(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing



Similar documents
I N T E L L I G E N C E A S S E S S M E N T

How To Understand Cyber Security

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

How do we Police Cyber Crime?

Working with the FBI

FEDERAL BUREAU OF INVESTIGATION SITUATIONAL INFORMATION REPORT Criminal Activity Alert Kansas City Field Office

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Distinct Challenges for Deterring Illicit Activity

U. S. Attorney Office Northern District of Texas March 2013

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN Ph: (952) Fax: (651)

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

2012 NCSA / McAfee Online Safety Survey

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E

Strategies for Countering Cyber Threats

April 30, 2015 VIA . Attorney General Joseph Foster Office of the Attorney General NH Department of Justice 33 Capitol Street Concord, NH 03301

Into the cybersecurity breach

The FBI and the Internet

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Notice of Privacy Practices

Healthcare Information Security Today

Microsoft s cybersecurity commitment

Detailed Description about course module wise:

Standard: Information Security Incident Management

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Federal Bureau of Investigation

Riverside Community College District Policy No General Institution

Information with a person who is involved in your medical care or payment for your care, such as your family or a

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

WRITTEN TESTIMONY OF

Protected Health Information. Notice Information. Notice of Privacy Practices. Nystrom & Associates, Ltd Family Support Services, Inc.

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Proposal: Illinois Justice Network Portal

Utica College. Information Security Plan

Letter from the CEO. January 25, To Our Valued Michaels Customers:

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

ADDRESSES SYSTEM LOCATION

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

<March XX, 2015> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRST NAME> <LAST NAME>:

HOMELAND SECURITY & INTELLIGENCE (HSI) SECTION

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

LIFESTREAM BEHAVIORAL CENTER, INC. JOINT NOTICE OF PRIVACY PRACTICES. Effective Date: April 14, 2003

ICT Barriers, High Tech Crime, and Police

azag.gov PROTECT YOURSELF AGAINST IDENTITY THEFT Office of Arizona Attorney General TERRY GODDARD For more information, contact:

Notice of Privacy Practices

How to Prevent It What to Do If You Are a Victim

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, :40 PM Subject: Important message from Anthem, Inc.

Federal Bureau of Investigation s Integrity and Compliance Program

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

ARE YOU A VICTIM OF AN IDENTITY CRIME?

Prepared by Sgt. Gibbs, Thomas B

Unisys Security Insights: Germany A Consumer Viewpoint

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

Middle Class Economics: Cybersecurity Updated August 7, 2015

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information.

Establishing a State Cyber Crimes Unit White Paper

Assessing the strength of your security operating model

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

ADDRESSING POLICE MISCONDUCT

Specific recommendations

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

Frequently Asked Questions. OPM Data Breach. Department of the Navy

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

How To Protect Your Privacy At A Clinic

ELECTRONIC INFORMATION SECURITY A.R.

IDENTITY THEFT VICTIM KIT

Transcription:

FEDERAL BUREAU OF INVESTIGATION INTELLIGENCE BULLETIN Cyber Intelligence Section 2 August 2011 (U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing (U//FOUO) The FBI assesses with high confidence a that law enforcement personnel and hacking victims are at risk for identity theft and harassment through a cyber technique called doxing. Doxing is a common practice among hackers in which a hacker will publicly release identifying information including full name, date of birth, address, and pictures typically retrieved from the social networking site profiles of a targeted individual. (U//FOUO) In response to law enforcement activities that have occurred against Anonymous b and LulzSec c since January 2011, members of these groups have increased their interest in targeting law enforcement in retaliation for the arrests and searches conducted. Hackers and hacktivists hackers who commit a computer crime for communicating a socially or politically motivated message have been openly discussing these activities on Twitter and posting information pertaining to law enforcement on their Twitter accounts and Internet Relay Chat (IRC) channels. (U//FOUO) In June 2011 members of Anonymous and LulzSec discussed an identified FBI agent in the IRC channel #lulzsec. The detailed information included when he or she started working for the FBI, training, assignments, and previous employment. 1 FBI analysis suggests that this information was derived from a 2009 affidavit that was available on the Wired.com Web site. 2 (U//FOUO) On 26 July 2011 the Twitter account OpMonsanto, an account used by members of Anonymous, warned of the intention to dox FBI agents following the 19 July 2011 arrests of 16 individuals for their presumed role in Anonymous activities: OpMonsanto: To any FBI agent involved in the continued unjust raiding of peaceful Anons: Expect us. You are no longer entitled to your privacy. 3 a (U) High confidence generally indicates that the FBI s judgments are based on high-quality information or that the nature of the issue makes it possible to render a solid judgment. Medium confidence generally means that the information is credibly sourced and plausible, but can be interpreted in various ways, or is not of sufficient quality or corroborated sufficiently to warrant a higher level of confidence. Low confidence generally means that the information s credibility or plausibility is questionable, the information is too fragmented or poorly corroborated to make solid analytic inferences, or that the FBI has significant concerns or problems with the sources. b (U) Anonymous is an international hacktivist group responsible for denial-of-service attacks, Web site defacements, and computer intrusions. c (U) LulzSec is a hacker group consisting of overlapping members of Anonymous and responsible for various computer intrusions.

(U) On 31 July 2011 more than 70 law enforcement Web sites were hacked and large amounts of confidential data was exfiltrated. These Web sites included state and local police departments that were not associated with the takedowns. The data consisted of e- mail addresses, usernames, Social Security numbers, home addresses, phone numbers, password dumps, internal training files, informant lists, jail inmate databases, and active warrant information. Operation AntiSec d claimed that the intrusion was in response to bogus, trumped-up charges against the individuals associated with Anonymous attacks on PayPal. 4 (U//FOUO) Recently, Anonymous members have also doxed the employees of companies that were victims of their previous attacks, who are perceived as working with law enforcement. (U) In July 2011 a sealed search warrant affidavit pertaining to the 19 July takedown was available on the Internet. The affidavit contained the personal information of employees of two US companies, as well as FBI personnel. The personal information consisted of names, units, and job titles. 5 (U) Outlook and Implications (U//FOUO) The 19 July takedown of Anonymous and LulzSec members has increased members interest in targeting law enforcement in retaliation for the arrests and searches conducted. As more arrests are made against suspected members of Anonymous and LulzSec, the FBI expects hacking activities and doxing that targets law enforcement and government interests will continue. This could compromise investigations and result in harassment and identity theft of the individuals named in the dox. (U//FOUO) Precautionary measures to mitigate potential harassment and identity theft risk to being doxed include: o Safeguarding material containing personal information pertaining to officers and named victims; o Changing passwords and do not reuse passwords for multiple accounts; o Using strong passwords; o Monitoring credit reports; o Monitoring online personal information, including what others post about you on services such as social networking sites; o Being careful when giving out contact information; and o Being aware of social engineering tactics aimed at revealing sensitive information. d (U) AntiSec is an operation conducted by members of Anonymous and LulzSec targeting government and law enforcement interests. 2

(U) Intelligence Collection Requirements (U//FOUO) This intelligence bulletin addresses the FBI Standing Collection Requirements for Identity Theft contained in USA-IDTA-CYD-SR-0108-10, and for Cyber Intrusions: Hacktivists contained in WW-CYBR-CYD-SR-0057-11. (U) This intelligence bulletin was prepared by the Domestic Threats Cyber Intelligence Unit of the FBI. Comments and queries may be addressed to the Unit Chief at 202-651-3051. 3

(U) Endnotes 1 (U//FOUO) Internet Relay Chat; #lulzsec; 10 June 2011; Information obtained through the National Cyber Forensics-Training Alliance. 2 (U) Online Article; February 2009; www.wired.com/images_blogs/threatlevel/files/love_guru_affidavit.pdf; accessed on 29 July 2011. 3 (U//FOUO) Twitter; 26 July 2011; Information obtained through the National Cyber Forensics-Training Alliance. 4 (U) Online Article; 31 July 2011; Trent Nouveau; AntiSec in Massive Law Enforcement Smack ; www.tgdaily.com/security-features/57594-antisec-in-massive-law-enforcement-smackdown; accessed on 1 August 2011. 5 (U) Online Article; July 2011; http://media.nbcbayarea.com/documents/search-warrant-072511.pdf; accessed on 27 July 2011. 4

FBI Intranet DI/OCA JWICS LEO LNI SIPRNet Distribution 5

FBI Customer Satisfaction Survey Please take a moment to complete this survey and help evaluate the quality, value, and relevance of our intelligence product. Your response will help us serve you more effectively and efficiently in the future. Thank you for your cooperation and assistance. Please return to: Federal Bureau of Investigation Editorial Review Unit 935 Pennsylvania Ave., NW, Room 11079C Washington, DC 20535 Customer and Intelligence Product Information Title: (U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing Dated: 2 August 2011 Customer Agency: Relevance to Your Intelligence Needs 1. The product increased my knowledge of an issue or topic. (Check one) 5. Strongly Agree 4. Somewhat Agree 3. Neither Agree or Disagree 2. Somewhat Disagree 1. Strongly Disagree Actionable Value 2. The product helped me decide on a course of action. (Check one) 5. Strongly Agree 4. Somewhat Agree 3. Neither Agree or Disagree 2. Somewhat Disagree 1. Strongly Disagree Timeliness Value 3. The product was timely to my intelligence needs. (Check one) 5. Strongly Agree 4. Somewhat Agree 3. Neither Agree or Disagree 2. Somewhat Disagree 1. Strongly Disagree ERU INTERNAL USE ONLY Product tracking #: IB-1353 Return to: Comments (please use reverse or attach separate page, if needed): 6