Inteligencia y Seguridad Frente Externo En Profundidad Economia y Finanzas Transparencia
  En Parrilla Medio Ambiente Sociedad High Tech Contacto
High Tech  
 
24/07/2010 | Fake femme fatale shows social network risks

Jaikumar Vijayan

Researcher Thomas Ryan says fictitious Robin Sage character fooled many holding security, military and intelligence posts.

 

Computerworld — 

Hundreds of people in the information security, military and intelligence fields recently found themselves with egg on their faces after sharing personal information with a fictitious Navy cyberthreat analyst named "Robin Sage," whose profile on prominent social networking sites was created by a security researcher to illustrate the risks of social networking.

In a conversation with Computerworld, Thomas Ryan, co-founder of Provide Security, said he used a few photos to portray the fictional Sage on Facebook, LinkedIn and Twitter as an attractive, somewhat flirty cybergeek, with degrees from MIT and a prestigious prep school in New Hampshire. Then he established connections with some 300 men and women from the U.S. military, intelligence agencies, information security companies and government contractors.

The goal, said Ryan, was to determine how effective social networking sites can be in conducting covert intelligence-gathering activities.

Despite some patently obvious red flags -- such as noting that the 25-year-old Sage had worked professionally for 10 years -- the scheme worked. The connections to Sage, who was depicted as a real-life Abby Scuito, a fictional character in CBS's NCIS television series, were established in less than a month. Many friends freely shared personal information and photos, invited the fictional threat analyst to conferences and asked her to review documents. Some "friends" at major companies, including Google and Lockheed Martin, even expressed interest in hiring her, he noted.

A security researcher created a fake online profile for a fictional cyberthreat analyst named "Robin Sage."

Had Sage really been a foreign agent, she would have had access to a lot of very useful information, said Ryan, who is scheduled to present his findings next week at the BlackHat security conference in Las Vegas. Excerpts from his interview with Computerworld follow:

What prompted you to conduct the experiment? One of the biggest drivers was all the talk about cyberwarfare and cyberespionage -- and what's real and what's not real. I wanted to see how much intel you could gather from a person just by lurking on a social networking site. I [also] wanted to see who was most susceptible to clicking. I wanted to see how fast this thing would propagate. One of the things I found was that MIT and St. Paul's [prep school] were very cliquey. If they don't remember seeing you, they are not going to click. You had less of a chance of penetrating those groups than the actual intel and security communities.

ITworld (Estados Unidos)

 


Otras Notas Relacionadas... ( Records 1 to 10 of 15 )
fecha titulo
25/09/2011 Redes sociales y política
31/08/2011 Redes sociales fomento de drogadicción y alcoholismo: estudio
31/08/2011 Redes sociales fomento de drogadicción y alcoholismo: estudio
03/07/2011 Bielorrusia bloquea redes sociales en día nacional
03/07/2011 Bielorrusia bloquea redes sociales en día nacional
20/02/2011 Is Malcolm Gladwell wrong on Egypt and social media?
01/08/2010 Grupo anarquista turco hackea el Facebook en español
01/08/2010 500 millones
01/08/2010 Wikileaks founder Julian Assange: more revelations to come
01/08/2010 Wikileaks founder Julian Assange: more revelations to come


Otras Notas del Autor
fecha
Título
20/01/2010|

ver + notas
 
Center for the Study of the Presidency
Freedom House