1 Jeff Jonas IBM. Spear Phishing en Masse Jeff Jonas, IBM Distinguished Engineer Chief Scientist, IBM Entity Analytics OReilly Gov.

Slides:



Advertisements
Similar presentations
Yahoo! OpenID and OAuth 1 Allen Tom Yahoo! Membership Architect OpenID Foundation Board
Advertisements

TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
FaceBook Pics More Important Than You May Realize!
Search Engine Marketing 101 June 20, 2006 Presented By:
Our Social Media Why and how to compose a social media release.
1 Wiki Wikiage An Experiential Workshop By Anas Eljamal 9 March 2007.
Final Project Instructor: Nguyen Anh Tu Students: Tran Tien Tai Tran Tien Tai Tran Ngoc Mai Tran Ngoc Mai Tu Kim Tuan Tu Kim Tuan Nguyen Ngoc Phuong Nguyen.
BeKnown How-to: Company Profiles & Jobs App for Timeline.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Facebook Part I Building Your Profile Patrick Therrien Technology & Education Training Specialist.
List and Search Grants Chapter 2. List and Search Grants 2-2 Objectives Understand the option My Grants List Grant Screen Viewing a Grant Understand the.
1 FUND RAISING THE GAME EVERYONE CAN PLAY – AND MUST! Leadership Institute March 2006.
Michigan Electronic Grants System Plus
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
0 - 0.
2nd Grade Reading Units of Study #3
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULTIPLICATION EQUATIONS 1. SOLVE FOR X 3. WHAT EVER YOU DO TO ONE SIDE YOU HAVE TO DO TO THE OTHER 2. DIVIDE BY THE NUMBER IN FRONT OF THE VARIABLE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Secure and Web Browsing Sébastien Dellabella – Computer Security Team.
40 Tips Leveraging the New APICS.org to the Benefit of Your Organization, Members, and Customers! 1.
Final Year Projects Some tips
- A Powerful Computing Technology Department of Computer Science Wayne State University 1.
E Safety Dorothy Stringer School. E Safety E safety is normal safety the difference is the knowledge gap.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Service Access Management Tool Tour: Contract Number
ABC Technology Project
SEARCHING MULTIMEDIA prepared by Literature Searching Team Library, Faculty of Medicine, UGM 2012.
© John Wallace Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals.
©2013 PROS, Inc. All rights reserved. Confidential and Proprietary. PROS Connect User Community Website and Support Portal Prepared by Christine Lambden.
SEO in 2010 January 21 st, 2010 Steve Thomas President, The Net Impact.
Options for communicating. A social network is a social structure made of individuals (or organizations) called "nodes," which are tied (connected) by.
© S Haughton more than 3?
Mechelen - 06/02/2014 Telenet Security Day CYBER scrapings putting our 2 cents in.. Christian Van Heurck CERT.be coordinator CERT.be team.
Twenty Questions Subject: Twenty Questions
Linking Verb? Action Verb or. Question 1 Define the term: action verb.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Inspiring and Motivating Others Gary L. Hickman
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
This, that, these, those Number your paper from 1-10.
How to create a wiki using pbwiki. Step 1: Choose a wiki website I have chosen.
Dan Bassett, Jonathan Canfield December 13, 2011.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
1 Welcome to JCCAA Data base presentation Click box to see the DEMO 1.JCCAA Web Site 2. Member Login 3. My Acount 4. School DBA The end.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
11 = This is the fact family. You say: 8+3=11 and 3+8=11
Week 1.
We will resume in: 25 Minutes.
How to Fill out a PAR for a New Standard Revised 8 July 2010.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
“Facts are stubborn things, but statistics are pliable.”
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
Welcome to Facebook. Texas State University October 17, 2006.
Protecting Yourself Online (Information Assurance)
Today’s Technologies for Scouting © All rights reserved, Wayne A. Burke, PE 23 March 2002 These are my opinions, not.
Mass Media – the Internet  Role of media  Types of media  What is the Internet  www  Information on the Internet  Usage of the Internet  Favourite.
Presentation transcript:

1 Jeff Jonas IBM

Spear Phishing en Masse Jeff Jonas, IBM Distinguished Engineer Chief Scientist, IBM Entity Analytics OReilly Gov 2.0 – May 27, 2010

3 Whats Coming Data will find data and relevance will find you. – Amazing ads tailored just for you – Populations spear phished en masse

4 How? Context accumulating systems used to deliver real-time, high quality predictions.

5 Context, definition of: Better understanding something … by taking into account the things around it.

6 No Context Billy In Barcelona now

7 In Context Previously Worked at AOL Is a Google Net Admin Lives in San Jose Acquaintance of Esthers Billy In Barcelona now

8 Social Media Bill Smith Play: Work: Data Finds Data About Bill is a computer network administrator at Google. Author. Speaker. Forum In Barcelona now! Whoo Hooo. Note new /Billy Is a Google Net Admin In Barcelona

9 Social Media Bill Smith Play: Work: Data Finds Data About Bill is a computer network administrator at Google. Author. Speaker. Forum In Barcelona now! Whoo Hooo. Note new /Billy Is a Google Net Admin In Barcelona

10 Context Accumulates Acquaintance of Esthers Is a Google Net Admin Living in San Jose In Barcelona Previously Worked at AOL

11 Phish This Esther is likely influential to Billy –Esther has 2,500+ FaceBook friends –Billy has 103 FaceBook friends Not best buddies –No recent communications evident on Facebook –No co-references between the two in open source Timely knowledge finds timely material –Lives in San Jose, in Barcelona now –First Google PDF for: [barcelona travelers guide pdf]

12 Phish Bait To: From: Billy, sorry we dont connect more often. Busy busy. A mutual friend tells me you are in Barcelona right now! This is my favorite guide for the area, just in case you need one. Esther PS: The spams killing me, hence the new address Barcelona eGuide.pdf

13 Results Amazing click through rates: – Ads – Infections

14 Spear Phishing en Masse Not a picture of a person. A whole population – the big picture. Humanless, not enuf of em. Targeted searches, subscriptions and crawlers feeding a fully automated context accumulation process. Not a snapshot of the past. What is happening here and now.

15 Plausible Targets The technical elite –Network and database administrators –CIOs, CTOs, CSOs, etc. People in positions of power –Elected officials –Corporate executives Their staff, family and friends Let your imagination run wild, there is virtually no limit

16 Hints for Scripts Travels Hobbies Interests Charitable causes Metallica Family members Others influential over them

17 Old School: GhostNet Next Gen: lasers on foreheads from 6,940 miles 1 vs. 1 vs. 1,000,000s

18 What Now? Better education – Cant keep up Better malware detection – Windows shut too late Better phone home detection – Traffic masking one-step ahead Investment for resilience to black swans – Catastrophic outages too rare

19 Closing Thoughts As context accumulates everyone gets smarter. Great ads. And timely s from folks you recognize and trust … that arent. Will identity authentication be mandated? And how will we square this with our right to be anonymous?

20 Related Links More About GhostNet GhostNet-Investigating-a-Cyber-Espionage- Network Related Stuff On My Blog Puzzling: How Observations Are Accumulated Into Context Data Finds Data Prediction: Channel Consolidation

Spear Phishing en Masse Jeff Jonas, IBM Distinguished Engineer Chief Scientist, IBM Entity Analytics OReilly Gov 2.0 – May 27, 2010