Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Advertisements

(nothing to see here). First thing you need to learn is that sysadmin is about people, not technology If youre a sysadmin so you dont have to deal with.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
BACK TO SCHOOL THEY GO!!! With Miss. Pezzuti Please click the picture to hear a personal welcome to 5 th grade!
Internet Online Safety How to have FUN and Stay in Control.
Some Thoughts on Cyber-Resiliency, Time, and Surveillance Peter Swire Huang Professor of Law and Ethics Georgia Institute of Technology NAS/NRC Forum on.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
What you don’t know CAN hurt you!
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
What do I need to know?.   Instant Messages  Social Networking.
Security Colin Armstrong School of Information Systems Curtin University
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Data Protection Act. Lesson Objectives To understand the data protection act.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
INSTANT ENTREPRENEUR 1. Preparation Ready, Started, Funded 2. Building the business Being different, Getting customers, Getting sales, Getting online,
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Mrs. Wohleb Career / Technical Education Welcome Note I look forward to working with each of you in the upcoming year. I am always available for questions.
Basic Persuasion Skills in Employee Ownership Corey Rosen National Center for Employee Ownerships.
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
CYBERSAFETY Presentations Keeping Safe on the Internet.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
How and Why to Use the ERS. Emergency Response System  This is a free service that we provide for our clients.  When they die, the ERS will contact.
s By Mollie.
Digital Access Digital access is the equal ability for people all over the globe to access digital internet. The digital divide is a gap that continues.
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, Sixth Edition Chapter 9, Part 8 Satisfying Customer Needs.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Student Norms The following norms were decided by YOU! If your goal is to have a successful year, here’s how to make your goal a REALITY!
Internet Safety Internet Safety LPM
DIFFICULTDIFFICULT C u s t o m e r s By: Haley Bassett.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Easy Read Summary Mental Capacity Act Mental Capacity Act A Summary The Mental Capacity Act 2005 will help people to make their own decisions.
Lecture 5 Page 1 CS 236 Online Key Management Choosing long, random keys doesn’t do you any good if your clerk is selling them for $10 a pop at the back.
Match the words on the left with the definitions on the right: Should we legalize brothels? 1. a prostitute a. someone paid to go out socially with other.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
ITM 353 Final Project Demos. Your Last Assignment There’s one more fun presentation in store for you all: the Transition Readiness Review (TRR) aka your.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Effective Campaigning GCU Students’ Association Elections 2015.
E-Safety Parent Talk Helping to keep your children safe online.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Welcome to My Reading Recovery Lesson. Rereading Familiar Books In every lesson every day I get to read lots of little books. I get to pick some of my.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
Online Safety! By: Michelle Deng.
Richard Purcell Corporate Privacy Officer Microsoft Corporation
What you can do to support people to be safe online
Helping your children to stay safe online
Using networks to be more effective
IGraphic Social impacts of IT
Presentation transcript:

Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack

Motivation 3 Years at Zero Knowledge Systems Freedom Network didn’t succeed Problems was sales, not law enforcement LE moved from scared to a customer Not enough r ers, privacy services Some potential operators are scared Share learning See more privacy technology deployed

The Cypherpunk Attitude™ Is lots of fun Has brought enourmous publicity Has encouraged a great deal of leading work Is a liability in talking to LE Doesn’t do any good Generates resistance and hostility Most cops are decent people Trying to solve crimes, help people Initial impressions are very important

Mellontrafficers.com Is a fine domain Got Len in trouble He hasn’t changed it Compare and contrast

Basic Message Privacy reduces crime ID theft Spam Stalking Crypto is not an unmitigated anything LE should be in favor of privacy Lets get along Method can be used with any privacy service

Delivered Message Regularly At ZKS Offices At RCMP, Interpol meetings Over phone Had LE outreach materials ready at abuse, legal, elsewhere Slides will be under

How to Present This is why we do what we do Here’s how it prevents crime Here’s why we don’t log Here’s how you can make progress Avoid “Bugger off” “I know your job more than you” Taking this talk as legal advice

Why We Run R ers Privacy prevents crimes Stalking ID theft Spam Privacy is a Social Good Whistleblowing Communication Schoeman’s “Philosophical Dimensions of Privacy”

Prevent Crime This is a key point Preventing crime is better than solving crimes “Would you prefer a lock or a video camera?” Easy examples: Crypto prevents CC theft, password theft

Crypto Hinders Criminals & Investigators Crypto can prevent crime: Encrypted data harder to steal, monitor Can’t sniff passwords Can’t forge authentications Crypto can make investigations harder Can’t read everything the bad guy says, stores Their job is about investigation, not prevention So, naturally police are very aware of this side of things, and sometimes miss the larger picture

Ok, but the logs? We don’t log because logs can be abused Available to anyone with a subponea Raises cost of running r er Creates a security risk We don’t know how to create a r er where only the police can read the logs (Blaze’s broadcast escrow impractical to deploy)

More on Logs, back doors DMCA Subpoenas Very hard to engineer security systems Even harder to engineer backdoors Clipper Chip example Which legal system? Freedom Network ran in 10+ countries

How to Investigate You are selling r er system/privacy In sales: Agree, Align, Convert Don’t start by arguing “You’re just trawling” “That’s awful, what can I do to help?” “Actually, we don’t keep logs. Let me explain why.”

Know the Case Law Put the right to anonymity in context McIntyre vs. Ohio NAACP vs. Alabama Federalist Papers Abuse of subpoenas Northwest airlines and their union Clearly, this is US case law Know your local law

How To Investigate (more) “Clearly, I am not an investigator” Think about the basics Means, motive, opportunity Undercover work Use privacy service to communicate with criminals Privacy is a two-way street

What A Privacy Service Offers Communicate without a name attached Block basic sniffers, logs Explain the limits of the r er system You can’t shoot someone through it You can’t bring down the power grid with an Doesn’t stop hacking suspect’s computer One on one surveillance

Summary Overview of ZKS’ law enforcement message Overview of the thinking which drove it Lessons for the privacy technology world `

Conclusions Biggest problems are not technical, or even legal, they’re in business & economics Press, analysts had trouble understanding Freedom Network vs Anonymizer, MIX nets, real time and batch, need more users in their anonymity sets Police and national security have an interest in these systems existing