fffuuu_failed - (Artwork by Mar - sudux.com)

fffuuu_failed - (Artwork by Mar - sudux.com)

Part 4: How Anonymous Has Failed in Theory & Practice

By Josh Corman & Brian Martin

2012

If you are new to this series, please begin with Part 0 and the index.

NOTE: We will post each installment here for the security industry to garner feedback for about one week prior to posting to Forbes.com and a more mainstream and business readership. Please comment toward improving/clarifying the content.

While this post in the series gets more critical than prior ones, the post to follow (Part 5) serves as its companion on potential ideas for mitigating some of the issues identified below. We expect (and hope for) comments and discussion on the content below – and expect much of it will be addressed further in Part 5.  Also note that this post was written prior to the arrests of alleged LulzSec members earlier this week. We will not dive into the details or recent press coverage in this installment. While some of the content below is relevant to these developments, it was written independent of them and with a bigger picture in mind.

Before addressing how Anonymous has “failed in theory”, it must be stressed that Anonymous is not an organization known for its internal consistency. There is no charter that lays out their theories and goals, so we must make our best guesses as to their nature. Their lack of stated beliefs is dual-edged and (in fact) one of their weaknesses and stumbling blocks – but we will explore this more in Part 5.

Failed in Theory: An Unmanageable Brand

Anonymous is not a simple group. It is more a group of groups. It is a brand or franchise which can be used or abused by anyone – and has been. The uncoordinated actions of one pocket can dilute, confuse, and/or adversely impact the overall brand and public opinion of Anonymous. These impacts can come by accident, but also via deliberate actions of imposters of various types. Since the court of public opinion is a major factor for the brand long term, this will increasingly be problematic.

Failed in Theory: Imposters are Legion

Since anyone can claim to be Anonymous, many imposters will. One CISO in the DC area claimed, “Anonymous is God’s gift to the Chinese” – asserting that the phenomenon allowed for easy scapegoating and “False Flag” operations which masked and served as distraction to straight up espionage. Other imposters from organized crime, law enforcement, and foreign agencies have been suspected and spotted as well. Beyond doing operations “in the name of” Anonymous, infiltration into their operations is also something that regular participants will have to expect as reality. The inability to trust others you are collaborating with is exhausting and eventually untenable for the average human. This state of war/inconvenience is why rationally self-interested people tend to form social contracts like those described by Hobbes and Locke respectively.

Failed in Theory: Unclear/Inconsistent Ideology

A mentor once told me:

“If you believe something, you should write it down. The more important the belief, the more critical it is that you are precise and clear in its articulation.”

To this we add:

“At some point, if you can’t state your principles, you may not have any.”

While some semi-consistent themes emerge, so do diametrically opposed actions. As time progresses, we sense that one reason no formal principles, code of conduct, or statements of belief have surfaced could be from fear that they know they will not all agree. Such tactical ambiguity may be beneficial in the short run, but can also come at the cost of greater impact and effectiveness. Can anyone state their top 3 beliefs? If we asked five members of Anonymous, would we get the same list? Maybe it is time to render these more explicit.

Failed in Theory: V’s Ideas Do Not Bleed… (but see above)

Anonymous’ iconography of Guy Fawkes draws immediate comparisons to the movie ‘V for Vendetta’. At the start of the movie, Evey (played by Natalie Portman), does a voice over:

Remember, remember, the Fifth of November, the Gunpowder Treason and Plot. I know of no reason why the Gunpowder Treason should ever be forgot… But what of the man? I know his name was Guy Fawkes and I know, in 1605, he attempted to blow up the Houses of Parliament. But who was he really? What was he like? We are told to remember the idea, not the man, because a man can fail. He can be caught, he can be killed and forgotten, but 400 years later, an idea can still change the world. I’ve witnessed first hand the power of ideas, I’ve seen people kill in the name of them, and die defending them… but you cannot kiss an idea, cannot touch it, or hold it… ideas do not bleed, they do not feel pain, they do not love…

While Anonymous does not directly quote this, many commentators and some who affiliate with the group will frequently use phrasing from it. There is a certain amount of romance in the notion that “ideas do not bleed”, and that Anonymous’ ideas and goals are like that. The decentralized group centered around common goals with a commonly accepted icon, the Guy Fawkes mask, further reinforces this kinship with ‘V for Vendetta’. However, there is a stark difference between the historical Fawkes or ‘V’, and Anonymous. Anonymous does not have one goal, nor do they have a list of goals clearly defined. While the group may embrace the notion that “ideas do not bleed”, the scattered and diverse membership and objectives will unfortunately lend to movements that are quickly lost in the noise, and to history.

The group’s own diversity and wildly varying causes will likely be the most significant contributor to their own ideas bleeding away, and eventually dying. As time passes, Anonymous will take on an increasing number of operations (ops). Some of their ops will resonate with larger numbers of the public, and some ops will remain mostly in the dark, rarely spoken about. The success of a high profile operation that appears to be a major win for Anonymous, may also be the same thing that effectively kills a half dozen smaller goals; some of which never left the planning stage as the group’s momentum carried them along the path of the higher profile op.

Failed in Theory: Winning the Battle, Not the War

As a group, or as individuals, Anonymous lacks long term vision. Only being able to focus on the here and now may be a side effect of the group’s nature, with members coming and going while limited resources are put entirely into the operation of the moment. Fighting one battle at a time, and not necessarily the most strategically sound battle, is not a recipe for winning a war. Small groups picking their battles is akin to guerrilla warfare. While problematic to an enemy with superior numbers and resources, such a tactic can be time consuming and very taxing on the smaller force. Without an end goal, without a defined way to ‘win the war’, Anonymous is left with a never-ending string of diverse battles and very few veterans to lead the troops. Big corporation (e.g., Visa), big money (e.g., Bank of America), and big religion (e.g., Scientology) have superior resources and deal with swings in performance and income as a matter of business. In short, they are used to the end result of an Anonymous operation. Some of these entities likely have a section of their disaster recovery policy that deals with protests. Even big crime (e.g., Zeta Cartel) will not be affected by a group such as Anonymous. After years of fighting a multi-million dollar war against law enforcement, they are well prepared for such an adversary.

The second problem Anonymous faces is that of commitment. While many core members of Anonymous are dedicated to the cause, a significant percentage of the group is made up of people that see themselves as casually involved. When your force is only half in the fight, your enemy has a significant advantage. The organizations that Anonymous fights are dedicated to their business, their bottom line. Showing up for a few hours on a weekend at a protest is great, but doesn’t send a message of being committed to the fight. This may give rise to hope in your opponent who sees waiting as a viable tactic. If your enemy is going to pack up and go home after weeks or months, you can focus on outlasting them, not beating them swiftly and surely.

The third issue we see, is that Anonymous sends mixed messages without realizing it. This is certainly a minor point, but most assuredly undercuts the message being delivered. For example, Anonymous has some level of involvement in the Occupy Wall Street (#OWS) movement. Activists in this fight write messages, communicate, and deliver manifestos complaining that corporations “have sold our privacy as a commodity”. They do this by delivering the message on Twitter and Facebook, two huge corporations that have undermined privacy in the most sinister of ways. Further, Anonymous has adopted the Guy Fawkes mask as one of their icons and wear the mask at protests and events. In doing so, they seem to forget that the rights to the image of Guy Fawkes is owned by Time Warner, parent company of Warner Brothers. Every time an Anonymous member buys a Fawkes mask, they contribute a tiny sum of money to a big corporation.

While minor, these points are not lost on the media and the companies they are fighting. Though Anonymous’ actions may go a long way to win the hearts and minds of some, the group also feeds their enemy by giving them weapons that can be used to undermine the group’s message.

Failed in Theory: Brand Management Examples

As we have mentioned several times, Anonymous is a nebulous group with no central leadership and no member roster. This is both a strength and weakness of the model. In the spirit of “building a better Anonymous”, we will focus on the weaknesses first, as they must be understood before they can be improved on.

With no list of members or official method for joining, any random person with a computer, Guy Fawkes mask, or fleeting desire can claim membership. This allows a single chaotic actor to commit an action that goes against Anonymous’ stated goals yet still claim to be part of the group. This in turn forces the group to issue a formal denial or denounce the actions of a person that is not part of the group, further reminding the world that their group makeup is questionable at best. If a rogue actor leaks a particularly sensitive database under Anonymous’ name, they have the ability to seriously hurt the public opinion of Anonymous. While the group may dismiss this, carrying public favor is an incredibly valuable tool in fighting perceived evil.

To counter this problem, Anonymous must figure out a channel for declaring projects, public action, or protests. The group already does this in many cases, but not consistently. If a goal or action is announced, even if it is not carried out, it helps confirm the legitimacy should an act be carried out. In the case of LulzSec, a splinter group of Anonymous, they maintained a Twitter feed that acted as their official channel to announce or deny involvement in activity. Falling back on “Did we Tweet it? No? Then not us!” became a simple and reliable method for journalists and bloggers to determine their involvement, should they be bothered to fact check.

In our previous article, Fact vs. Fiction we highlighted a recent example that clearly illustrates the weakness in an open model. The recent attack on Stratfor by Anonymous, as credited on the defaced Statfor web page quickly gave way to an “Emergency Christmas Anonymous Press Release” in which Anonymous claimed they were not responsible. Not even a day later, another release appeared once again taking credit as Anonymous. This will continue to be a problem for Anonymous in the future, and likely be used as a method to undermine the Anonymous brand.

To date, it appears that a handful of independent would-be do-gooders have been the only ones to undermine Anonymous in such a fashion. Anonymous simply isn’t prepared to deal with an adversary that uses this against the group intentionally, especially in bigger and more public ways.

First Rule of Anonymous; Stay anonymous

The second rule of Anonymous; stay anonymous. This amusing reference to Fight Club may seem a joke of sorts, but in reality it is an object lesson in how Anonymous is failing. Our preliminary count at the time of this posting shows the number of arrests or “busted” (search/seizure) is around 175 – including the 25 interpol arrests last week and the LulzSec arrests this week. The fundamental purpose of anonymity and presenting a uniform singular image is to strip away personal identity when committing an act of disobedience. Violating anonymity, whether it is at the hands of an Anonymous member, or through the diligent work of law enforcement, gives their enemy a win. Lapses in operational security (OpSec) are not just a matter of “leaking an IP address or name”, it may have a more serious impact such as being arrested or facing retaliation from a rival entity.

Some members of Anonymous dismiss these busts as inconsequential, stating “they weren’t really a member”. In some cases, when a high profile pseudonym is busted (e.g., Topiary), there are replies from the group saying “that wasn’t the real Topiary”. Such claims may be the truth, or disinformation. Eventually, claims that the police “got the wrong guy” become disingenuous as they simply can’t be wrong all the time. Either way, Anonymous appears to miss the more important point; each bust, no matter if legitimate, works against the group in several ways.

First and perhaps most importantly, every time law enforcement (LE) busts a member of Anonymous, public perception is swayed. The bust is always covered in the media, and the resulting press tells the public that law enforcement won a victory that day. This is LE’s attempt to win the ‘hearts and minds’ in the never-ending battle for public opinion. Second, if LE continually busts members, it may severely impact Anonymous’ recruiting efforts. Potential members or contributors that see a long string of arrests may reconsider becoming involved. Third, statistics are on LE’s side. For each person busted, there is a chance that they may seek a more lenient sentence and do so by turning state’s evidence. Even worse, they may become an informant who helps to infiltrate the group and report subsequent activity to law enforcement. NOTE: Much of this seems to have transitioned from theory to practice as of this week’s LulzSec / FBI activity.

Failing in Practice (aka Pyrrhic Practices)

This criticism of the theory behind Anonymous is not simply academic. The failure in theory has led to failures in action, as illustrated in the following examples. Note that as is often the case, the public does not have all the details of a given incident. We can only make these observations based on what we know.

OpBART – More Wrong than Right

In August, 2011, there was a flurry of news regarding Anonymous protesting the Bay Area Rapid Transport (BART) administration. This lead to a wide variety of drama as BART jammed cellular telephone signals at some of the stations, leading to cries of censorship and concerns for safety (e.g., inability to dial 9-1-1). Anonymous called for several types of attacks as well as defaced the mybart.org site as well as leak user data from the site. There are several issues with this operation that question if Anonymous is really helping and/or getting their message out there.

First, there is relatively little coverage of why the protests were originally called for. More mainstream media such as the Tech Herald wrote one piece on opBART, but did not cover the history. Non-mainstream sites like KnowYourMeme are about the only ones who give a concise and clear explanation of what prompted the protest (the shooting of a homeless man by two BART officers months earlier). Listening to Anonymous’ own two videos don’t give background. The leaking of mybart.org user emails, passwords, addresses, and phone numbers certainly doesn’t punish BART, rather it punishes their customers; the average citizens Anonymous claims to fight for. Between the lost message and collateral damage, Anonymous seams to undermine the overall message.

OpDarknet – A Question of Ethics

In what appeared to be a significant win for Anonymous, news broke about the group shutting down part of ‘Darknet’, a shadowy technical network dedicated to sharing child pornography among other things. This event, announced via pastebin, certainly garnered more attention, reaching the mainstream including CNN and Fox News. With child pornography, it is seemingly the universal immoral act that everyone is against. After Anonymous took out ‘Lolita City’ and ‘Hard Candy’, two sites dedicated to child pornography, a third site was compromised and declared to have the same material. In reality, OpDarknet called Anonymous’ own ethics into question as much as their victims.

Shortly after the news broke, a blogger named ‘Justice Duck’ wrote a piece that presents compelling evidence that the third site brought down by Anonymous was not actually a child pornography site at all. Based on the blogger’s research, it appears that the only person who likely had virtual child porn was a member of Anonymous. In addition, with the release of the densetsu.com site’s user list, Anonymous advocated the harrassment of what appear to be legitimate users (including many females) that are likely innocent of any allegations related to such pornography. The site’s members that signed up because of their interest in Hentai were in turn branded ‘child porn traders’ and paedophiles. While some may argue that Hentai is ‘virtual child porngraphy’, remember that law enforcement and retailers disagree.

There are enough bad actors committing heinous crimes out there, that Anonymous should never have to resort to the same criminal and unethical behavior as their targets do. Further, vigilante takedowns may complicate/undermine justice. If systems were compromised, is any evidence against true criminals contaminated and therefore inadmissible? What is to stop the attackers from planting false accounts to smear enemies? Given this subject matter, suspects are especially “guilty until forever” in the court of public opinion.

Texas Takedown Thursday (#ttt) – Crime vs. Bureaucracy

Anonymous has been in a half-year war against law enforcement, targeting their systems and releasing sensitive data. In an operation titled Texas Takedown Thursday, Anonymous released extensive emails and details from TexasPoliceChiefs.org. Some of the emails released exposed a variety of problems within law enforcement including abuse of government resources, racist and sexist messages, and pornography. Such an exposure is likely good for the citizens who pay the salary of law enforcement via tax dollars. On the other hand, criminal trespass into a computer system to leak the emails may not be as effective as other legitimate avenues.

In a Star-Telegram article about the incident, Saginaw Police Chief Roger Macon made the observation that “[Anonymous] could have had … a whole lot more [e-mails] just by sending a public information request.” Some of the emails leaked that were marked ‘Law Enforcement Sensitive’ may not be covered under such requests, but a surprising amount of information is available from all levels of government offices if you know how to ask correctly. After figuring out the procedures which vary on a nearly per-office basis, it becomes pretty straight forward.

If Anonymous is truly intent on opening government records, a coordinated series of Freedom Of Information Act (FOIA) requests would be interesting and potentially compelling. To date, Anonymous does not appear to have considered this route, instead relying on computer intrusion to obtain documents. A completely separate, but more relevant issue to the law enforcement leaks, is that Anonymous is leaking data that puts police officers and their informants at risk. You may not agree with some police activity, but to put them at increased risk of violence or attack does not help anyone, especially the citizens they are supposed to protect. It also damages the Anonymous brand in the court of public opinion. This is not because breaking any law will be judged. Rather what may be judged is breaking laws unnecessarily or breaking “unjust” laws without the aforementioned, articulated ideology to support the “unjust” claim.

OpSatiagraha – Separating the Wheat from the Chaff

The last year has seen Anonymous leak a considerable amount of data from the victims of their hacking. The leaking of user databases and thousands of emails is becoming a routine part of their hacktivism methodology. The downside to such data dumps, is that the amount of information is overwhelming to a majority of would-be readers. As Scot Terban writes, the material is often interesting, but “it’s certainly not earth shattering.” Hundreds of megs (or gigs) of data with no context or analysis, puts the burden on journalists to scour the information looking for the juicy bits. Anonymous will go so far as to imply a conspiracy or overstate the scope of the data being released, only to leave readers underwhelmed when the data is finally made public.

When faced with thousands of routine email correspondences, finding the handful of gems becomes the more valuable service. This is something that Wikileaks has had to contend with over the years. Rather than rely on journalists or hope that a member of Anonymous will pick out the material of interest, Anonymous needs to focus on analysis as much as providing the data dumps. For all we know, they could have leaked earth-shattering information a year ago, and it was simply lost in the noise. Without methodical analysis of each data dump, we may never know.

While these failures in theory and in practice are not exhaustive, we now have a basis for discussing some ways one could “build a better Anonymous” in Part 5 of this series.

Which failures, weaknesses, or challenges would you add? Please comment below.

Copyright 2011-2012 by Josh Corman and Brian Martin. Permission is granted to quote, reprint or redistribute provided the text is not altered, appropriate credit is given and a link to the original copy is included. Custom graphic courtesy of Mar – sudux.com.

Should you feel generous, please donate a couple of bucks on our behalf to any 501(c)(3) non-profit that benefits animals or computer security.

RSA 2012 Preamble

Posted: 2012/02/15 in Conferences
RSA 2012

RSA 2012

RSA 2012 is close upon us (Feb 27th – Mar 2nd) – for better or worse.

Love it or hate it, RSA is the single largest security conference of the year – and if the security industry has a rhythm and a cadence, then it is the RSA Conference sets it.

Though I sometimes quip that:

RSA is mandatory punishment

or

Every year at RSA I want to quit security

…there is no denying the importance of the event on framing the upcoming year’s buzz words, topics, trends, etc.

Below are:

  • a few quick thoughts on how to make the most of the conference week
  • a few topics/times I’ll be speaking in case you’d like to catch me

People Value:

The best parts of the RSA conference aren’t the actual conference. Be sure you embrace the Hallway-Con, the Bar-Con, the Lobby-Con, and nearby eateries… People are what drive the progress of our industry more than any vendor or sponsored keynote. We are blessed with some very creative minds and dynamic personalities. Network as ferociously as you can. My best collaborators have been born from happenstance chats in some hallway or lobby.

Non-RSA Venue:

Some of the best talks and debates are at adjacent events to RSA. BSides and BSidesSF has become a force (despite its growing pains). I get a ton of value out of the AGC Security Conference (America’s Growth Capital) which brings great content to a high octane audience of the investment community, the founders of innovative start-ups, and potential acquirers. Mini-MetriCon 6.5 continues to push the rock up the hill to drive us from faith based security to evidence based models. There are a myriad of other events and working groups which converge that week. While many are closed or filled up by now, do some digging – as they are well worth it.

The Exhibit Floor:

While the exhibit floor is a bit of a Bizarre Bazaar (Hat Tip to Neil Gaiman), you must try to walk the floor. Embrace the horror. Treat it as a Tour de Force of what matters and what doesn’t. Of who is a source of SIGNAL and who is a source of NOISE. In fact, develop a justified, righteous indignation against hyperbole, FUD, and vendor B.S. Vendors do this because they can, because we let them, and because there are seldom consequences for doing so. Provide the feedback loop that alters that equation for them.

Last year I walked the floor with Paul Roberts and we gave this a try. We knew just about ever vendor, who had the goods, who was full of [insert your favorite here], etc. We saw maybe a dozen vendors making credible claims about emerging security challenges and offering valuable products/services in response. We asked each vendor who was thumping APT to define it – with nearly none of them even close to real substance. Asking for specifics will quickly reveal the snake-oil from the substance. We even quipped a safe rule of thumb (at least last year):

The frequency of the phrase “APT” by a vendor is inversely proportional to their actual expertise or comprehension of it

Put the vendors to the test. Ask for specifics. Maybe take some dramamine 1st.

My Speaking Slots:

Monday, February 27, 12:30 PM – RSA – Room 302

PROF-001 – Stress and Burnout in the Information Security Community

Jack DanielStacy Thayer,  Gal ShpantzerMartin McKeay, Joshua Corman (and @kcyerrid shhh!)

We’ve done real survey work with proven non-security-models and this is an important topic. We did a less formal version at BSidesLV 2011 with great feedback, validating the need for this.

Monday, February 27, 3:00 PM – AGC’s Security Conference – Main Stage at Westin Market St

PM Keynote: Apocalypse Now: Adapting to Espionage and Chaotic Actors

Joshua Corman

I’m excited to confront the VC and Investment community to actually rise to substantive changes in the space – versus repackaging old “kit” into the latest compliance or FUD buzzwords. This industry used to innovate, and it is time to again. What’s really cool about this, is my keynote is followed by two child panels: one on adapting to Espionage developments – one on implications of Chaotic Actors. With the money and the innovators in the room, confronting these topics, perhaps we can catalyze some action.

Tuesday, February 28, 1:10 PM – RSA – Room 305

CLD-106 – Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed

Gene Kim & Joshua Corman

Gene and I have been collaborating for a little over a year and a half on this topic. I’m most excited about this one. **BONUS POINTS if you can name the movie reference in the title

Here is a short podcast teaser we did with RSA

Wednesday, February 29, 9:30 AM – RSA – Room 309

GRC-202 – Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?

Joshua Corman & David Etue

David and I have been working this idea for several years. After last year’s pantheon of adversaries and pervasive failures became clearer, more practitioners may be ready for this concept. HDMoore’s Law will be discussed.

Here is a short podcast teaser we did with RSA

If you need/want to reach me while there, hit me on twitter: @joshcorman

RSA is what you make of it…

  • What are you expecting?
  • What are you dreading?
  • Which people/talks are you eager to see?

Anonymous Good and Evil (Artwork by Mar - sudux.com)

Anonymous Good and Evil (Artwork by Mar - sudux.com)

Part 3: How We All Got it All Wrong

By Josh Corman & Brian Martin

2011

If you are new to this series, please begin with Part 0 and the index.

NOTE: We will post each installment here for the security industry to garner feedback for about one week prior to posting to Forbes.com and a more mainstream and business readership. Please comment toward improving/clarifying the content.

Like many, early on we carried a cognitive dissonance about Anonymous. Is this a good thing? Or a bad thing? Many people seemed to approve of the attacks against Scientology – or Anonymous’ apparent passion for transparency and their crusade against corruption. Helping oppressed people in Tunisia and Egypt? Absolutely, people see that as a force for good. Others operations however, were a bit more disconcerting for the onlookers. Leaking personal details of law enforcement, their families, and confidential informants did not sit well with many.

Riding on the back of Part 2: Fact vs Fiction, there are some additional points to make. When we explored fact and fiction, many of the points were based on a lack of understanding. In this article, we discuss how we collectively “got it wrong”. This moves beyond misconceptions born out of poor reporting or conflicting information, and into the realm of our simple lack of understanding. Further, it highlights that as a society, we seem to be unable to learn from our history. As George Santayana famously said in The Life of Reason,

“Those who cannot learn from history are doomed to repeat it.”

Everything Old is New Again

Regarding this article, the concept of speculating and proposing a “better”, more efficient, and more serious adversary is old. Government sponsored think-tanks and the U.S. military have been doing this for decades. With regard to Anonymous, the idea of the group is also not new. All of their diverse traits seen in a single group, even if nebulous, may be new to most people. However, many in information security or law enforcement have been exposed to most of these traits before. The concept of Hacktivism has been going on for well over a decade, primarily through groups defacing web pages with political messages.

Disregarding the apparent disconnect between a “computer-based group”, as Anonymous is often considered, and more traditional groups, the traits of Anonymous become more prominent. Compare some of the actions of PETAthe Black HandKu Klux KlanWeather Underground, or Earth First to some of the actions of Anonymous. Despite their goals being diverse, and each group having their share of radical members, there are many parallels to be drawn.

While they have far less in common than a broad swath of their members or observers would think, their common traits are certainly there. Each group is frustrated about their raison d’etre. Each group believes in presenting a unified front outwardly while embracing diversity and resilience internally. Despite being a heterogeneous group sociologically, Anonymous does a good job putting forth a homogeneous image (arguably propaganda) through the use of iconography and central messages.

Being Dismissive is a Disservice

Over the last year, many media outlets, pundits, and security professionals have given commentary on Anonymous and LulzSec. In many cases, the tone of the commentary has been negative, with the commentator essentially dismissing the groups’ actions. In some cases, it has been a general dismissive “the group is not effecting change” line. In other cases, pundits outright deride LulzSec as having no advanced hacking skills and only attacking the “low hanging fruit”. While most, if not all, of their hacking exploits have been easy to find and exploit, these pundits are missing the bigger picture.

First, LulzSec didn’t need more sophisticated exploits to compromise these organizations. An attacker is only as sophisticated as they are required to be; when companies don’t make it a challenge for attackers, there is no reason to use more advanced attacks. If large companies and law enforcement are protecting such valuable information, why are their own security programs not catching the low hanging fruit?

Second, what if the high profile compromises using basic exploits are just a noisy cover hiding the real activity? The concept of misdirection when hacking has been around for over twenty years. It is dangerous to assume that we know the whole picture when we are only seeing what makes the front page. There are two aspects to this idea: LulzSec could be using some of these attacks as a method of distracting onlookers from their real goals, or third parties unaffiliated with LulzSec and Anonymous may be using their brand for misdirection. For example, a disgruntled employee could launch a denial of service attack against his employer and embed a message such as “We are legion” in it, giving the impression the attacks are the work of Anonymous.

“Pretenders” also came up during the Q&A following our DEFCON 19 panel. Several in-room members of Anonymous claimed the two large Sony breaches of credit cards were “not us” but rather “the Russians” – as many suspected. Regardless, many have been dismissive of the group or the impact of an attack – until they’ve been on the receiving end.

The Media’s Field Day

To say the media has collectively had a field day with coverage of Anonymous is certainly an understatement. The group’s diverse actions, ranging from in-person protests or virtual sit-ins (DDoS attacks) to leaking information from hacked corporations, provides a gold mine of drama-rich news. The lack of a central authority or official channel for public statements from Anonymous helps the media run wild, and Anonymous must play a game of catch-up when trying to hold the media accountable. The perception that Anonymous is new and a game changer has led many media outlets to go to press without finding a qualified person to speak on the matter. Simply grabbing the nearest mouthpiece, that frequently has a personal or corporate agenda, does not help the media, Anonymous, or the public.

When LulzSec splintered off from Anonymous, the more revealing story was not the material results of their hacking; rather, it was the sad commentary on infosec-centric and mainstream news coverage alike. After 50 days of hacking into a wide variety of sites, accompanied by a high profile predominantly Twitter-based media presence, the pressure added up. With the looming threat of law enforcement catching up to them, LulzSec announced their retirement on Pastebin and broadcast it via Twitter. While the announcement was deemed inevitable, many figured we hadn’t heard the last from them, and they were right. Some in the mainstream media announced it and gave commentary on why it was inevitable and certain.

One of the most noticeable traits of media coverage during the 50 days LulzSec was active, was the lack of truly critical press. Publications and authors that have been more vocal and firm in the past seemed to pull their blows when covering the hacking activity of LulzSec. Since the group was executing a wide variety of attacks, and supporters of the group were carrying out DDoS attacks against detractors, it appeared that journalists were scared to be overly critical. Paul Carr wrote for TechCrunch saying “Please Hacker Don’t Hurt Us: The Media’s Coverage Of LulzSec Has Been Cowardly and Pathetic”. It should be noted the irony that this article came a day after LulzSec posted their retirement message. Worse, the timing of the article and criticality suggests that Carr, like many others, felt that the group was truly done and their “vandalism spree” was finished. Similarly, Bill Brenner wrote an article for CSO Online called “Whatever, LulzSec”, two days after the retirement message. The timing of these articles suggest the authors feared potential retaliation from LulzSec should their message be construed negatively. Provoking these groups may seem undesirable, but it would also prove an interesting point; if Anonymous or LulzSec retaliate over poor press, they may be considered the tyrants they so oppose.

Arresting Anonymous Won’t Help

The pursuit of Anonymous is just as futile as it is necessary. Thinking of the group in terms of traditional crime simply doesn’t hold up. This group is not four people that have been knocking over banks, where bringing even one of the four to justice may stop further robberies. For each Anonymous member busted, another will take his or her place, maybe two. That said, law enforcement cannot let the group go unchallenged. Public and corporate pressure to put a stop to their activity is stronger than ever. With a nebulous group that has new recruits ready to step in for fallen comrades, it could be a never ending battle. With a seemingly endless supply of new recruits, all with a strong belief in the movement, a few dozen arrests won’t put a dent in the organization.

Some have suggested the only way to truly stop these groups is to capitulate, and meet their demands, which is as much a pipe dream. With a diverse set of demands, that are often not well defined, or more of a general principle such as “maintain secure networks”, meeting them is often not possible. If you take away the reason someone is protesting, they will generally stop. Locking them up or pushing back rarely leads to a real solution. As Natalie Portman’s voice over in ‘V for Vendetta’ said,

“We are told to remember the idea, not the man, because a man can fail. He can be caught, he can be killed and forgotten, but 400 years later, an idea can still change the world.”

Anonymous Alleged Mugshots

Anonymous Alleged Mugshots

(Source of mugshots: talkingpointsmemo.com)

Even with dozens of arrests in several countries, there is no indication that Anonymous is dissuaded.

Occam’s Razor Cuts Deep

Like most current topics, a prevailing trend in media coverage of Anonymous is heavily based on making assumptions. A news organization may receive one or two pieces of information about a situation or scandal, then fill in the blanks with their best guesses. We’ve become accustomed to news coverage that consists of a commentator standing by repeating the same fact over and over, interjected with their guess of additional facts. Moving beyond the simple (e.g., “the politician is greedy”), commentators will speculate wildly about state of mind or other actors that may or may not be involved. We, the viewers, are the cause of this. As a society, we are willing to forgo logic and simplicity in favor of drama and intrigue.

For Anonymous, a group largely grounded in the Internet as a medium and meeting place, the theory of Occam’s razor is largely applicable. Combine with that the Online Disinhibition Effect, and it becomes obvious that many are acting out because they can. More interesting is the notion that the casual members and new recruits, viewed as ‘cannon fodder’ by some, are the ones acting out the most. Further, they feel safer with a layer of anonymity and perceived protection that they do not enjoy in real-world protests or activity. In some cases, it is simply a matter of the participant not fully understanding technology and how it relates to anonymity. They feel that being virtual protects them, without understanding the exposure of a disclosed IP address that has not been masked with effective technology (e.g., TOR, proxies).

On the flip side, many members of Anonymous are proving that the Online Disinhibition Effect only goes so far. With members helping in Internet activism before proceeding to a local protest to square off with those they are protesting, anti-protestors, and law enforcement, one has to accept that not all members act differently simply because of perceived Internet anonymity. As this happens, media outlets are guilty of varying degrees of projection, assigning traits and beliefs to persons that have made no definitive actions of the sort.

In challenging the integrity or morals of someone that hides behind a mask or computer, many of us fail to realize that dissociative anonymity may also be helping our society. The protection provided by that anonymity may be leading people to find the strength or freedom to say things they wouldn’t otherwise. At DEFCON 19, one member of our panel began the session wearing a mask. When we asked the audience if he should remove it, a majority said “no” (with a noted selection bias). This lends to the idea that many sympathizers don’t want Anonymous unmasked, perhaps as a way of supporting or agreeing with a majority of their actions; or simply out of fear of repercussions. Like most tools, anonymity can be used for good or evil.

Those seeking anonymity may include people effectively whistleblowing, arguably a valuable public service that puts them at risk for the greater good of society. Further, asynchronous communications may be fueling people to embrace speaking out. The ability to voice opinions or share information on message boards, via e-mail, or on web sites, without immediate backlash or punishment is a powerful motivator for opening up and sharing.

There are many factors that contribute to the actions and mindset of a person affiliating themselves with Anonymous, LulzSec, or any group tangentially related to Anonymous. Despite all of the speculation and possibilities enumerated in this article, Occam reminds us that a group such as LulzSec may truly be doing it all “for the lulz“. Every time the media or an analyst takes a guess or makes a suspect claim about Anonymous’ motivations, it is important to go back to a more simple explanation and give it serious consideration.

Copyright 2011 by Josh Corman and Brian Martin. Permission is granted to quote, reprint or redistribute provided the text is not altered, appropriate credit is given and a link to the original copy is included. Custom graphic courtesy of Mar – sudux.com.

Should you feel generous, please donate a couple of bucks on our behalf to any 501(c)(3) non-profit that benefits animals or computer security.

2012 Social Security Bloggers Awards

2012 Social Security Bloggers Awards to take place at RSA

It’s an honor just to be nominated.

A few weeks ago, the nominations for the 2012 Social Security Bloggers Awards came out.

Given how spanky new this blog was, I was shocked to see it receive a nomination for “Most Educational Security Blog“. This is a tough category and a humbling one. I almost took it as a suggestion/challenge to rise than any other meaning. I do really try to add signal and researched backed concepts (versus simply adding noise) – so I feel great that at least a few noticed that. I also want point out that Brian Martin (aka Jericho @attritionorg) has co-authored the “Building a Better Anonymous series” – and therefore is also part implicated/reponsible.

Regardless, I am honored to have “Cognitive Dissidents” included among some excellent resources (pasted below):

The Most Educational Security Blog:

Cognitive Dissidents https://blog.cognitivedissidents.com/

Tao Security http://taosecurity.blogspot.com/

F-Secure blog http://www.f-secure.com/weblog/

The New School Security Blog http://newschoolsecurity.com/

AppSecInc Blog http://blog.appsecinc.com/

Evil Bytes/John Sawyer http://www.darkreading.com/blog/archives/evil-bytes/index.html

All of those are excellent resources. I’d probably vote for The New School Security Blog. Each offer something different, so I’d highly encourage you to try them each.

There are many great nominees for various categories of BLOGs and Podcasts. If you haven’t taken a look, I’d encourage you to do so. There are also some glaring omissions from some of the nominees, so feel free to suggest write-ins or ask more about the nomination process.

E.g. Best Security Podcast  was missing Risky Business and the Social-Engineer.org podcasts – the former being the best source of weekly security news and the latter being one of the most structured and educational in its monthly format.

Like the SAG (Screen Actors Guild) awards, these are voted upon by other bloggers. You need a security blog to vote. If you have one, and have not voted yet, please do so before it closes. Here’s a convenient link to the voting form.

Like many of you, I feel a bit conflicted about these kinds of things. Sure there is a bit of echo chamber and digerati and cult-of-personality stuff with any of these awards. That said, there are some truly excellent researchers and bloggers who devote a ton of their personal time to helping advance this space. This is a small, easy way to acknowledge their contributions.

Telling Fact from Fiction since we see what we WANT to in Anonymous - (Artwork by Mar - sudux.com)

Fact vs. Fiction? we see what we WANT to in Anonymous - (Artwork by Mar - sudux.com)

Part 2: Fact vs. Fiction

By Josh Corman & Brian Martin

2011

If you are new to this series, please begin with Part 0 and the index. You may also recognize the above ink blot from a short post in November (which has several comments worth reading).

NOTE: We will post each installment here for the security industry to garner feedback for about one week prior to posting to Forbes.com and a more mainstream and business readership. Please comment toward improving/clarifying the content.

The story of Anonymous is interesting. Some of the activities and exploits of the “group” are surely entertaining. As such, the media tends to run wild and loose with fact, injecting a healthy dose of fiction along the way. With as much truth as fiction in the news, it makes it difficult to understand and accurately portray such a group. It skews our perception of Anonymous’ activities and goals. Reporting with a lack of information or perspective is often just as big a disservice as reporting inaccurate information.

After our DEFCON 19 Panel “Whoever Fights Monsters…”, we had several intense discussions with many attendees and even some self-identifying members of Anonymous. While there were many take-aways, our biggest was that one of the reasons our collective narrative is so far off base is due to a bit of a Rorschach effect. We see in Anonymous, what we want to see. We project. Our narrative says more about us than it does about them. Just because we may want them to be “demonstrating insecurity in order to catalyze better security”, doesn’t mean that’s what is driving them. In fact, there isn’t even one singular, monolithic motivation or cause – and that is one of the next points.

With that, we examine some of the myths and fiction surrounding Anonymous. Anonymous is surrounded in contradictions and represents a paradox. Exploring the paradox is part of the dialogue, as contradictions are inherent in the subject matter.

Fact or Fiction: Leadership and a Defined Group

Anonymous is a loose collective with no membership roster, not a monolithic group. One could say it is an “idea”, but even that is incorrect, as it is a collective of ideas. Without structure, without a roster, without leadership, how can a collection of people even be called a group, let alone affect change? Despite that they call themselves a group, and by definition they are one. They assemble under the banner and ideal of Anonymous. What exactly that is, is hard to nail down. The idea of such a nebulous group that can usually work together to achieve a goal is a foreign concept to most people. For law enforcement, who is already struggling to break away from the mindset that digital criminal organizations are like the Mafia, Anonymous represents an entirely new paradigm.

To add even more confusion, Anonymous may have equally undefined sub-groups; people who associate with Anonymous, but only to participate in a specific cause or action. These pockets have different backgrounds, different motivations, and different levels of involvement. When people seem surprised that Anonymous did this or that – that it may be “out of character for them” – this is often due to the fact that they assign a singular, cohesive persona and timeline to one group – when reality is more of a morphing plurality of parties and interests. Commentary from the group mentions a hive mind, or collective consciousness in psychology. Using IRC and Twitter, the group gathers like-minded individuals for operations and they effectively become a cell of the group.

Take for example the recent attack on Stratfor by Anonymous. The initial news reports credited the attack to Anonymous, as the hack and defacement of the Stratfor web page was signed Anonymous. Shortly after, an “Emergency Christmas Anonymous Press Release” was released claiming the attack was not the work of Anonymous. A day after that, another release appeared once again taking credit as Anonymous. This back-and-forth credit game perfectly punctuates the problem with such a decentralized group.

Anonymous is less of a cohesive singular personality than it is a brand or a franchise – which can be borrowed by anyone – and it has been. “Anonymous is not Unanimous”. This introduces complications for the group, when anyone can claim involvement and then tarnish the brand. This can be used by a bored person or a more organized subversive group that seeks to undermine Anonymous.

Family Tree courtesy of Eric Limer - click for his full piece

Family Tree courtesy of Eric Limer - click for his full piece

More importantly, there has been at least one splinter group, LulzSec, that formed from Anonymous. A month after splintering, LulzSec and Anonymous announced that they “made up” so to speak, and fully support each other. With multiple groups operating and focusing on different goals, while still not having a defined roster, the question of membership becomes more important. This becomes evident when a journalist must qualify an interview in the headline: Our ‘Possible’ Interview with a Member of LulzSec. The first part of the article further articulates the confusion:

DataDoctors First question: How do we know that this is really a LulzSec account and not a wanna be fan?

Lulzsec: We do not represent the twitter voice of LulzSec. We are the original founders.

Further updates to the article indicate LulzSec denied this person is legit, while the interviewee insists they are part of a splinter group of LulzSec. Regardless, the one thing that is abundantly clear is that leadership appears to be in short supply. Despite that, there is some sense of leadership, as hundreds, if not thousands, of members can mobilize to achieve the same goal. Temporary thought leaders can emerge on designated IRC channels. Anyone can take up this title by being in channel and making an argument that people want to follow.

Fact or Fiction: Hacktivism is New

Digital or Internet activism is the use of technology to facilitate a group of people to more effectively communicate over large distance in order to effect some form of change. When one of the methods used to this end is hacking (generally accepted as committing some form of computer crime), the term “hacktivism” is used. Anonymous has used hacking as a vehicle to expose private information they felt should be public.

Hacktivism predates Anonymous by a decade a more. Perhaps the first documented instance comes from 1989, when a malicious worm called “WANK” was used to protest nuclear weapons. According to Wikipedia’s timeline of hacktivism, the first incident of hacktivism not involving self-replicating software was the “Intervasion of the UK orchestrated by a group called the Zippies on Guy Fawkes Day”. While unrelated to the group Anonymous, the coincidence of it occurring on Guy Fawkes Day is certainly interesting.

Not all hacktivism involves illegal activity. The legitimate use of technology to gain access to information from diverse sources and piecing it together can often appear to be the result of hacking. Using open-source intelligence (OSINT) to piece together details, it is possible expose a wide range of information that may not have been thought of as public, despite being available to anyone that looked for it. This activity historically took the form of “doxing” (document dropping), an old practice of exposing detailed personal information about an individual such as name, phone number, address, or relative names. Primarily used as a threat or indirect attack, exposing a person conducting illegal hacking in such a way can assist law enforcement in apprehending the person. However, by publishing information on people in sensitive positions (e.g., law enforcement that may be undercover) or persons wishing to stay out of the spotlight (e.g., political donors), “doxing” can be used by activists in a similar manner.

Fact or Fiction: A Force for Good

A fundamental trait of many original Anonymous is their desire to do good. The group’s actions are born out of a sense of righting wrongs and combatting injustice. There is an ethical delimna when achieving goals in pursuit of good require breaking the law, but it is one the group sees as a necessary evil. Despite good intentions, some of the group’s activities are certainly questionable, while others are clearly misguided and do more harm than good.

In early December, 2011, Anonymous drew criticism for “OpRobinHood”, an operation intended to steal from the rich and give to the poor. This idea was great in theory, but many suspected it would end up hurting the common people, not banks or big corporations. This was put to the test when credit cards pilfered from the Stratfor hack were used to donate to several charities. Instead of helping charities, the fraudulent transactions are being returned. Not only did the money not end up helping the charities, the misguided attempt to help ended up causing them administrative overhead in trying to make things right. Worse, at least one charity said they are charged $35 for each fraudulent transaction and pleaded with Anonymous not to make any more donations. The full story and operation have yet to play out, but early signs show that things are more complex and more cleanly ‘good’ in practice, than in theory.

Ultimately, in attempting to help the poor and needy, Anonymous has hurt both charities and common people. The credit cards taken from Stratfor were not corporate cards tied to faceless businesses. They were mostly personal credit cards of average citizens, including some that had to close their accounts and did not have the money donated. The banks will likely not absorb the cost of the fraudulent transactions. Rather, they will pass the costs around to merchants in the form of additional fees. This may in turn lead to an increased cost of service as merchants pass the costs down. In the end, Anonymous may have robbed from the poor, not the rich.

Fact or Fiction: Anonymous and LulzSec Make you Vulnerable

The classic phrase, “don’t shoot the messenger” must be remembered. While it takes a criminal to break into your system and cause some form of mischief, that person did not make your system vulnerable. They merely exploited the vulnerabilities that were already present. Either through manufacturer defect or misconfiguration, the system has weaknesses before the hacker attackers. The private information that is being exposed by groups such as Anonymous and LulzSec was being stored on systems with inadequate protection.

Members of LulzSec have claimed their activity was based on showing that the emperor has no clothes. Subsequently, LulzSec believes they have revived the Antisec Movement, focusing on general insecurity, where the original movement was based primarily on exposing problems with security companies and professionals. Others following in the footsteps of LulzSec fomented the Antisec Movement by attacking not only security companies, but any other company they found to be vulnerable.

Fact or Fiction: Anonymous and LulzSec are a Terrorist Organization

Until recently, most media outlets and victims of Anonymous’ actions have labeled them a nuisance or criminals. With the publishing of the Arizona Department of Public Safety confidential documents, Jimmy Chavez, president of the Arizona Highway Patrol Association, went one step farther by labeling them a terrorist organization:

“They don’t need any additional pressure on them from a — let’s just call it what it is — a terrorist organization.” — Jimmy Chavez

Noted privacy researcher and advocate Dissent once commented, “It was a Class C misdemeanor when an AZ state employee revealed PII that endangered others, but when @LulzSec did it, it’s ‘terrorism?'” Chavez’ labeling either group a “terrorist organization” is disingenuous and self-serving at best, as Anonymous / LulzSec’s activity certainly don’t fit the definition of terrorism. Increasingly aggressive acts against policy makers and law enforcement will certainly invite the term ‘terrorist’, even if it is misapplied. In addition, given the diverse nature of the group, many members or people that identify with Anonymous have morals that would preclude them from staying involved if they thought they were close enough to even be mistaken for “terrorism”. Further, such a brand would work to counter their objectives and movement.

Fact or Fiction: They Are Not Moral

Cries that Anonymous is not legitimate in the activism movement because of a supposed lack of morals are shortsighted. It simply does not matter if you feel they are moral or not. Their activities are not about your morals or values. Ethics are a secondary thought at best; if Anonymous feels that a specific action will have the desired result, they act based on their perception of the greater good. It is clear that to many involved, the ends justify the means. In other cases, for some members of Anonymous, the real-world consequences for their digital activity may not be fully realized.

As previously covered, the notion that such a group adheres to any one set of beliefs, morals or code of ethics is wrong. With a large, nebulous, diverse group such as Anonymous, we must also consider that decisions are unlikely to be made according to any one person’s sense of morality (more on this later), making it difficult to ascribe an ethical standard to the group as a whole. There are simply too many factors at play and too many individuals affiliated with the group to ascribe a binary value of “yes” or “no” to the question of Anonymous’ morals.

Fact or Fiction: The Concept of “Organized Chaos” is Absurd

As people try to wrap their head around the concept of such a fundamentally different group, conclusions are reached that seem contradictory. The idea that a group or idea can be “organized chaos” appears to be an oxymoron, yet it certainly applies. The loose structure, lack of central leadership, diverse objectives, and wide range of tools at their disposal speak to this. They are certainly organized, as demonstrated by the BART protests. They are also most assuredly chaotic, practicing a form of civil disorder that borders on general chaos.

The concept that organization and logic can be found in chaotic situations has been studied and falls under the category of a complex adaptive system. Both Murray Gell-Mann and Kevin Dooley write about the topic as it applies to a variety of systems, including socially. Dooley writes:

Contingency theory states that an organization structures itself and behaves in a particular manner as an attempt to fit with its environment. Thus organizations are more or less complex as a reaction to environmental complexity. An organization’s environment may be complex because it is turbulent, hostile, diverse, technologically complex, or restrictive. An organization may also be complex as a result of the complexity of its underlying technological core.

Applying this to Anonymous is fitting and revealing.

Fact or Fiction: They Believe in Anonymity

As their name suggests, the group certainly cherishes their own anonymity. With some of their actions crossing moral and legal lines, anonymity becomes a protective blanket to keep them running afoul of the law. However, there is a flip side; many affiliated with Anonymous do not believe in the anonymity of the people they expose. This can be seen in their leaking of BART police informationleaking Booz Allen email and logins, and Arizona law enforcement information leak that included officer and confidential informant information. During our feisty DEFCON Q&A, David Etue posed this to the Anons participating in the exchange:

“There is something paradoxical about a group that promotes transparency, but isn’t transparent themselves; and believes in anonymity, but negatively impacts the anonymity of others. How do you resolve your values and operations?” — David Etue

This is further exacerbated when Anonymous claims to fight for the people, yet performs actions that directly hurt the common person. Leaking databases full of consumer information surely teaches a company a lesson in security, but does so in a manner that yields a high amount of collateral damage. Leaking the personal information about police officers and their family makes a point, but does not fight corruption or the relatively small number of “bad apples” in police departments. This not only belies a cognitive dissonance, but may also hint at the presence of less noble/righteous participants – and even psychopathy within the group.

Fact or Fiction: Anonymous Supports Free Speech & Civil Liberty

On the surface, this is most assuredly true. Looking deeper, there appears to be a lack of understanding of causality that could drastically impact both free speech and civil liberties. Legislators have a history of introducing new laws as part of a knee-jerk reaction to a high profile negative incident. If Anonymous continues to break the law to achieve their goals, they risk legislators replying the only way they know how; more legislation. In doing so, the risk of sweeping laws being enacted that are poorly considered is high. This could lead to new laws that limit free speech, suspend or restrict civil liberty, and take away freedoms we currently enjoy. As one of the authors remarked at DEFCON and elsewhere,

When threatened… powerful, uninformed people make powerfully uninformed decisions.

If Anonymous continues in the same fashion as they have for years, what will the group say when a “Cyber Patriot Act” modeled after the Patriot Act or “Cyber Neo-McCarthyism” is enacted as a direct result of their actions?

Fact or Fiction: Disinformation Cuts Both Ways

With such a radical shift from a classic activist group, the level of inaccurate or misleading information is immense. The disinformation we see about Anonymous and their actions come from a variety of sources, including the media, analysts, law enforcement, chaotic actors (that may or may not associate with the group) and Anonymous themselves.

Law enforcement and media are consistently contributing to a campaign of disinformation, often times without realizing it. As we see more frequent articles announcing the “bust of # members of Anonymous”, it gives the perception that law enforcement is making steady progress fighting the group. In addition, it is easy to read into such articles and believe that they are “key” or “core” members of the group. In reality, they may be casual members, sympathizers or completely unaffiliated with the group. Regardless of their affiliation, once the announcement is made, they are branded as such and the world is rarely exposed to a correction or follow-up with details. The articles that claim “Topiary of LulzSec busted” or “Commander X taken down” also call into question the ratio of persons to handles. What if multiple people assume the same name, just as they assume one name as a group?

There are an increasing number of people that consider themselves ex-Anonymous. For a variety of reasons, they no longer identify themselves as part of the group. For example, “SparkyBlaze” quit the group leaving a missive behind focusing on Anonymous removing innocent peoples’ right to stay anonymous themselves. In a few cases, the persons will stay involved to some degree. For example, Gregg Housh no longer identifies with the group, but calls himself an observer of the group as he maintains a timeline related to Anonymous. Another person that is involved, but from a slightly removed stance, is St4rFox (Twitter feed now gone), who has talked about his involvement in running a site to train would-be Anonymous members on hacktivism and hacking, titled Operation NewBlood. Both of these individuals call to question if they are part of the group as a fringe element, members of the group that are attempting to manage public perception, or simply acting as sources of information and disinformation as is convenient.

With dozens of Twitter feeds likely operated by twice as many people, the level of accuracy and trustworthiness of the information being broadcast by Anonymous is questionable. With so many sources of noise about the group, for example Joseph Black and his creating confusion with wild claims, it becomes hard to find the signal. Finally, there are an unknown number of actors that are influencing, or attempting to influence, perception of the group such as a supposed Federal Bureau of Investigation (FBI) psychological profile of Anonymous that was later determined to be fake. Additionally, private citizens, some with an apparent motive to profit, have been attempting to infiltrate their ranks.

Anonymous: A Visit from Rorschach

This isn’t a case of fact versus fiction, this is a simple truth about human nature and perception. We project our own desires, fears and love on others, and Anonymous is no different. Anonymous is a real Rorschach test, helping us discover what we see in the group day to day. Yes, day to day because perception changes quickly, and what we see in the group can change just as quickly. Early on, one author of this article saw Anonymous as “light gray hats demonstrating insecurity to catalyze security”. Over time, that opinion changed as more activity occurred and Anonymous matured.

Many sympathetic to Anonymous see them as a group of Robin Hoods, hitting the rich and powerful in the name of the oppressed people. Some analysts see them more as the Joker, a purely chaotic actor that wants to see the world burn. Others romanticize the group, seeing the greater good they hope to accomplish, falling in love with the anti-hero ‘V’. This projection and perception says more about us than it does about Anonymous. In short, we see what we want to see in the group.

In the next installment: “How We Got It All Wrong”.

 

Copyright 2011 by Josh Corman and Brian Martin. Permission is granted to quote, reprint or redistribute provided the text is not altered, appropriate credit is given and a link to the original copy is included. Custom graphic courtesy of Mar – sudux.com.

Should you feel generous, please donate a couple of bucks on our behalf to any 501(c)(3) non-profit that benefits animals or computer security.

Expect Anonymous Fight Club Soap (Artwork by Mar - sudux.com)

Expect Anonymous Fight Club Soap (Artwork by Mar - sudux.com)

Part 1: Introduction & Approach

By Josh Corman & Brian Martin

2011

If you are new to this series, please begin with Part 0 and the index.

NOTE: We will post each installment here for the security industry to garner feedback for about one week prior to posting to Forbes.com and a more mainstream and business readership. Please comment toward improving/clarifying the content.

Why Write This & Operating Parameters

As we sit here to write this in October and November of 2011, we’d like to render a few things explicit. As objective observers, we’ve seen the rise of Anonymous and other chaotic actors as both intriguing and “of consequence”. We’ve also seen very little in the way of what we’d call “insight” or “understanding” toward the evolution of the “group(s)”. Those who are publicly speaking don’t seem to “get it”. Those who seem to have insight are frequently unwilling (and in many cases afraid) to speak.

So with natural curiosity, we have attempted to ask questions, engage in dialectic, apply logic and analysis, and see if other willing minds can’t nudge the conversation forward in useful and non-confrontational ways for the benefit of all. As the group(s) continue to morph and evolve – and as our comprehension (hopefully) improves, this will clearly re-cast the content of what you will read throughout these articles. We will attempt to capture thought at this time – and when necessary, we may adjust/augment/update against this point-in-time content.

Operating parameters of this series:

  • We are not now, nor have we ever been, members of Anonymous
  • We have not joined any IRC rooms affiliated with Anonymous
  • We are not seeking to “break” any story, but rather to logically analyze events as they unfold and to anticipate likely future scenarios and developments
  • We are not seeking to identify or investigate individuals, but rather to understand broader attitudes and motivations
  • By writing this article, we are not endorsing or denouncing Anonymous

Anonymous Background

Unstructured and nebulous, a group called Anonymous, born in the trenches of virtual trolling, has become a household name based on a reputation of civil disobedience and digital activism. They are a wildly diverse and unpredictable group, one that takes up arms to fight a varied collection of causes, while having no stated charter or organizational chart. Despite these seemingly limiting traits, Anonymous has flourished and become a force to be feared or respected, but not reasoned with.

Many people believe they know the history – but “which one?” The history of Anonymous is just as murky as trying to define them. The very brief history we present below could be thought of as a commonly accepted history. However, a similar history claims the background is more wrong than right. Gregg Housh, a former Anonymous member who now observes the group, has put together a considerably more thorough “chanology timeline” that attempts to chronicle all events related to Anonymous.

Formed in 2003, Anonymous was born out of a community / forum known as “4chan”, with a subset message board called “/b/”. Gawker wrote a concise summary of these boards and other 4chan affiliated projects, to better explain the origin of today’s Anonymous. Widely perceived as putting their attention and power toward a greater good only in the last three years, Gawker notes that previous pranks may have begun to show their ‘good’ side much earlier. Based on the concept of an anonymous community that became a shared collective identity, the Anonymous name gained international attention in 2008 for Project Chanology, a coordinated fight against the Church of Scientology. Years before Project Chanology, between 2006 and 2007, Anonymous demonstrated that they were heading down a path of righteousness with several high profile activities. In subsequent years, the group continued activities that garnered mainstream media that demonstrated the concept of digital activism, sometimes based on illegal hacking activity.

Anonymous activities in 2011 have helped them become a household name, covered by all types of media and gaining increased attention from law enforcement and pundits. Security firm and government contractor HBGary Federal angered Anonymous after claims that they were working with the FBI to unmask key Anonymous members, resulting in more than 60,000 private e-mails of CEO Aaron Barr and other employees being published. In response to Sony suing Geohot (aka George Hotz), Anonymous launched a Distributed Denial of Service (DDoS) against the corporate giant, resulting in Sony blaming them for subsequent attacks they had no declared part in, which were numerous. Banking giant Bank of America dealt with Anonymous when they released internal mails that claimed to prove corruption and fraud“Operation Anti-sec” was (re)born, with the Anonymous splinter group LulzSec teaming back up with their parent group to protest a list of government transgressions by breaking into numerous sites ranging from the Arizona Department of Public Safety to The Times to the Fox News Twitter Account. One of the most recent attacks after our DEFCON 19 panel was launched against the Bay Area Rapid Transit (BART) after the death of BART passenger Oscar Grant, leading to BART customer information being exposed and increased calls for protests. These activities, and more, have resulted in the group being perceived as more dangerous as well as more effective.

Understanding Anonymous

It is not easy to claim understanding of a group so diverse as Anonymous. At best, one can attempt to understand some of the fundamental principles and ideas that motivate some, but not all, members. There are several articles that attempt to display this understanding, written from a variety of perspectives (and possibly involvement). For example, Adrian Crenshaw wrote “Crude, Inconsistent Threat: Understanding Anonymous“, in which he discusses the motivation and organization of the group. Josh Corman, co-author of this article “ has previously written about the topic“. Cole Stryker has even authored a book on the topic, titled “Epic Win for Anonymous: How 4chan’s Army Conquered the Web“. One thing should remain clear; no one person will ever fully understand Anonymous beyond the broad influences.

Throughout their history, Anonymous has exposed weakness and vulnerabilities in a wide variety of social and technical systems. In doing so, the group has been demonized unfairly by a wide range of people including the media and law enforcement. One fundamental truth that seems to escape many observers is that the vulnerabilities were already there. Anonymous just brought them to the public’s attention. In crying for the heads of Anonymous, we are effectively shooting the messenger bearing bad news. Gene Spafford, from the Center for Education and Research in Information Assurance and Security (CERIAS), summarized the underlying issue that is absolutely critical for everyone to understand:

“First, if a largely uncoordinated group could penetrate the systems and expose all this information, then so could a much more focused, well-financed, and malevolent group – and it would not likely result in postings picked up by the media. Attacks by narcotics cartels, organized crime, terrorists and intelligence agencies are obvious threats; we can only assume that some have already succeeded but not been recognized or publicized.” — Gene Spafford

Anonymous Zeitgeist in Popular Media

For those who wish to avoid the laborious task of trying to define a chaotic and disparate group, there are several pop culture leanings that may help paint the group in a very broad stroke. These media references are based on Anonymous’ actions and the authors’ interpretation of their activity and writings.

V for Vendetta by Alan Moore

V for Vendetta by Alan Moore

Due to the adoption of the Guy Fawkes mask as a symbol of the group, perhaps the most popular pop culture reference would be Alan Moore’s V for Vendetta. Toward the end of the movie, the protagonist V outfits thousands of citizens in a black cloaks and Fawkes masks to create an anonymous army of sympathizers fed up with the totalitarian government. This scene is perhaps the ultimate symbolism for the group as we know it; an army of oppressed citizens finally fed up with an abusive regime that has stripped them of privacy, civil liberty and ultimately power.

Fight Club by Chuck Palahniuk

Fight Club by Chuck Palahniuk

Chuck Palahniuk’s Fight Club touches on broad leanings of Anonymous members. The idea of a near cult-like group engaging in diverse projects under the names ‘Project Mischief’ and ‘Project Mayhem’ certainly draws parallels to Anonymous. Members of the group determine their own level of involvement, a strong theme of Anonymous. Ultimately, tapping into the latent frustration of members, eloquently summarized by Tyler Durden (Brad Pitt) in the movie adaptation:

Man, I see in Fight Club the strongest and smartest men who have ever lived. I see all this potential, and I see it squandered. Goddammit, an entire generation pumping gas, waiting tables, slaves with white collars. Advertising has us chasing cars and clothes, working jobs we hate so we can buy shit we don’t need. We’re the middle children of history, man; no purpose or place. We have no Great War, no Great Depression. Our Great War is a spiritual war. Our Great Depression is our lives. We’ve all been raised by television to believe that one day we’d all be millionaires and movie gods and rock stars. But we won’t; and we’re slowly learning that fact. And we’re very, very pissed off.

Watchmen by Alan Moore

Watchmen by Alan Moore

Another Alan Moore graphic novel, The Watchmen, highlights several aspects of the Anonymous collective; post-modern anti-heroes willing to do evil things to avoid a greater evil, a cast of characters confront and challenge both morality and alignment, redefining the popular concept of heroes embodying good. One of the running themes throughout the novel is the idea of “who watches the watchmen?”

The Dark Knight

The Dark Knight

The Dark Knight introduces people to a purely chaotic evil actor, The Joker, who the butler Alfred draws an allegory to. He tells Bruce Wayne of a bandit he helped chase in a forest who was throwing away the jewels he stole, saying “Some men aren’t looking for anything logical … [they] just want to see the world burn.” Wayne asks how he was ultimately caught. Alfred replies, “We burned the forest down.” A simple solution, but one that is easily argued as worse than the bandit’s actions. Opposite of the chaotic evil Joker is Batman, a chaotic good hero that demonstrates a steady scale of escalation to fight evil, just as Anonymous appears to do often times. At the same time, Anonymous likely has a handful of chaotic evil actors involved, even if they don’t realize it yet.

Ghost In The Shell: Stand Alone Complex The Laughing Man

Ghost In The Shell: Stand Alone Complex The Laughing Man

There are several other notable media that draws parallels to Anonymous to some degree or another. Ghost in The Shell – Stand Alone Complex is eerily prophetic about these concepts, with a villain named Laughing Man that is essentially a collective of infectiously contagious meme copycats of an original that may not even exist.SLC Punk showcases the fleeting catharsis, contradictions, inconvenience, and ultimate emptiness experienced by a few young anarchists.

SLC Punk!

SLC Punk!

With the group constantly changing and adapting, losing followers as often as they gain new interest from the disenfranchised, understanding will come in small waves and require reexamination every step of the way.

Copyright 2011 by Josh Corman and Brian Martin. Permission is granted to quote, reprint or redistribute provided the text is not altered, appropriate credit is given and a link to the original copy is included. Custom graphic courtesy of Mar – sudux.com.

Should you feel generous, please donate a couple of bucks on our behalf to any 501(c)(3) non-profit that benefits animals or computer security.

A Better Anonymous - (Artwork by Mar - sudux.com)

A Better Anonymous – (Artwork by Mar – sudux.com)

By Josh Corman & Brian Martin

2011

This multi-part article, with original artwork by Mar, is a follow-up to a one hour panel discussion at DEFCON 19 titled “‘Whoever Fights Monsters…’ Confronting Aaron Barr, Anonymous and Ourselves” moderated by Paul Roberts, discussed by Josh Corman, Brian Martin and Scot Terban. The views of the authors are not meant to be a criticism of Anonymous, nor are they meant to be encouragement for future criminal activity. It is an inevitable fact that Anonymous, or similar groups, will become bigger, stronger, and more effective. Discussions on how to build a more potent digital hacktivism group (illegal hacking to achieve a political goal) have occurred for over a decade. This article will not attempt to introduce groundbreaking new ideas, but rather will summarize many existing ideas and subject them to analysis from two security practitioners on two sides of this issue. If anything, this will serve more as a ‘Lessons Learned’ with the aim of broadening the reader’s understanding of the topic, while demonstrating that the “problem” is not going away; the “problem” is evolving and growing.

When we say “building a better Anonymous”, we seek to explore the ideas of making such a group truly better. That means better for all parties involved; the group, end users, citizens and law enforcement. “Better” does not mean more criminal acts in the name of the greater good, it means a more efficient organization that can achieve the same (or better) results with less collateral damage. We envision a group with better defined goalsmore accountabilitya healthy dose of humor and the legendary resolve of the sabertooth squirrel. Of course, the chaotic nature of a group such as Anonymous means that any hopes of improvement will likely come in the form of small numbers of members guiding the rest toward these goals.

NOTE: We will post each installment here for the security industry to garner feedback for about one week prior to posting to Forbes.com and a more mainstream and business readership. Please comment toward improving/clarifying the content.

Below you will find an index for the series (links will be added as published):

1) Introduction & Approach

A brief introduction to this article series and Anonymous.

2) Fact vs Fiction

Figuring out the fact versus fiction of Anonymous.

3) How We Got it All Wrong

How the media and professionals got it wrong.

4) How Anonymous Has Failed in Theory & Practice

Anonymous, as they are today, and various shortcomings.

5) Building a Better Anonymous – Philosophy

A foundation/framework for improving on the Anonymous blueprint.

6) Building a Better Anonymous – Details

Extending the new foundation for improving on the Anonymous blueprint.

7) Abstract Ideas

Other considerations relevant to this topic.

8) Conclusion

What have we learned, and what we hoped to teach.

Copyright 2011 by Josh Corman and Brian Martin. Permission is granted to quote, reprint or redistribute provided the text is not altered, appropriate credit is given and a link to the original copy is included. Custom graphic courtesy of Mar – sudux.com.

Should you feel generous, please donate a couple of bucks on our behalf to any 501(c)(3) non-profit that benefits animals or computer security.

Anonymous Rorschach Ink Blot (Artwork by Mar - sudux.com) - https://cognitivedissidents.wordpress.com

We see in Anonymous what we WANT to see (Anonymous Rorschach) - (Artwork by Mar - sudux.com)

I have a “simple”, non-rhetorical question for you:

When you look at Anonymous, what do you see?

Context:

Jericho (@attritionorg) and I have been working on a BLOG series about Anonymous, as a follow-on to our DEFCON19 Panel called “Whoever Fights Monsters: Confronting Aaron Barr, Anonymous and Ourselves”. We’re pretty close to posting the 1st of these (possibly next week).

It dawned on me as we researched that one of the “distortion fields” surrounding “understanding Anonymous” is that we see in them what we WANT to see – like we do with a Rorschach ink blot test. We project. Our narrative says more about us, than it does about them. This is the double-edged sword that sometimes comes with symbols and iconography.

For those who didn’t immediately recognize the Friedrich Nietzsche reference in that DEFCON title, it comes from this:

Whoever fights monsters should see to it that in the process he does not become a monster. And if you gaze long enough into an abyss, the abyss will gaze back into you.

As a teaser to our series – and as I finalize my slides for my Anonymous talk for next Thursday at SOURCE Barcelona, I thought I’d throw this Non-Rhetorical Question out to each of you…

When you look at Anonymous, what do you see?

As succinctly as you can – either within the Comment field or with a BLOG post/response of your own… please add your take on Anonymous (initially, today, going forward, all of the above…)

I hope to share some of the more interesting responses during my talk in Barcelona.

Remember… as you gaze into the Anonymous Abyss… it too gazes back into you.

Artwork Note:

This Rorschach and several other BEAUTIFUL pieces of orignal artwork come from -MAR- at sudux.com – just amazing.

Anonymous Rorschach Ink Blot (Artwork by Mar - sudux.com) - https://cognitivedissidents.wordpress.com

We see in Anonymous what we WANT to see... what do you see? (Artwork by Mar - sudux.com)

HD Moore

HD Moore - Creator and Chief Architect of Metasploit and CSO of Rapid7

You Must Be THIS TALL To Ride

You Must Be THIS TALL To Ride

Most people understand “Moore’s Law“:

Compute power grows at the rate of doubling about every 2 years

At Metricon6, I asserted “HDMoore’s Law” version 1:

Casual Attacker power grows at the rate of Metasploit*

*HD Moore (@hdmoore) gave the industry the Metasploit Project in 2003 – a wildly successful and leveraged open-source penetration testing platform.

Perhaps the greatest value of this concept is it is DEMONSTRABLE. While it won’t tell you you’ve done “enough” to prevent breaches, it just might prove if you haven’t.

Genesis:

While this post is not about PCI DSS, HDMoore’s Law concept came to me after a year of me asking “Is PCI the ‘No Child Left Behind Act’ for IT Security?” and subsequently my intuitive allergy to the following two pervasive, thought terminating clichés / platitudes… perhaps you’ve also heard them:

I know PCI won’t stop a determined attacker, but it will at least stop a casual attacker

Really? Will it? Is that still true? and second:

PCI is better than nothing – it at least raises the bar.

But has it raised the bar enough to matter? to stop even the least skilled adversaries?

Contrary to our wishes, “security” doesn’t grow linearly with our effort. With sentient adversaries seeking to steal valuable information, security gains are realized when a defender has done “enough” to deter/exhaust the resources of an actual attacker.

There was a time when less skilled, “casual attackers” may have had only one or two tricks up their sleeves. If you were patched, a casual attacker would simply “move on”… Metasploit and other tools have shattered this assumption and now the “enough” is a moving target.

Point. Click. Pwn.

The pointy-clicky nature of Metasploit and ever-growing expert contributions makes it the ultimate script kiddie tool – and an greater force multiplier in the hands of more talented individuals/teams.

“Enough” Security – Metasploit as table stakes:

One of the most prevalent questions in all of IT security has long been:

What is “enough” security?

Clearly the answer is “it depends” (on a number of factors). One of which is Who is attacking us (which adversary classes?). If we use the latest version of Metasploit as a proxy for the lower bounds of attack capacity for the least skilled “casual attacker”, then one can measure at any time that you must be “this tall to ride”. Put another way, to stop breach attempts from even our weakest adversary class, defensive power needs to meet or exceed parity with $today’s free version of Metasploit. If you cannot rise to HDMoore’s Law, it’s possible the only adversary you can fend off is the friendly-fire, self-imposed one.

In the few live, graphical presentations on it I’ve given thus far, the recognition of its value, utility, and implications was nearly instantaneous. I’ll attempt to show just a few here in this initial post by example – which will also aid in defining it.

HDMoore’s Law in Juxtaposition – Drop-Off Rates by Adversary Classes (weakest to strongest):

  • Auditor/Assessor – in the case of PCI, this is the QSA – by far the easiest attacker to reliably “make go away”. Though they do not cause breaches (let’s hope), CISOs often see them as their top threat.
  • Casual Attacker – this is an unskilled target agnostic attacker. This is the weakest class of adversary that actually causes breaches. HDMoore’s Law is a measurable proxy for this class, who get stronger as Metasploit adds new exploits, evasions, payloads, features and the like.
  • Chaotic Actors – this class of ideoligically-fueled actors includes the likes of Anonymous and LulzSec and (with a few exceptions) is also fairly unskilled and tracks loosely to HDMoore’s Law. However, chaotic actors can be more determined and target-sticky. Consider them at 1.xx times the strength of HDMoore’s Law, but aimed at different asset types and seek to shame, embarrass, DDOS, targets rather than steal (e.g. credit card numbers).
  • Organized Crime – this financially motivated class recruits and cultivates serious hacking skills within economically rational parameters.
  • State Sponsored Espionage – with the power and resources of nation states behind them this is a whole different ball of wax, When facing what some (kitten killers) call APT and I refer to as Adaptive Persistent Adversaries, the model is more a game of chess and war of attrition if this class of adversary is after your less replaceable assets.
HDMoore's Law: Attacker Drop-Offs by Adversary Class

HDMoore's Law: Attacker Drop-Offs by Adversary Class

I already acknowledge:

  • I’m certain this articulation is imperfect (there are things I don’t like about it)
  • I fully expect to iterate on the following visualizations
  • The concept that all adversary classes conform to the same continuum is an acknowledged and willful oversimplification
  • AND… it is still a valuable abstraction regardless
  • And yes… this is more of a Metasploit’s Law (as HDMoore’s personal prowess is “off the charts) – but come on… HDMoore’s Law is far catchier

That’s enough for today… and I will be revisiting this topic as a building block concept.

A few departing seed questions for upcoming posts:

  • Exactly how fast is HDMoore’s Law growing and can we keep up?
  • Is your Security program tall enough to ride?
  • How can an organization shift from ticking compliance boxes to measuring themselves against HDMoore’s Law?
  • How frequently should an organization measure themselves?
  • How can PCI DSS rationalize/adjust itself to stop any real adversaries?
  • What does HDMoore’s Law mean for the organizations Wendy Nather (@451wendy) calls “Living Below the Security Poverty Line“?

Put your program to the test.

Grab the free version of Metasploit (at least) and measure if you can handle HDMoore’s Law.

One of the things on my mind lately is a deceptively simple idea/question:

How replaceable is an asset type?

And a nagging question/observation:

Why do we spend the majority of our time in IT security on the most replaceable assets like regulated credit card data – at the opportunity cost and neglect of less-and-irreplaceable assets like Intellectual Property, Corporate Secrets and Critical Infrastructure?

If we draw a continuum from “Highly Replaceable” through “Irreplaceable”, we can then map 1..n various asset types against said continuum. Please see Figure 1 below.

Replaceability Index/Continuum

Figure 1 - Replaceability Continuum

At the extremes, a human life is irreplaceable – whereas my mother-in-law’s Credit Card Number (CCN) is highly replaceable.

Highly Replaceable:

Let’s start with one of the most replaceable asset types… Who hasn’t had a Credit Card stolen (or several)? Think about it. How bad is it really? At most you are liable for a mere $50 – a fee I’ve yet to see anyone have to pay. What it tends to mean is an inconvenience of getting a new card issued, and the nuisance of direct billing logistics. Can it be worse? I’m sure it can be (and has been), but/and I’m pretty sure it isn’t worse than less replaceable assets types.

Irreplaceable/Less Replaceable:

On the other end of the continuum, we find less replaceable asset types: your Intellectual Property, your trade secrets, your corporate secrets, your proprietary research and development, etc. Whether this is, for example (but not limited to):

  • “the Colonel’s” secret herbs and spices which go into his world famous fried chicken (including the alleged “addictive chemical that makes you crave it fortnightly” #NameThatMovie)
  • Coca-Cola’s highly guarded recipe for brown sugar water
  • research data for the next wonder-drug (think Viagra)
  • Mergers & Acquisition files
  • Oil & Mineral Prospecting Data
  • Military Defense Secrets like the F-35 Joint Strike Fighter plans
And then there are the irreplaceable losses of human life. While examples of cyber attacks affecting human lives are rare, debated, dismissed, exaggerated, many-of-the-above… clearly failures of critical infrastructure, power grids, mass transit, defense infrastructure and the like can lead to such losses.
My prior question was deliberately coy. I have some answers/theories (which I will share in more detail in subsequent posts). So again:
Why do we spend the majority of our time in IT security on the most replaceable assets like regulated credit card data – at the opportunity cost and neglect of less-and-irreplaceable assets like Intellectual Property, Corporate Secrets and Critical Infrastructure?
A few teasers to start your thinking:
  • As a CIO once told me, “I might be hacked, but I will be fined”
  • Is it that we “Fear the Auditor more than the attacker?”
  • Are we erroneously assuming that these “best practices” for defending card data equally apply to other adversary classes (think state sponsored espionage and/or ideologically fueled chaotic actors) seeking other asset classes (which are often in other parts of our IT)? More on this later.
  • Is it that we have more available data on regulated data types due to mandatory disclosure laws and we’re looking “where the light is best”?
Why do you think we focus the bulk of our scarce IT Security time and resources on the most replaceable of our asset types? If you agree and this is also nagging at you, what are you doing about it?
NOTE: As I write this, it occurred to me this concept may have affinity with something Dan Geer has been puzzling over recently – describing security as a function of “dependence”.

*There are caveats per your contracts. E.g. you may need to report the fraud in a reasonable timeframe.

Posted: 2011/10/24 in Concept, Replaceability