On/Offline Countersurveillance By Collin Donaldson.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

SOCIAL NETWORKING Keith Watson, CISSP-ISSAP, CISA Information Assurance Research Engineer, CERIAS SECURITY AND PRIVACY.
Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
Netiquette Rules.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Unit 5 BANKING –Banking Basics
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Credit Card vs. Debit Card. Debit Cards Also called “check cards” –Works just like writing a check Deducts money from your checking account.
Internet safety By Lydia Snowden.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
PRIVACY BOOTCAMP YpJU.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
CS44 – Nick Ragouzis – 2007 Privacy – a study in assiduity –
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 Cable companies are experimenting with tracking and target individual households cable boxes;
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
7.3 Protect your Identity Objective: Understand the importance of managing and protecting your personal credit….
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Consumer Protection Shop Safely and Guard Your Financial Information.
By: Asfa Khan and Huda Mukhtar
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Frances Maier, CEO.
Privacy and Data Mining What Do “They” Know About You?
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Private Information Stay Safe Online. Having Fun Online There are lots of websites where you can go to do fun things To participate on many websites,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Anonymous Internet Browsing by Collin Donaldson. Outline  Overview  Definitions and Explanations  Part 1: How it all works  Overview of Network Communication.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
PUBLIC COMPUTER SAFETY
Facebook privacy policy
Managing Windows Security
Hotspot Shield Protect Your Online Identity
Attention Identity theft Definition
Name Job Title Library Name
Internet and security.
Virtual Private Networks
Privacy Online.
Importance of Privacy Internet Safety
Information Security Awareness 101
Internet Privacy and You
Internet.
Internet Safety – Social Media
Privacy and Data Mining
Privacy and Data Mining
My Digital Footprint….
Presentation transcript:

On/Offline Countersurveillance By Collin Donaldson

The Difficulty of Modern Countersurveillence Cyber-physical/Embedded System and Cloud Proliferation Big Data marketization (Data Brokers) The paradox of countersurveillance (Info in, Info out) Increased Intelligence Gathering and Sharing ◦ Between Governments, Companies, etc. ◦ Doxing (Anonymous, “Human Flesh Search Engine”)

Countermeasures First Step: Decide how private you want to be Second Step: Discover specifically who tracks you Third Step: Control your privacy

Step 1: Ask Yourself Do you care how visible your social media posts are? How about your address? Location? Search history/preferences? Purchase history? Financial information? Decide approximately what you wish to safeguard

Step One: Ask Yourself (cont.) How much convenience will you sacrifice for PSA? ◦ i.e. The cloud is more convenient than physical storage, but is also less PSA

Step 2: Find out who tracks you Services like Disconnect and Mozilla Lightbeam will overtime collect information on people that try to follow you Software like NoScript can block all scripts running on a page, but will also display all the trackers looking at

Step Three Part One: Stop Current Privacy Violations Change your social media preferences (can automate this with software like AVG’s Privacy Fix) Use services like Abine's Blur and Dashlane to create and maintain proxy s, passwords, debit cards, and more When you have to give information (i.e. security questions) falsify them, when legal ◦ Consider creating different professional/personal personas

Step Three Part One: Control Your Current Privacy Check privacy policies, especially for freeware Default to ◦ Private Browsing ◦ Anon Browsing: DuckDuckGo, Startpage, Disconnect Search, Ixquick ◦ HTTPS ◦ Anti-tracking ◦ Block 3 rd Party Cookies

Step Three Part One: Control Your Current Privacy Route traffic through a VPN or Tor (may be covered more in depth in future meetings) HTTPS secure s, or use alternative s (proxies, homebrews, privacy-dedicated like Riseup or MyKolab) Use a self-destructing text/chat service Limit location tracking Turn off Wi-Fi and Bluetooth when not in use Use PC-level style security for your mobile devices

Step Three Part One: Control Your Current Privacy Pay with cash or disposable debit cards Make sure no one can see/hear your keystrokes when entering a PIN or password Keep devices and documents relatively hidden and secured Enable device tracking in the event of theft/loss Defense in Depth

Step Three Part Two: Control Already Exposed Information Delete unused “orphan” accounts Use software or shell commands to wipe old data Adapt privacy-friendly practices Delete records of credit cards at existing companies that don’t need it Opt-Out of data broker knowledge list

Data Brokers to Opt-Outs NAI (Network Advertising Initiative) DMAchoice (online and off) DAA Ad Choices Spokeo Pipl ZoomInfo Whitepages PeopleSmart CheckPeople BeenVerified Intelius PublicRecords360 ZabaSearch US Search PeopleFinders PeekYou

Alternatively: Automated Opt-Out Services (paid) Safe Shepard Reputation Defender Delete Me