SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
U.S.Department Justice
               of
Federal
      Bureauof Investi




Psychological
            Profiles
of
AnonymousLeadership




                  Law Enforcement Sensitive
                           (LES)



                                 August 2011


  BSU Quantico           LES (Law EnforcementSensitive)   USDOJ
I. OVERWEWFOR THE FEDERAL BAREAA OF INWSTIGATION              ..............
                                                                          /
  A. Introduction
il. PSYCHOLOGICALPROFILING APPROACH.                          ..............
                                                                           1
III. ANONYMOUSCOLLECTIW BACKGROUND......                             ......2
IV PROFTLE^S............                                            .......3

    3               (Status
         UNSUBTopiary     captured)......                     ...................5




ANNEX: A TwitterLogs.........



REDACTED SeeEnclosureB,




   BSU Quantico             LES (Law Enforcement Sensitive)       USDOJ
I. OVERVIEW FOR THE FEDERAL BUREAU OF INVESTIGATION

A. Introduction

The Anonymous 'collective'has risen from an amorphousgroup of individuals on the intemet to
the current stateof a potential threat to national security. Due to the nature of anonymous,they
believe that they are a leaderless collective. However, it has beenshown that there is a defined
leadershipgroup. The goal of this report is to better understand   that leadershipsstructureand its
memberspsychological statesin order to better assess     who they really may be as well as define
meansto effectively track them down for arrest.

By using the techniquesand resources the BSU at Quantico,we hope to enlightenthe
                                       of
investigatorsto cuesthat could help in manipulating and apprehending leadershipof
                                                                       the
Anonymous. This will have a profound effect on the collective itself as the arrestof the core
would demoralizethe whole.

II. PSYCHOLOGICAL PROFILING APPROACH

Due to the nature of Anonymous and the intemet, the leadersof the collective have attemptedto
cloak their identities within screennamesand technological obfuscationmethods. Since the
intemet has many ways to hide a person'strue identity, the Behavioral SciencesUnit was
contacted assess individual's online personae
          to         the                          throughonline dialogs.

Working this casewas approached the samemanner as any other UNSUB (Unknown Subject)
                                    in
that the BSU handles,however, the context from this particular casehas been augmentedby
technical servicesbranch members.The upshot of this is that the network technical and forensics
teamsprovided not only the content from which we at the BSU would audit, but also context as
to how the LINSUB's attemptedto hide their identities. The marrying of all of the technical as
well as the contextual data has resultedin this report.

A thorough assessment eachUNSUB's online activities, speechpatterns,and generalwritings
                        of
was collectedby the FBI. EachUNSUB was individually assessed membersof the SBU and a
                                                                  by
psychologicalprofile createdfrom thesedatasets.  Someof this datawas also collectedfrom
sourcessuch as CI's in the field. One such CI (Marotte) has been quite effective in engagingthe
Anonymous leadershipand thus gatheringintelligence that was helpful to the SBU in gauging
their psychological makeup under differing circumstances.

The following report is to be used as a guide not only to perhapslocate the individuals by region,
sex and age,but also to give insight to the agentsin the field canying out operationsto capture
theseactors.By knowing the traits of theseleaders,one can extrapolatethe larger motivations
and perhapseven anticipateactions on the part of Anonymous and its splinter cells.




   BSU Quantico                 LES Oaw EnforcementSensitive)                               USDOJ
III. ANONYMOUS COLLECTIVE BACKGROUND

From Wikipedia:

Anonymous (used as a massnoun) is a group initiating active civil disobedience     and spread
through the Internet while staying hidden, originating in 2003 on the imageboard4chan,
representingthe concept of many online community userssimultaneouslyexisting as an
anarchic,digitized global brain.[2] It is also generally consideredto be a blanket term for
membersof certain Internet subcultures,away to refer to the actionsof people in an
environment where their actual identities are not known.[3]

In its early form, the concepthas beenadoptedby a decentralizedonline community acting
anonymously in a coordinatedmanner,usually toward a loosely self-agreedgoal, and primarily
focused on entertainment.Beginning with 2008, the Anonymous collective has become
increasingly associated  with collaborative,internationalhacktivism, undertakingprotestsand
other actions, often with the goal of promoting internet freedom and freedom of speech.Actions
credited to "Anonymous" are undertakenby unidentified individuals who apply the Anonymous
label to themselvesas attribution.[4]

Although not necessarilytied to a single online entity, many websitesare strongly associated
with Anonymous. This includes notable imageboardssuch as 4chan,Futaba,their associated
wikis, EncycloprediaDramatica, and a number of forums.[5] After a seriesof controversial,
widely-publicized protestsand distributed denial of service(DDoS) attacksby Anonymous in
2008, incidentslinked to its cadremembershave increased.[6] consideration its
                                                              In               of
capabilities, Anonymous has beenpositedby CNN to be one of the three major successors    to
Wikileaks.[7]




   BSU Quantico                LES (Law EnforcementSensitive)                             USDOJ
IV. PROFILES

        UNSUB Sabu
        Approximate age: 29-35
        Sex: Male
        Location: USA
        Probable Nationality: American
        Language Indicators: Slangand diction (American)

        Profile: Sabuis the overall leaderof the LulzSec group and since the arrestof
        Topiary, has taken over the spokesperson  role for Anonymous. Sabu's character
        strongestof the namedgroup and is definitely in charge.Sabuis technically
        competentwithin the realm of computertechnologiesand is the elder of the group of
        AnonymousIINSUB's

        Sabuhas charactertraits of a professionaladult individual who puts on the guise of a
        "script kiddie"
                          in language(netspeak)but functions within his normal day to day life
        within the businesscommunity without casting any clues to his other online activities.
        It is likely that Sabuworks in the information security sectorand has been doing so
        since the early days of the internet and hacking activities. His use of net speakis
        interspersed   with proper American English diction and grammar that implies he is an
        American citizen and has beeneducated.

        Varying logs from online IRC (Internet Relay Chat) sessions   have borne out the
        possibility however,that the userID "Sabu" is sometimes    alsousedby othersto
        confuse authorities and others as to who the real personis behind the keyboard.
        However, through an amalgamof transcriptsthe tell tale signs of a consistent
        individual can be clearly seenand assessed.

       overall, a picture emerges  from thesesessions can lend to a psychological
                                                    that
       assessment the individual who calls himself "Sabu" The followins bulletized
                    of
       points are the key findings.

       PsychologicalMakeup and Personal Details:

           o   Likely married and employed in the technology sector
           o   Has amoraltendencies    and see'sthe world from a nihilistic perspective
           .   Spellingcorrectionon chat logs showscompulsivebehaviors
           o   Showsnarcissistic   tendencies
           o   Likely to be living in North America (EastCoast)Perhaps    NYC
           o   Prideful and likely easily prone to reaction through manipulation
           .   Ver) conformist in everydaylife
           o   Lives out rich fantasylife online (feeling important and empowered)
           o   Perceiveshimself as a martyr for the cause(his own cause)




  BSU Quantico              LES (Law EnforcementSensitive)                           USDOJ
4


      Assessment: Sabuis skilled and capableaccordingto the technical group, however,
      the tendencies toward attention seekingpathologiesand his ego driven desireswill be
      the most likely way to attemptto apprehend him. It is recommended  that the
      investigationuse CI's and operativesonline to continueto engagehim online in chats.
      Manipulation of languageand emotionsthrough thesechatswill indeed lead to
      further information to be disclosedby him or others.

      It is recommended  that the BSU insert a team member into the LulzSec/Anonymous
      investigationto interfaceonline with the subject(s)and further the social and
      psychological investigationof the group and its leadershipin an attemptto flesh out
      further information.


      UNSUB Kayla
      Approximate age22-27
      Sex:Male
      Probable Location: USA (Middle America)
      Probable Nationality: American
      Profile: Kayla is the online personafor this individual who ran the botnet's
      (compromisedzombie computers)to run attacksagainstsites and userswith DDOS
      (DistributedDenial of Service)attacks.  Kayla claimsto be a girl but the intelligence
      gatheredplacesthe sex of the UNSUB as male.


     PsychologicalMakeup and Personal Details:
     Kayla is one of the more introverted membersof the group and is a close lieutenantto
     Sabu.Kayla is submissiveand has a tendencyto be aggressive   toward anyone who he
     feels has slighted him in any way. Chat logs show a penchantfor entendreand use of
     netspeakthat denotesa younger person as well as perhapsa stuntedemotional age
     that doesnot connectwith his real ase.

         o   Possiblybisexual
         o   Likely abused a child
                            as
         .   Likely inferiority complex due to childhood trauma
         o   Potentially violent behavior possible offline in real world activities
         o   Amoral personality traits
         o   Attention seekingpersonality seekingfather figure approval
         o   Possiblepersistent  drug use
         .   Likely from a broken home

     AssessmentzKayla aka Lolspoon (twitter) is a likely target for an attempt to correlate
     his online personawith othersin the alternativelifestyle intemet underground.SA's
     attempting to interfacewith Kayla should keep in mind that he is easily pushedto
     anger and this can be used.It is recommended  that the investigatorspush this
     individual as frequently as possibleto make him react and thus potentially slip up in
     anger.




BSU Quantico              LES (Law EnforcementSensitive)                              USDOJ
UNSUB Topiary (Status captured)
      Age: 18
      Sex: Male
      Location: Shetland  IslandsUK, Scotland
      Profile: Topiary aka JakeDavis has been apprehended as suchthis profile is only
                                                          and
      for backstoppingpurposes.An ongoing evaluationof his personality and his life is
      being carried out by the Met and ScotlandYard presently.Topiary was the de facto
      spokesman Anonymous and LulzSec and is very outspoken.
                  for

      Toipiary/Davis, is a young individual with a defined ethosof counter culture
      behaviors.At the time of his arraignmentDavis carried a book on revolutionary
      scientistsand made surethat the presscould seethis as a meansto show his point of
      view and defianceof the common laws.

      PsychologicalMakeup and Personal Details:
      Out of the group Topiary is the altruist who believesin what he is doing on the
      outside of it. Internally, his senseif right and wrong are skewedtoward self fulfilling
      outcomes.Davis it is believedhas beenused and co opted by the others within the
      anonymousleadershipas cannonfodder.

         o   A true believer in his world view that society has failed
         o   Youthfully idealistic
         o   Ego driven in his convictions
         o   Obsessivepersonalitytraits including possibleAspergerssyndrome
         o   Socially inept and withdrawn


     UNSUB JoePie9l
     Approximate age2l-26
     Sex: Male
     Location: EU
     Profile: JoePieis a technical individual who is third in command.His skill are in the
     coding areaand also has partakenin the actual hacking carried out by LulzSec and
     Anonymous. Joepie'spolitical views on performing hacking againsttargets only
     extendsto the point of actually breaking the law. JoePiehas allegedthat his is a
     support role only, and as such,not breaking the law.

     PsychologicalMakeup and PersonalDetails:
     JoePieis intelligent and well spoken.He tendsto not use as much netspeakas the
     others and makesrelevant argumentsin correct grammatical syntax. There are times
     when the syntax and grammar infer that JoePieis not an American and may in fact be
     in the EU.

     It is recommendedthat the approachto be taken with JoePieis to align the agent's
     commentaryto JoePie's.Use common ideals stemmingfrom commentary in the HB
     Gary and other IRC chatscapturedto gaugethe approach.



BSU Quantico              LES (Law EnforcementSensitive)                              USDOJ
o   Likely a college studentbut may be just out of college
               o   Technically capableand versed(mention of coding and technical measures)
               a   More autonomous    member of the group
               o   Amoral charactertraits and personalbeliefs




           UNSUB Tflow
           Approximate age 22-26
           Sex: Male
           Location: USA
           Profile: Tflow shows a more mercenaryapproachto the LulzSec and Anonymous
           campaigns.His motivations seemto be monetarily basedand may in fact be a paid
           assetfor the group as a freelancehacker. Tflow is a key player in the command and
           control of their domain registration and management. essence,
                                                                 In          Tflow is a key
           target for taking down the infrastructural underpinningsof the group.

              a    Pseudo-intellectualthat lacks true educationalbacksround
              a    Monetarily driven
              o    Likely has a criminal history
              o    Has cosnitive dissonance  over hacktivism and activism

          PsychologicalMakeup and PersonalDetails:
          The psychological makeup as glimpsed from the IRC chatsleadsthe investigatorsto
          believe that Tflow may be the linchpin to affack as he runs the technology side of
          their internet space.As suchhe is intimately familiar with all of the players and may
          in fact know personaldetails that would be helpful in prosecutionof the other key
          members.

          It is also recommended    that Tflow may be easily turned againstthe group due to his
          cognitive dissonance   over hacktivism as well as he desiresfor monetary gain. This
          also flows into his likely attitudesthat he is not willing to go down for the group
          should his identity be compromised.BSU recommends          that Tflow be a key target for
          agentsin the field to approach.

V. CONCLUSION
In conclusion, the BSU recommendsmore investigation be carried out online to investigatethese
usersby inserting agentsinto their chat rooms as well as gathermore CI's who can do the same.
Becauseof the nature of Anonymous and the internet, it is harderto get areal idea of where
usersare if they know how to hide their tracks online. The use of the social aspects(what
hackers  would call 'social engineering')will be key to gainingaccess datathat will eventually
                                                                       to
lead to capture.

Theseprofiles are solely basedon intemet chatsand as such,may also be somewhatincorrect as
the usersknow that they are being monitored in certain areasof the internet. However, as an
aggregate, data presentedand assessed
             the                           gives the BSU someconfidencein the data presented
here. It is the recommendationof the BSU that this report be re-assessed more data comes
                                                                         as
from assetsin the field and through interviews carried out with Topiary (Davis) by the Met and

   BSU Quantico                LES (Law EnforcementSensitive)                              USDOJ
7


the FBI field agentstaskedto the UK for interviews. Overall, the assessment here is that we have
a group of younger individuals being lead by an older, more experienced  one in an effort that
seemsto have conflicted ideals.Additionally, because   there are many personalitiesinvolved and
Anonymousclaimsto be a larger'collective' group without leaders, is easierto assume
                                                                    it                     that
there are other cells and other leaders.Theseleadersand groupsmay not be chatting in the open
areasof the IRC, but in fact have learnedfrom the experiences this group to be more discreet
                                                               of
about their activities and planning.

The overall assessment the movement however is the following:
                     for

   1.   The movement is out of control and there seemsto be no real coherentmotivation
   2.   The leadershave begun to hide themselvesa bit more due to arreststhat have beenmade
   3.   Their reliance on technologywill eventually be their downfall
   4.   Their interpersonalrelationshipsare weak points, as suchthey should be leveraged
   5.   Their increasingattackson infrastructurewill eventually lead to seriousresults that could
        in fact lead to deaths

It is after the first real attributabledeathsthat there may be a tapering off of their ranks as the
membersrealize that by outing individuals, actualphysical actionscan occur that causegreat
damage.Until such time though, the movementwill continue with the massesused as fodder and
the command structureurging them on to carry out their commands.




   BSU Quantico                LES Gaw EnforcementSensitive)                              USDOJ
AIINEX: A Twitter Logs
REDACTED SeeEnclosureA


AIINEX: B Chat Logs
REDACTED SeeEnclosureB




 BSU Quantico        LES (Law Enforcement Sensitive)

Más contenido relacionado

Similar a Fbi anonymous

Human Intelligence Source Analysis
Human Intelligence Source AnalysisHuman Intelligence Source Analysis
Human Intelligence Source AnalysisLaura Torres
 
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docxEmma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docxgidmanmary
 
Essay About Obama.pdf
Essay About Obama.pdfEssay About Obama.pdf
Essay About Obama.pdfDawn Romero
 
Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.Jasmine Culbreth
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspaceFabrice Epelboin
 
Classification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdfClassification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdfTina Hudson
 
George Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (NarrGeorge Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (NarrWendy Belieu
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationBruce Forrester
 
How To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper ConferenceHow To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper ConferenceJessica Huston
 

Similar a Fbi anonymous (9)

Human Intelligence Source Analysis
Human Intelligence Source AnalysisHuman Intelligence Source Analysis
Human Intelligence Source Analysis
 
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docxEmma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docx
 
Essay About Obama.pdf
Essay About Obama.pdfEssay About Obama.pdf
Essay About Obama.pdf
 
Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
Classification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdfClassification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdf
 
George Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (NarrGeorge Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (Narr
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 Presentation
 
How To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper ConferenceHow To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper Conference
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Fbi anonymous

  • 1. U.S.Department Justice of Federal Bureauof Investi Psychological Profiles of AnonymousLeadership Law Enforcement Sensitive (LES) August 2011 BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 2. I. OVERWEWFOR THE FEDERAL BAREAA OF INWSTIGATION .............. / A. Introduction il. PSYCHOLOGICALPROFILING APPROACH. .............. 1 III. ANONYMOUSCOLLECTIW BACKGROUND...... ......2 IV PROFTLE^S............ .......3 3 (Status UNSUBTopiary captured)...... ...................5 ANNEX: A TwitterLogs......... REDACTED SeeEnclosureB, BSU Quantico LES (Law Enforcement Sensitive) USDOJ
  • 3. I. OVERVIEW FOR THE FEDERAL BUREAU OF INVESTIGATION A. Introduction The Anonymous 'collective'has risen from an amorphousgroup of individuals on the intemet to the current stateof a potential threat to national security. Due to the nature of anonymous,they believe that they are a leaderless collective. However, it has beenshown that there is a defined leadershipgroup. The goal of this report is to better understand that leadershipsstructureand its memberspsychological statesin order to better assess who they really may be as well as define meansto effectively track them down for arrest. By using the techniquesand resources the BSU at Quantico,we hope to enlightenthe of investigatorsto cuesthat could help in manipulating and apprehending leadershipof the Anonymous. This will have a profound effect on the collective itself as the arrestof the core would demoralizethe whole. II. PSYCHOLOGICAL PROFILING APPROACH Due to the nature of Anonymous and the intemet, the leadersof the collective have attemptedto cloak their identities within screennamesand technological obfuscationmethods. Since the intemet has many ways to hide a person'strue identity, the Behavioral SciencesUnit was contacted assess individual's online personae to the throughonline dialogs. Working this casewas approached the samemanner as any other UNSUB (Unknown Subject) in that the BSU handles,however, the context from this particular casehas been augmentedby technical servicesbranch members.The upshot of this is that the network technical and forensics teamsprovided not only the content from which we at the BSU would audit, but also context as to how the LINSUB's attemptedto hide their identities. The marrying of all of the technical as well as the contextual data has resultedin this report. A thorough assessment eachUNSUB's online activities, speechpatterns,and generalwritings of was collectedby the FBI. EachUNSUB was individually assessed membersof the SBU and a by psychologicalprofile createdfrom thesedatasets. Someof this datawas also collectedfrom sourcessuch as CI's in the field. One such CI (Marotte) has been quite effective in engagingthe Anonymous leadershipand thus gatheringintelligence that was helpful to the SBU in gauging their psychological makeup under differing circumstances. The following report is to be used as a guide not only to perhapslocate the individuals by region, sex and age,but also to give insight to the agentsin the field canying out operationsto capture theseactors.By knowing the traits of theseleaders,one can extrapolatethe larger motivations and perhapseven anticipateactions on the part of Anonymous and its splinter cells. BSU Quantico LES Oaw EnforcementSensitive) USDOJ
  • 4. III. ANONYMOUS COLLECTIVE BACKGROUND From Wikipedia: Anonymous (used as a massnoun) is a group initiating active civil disobedience and spread through the Internet while staying hidden, originating in 2003 on the imageboard4chan, representingthe concept of many online community userssimultaneouslyexisting as an anarchic,digitized global brain.[2] It is also generally consideredto be a blanket term for membersof certain Internet subcultures,away to refer to the actionsof people in an environment where their actual identities are not known.[3] In its early form, the concepthas beenadoptedby a decentralizedonline community acting anonymously in a coordinatedmanner,usually toward a loosely self-agreedgoal, and primarily focused on entertainment.Beginning with 2008, the Anonymous collective has become increasingly associated with collaborative,internationalhacktivism, undertakingprotestsand other actions, often with the goal of promoting internet freedom and freedom of speech.Actions credited to "Anonymous" are undertakenby unidentified individuals who apply the Anonymous label to themselvesas attribution.[4] Although not necessarilytied to a single online entity, many websitesare strongly associated with Anonymous. This includes notable imageboardssuch as 4chan,Futaba,their associated wikis, EncycloprediaDramatica, and a number of forums.[5] After a seriesof controversial, widely-publicized protestsand distributed denial of service(DDoS) attacksby Anonymous in 2008, incidentslinked to its cadremembershave increased.[6] consideration its In of capabilities, Anonymous has beenpositedby CNN to be one of the three major successors to Wikileaks.[7] BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 5. IV. PROFILES UNSUB Sabu Approximate age: 29-35 Sex: Male Location: USA Probable Nationality: American Language Indicators: Slangand diction (American) Profile: Sabuis the overall leaderof the LulzSec group and since the arrestof Topiary, has taken over the spokesperson role for Anonymous. Sabu's character strongestof the namedgroup and is definitely in charge.Sabuis technically competentwithin the realm of computertechnologiesand is the elder of the group of AnonymousIINSUB's Sabuhas charactertraits of a professionaladult individual who puts on the guise of a "script kiddie" in language(netspeak)but functions within his normal day to day life within the businesscommunity without casting any clues to his other online activities. It is likely that Sabuworks in the information security sectorand has been doing so since the early days of the internet and hacking activities. His use of net speakis interspersed with proper American English diction and grammar that implies he is an American citizen and has beeneducated. Varying logs from online IRC (Internet Relay Chat) sessions have borne out the possibility however,that the userID "Sabu" is sometimes alsousedby othersto confuse authorities and others as to who the real personis behind the keyboard. However, through an amalgamof transcriptsthe tell tale signs of a consistent individual can be clearly seenand assessed. overall, a picture emerges from thesesessions can lend to a psychological that assessment the individual who calls himself "Sabu" The followins bulletized of points are the key findings. PsychologicalMakeup and Personal Details: o Likely married and employed in the technology sector o Has amoraltendencies and see'sthe world from a nihilistic perspective . Spellingcorrectionon chat logs showscompulsivebehaviors o Showsnarcissistic tendencies o Likely to be living in North America (EastCoast)Perhaps NYC o Prideful and likely easily prone to reaction through manipulation . Ver) conformist in everydaylife o Lives out rich fantasylife online (feeling important and empowered) o Perceiveshimself as a martyr for the cause(his own cause) BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 6. 4 Assessment: Sabuis skilled and capableaccordingto the technical group, however, the tendencies toward attention seekingpathologiesand his ego driven desireswill be the most likely way to attemptto apprehend him. It is recommended that the investigationuse CI's and operativesonline to continueto engagehim online in chats. Manipulation of languageand emotionsthrough thesechatswill indeed lead to further information to be disclosedby him or others. It is recommended that the BSU insert a team member into the LulzSec/Anonymous investigationto interfaceonline with the subject(s)and further the social and psychological investigationof the group and its leadershipin an attemptto flesh out further information. UNSUB Kayla Approximate age22-27 Sex:Male Probable Location: USA (Middle America) Probable Nationality: American Profile: Kayla is the online personafor this individual who ran the botnet's (compromisedzombie computers)to run attacksagainstsites and userswith DDOS (DistributedDenial of Service)attacks. Kayla claimsto be a girl but the intelligence gatheredplacesthe sex of the UNSUB as male. PsychologicalMakeup and Personal Details: Kayla is one of the more introverted membersof the group and is a close lieutenantto Sabu.Kayla is submissiveand has a tendencyto be aggressive toward anyone who he feels has slighted him in any way. Chat logs show a penchantfor entendreand use of netspeakthat denotesa younger person as well as perhapsa stuntedemotional age that doesnot connectwith his real ase. o Possiblybisexual o Likely abused a child as . Likely inferiority complex due to childhood trauma o Potentially violent behavior possible offline in real world activities o Amoral personality traits o Attention seekingpersonality seekingfather figure approval o Possiblepersistent drug use . Likely from a broken home AssessmentzKayla aka Lolspoon (twitter) is a likely target for an attempt to correlate his online personawith othersin the alternativelifestyle intemet underground.SA's attempting to interfacewith Kayla should keep in mind that he is easily pushedto anger and this can be used.It is recommended that the investigatorspush this individual as frequently as possibleto make him react and thus potentially slip up in anger. BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 7. UNSUB Topiary (Status captured) Age: 18 Sex: Male Location: Shetland IslandsUK, Scotland Profile: Topiary aka JakeDavis has been apprehended as suchthis profile is only and for backstoppingpurposes.An ongoing evaluationof his personality and his life is being carried out by the Met and ScotlandYard presently.Topiary was the de facto spokesman Anonymous and LulzSec and is very outspoken. for Toipiary/Davis, is a young individual with a defined ethosof counter culture behaviors.At the time of his arraignmentDavis carried a book on revolutionary scientistsand made surethat the presscould seethis as a meansto show his point of view and defianceof the common laws. PsychologicalMakeup and Personal Details: Out of the group Topiary is the altruist who believesin what he is doing on the outside of it. Internally, his senseif right and wrong are skewedtoward self fulfilling outcomes.Davis it is believedhas beenused and co opted by the others within the anonymousleadershipas cannonfodder. o A true believer in his world view that society has failed o Youthfully idealistic o Ego driven in his convictions o Obsessivepersonalitytraits including possibleAspergerssyndrome o Socially inept and withdrawn UNSUB JoePie9l Approximate age2l-26 Sex: Male Location: EU Profile: JoePieis a technical individual who is third in command.His skill are in the coding areaand also has partakenin the actual hacking carried out by LulzSec and Anonymous. Joepie'spolitical views on performing hacking againsttargets only extendsto the point of actually breaking the law. JoePiehas allegedthat his is a support role only, and as such,not breaking the law. PsychologicalMakeup and PersonalDetails: JoePieis intelligent and well spoken.He tendsto not use as much netspeakas the others and makesrelevant argumentsin correct grammatical syntax. There are times when the syntax and grammar infer that JoePieis not an American and may in fact be in the EU. It is recommendedthat the approachto be taken with JoePieis to align the agent's commentaryto JoePie's.Use common ideals stemmingfrom commentary in the HB Gary and other IRC chatscapturedto gaugethe approach. BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 8. o Likely a college studentbut may be just out of college o Technically capableand versed(mention of coding and technical measures) a More autonomous member of the group o Amoral charactertraits and personalbeliefs UNSUB Tflow Approximate age 22-26 Sex: Male Location: USA Profile: Tflow shows a more mercenaryapproachto the LulzSec and Anonymous campaigns.His motivations seemto be monetarily basedand may in fact be a paid assetfor the group as a freelancehacker. Tflow is a key player in the command and control of their domain registration and management. essence, In Tflow is a key target for taking down the infrastructural underpinningsof the group. a Pseudo-intellectualthat lacks true educationalbacksround a Monetarily driven o Likely has a criminal history o Has cosnitive dissonance over hacktivism and activism PsychologicalMakeup and PersonalDetails: The psychological makeup as glimpsed from the IRC chatsleadsthe investigatorsto believe that Tflow may be the linchpin to affack as he runs the technology side of their internet space.As suchhe is intimately familiar with all of the players and may in fact know personaldetails that would be helpful in prosecutionof the other key members. It is also recommended that Tflow may be easily turned againstthe group due to his cognitive dissonance over hacktivism as well as he desiresfor monetary gain. This also flows into his likely attitudesthat he is not willing to go down for the group should his identity be compromised.BSU recommends that Tflow be a key target for agentsin the field to approach. V. CONCLUSION In conclusion, the BSU recommendsmore investigation be carried out online to investigatethese usersby inserting agentsinto their chat rooms as well as gathermore CI's who can do the same. Becauseof the nature of Anonymous and the internet, it is harderto get areal idea of where usersare if they know how to hide their tracks online. The use of the social aspects(what hackers would call 'social engineering')will be key to gainingaccess datathat will eventually to lead to capture. Theseprofiles are solely basedon intemet chatsand as such,may also be somewhatincorrect as the usersknow that they are being monitored in certain areasof the internet. However, as an aggregate, data presentedand assessed the gives the BSU someconfidencein the data presented here. It is the recommendationof the BSU that this report be re-assessed more data comes as from assetsin the field and through interviews carried out with Topiary (Davis) by the Met and BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 9. 7 the FBI field agentstaskedto the UK for interviews. Overall, the assessment here is that we have a group of younger individuals being lead by an older, more experienced one in an effort that seemsto have conflicted ideals.Additionally, because there are many personalitiesinvolved and Anonymousclaimsto be a larger'collective' group without leaders, is easierto assume it that there are other cells and other leaders.Theseleadersand groupsmay not be chatting in the open areasof the IRC, but in fact have learnedfrom the experiences this group to be more discreet of about their activities and planning. The overall assessment the movement however is the following: for 1. The movement is out of control and there seemsto be no real coherentmotivation 2. The leadershave begun to hide themselvesa bit more due to arreststhat have beenmade 3. Their reliance on technologywill eventually be their downfall 4. Their interpersonalrelationshipsare weak points, as suchthey should be leveraged 5. Their increasingattackson infrastructurewill eventually lead to seriousresults that could in fact lead to deaths It is after the first real attributabledeathsthat there may be a tapering off of their ranks as the membersrealize that by outing individuals, actualphysical actionscan occur that causegreat damage.Until such time though, the movementwill continue with the massesused as fodder and the command structureurging them on to carry out their commands. BSU Quantico LES Gaw EnforcementSensitive) USDOJ
  • 10. AIINEX: A Twitter Logs REDACTED SeeEnclosureA AIINEX: B Chat Logs REDACTED SeeEnclosureB BSU Quantico LES (Law Enforcement Sensitive)