MITIGATING the EFFECTS of DOXING by Ingrid N. Norris

Total Page:16

File Type:pdf, Size:1020Kb

MITIGATING the EFFECTS of DOXING by Ingrid N. Norris MITIGATING THE EFFECTS OF DOXING By Ingrid N. Norris A Capstone Project Submitted to the Faculty of Utica College December 14, 2012 In Partial Fulfillment of the Requirements for the Degree of Master of Science in Cybersecurity Intelligence and Forensics © Copyright 2012 by Ingrid N. Norris All Rights Reserved ii Abstract Hacktivists create dossiers on any entity that is perceived to be an obstacle to their social or political agenda. This includes individuals, public and private entities, law enforcement agencies, military personnel, government officers, and other entities. Dossiers are created from the content found in social media networks, Google searches, private, public, government, and military websites, reverse IP lookup, social engineering, hacking, phishing, and other sources. Once information is found, online activists publicize the information via Pastebin, social media networks, other websites, and other forums. This is called doxing, a term derived from documents. The goal of doxing is to threaten, embarrass, harass, and humiliate the individual or organization to further the hacktivists agenda. The purpose of this capstone project is to call to attention the problems that arise as a consequence of hacktivists doxing individuals and other entities. The ramifications of doxing are critical to an individual’s and other entity’s safety because the information disseminated exposes the individual or organization to be a victim of identity theft, hacking, financial crimes, and other crimes. To mitigate the effects of doxing, individuals and organizations need to take an active role by being conscientious of the information disseminated via social media networks, over the phone, emails, texting, and other means. Organizations need to actively defend their infrastructure by implementing defense in depth best practices to protect the organization’s information and information systems. Following the “protect, detect, and react” model, organizations achieve information assurance that establishes a balance between people, technology, and operations. Keywords: Cybersecurity Intelligence and Forensics, Christopher Riddell, Vernon McCandlish, political activists, economic crimes, identity theft, information protection, technological crimes iii Acknowledgements I would like to thank my capstone project chairman, Christopher Riddell, and my technical advisor, Vernon McCandlish, for their guidance, expertise, enthusiasm, and understanding throughout this project. I cannot thank both of you enough for your time and patience. Thank you so much Vern for guiding me through the topic of doxing and teaching me about the world of cyber intelligence. My gratitude goes to my professors at Utica College for all the lessons and advising I obtained through the many years I have been at UC. Many thanks also for sharing your experiences; they helped me get a glimpse of the “real working world” in the criminal justice system. Thank you Joe Giordano for encouraging me to “hang in there;” your words of encouragement are immensely appreciated. Thank you also to the Utica College administration for assisting me in obtaining this degree. Last but not least, I must acknowledge my appreciation to the ECJS faculty and staff for giving me the opportunity to work amongst you. I have learned a lot about the intricacies in the academia world. Many thanks to my parents and parents-in-law, especially my Mom, for helping me look after my children while I worked and went to school. I would never have been able to complete any of my degrees without their encouragement, help, and support. Most importantly, I would like to thank my husband, Brian, for his constant encouragement, love, and support. Thank you also for being Mom and Dad during times when I had to do my homework, attend group meetings, and work on my capstone project. Lastly, I would like to thank my children for their patience and understanding while Mom did her homework. I have lots of making up to do! iv Table of Contents Abstract .......................................................................................................................................... iii Acknowledgements ........................................................................................................................ iv List of Illustrative Material ........................................................................................................... vii Statement of the Problem ............................................................................................................ 1 Hacktivists Common Modi Operandi ......................................................................................... 3 Website defacement ................................................................................................................ 3 Denial of service (DoS) attacks .............................................................................................. 4 Distributed denial of service (DDoS) attacks ......................................................................... 5 Justification of the Problem ........................................................................................................ 7 Current Deficiencies in Research ............................................................................................. 10 Literature Review.......................................................................................................................... 13 Social Media Networks ............................................................................................................. 13 Hacktivists Doxing Methods .................................................................................................... 16 Reconnaissance stage ............................................................................................................ 16 Google ................................................................................................................................... 17 Online public searches .......................................................................................................... 19 Microsoft’s Bing ................................................................................................................... 21 Reverse IP lookup ................................................................................................................. 22 Skype, *67, 411 ..................................................................................................................... 22 Private, public, and government websites ............................................................................. 23 Pastebin and similar websites ............................................................................................... 24 Hacking ................................................................................................................................. 24 Phishing ................................................................................................................................. 25 Maltego ................................................................................................................................. 25 Geolocation API specification .............................................................................................. 26 Discussion of Findings .................................................................................................................. 27 Ramifications of Doxing ........................................................................................................... 28 Privacy Concerns ...................................................................................................................... 30 Identity theft .......................................................................................................................... 33 Theft of intellectual property ................................................................................................ 34 Shared domain names perils ................................................................................................. 35 Harassment ................................................................................................................................ 35 Pizza bombs .......................................................................................................................... 35 Fax bombs ............................................................................................................................. 37 Twitter bombs ....................................................................................................................... 37 Email bombs. ........................................................................................................................ 39 Public Humiliation .................................................................................................................... 39 Recommendations and Conclusions ............................................................................................. 40 Defense in Depth ...................................................................................................................... 42 IA achieved through People .................................................................................................. 43 IA achieved through technology ........................................................................................... 44 Internal Firewall ...................................................................................................................
Recommended publications
  • Malpedia: a Collaborative Effort to Inventorize the Malware Landscape
    Malpedia: A Collaborative Effort to Inventorize the Malware Landscape Daniel Plohmann @push_pnx [email protected] 2017-12-07 | Botconf, Montpellier Martin Clauß martin.clauß@fkie.fraunhofer.de Steffen Enders [email protected] Elmar Padilla [email protected] 1 © Cyber Analysis and Defense Department, Fraunhofer FKIE $whoami Daniel Plohmann Security Researcher @ Fraunhofer (Europe‘s largest organisation for applied research) Research Scope: Malware Analysis Reverse Engineering Automation 2 © Cyber Analysis and Defense Department, Fraunhofer FKIE Outline Summary Motivation (or: how it began) Approach The Malpedia Corpus & Platform A Comparative Structural Analysis of Windows Malware Future Plans / Conclusion 3 © Cyber Analysis and Defense Department, Fraunhofer FKIE Summary 4 © Cyber Analysis and Defense Department, Fraunhofer FKIE Summary TL;DR What is Malpedia? A free, independent, pooled resource for confidently labeled, unpacked reference samples for malware families and versions Meta data tracker for info such as references (analysis reports, blogs, …), YARA rules, actors, tied to these families Status (2017-12-01): 2491 samples for 669 families, multi-platform (WIN, ELF, APK, OSX, …) Our Contributions Definition of requirements for malware corpora and a reference corpus + platform implementing these A Comprehensive, quantitative static analysis of structural features for 446 Windows malware families 5 © Cyber Analysis and Defense Department, Fraunhofer FKIE Motivation … or
    [Show full text]
  • Cyber Violence Against Women and Girls
    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
    [Show full text]
  • Cyberbullying and Ohio Schools: a Social Justice Framework to Understand and Create Change Lorri A
    Cyberbullying and Ohio Schools: A Social Justice Framework to Understand and Create Change Lorri A. Gerwig-Parker Donna Tromski-Klingshirn Rebecca Kolssak Joshua D. Miller Wright State University Abstract In 2019, 36.5% of students, age 12-17, reported that they were cyberbullied at some point in their life. Cyberbullying is a growing problem within Ohio. Self-mutilation, attempted suicide, and death have been linked to victims of cyberbullying. Within Ohio, there are also legal implications for schools to consider. Using Bronfenbrenner’s ecological systems framework, different types of cyberbullies, bullying practices, and proposed solutions for cyberbullying can be addressed in a more comprehensive manner within the schools. Ultimately, schools can be the vanguards for social justice, creating the cultural shift to end cyberbullying and its devastating effects on victims. Keywords: cyberbullying, school administration and faculty, adolescents, social justice, ecological model Cyberbullying, also known as e-bullying or digital harassment, has grown from a technological possibility to a universal problem among communities of young people within the past two decades. Adolescent populations have both high rates of victimization and potentially severe consequences to their mental and physical health. Hinduja and Patchin (2019) indicated that 36.5% of adolescents ages 12 to 17 in the United States reported being cyberbullied at least once. Further, according to Pacer’s National Bullying Prevention Center (2019) only 33% of adolescent victims
    [Show full text]
  • Hacking the Web
    Hacking the Web (C) 2009-2020 Arun Viswanathan Ellis Horowitz Marco Papa 1 Table of Contents } General Introduction } Authentication Attacks } Client-Side Attacks } Injection Attacks } Recent Attacks } Privacy Tools 2 (C) 2009-2020 Arun Viswanathan Ellis Horowitz Marco Papa Why secure the Web? } The Web has evolved into an ubiquitous entity providing a rich and common platform for connecting people and doing business. } BUT, the Web also offers a cheap, effective, convenient and anonymous platform for crime. } To get an idea, the Web has been used for the following types of criminal activities (source: The Web Hacking Incidents Database (WHID) http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database) } Chaos (Attack on Russian nuclear power websites amid accident rumors (5Jan09) } Deceit (SAMY XSS Worm – Nov 2005) } Extortion (David Aireys domain hijacked due to a CSRF (cross site request forgery) flaw in Gmail – 30Dec2007) } Identity Theft (XSS on Yahoo! Hot jobs – Oct 2008) } Information Warfare (Israeli Gaza War - Jan 2009 / Balkan Wars – Apr 2008 ) } Monetary Loss (eBay fraud using XSS) } Physical Pain (Hackers post on epilepsy forum causes migraines and seizures – May 2008) } Political Defacements (Hacker changes news release on Sheriffs website – Jul 2008) (Obama, Oreilly and Britneys Twitter accounts hacked and malicious comments posted – Jan 09) } Chinese Gaming sites hacked (Dec. 2011) 3 Copyright(C) 2009 (c) -20092020- 2019Arun Arun Viswanathan Viswanathan Ellis HorowitzEllis Horowitz Marco Marco Papa Papa
    [Show full text]
  • Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’S Terrorist Today (T4) Through OSINT By: Mr
    Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract June 2011 Country Studies Public Places Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’s Terrorist Today (T4) through OSINT by: Mr. E. Ben Benavides CounterTerrorism Infrastructure Money Laundering Gang Warfare Open Source Intelligence is the non-cloak- and-dagger aspect of fact collecting. (Alan D. Tompkins) Human Smuggling Weapon Smuggling IEDs/EFPs Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Table of Contents Table of Contents ........................................................................................................................ 2 Comments ................................................................................................................................... 7 Open Source Intelligence (OSINT): What It Is and What It Isn’t ................................................... 8 How To Use Open Source Intelligence ........................................................................................ 9 Key Army Access Sites .............................................................................................................. 17 Must Haves References ............................................................................................................ 18 Core Open Source Intelligence Documents & Guides ........................................................... 18 MI Officer Students ...............................................................................................................
    [Show full text]
  • Securing Information in a Mobile World
    Securing Information in a Mobile World Thu, Jan 21 | 2:00 p.m. – 3:30 p.m. PRESENTED BY: Charlie LeBlanc, William Figures, and Blad Slavens Schedulers & Dispatchers Conference | Tampa, FL | January 19 – 22, 2016 A Brief History of Computing and Software for Schedulers and Dispatchers Systems in the 80’s and early 90’s were computer- centric and pretty secure…. Why ????? And then came the Internet !!!! Highly technical description of the Internet “The Internet is a data network that connects “everything” together” (kind of like the phone system !) - William Figures 2007 The ‘Net(work) as a computing platform- Using WEB Services WEB SERVICES=FARS Is it safe to use public Wi-Fi? 6 Security challenges when using public Wi-Fi Some things to know about public Wi-Fi hotspots • Unlike your home Wi-Fi access point, most public Wi-Fi hotspots at hotels, restaurants, coffee shops, airports, etc. do not use encrypted communication. • This means that all your data may be sent in clear-text across the wireless network. Anyone with a “sniffer” could then snoop on your connection. • In order to secure their Wi-Fi properly, a business owner would have to issue a password to connect to the hotspot. To be truly secure, this password would be unique to a single person. • Since this isn’t feasible, you need to take other precautions to secure your data when using a public hotspot. Sources: http://www.networkworld.com/article/2904439/wi-fi/is-it-safe-to-use-public-wi-fi-networks.html 7 Case Study: Firesheep browser extension Coder exposed risk to Facebook users at public hotspots • To call attention to glaring security vulnerabilities with both Facebook – and other sites – and public Wi-Fi, a “white hat” hacker developed a Firefox extension that allowed a user to hijack the Facebook account of anyone logged into the same Wi-Fi hotspot.
    [Show full text]
  • Staying Safe Online: Gender and Safety on the Internet
    MEDITERRANEAN INSTITUTE OF GENDER STUDIES (MIGS) Staying Safe Online: Gender and Safety on the Internet Experiences of Young Women and Men in Cyprus Nicosia, Cyprus November 2014 Staying Safe Online: Gender and Safety on the Internet © 2014, Mediterranean Institute of Gender Studies, all rights reserved. 46 Makedonitissas Ave. P.O. Box 24005, Nicosia 1703 Cyprus Authors: Elena Rousou, Christina Kaili Edited by Susana Elisa Pavlou Published by the Mediterranean Institute of Gender Studies (M.I.G.S.) on December 2014 Coordinated by Gender Studies, o.p.s., Czech Republic Partner Organisations Feminoteka , Poland ProFem, Czech Republic Mediterranean Institute of Gender Studies (M.I.G.S.), Cyprus This publication has been produced with the financial support of the DAPHNE III Programme of the European Union. The contents of this publication are the sole responsibility of the Mediterranean Institute of Gender Studies (M.I.G.S.) and can in no way be taken to reflect the views of the European Commission. 1 Table of Contents 1. INTRODUCTION ........................................................................................................ 4 1.1 SCOPE, GOALS AND OBJECTIVES ....................................................................................... 4 1.2 METHODOLOGY ............................................................................................................. 4 1.3 DEFINITIONS ................................................................................................................. 6 2. THEORETICAL FRAMEWORK
    [Show full text]
  • Sociotechnical Security As an Analytic Framework
    Entanglements and Exploits: Sociotechnical Security as an Analytic Framework Data & Society Research Institute Columbia University Matt Goerzen, ​ ​Elizabeth Anne Watkins, ​ Open Technology Fund Research Fellow Gabrielle Lim, ​ Abstract Unfortunately, platform-linked violence like the incidents in The rise of social media platforms has produced novel Christchurch and San Diego are not uncommon and are security threats and vulnerabilities. Malicious actors can unlikely to subside in the near future. Other forms of now exploit entanglements of once disparate technical and problematic and potentially dangerous content also social systems to target exposed communities. These proliferate. False and misleading content distributed on exploits pose a challenge to legacy security frameworks Whatsapp in India led to the murders of over two dozen drawn from technical and state-based conceptions of people in 2018 (Goel et al., 2018). The genocide of the referent objects and bounded information systems. In this Rohyinga in Myanmar was partially incited by the military paper we propose a new framework of analysis to meet this through disinformation and false accounts on Facebook challenge, Sociotechnical Security (STsec), which (Mozur, 2018). Facebook usage may also correlate with acknowledges how the interplay between actors produces higher rates of anti-refugee attacks in Germany (Müller and emergent threats to participant communities. This Schwarz 2018). Meanwhile, targeted harassment has been exploratory paper offers an overview of sociotechnical linked to self-censorship and a chilling effect on systems, explains why these threats and vulnerabilities internet-based communications (UN Office of the High require us to expand our understanding of security with Commissioner, 2017). Amnesty International in 2018, for regards to participatory technology, and how sociotechnical example, declared Twitter trolling of women a human rights security can be operationalized as a framework for analysis.
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Anatomy of Data Breaches and Its Impact on Security
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Anatomy of Data Breaches and Its Impact on Security Anshu1, Monika Sharma2 1M.Tech Scholar, Computer Science Department, TIT & S, Bhiwani, India 2Assistant Professor, Information Technology Department, TIT & S, Bhiwani, India Abstract: In cloud computing, the word cloud is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services - such as servers, storage and applications -- are delivered to an organization's computers and devices through the Internet [14]. Every user access cloud services through internet without knowing the security aspects. Today security threats are increasing rapidly and data breach is top of them. Breach in the security of any component in the cloud can be both disaster for the organization and the provider. In this research paper we focus on main security issue in cloud like data breach, different forms of data breaches and how it occurs in cloud. It also explore where major breaches occur in cloud in past years. Keywords: cloud, data breaches, security 1. Data Breaches two categories i.e. accidental breach or intentional breach The term data breach means when an unauthorized user or a) Accidental breach: also called as employee error when hacker or an attacker attacks an authorized data, access or an employee by mistake sends data to wrong receipts, retrieves it by an individual or service without the and by not understanding security protocols and permission. A data breach results in loss of sensitive, procedures.
    [Show full text]
  • 489 INDEX 1 10Kwizard, 194 123People.Com, 126, 135 a AAD, 373
    INDEX 1 A (cont.) 10kWizard, 194 Administrative Office of the U.S. 123People.com, 126, 135 Courts, 421, 432 Admissible Evidence, 31, 32, 119 A Internet Archive, 33 Social Networking Sites, 34 Wikipedia, 33 AAD, 373 Adobe, 69 AAJ, 298 Adobe Acrobat, 10, 71, See also ABA. See American Bar Association Adobe Reader, See also PDF ABI, 464 Adobe Reader, 71 Access Downloading, 10 GPO, 372 Toolbar, 72 Access to Archival Databases (AAD) Ads, 37 System, 373 Advanced Search, 69 ACCESSLAW Advertising California State Courts Ethics, 477 Free Case Law Database, 333 Law, 463, 464 Cases Agencies California Federal, 289, 418, 419 Free, 333 Directories, 408, 420 Accounting Forms, 472 TAXSites.com, 480 Statistics, 441 Accurint, 233, 244, 253 Local, 437 Bankruptcy, 196 State, 437 Canadian Phones, 255 Territorial (U.S.), 437 Contact Card Report, 255 Tribal (U.S.), 437 Deep Skip, 255 AGRICOLA Books, 373 Driver’s License Records, 126 AIPLA, 474 Driver’s Licenses, 255 Briefs, 477 E-mail database, 255 Air Force Personnel Foreclosure database, 257 Locator Services, 180 People Alert, 255 People at Work database, 255 Alerts Phones Plus, 255 Accurint, 255 Relavint, 255 Articles, 310 Vehicle Identification Numbers, 255 Blogs, 80 Voter’s Registration, 255 Cases, 304, 310, 327, 346 Address Bar, 6, 14, 35 Complaints, 462 Dockets, 453, 455, 461 Address Search, 233, 235, 245, 251, Dockets (Federal Courts), 453 253, 256, 262 EDGAR, 194 Past, 235 Federal Register, 409 Addresses Free, 80 E-mail, 144, 172, 215, 235 Google Scholar, 304, 310 Unlock, 144 Groups, 80 URL, 6, 26, 29, 117 Legal News, 284 Web Site, 2 Morningstar Document Research, 194 AdLawbyRequest.com, 464 News, 80 Patents, 310 489 A (cont.) A (cont.) Alerts (cont.) American Psychological Association Podcasts, 85 Citation Rules, 488 Scholar, 304, 310 SEC, 194 American Samoa Government U.S.
    [Show full text]
  • Coronavirus Social Engineering Attacks: Issues and Recommendations
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 5, 2020 Coronavirus Social Engineering Attacks: Issues and Recommendations Ahmed Alzahrani Faculty of Computing and Information Technology King Abdulaziz University, Jeddah Saudia Arabia Abstract—During the current coronavirus pandemic, Social engineering attacks fall into four types: physical, cybercriminals are exploiting people’s anxieties to steal technical, social, and socio-technical [3]. In general, there are confidential information, distribute malicious software, perform two methods of social engineering attacks, human-based and ransomware attacks and use other social engineering attacks. computer-based. Human-based social engineering requires The number of social engineering attacks is increasing day by interaction with humans to gain the desired information. day due to people's failure to recognize the attacks. Therefore, Impersonation is the most common approach for this type, via there is an urgent need for solutions to help people understand a phone call or text message (see Fig. 2), online, or even in social engineering attacks and techniques. This paper helps person. Computer-based social engineering uses computer individuals and industry by reviewing the most common software to try to gain the required information. This attack coronavirus social engineering attacks and provides includes sending scam emails asking the user to open an recommendations for responding to such an attack. The paper also discusses the psychology behind social engineering and attachment to check the latest statistics about coronavirus or introduces security awareness as a solution to reduce the risk of information about coronavirus safety measures (see Fig. 1). social engineering attacks. Cybercriminals can also create a fake website to trick users into downloading malware to steal users' credentials and online Keywords—Social engineering; coronavirus; COVID-19; banking information.
    [Show full text]