Выбрать главу

Clive opened with a few brief remarks, then introduced each of the panel participants before gesturing to the flat screen. “And from somewhere on the Internet we have a spokesperson for Anonymous. I understand he’s already with us.”

With that an image materialized from the screen, slowly resolving into a Guy Fawkes smiling mask, floating on an ebony background, which served as the public face of Anonymous.

“We are here,” the voice said. The speaker used a program to cause his voice to sound slightly disembodied. The audience tittered.

For all the novelty of the Anonymous presence, the discussion followed a predictable pattern. The man in the suit, who was in fact an FBI agent named Norm Allender, made the point repeatedly that hacktivism was an enormous and growing threat. “Because of it the day may come when the kind of open, unrestricted Internet you enjoy today will no longer exist,” he said more than once in more than one way. “What I want, what I believe we all want, is a secure, universally accessible Internet.”

Capps was pitching her latest book, Hacktivism, Twitter, and Facebook: The Age of Cyberprotest and Flash Revolutions, this time taking the position that governments constituted the greatest threat to the Internet. Whenever she repeated a detail, she’d lean forward and point a finger at the FBI agent, who took it all in with good cheer. “Hacktivism is a mere drop in the bucket compared to you. You need to be stopped,” she said, much to the amusement of the audience.

Chuck dismissed the notion that hacktivism was evil or inherently destructive. “It is a legitimate form of social protest,” he argued, to a round of applause. “They bring accountability to systems that want to evade it. Their positions, whether you agree with them or not, come from a deep sense of morality. These attacks are a form of civil protest intended to identify legitimate issues. If it wasn’t for hacktivism I can see the day Big Brother takes over.” Several booed Big Brother. “When that happens, the real Internet will only exist as an underground movement.”

“It has already begun. You should join the cause,” Anonymous intoned. “Your heart is in the right place.”

“This is absurd,” Ritter interjected. “This freak in his plastic mask has no business here. What’s he afraid of? Why not come out from behind his screen? Hacktivism is simply evil. If Anonymous has its way, nothing we do in our computers or over the Internet will be private. Chuck and Agnes here worry about Big Brother when it’s actually teenagers like this one on the monitor here who are the threat to us all!”

More boos came from the crowd, though there was a ripple of light applause. Ritter wasn’t alone in his view.

Capps returned to her book, particularly a chapter devoted to the invasive surveillance techniques reportedly employed by the FBI. “Internet providers cannot meet the requirements of your subpoenas — the technology doesn’t allow it — so they end up giving you far more information than you have a right to. Cyber agents like you use the extra data on innocent people you collect this way to create massive databases. The Fourth Amendment implications are striking yet you continue doing it. Why? Why are you at war with the American people?” She shouted this last question amid general hoots of approval.

“We are not at war with the American people,” the FBI agent said, but before he could continue Capps interrupted.

“Not at war! What about Carnivore? You’ve been trolling the Internet for decades monitoring e-mail, Twitter, text messages…anything you can get your hands on. You’ve built a customized packet sniffer that monitors all of a target user’s Internet traffic and you don’t care about any incidental data you garner from others in the process. What do you do with all that information? Tell us!”

“You are not immune,” Anonymous said. “We have penetrated law enforcement before. We will penetrate you!”

There were scattered cheers.

And so it went until Clive wrapped up the discussion to allow the panel to field questions from the audience. The woman next to Jeff shouted out, “What’s next for RegSec, Anonymous? Inquiring minds want to know!” She looked up at Jeff with a grin.

Laughter, then the voice from the monitor said, “We will crush them!” With that his image slowly faded into the background, leaving behind just a mocking, nearly hysterical laugh.

* * *

Following a quick lunch with Clive, Jeff settled in the speakers’ room, taking one of the tables and chairs made available for speakers to prep. He spent the next hour reviewing his PowerPoint slides and practicing the talk’s demos, occasionally stopping to chat with other speakers he knew who came in. He glanced at his watch and saw that it was after three, so he packed up.

After locating the room for his presentation, he walked to the front where a draped folding table about four feet high sat on a dais. Behind it was a screen. He placed his water bottle on the table, took his laptop from its bag, and connected it to the projector cable. Then he attached the wireless mic clip to his shirt and opened his PowerPoint. He was ready to go as people streamed in and took seats. Despite other conflicting presentations, there were about 250 people in the room. He smiled at Chuck when he noticed him sitting in the front row.

His talk, entitled “Statistical Analysis of Network Traffic: Finding the Needle in the Haystack,” was well attended, not just because he was popular in the cyber-security community or because he’d once worked for the CIA or even out of an interest in his topic. His role and that of Daryl Haugen in uncovering and muting an Al Qaeda cyber-attack on the West was widely rumored though it had not appeared in the traditional media.

Daryl was now his partner in their company, Red Zoya Systems LP. They were also a committed couple and living together, but she was in Oregon on a forensics case so he’d made this trip alone. He missed her very much despite her occasional text messages and phone calls.

Jeff began by trying out some new jokes, all techy so that only such an audience as this could relate and appreciate with laughter. He followed these with live demos of his log analysis tool. The tool digested massive log files pulling out discrete pieces of relevant information, typically source IP addresses, size of requests, types of requests, then applied statistical analysis to find potentially anomalous activity. Its effectiveness increased with the amount of data it analyzed.

The data he displayed showed suspicious activity on the anonymized logs from some of the clients he’d done work for. He stepped the audience through another of his own tools, which assisted him in locating anomalies in computer data and helped him focus on malware. When he finished there was a hearty round of applause, followed by a stage rush from those wanting to ask questions and to exchange business cards. If this was any taste of what it was like to be a celebrity, he wanted none of it.

Following his presentation, Jeff and Chuck went to the hotel bar for a drink. After settling in a booth, Jeff ordered a glass of white wine and Chuck asked for one of the beers they had on tap. Jeff asked what he was working on. There were several projects but the biggest was with Combined Technologies International.

“They’re remaking the company and have been contracting out a lot of work recently.” Chuck sighed, then took a drink before continuing. “I can’t say I like working for them all that much. Sometimes they make me feel as if I’m on the wrong side.”

Talk turned to Jeff’s current project, and though he couldn’t reveal his client, they discussed how he’d been hired to defend against a threat made by Anonymous. Chuck might guess he meant RegSec, but Anonymous routinely threatened any number of companies. Jeff asked, “You can’t really support the activities of Anonymous. They’ve caused enormous harm to companies who’ve done nothing wrong.”