Module 7 - The Role of Social Networking Flashcards
Uses of Social Media
1 to many comms. with tools such as Twitter, Flickr, and resume sites
- 1 to many comms with some privileged comm. to groups of individuals with tools such as Facebook (with security enabled) and Orkut (popular in S. America and S. Africa).
- One to One sharing of info with tools such as SnapChat and Pair
Social Media as Means of OSInt
Collect information from across multiple social networking sites, e.g. Facebook, LinkedIn, Twitter, Flickr, Monster, forums, product reviews, etc. Becomes very easy to do.
- Also against the corporations based on information posted by employees
Social Networking Sites serve as (4):
- passive source of info. about targets, both individuals and organizations
- an active source of reconnaissance (Robin Sage and fake profiles)
- a weapon, e.g. profiles with hyperlinks and embedded malicious pictures
- as means to rally large groups of individuals
Popular Sources of Communication and Information:
- social networking sites (personal, professional)
- file sharing sites
- pastebin (Anonymous)
- IRC Servers
- Forums
- 4chan.org
List 7 Popular Social Networking Sites in US
- MySpace
- Linked In
- Google Plus
- Flickr
- Four Square
Social Media Problem for Governments (examples)
View Social Networking as a problem (sensitive information disclosed online)
- example - Fairfax Media survey uncovered > 200 Australian intelligence officers who had disclosed their classified employment on sites.
> Petraeus Affiar (mistress leak sensitive information
> UK - Wife of MI6 posted data on Facebook
Social Media as Intel Source (tool)
For governments, military, and non state such as corporations.
Dynamic Twitter Network Analysis (DTNA)
- pulls data from Facebook, YouTube, Google, Twitter
Robin Sage
- Thomas Ryan ran experiment Dec 2009 - Jan 2010.
- Obtained 300 LinkedIn contacts, 110 Facebook Friends, 141 Twitter followers
Terrorists Use of Social Media for Intelligence
Taliban friending US Troops on Facebook using fake accounts.
Cyber Profiling Using Social Media (how its done)
- Identify Individuals of Interest (DBAs, Security Admins, Firewall engineers)
- Identify Architecture (determine weaknesses based on posting)
- Target Organizations of interest (realistic spear phishing attacks, logistical information)
One Intrusion Technique Using Social Media:
1) Forgot password
2) Answer security questions based on profiling data
3) Reset the password and reset secondary e-mail address
Live Journal
Accounts: 41.4 Million
US Accounts: 4.5 million
Russian Federation Accounts: 2.6 million (but much more active)
Sentinel Analyzer
- Analyzes cluster “power” of individuals, shows connections $4000
Facebook Notes
- Username and password required for logon
- Logon from computer or mobile device
- E-mail alert when an unusual device or location are used.
- Friend Invitations must be accepted.
- Postings timestamped
- Not all profiles viewable
Twitter Notes
all around the world
Tool for Looking at Metadata
ExifReader - make/model - timestamp - phone's GPS (likely on Apple, possible on Android)