SESSION ID:
Foreign spies and Facebook: the undeniable truth
MASH-W03B
Menny Barzilay Cyber Security Strategist
Hila Meller Head of Security Strategy, EMEA CA Technologies
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
24
#RSAC
25
#RSAC
26
#RSAC
Sour
ce: h
ttp:
//up
load
.wik
imed
ia.o
rg/w
ikip
edia
/com
mon
s/6/
60/E
dwar
d_Sn
owde
n-2.
jpg
#RSAC
28
#RSAC
29
#RSAC
30
#RSAC
#RSAC
#RSAC
#RSAC
34
#RSAC
#RSAC
#RSAC
#RSAC
y
General
Keith Alexander
Sour
ce: h
ttp:
//up
load
.wik
imed
ia.o
rg/w
ikip
edia
/com
mon
s/6/
60/E
dwar
d_Sn
owde
n-2.
jpg
#RSAC
#RSAC
#RSAC
y
...a vital tool in thwarting
54 terrorist
attacks worldwide
Sour
ce: h
ttp:
//up
load
.wik
imed
ia.o
rg/w
ikip
edia
/com
mon
s/6/
60/E
dwar
d_Sn
owde
n-2.
jpg
#RSAC
y
...a vital tool in thwarting
? terrorist
attacks worldwide
Sour
ce: h
ttp:
//up
load
.wik
imed
ia.o
rg/w
ikip
edia
/com
mon
s/6/
60/E
dwar
d_Sn
owde
n-2.
jpg
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
47
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
60
#RSAC
Dart
h Va
der a
s he
appe
ars i
n So
ul C
alib
ur 4
for P
S3
#RSAC
#RSAC
#RSAC
A Happy Spy….
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
72
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
?
#RSAC
#RSAC
#RSAC
80
#RSAC
#RSAC
82
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
He is using Wi-Fi ht
tp:/
/loly
ard.
com
/279
5/he
-has
-wifi
#RSAC
#RSAC
#RSAC
93
#RSAC
94
#RSAC
#RSAC
96
#RSAC
97
#RSAC
98
#RSAC
99
#RSAC
100
#RSAC
101
#RSAC
The strange case of Reut Zukerman
In 2010 Swiss and Israeli news sites reported of a fake Facebook account named Reut Zukerman allegedly used by Hisbollah for spying on Israeli soldiers.
102
#RSAC
103
#RSAC
Nearly every APT follows four phases:
104
Source: Defending against advanced persistent threats: strategies for a new era of attacks. eBook published by CA Technologies
#RSAC
105
#RSAC
106
#RSAC
107
#RSAC
108
#RSAC
109
#RSAC
Academic use case
During 2011 a group of researchers from the Federal University of Ouro Preto Barzil deployed and monitored the activity and popularity of 2 tweeter female bots.
Both bots were operated using the standard Twitter Python API.
The research presents bot algorithms employed to interact in the social network and gain popularity.
#RSAC
Use a human to be a human
111
#RSAC
112
#RSAC
#RSAC
#RSAC
#RSAC
116
#RSAC
117
#RSAC
75 Years
118
#RSAC
119
38 Years
#RSAC
13 Years
120
#RSAC
3.5 Years
121
#RSAC
38 Days
122
#RSAC
123
#RSAC
124
#RSAC
125