W H A T ’ S H A P P E N I N G , W H O I S I N V O L V E D
A N D W H A T ’ S A T S T A K E ?
Cybersecurity
Alleged Anonymous hackers charged
 Article appeared in Washington Post, 3/12/2012
 5 hackers charged with recent cyber-assaults
 Core members of Anonymous
 Fellow hacker Hector Monsegur (―Sabu‖) turned
confidential informant
 FBI says distrust has ―broken the back of the
collective‖
Stratfor leak
 Arrests related to recent cyber-assault on
Stratfor, a private intelligence company
 Stratfor provides ―geopolitical analysis‖ to
corporate and government clients
 Hackers provided stolen emails to Wikileaks
 25 million Stratfor emails published on Wikileaks
detailing government attacks on
Wikileaks, Julian Assange
 Stolen emails also reveal how Stratfor runs its
business
Anonymous
 International ―hacktivist‖ group
 Loose coalition, no central leadership
 Members communicate on multiple
imageboards, Internet forums, wikis, and
Internet Relay Chat networks
 Hackers used pseudonyms and are located
around the world
 Image from Wikipedia Commons, author Vincent Diamante, originally posted
to Flickr.com
Anonymous Activities
 Conduct cyber-assaults as a means of political
protest
 Often targeting anti-digital piracy groups
 Steal data and disrupt websites
 They have hacked the Wall Street Journal and
crashed the CIA website
 Currently threatening ―Operation Global
Blackout‖ to take down Facebook or the entire
Internet
Ties between Anonymous and Wikileaks
 Wikileaks has access to mainstream media
 Information stolen by Anonymous hackers fed to
Wikileaks for media coverage
 ―The two have long been something like
partners-in-crime, with the leaderless hacktivist
collective Anonymous having attacked enemies
of WikiLeaks in the past — but WikiLeaks always
remained carefully removed.‖
Washington Post, 2/27/2012
Cyber-assaults beyond Anonymous
 CBS 60 Minutes Segment: Cyber War: Sabotaging
the System broadcast June 13, 2010
 ―Could foreign hackers get into the computer
systems that run crucial elements of the world's
infrastructure, such as the power grids, water
works or even a nation’s military arsenal, to
create havoc? They already have. Steve Kroft
reports.‖
 Our electronic Pearl Harbor occurred in 2007;
government and military data compromised by
unknown foreign government
Other Recent Cyber-Assaults
 Significant cyber-assaults happen daily
 Sony – Caused Playstation Network outage and
customer data breached
 Google – Chinese hackers accessed U.S.
government gmail accounts
 RSA – Issues security tokens, related to
Lockheed Martin breach
 Epsilon – Marketing company, several million
names and email addresses compromised
US Government Response
 NIST National Cybersecurity Center of Excellence
 A public-private collaboration for accelerating
the widespread adoption of integrated
cybersecurity tools and technologies
 Unite the knowledge of the government with the
know-how of the private sector to improve our
nation’s cybersecurity

More Related Content

PPTX
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
PDF
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
DOCX
Top 5 notorous Hackers
PDF
Cyber terrorism fact or fiction - 2011
PPTX
Internet in news
PDF
White Paper: Managing consumer data privacy with Gigya (French)
PDF
DARK OVERLORD 9-11 TERRORIST BLACKMAILERS
PPTX
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Top 5 notorous Hackers
Cyber terrorism fact or fiction - 2011
Internet in news
White Paper: Managing consumer data privacy with Gigya (French)
DARK OVERLORD 9-11 TERRORIST BLACKMAILERS

What's hot (20)

PPTX
Hacktivism in Virtual Worlds
PDF
Cybersecurity Events 2017
PDF
Cyber Convergence, Warfare and You
PDF
How the Surveillance State Changes IT Security Forever
PPTX
Hacking
PPTX
Cyber War ( World War 3 )
PPTX
Cyber terrorism
PDF
5 biggest cyber attacks and most famous hackers
PDF
WikiLeaks and Information Policy
PPTX
Cyber terrorism
PPTX
Cyber terrorism
PPTX
Presentación3
RTF
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
KEY
Post Apocalyptic Cyber Realism
PPT
Cyber Terrorism Presentation
PDF
Security Bytes - July 2013
PPTX
PPTX
Information Ethics & WikiLeaks
PPT
National security and Freedom of expresion after Wikileaks
PPT
28658043 cyber-terrorism
Hacktivism in Virtual Worlds
Cybersecurity Events 2017
Cyber Convergence, Warfare and You
How the Surveillance State Changes IT Security Forever
Hacking
Cyber War ( World War 3 )
Cyber terrorism
5 biggest cyber attacks and most famous hackers
WikiLeaks and Information Policy
Cyber terrorism
Cyber terrorism
Presentación3
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
Post Apocalyptic Cyber Realism
Cyber Terrorism Presentation
Security Bytes - July 2013
Information Ethics & WikiLeaks
National security and Freedom of expresion after Wikileaks
28658043 cyber-terrorism
Ad

Similar to Presentation on Cybersecurity presented by Katie Rapp for Information Policy course (20)

ODP
CWFI Presentation Version 1
PDF
Fail To Plan
PDF
IT Risk Management In The Age of Wikileaks
PPT
Cyber Wars And Cyber Terrorism
PPTX
Sit presentation - Hacking
PPTX
Assignment 3
PPTX
Hackers & hacktivism
DOCX
Cyber terrorism, by definition, is the politically motivated use.docx
KEY
Geovon TECH621 Presentation
PDF
Tema 5.cybersecurity
PPTX
Cyber warfare Threat to Cyber Security by Prashant Mali
DOCX
Cyberterrorism can be in the form of Information attacks which a.docx
PPSX
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
PDF
Future_Radicals_Study_Guide_HIGH_RES
PPTX
Cyber Terrorism
PPTX
Cyber war
PPT
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
PPTX
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
PDF
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
CWFI Presentation Version 1
Fail To Plan
IT Risk Management In The Age of Wikileaks
Cyber Wars And Cyber Terrorism
Sit presentation - Hacking
Assignment 3
Hackers & hacktivism
Cyber terrorism, by definition, is the politically motivated use.docx
Geovon TECH621 Presentation
Tema 5.cybersecurity
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyberterrorism can be in the form of Information attacks which a.docx
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
Future_Radicals_Study_Guide_HIGH_RES
Cyber Terrorism
Cyber war
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
Ad

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
TEXTILE technology diploma scope and career opportunities
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Architecture types and enterprise applications.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
DOCX
search engine optimization ppt fir known well about this
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Getting started with AI Agents and Multi-Agent Systems
NewMind AI Weekly Chronicles – August ’25 Week III
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A proposed approach for plagiarism detection in Myanmar Unicode text
2018-HIPAA-Renewal-Training for executives
Flame analysis and combustion estimation using large language and vision assi...
Build Your First AI Agent with UiPath.pptx
Improvisation in detection of pomegranate leaf disease using transfer learni...
TEXTILE technology diploma scope and career opportunities
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Architecture types and enterprise applications.pdf
Comparative analysis of machine learning models for fake news detection in so...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
Consumable AI The What, Why & How for Small Teams.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
search engine optimization ppt fir known well about this
A contest of sentiment analysis: k-nearest neighbor versus neural network
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Presentation on Cybersecurity presented by Katie Rapp for Information Policy course

  • 1. W H A T ’ S H A P P E N I N G , W H O I S I N V O L V E D A N D W H A T ’ S A T S T A K E ? Cybersecurity
  • 2. Alleged Anonymous hackers charged  Article appeared in Washington Post, 3/12/2012  5 hackers charged with recent cyber-assaults  Core members of Anonymous  Fellow hacker Hector Monsegur (―Sabu‖) turned confidential informant  FBI says distrust has ―broken the back of the collective‖
  • 3. Stratfor leak  Arrests related to recent cyber-assault on Stratfor, a private intelligence company  Stratfor provides ―geopolitical analysis‖ to corporate and government clients  Hackers provided stolen emails to Wikileaks  25 million Stratfor emails published on Wikileaks detailing government attacks on Wikileaks, Julian Assange  Stolen emails also reveal how Stratfor runs its business
  • 4. Anonymous  International ―hacktivist‖ group  Loose coalition, no central leadership  Members communicate on multiple imageboards, Internet forums, wikis, and Internet Relay Chat networks  Hackers used pseudonyms and are located around the world  Image from Wikipedia Commons, author Vincent Diamante, originally posted to Flickr.com
  • 5. Anonymous Activities  Conduct cyber-assaults as a means of political protest  Often targeting anti-digital piracy groups  Steal data and disrupt websites  They have hacked the Wall Street Journal and crashed the CIA website  Currently threatening ―Operation Global Blackout‖ to take down Facebook or the entire Internet
  • 6. Ties between Anonymous and Wikileaks  Wikileaks has access to mainstream media  Information stolen by Anonymous hackers fed to Wikileaks for media coverage  ―The two have long been something like partners-in-crime, with the leaderless hacktivist collective Anonymous having attacked enemies of WikiLeaks in the past — but WikiLeaks always remained carefully removed.‖ Washington Post, 2/27/2012
  • 7. Cyber-assaults beyond Anonymous  CBS 60 Minutes Segment: Cyber War: Sabotaging the System broadcast June 13, 2010  ―Could foreign hackers get into the computer systems that run crucial elements of the world's infrastructure, such as the power grids, water works or even a nation’s military arsenal, to create havoc? They already have. Steve Kroft reports.‖  Our electronic Pearl Harbor occurred in 2007; government and military data compromised by unknown foreign government
  • 8. Other Recent Cyber-Assaults  Significant cyber-assaults happen daily  Sony – Caused Playstation Network outage and customer data breached  Google – Chinese hackers accessed U.S. government gmail accounts  RSA – Issues security tokens, related to Lockheed Martin breach  Epsilon – Marketing company, several million names and email addresses compromised
  • 9. US Government Response  NIST National Cybersecurity Center of Excellence  A public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies  Unite the knowledge of the government with the know-how of the private sector to improve our nation’s cybersecurity

Editor's Notes

  • #3: 5 hackers charged with cyberattacks, stealing confidential information from U.S. companies and temporarily shutting down government web sitesAccording to FBI, these are core members of the groupHackers identified by Anonymous hacker Hector Monsegur (“Sabu”), who turned confidential informantAccording to FBI, this has caused distrust within Anonymous and may have “broken the back of the collective”
  • #4: Article states that one of the recent cyber attacks connected to these arrests involved hackers providing emails from Stratfor, a private intelligence company with close links to the US Government, to Wikileaks, which published them in FebruaryStratfor provides “geopolitical analysis” to corporations and government clients25 million emails published on Wikileaks detailing government attacks on Wikileaks, Julian AssangeEmails also reveal how Stratfor runs its business
  • #8: http://www.cbsnews.com/video/watch/?id=6578069n&tag=mncol;lst;13:45 to 6:50
  • #10: http://www.nist.gov/itl/csd/nccoe-022112.cfm