Law-enforcement officials, IT security providers and executives at the RSA 2012 Conference were concerned about the kind of damage hacktivists can cause on networks and on a company’s reputation. Still, while some see chaos, others see potential, and a panel of experts worried about all this technical knowledge going to waste.
Eric Strom, unit chief of the Federal Bureau of Investigation’s cyber-initiative and resource fusion unit; Misha Glenny, a journalist; and Grady Summers, a vice president from Mandiant, joined Jeffrey Brown, a senior correspondent with “PBS NewsHour,” for a panel on hacktivism at the RSA Conference in San Francisco Feb. 29. The panelists agreed that many of the hacker collectives online, such as Anonymous, were primarily political movements rather than criminal organizations.
For many of the members, the Internet is part of their lives, and computers and mobile devices integrate their digital and physical identities seamlessly. Hacktivism would be the preferred method of protest for a group comfortable with online life, Glenny said.
The groups are full of “skilled young people who are persuaded to go to the other side,” said Glenny.
Anonymous is primarily viewed by members as a political movement, and its methods are political tools of protest, much in the same way marches and sit-ins were part of civil disobedience in the physical world. While organized criminals do recruit individual members for criminal activity or attempt to direct campaigns in a way to benefit their interests, for the most part, groups like Anonymous are political.
It is difficult to draw the distinction between what is a legitimate protest and what is illegal, said Summers. While launching distributed denial-of-service attacks are illegal, it’s not always clear how taking a site offline is more disruptive than physically protesting in front of an organization and preventing it from doing business, he said.
For many organizations, last year was the first time information security was even mentioned in front of the board of directors. Hacktivists aren’t just a security concern for organizations, but also a public relations issue. Regardless of whether a cyber-incident was the work of Anonymous, and if it is an advanced persistent threat (APT) or something else, organizations still need to respond.
Anonymous has no formal hierarchy or organizational structure. A small group of highly skilled individuals influence other members, who are usually less advanced and younger, panelists said. Much of the activity in Anonymous’ operations is carried out by younger members who are excited to be part of a political process.
The symbolism of the name Anonymous is incredibly “powerful,” said Glenny, noting that the name shows there’s no accountability and there’s no way to trace the activities.
“Most of them are minors. How do we prosecute someone like that?” asked Strom. FBI agents generally wind up talking to the parents, Strom said.
A lot of people think hacktivists are just kids fooling around, but the bottom line is that they can cause a lot of harm to an organization, said Strom.
There was “not a single person in the room” who didn’t know the kind of havoc hacktivists can wreak on an organization or feel “sick to the stomach” at the thought of being targeted, said Summers. But the amount of attention paid to groups may be overblown.
Even though he doesn’t mean to make light of the issue, Summers is not expecting a zero-day attack from Anonymous.
Regardless of their motivation, hacktivists have forced two major changes among organizations. Their activities have increased information sharing between organizations and law enforcement, but they have also increased senior management’s perception of the importance of security, said Summers.
Glenny advocated “rehabilitating” hacktivists to use their talents for the organizations, instead of against them. Instead of arresting and jailing hacktivists for taking part in the political protests, they should be hired by companies to provide insight and real technical skills, said Glenny.
“If your only skill is using a computer, and you’re not able to do that, I think that’s likely to put you back into the underground,” said Glenny.
Summers didn’t think it was likely that organizations would take on the responsibility of bringing hacktivists on board. While some companies have hired hackers in the past, there are others with a clear policy against the practice.
While hacktivists were for the most part youngbetween 14- and 22-years-oldthere are professionals and IT employees also taking part in these activities, said Strom. The older members often have enough skills to be hired as professionals. The younger members have skills that could be transferred to other uses, and it is important that officials try to divert their interests while they are still young, said Glenny.
“We have a lot of talent out there and we should start to think of developing methods so we can find incentives to channel those talents before it happens,” said Glenny.