Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Neighborhood Watch John E. Williams, CPS Certified Crime Prevention Specialist Beavercreek Police Department.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Your Identity: What to Know, What to Do.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Computer Threats I can understand computer threats and how to protect myself from these threats.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Computer Forensics BACS 371
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Crime & Malpractice AS Module Heathcote Ch. 10.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety Internet Safety LPM
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Computer Security By Duncan Hall.
Society & Computers PowerPoint
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Video: Digital citizenship is defined as the norms of appropriate,
IT and Society Week 2: Privacy.
Presentation transcript:

Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc

Overview of Talk Our Goals A Short history of Privacy Crime in Cyberspace Monitoring of Cyberspace Technologies of Privacy Opening a dialogue

Who We Are Formed in 1998 to build strong privacy systems Venture Funded Montreal Company Attracted top privacy and cryptography experts Selling Freedom 1.1, world’s best privacy software

Overview of Talk Our Goals A Short history of Privacy Crime in Cyberspace Monitoring of Cyberspace Technologies of Privacy Opening a dialog

Our Goal Prevent People From Being Victimized –Victims of criminal invasions of privacy –Victims of non-criminal invasions By Individuals By Organizations By Technical Accident Our goal today is to open a dialogue with you –We share many goals –We look forward to working together

Overview of Talk Our Goals A Short history of Privacy Crime in Cyberspace Monitoring of Cyberspace Technologies of Privacy Opening a dialog

A Short History of Privacy Provide Context For Discussion –Understand Laws, International Activity –Privacy Invasive Technologies OECD EU Data Protection Canada’s Bill C-6, Charter of Rights US Constitution and case law

Overview of Talk Our Goals A Short history of Privacy Crime in Cyberspace Monitoring of Cyberspace Technologies of Privacy Opening a dialog

Crime in Cyberspace Cyberspace crimes Physical World Crimes How they blend –Line can be hard to define Privacy and Hacking

Cyberspace Crimes Cybercrime is Diverse –Denial of Service & distributed variants –Stealing money –Stealing bits –Hacking Cybercrimes that blend into the real world –Stalking –identity theft

Cyberspace Crimes (2) Some types are aided by privacy (DDOS, Hacking) Some types are privacy-neutral –Stealing money from a bank Some types are hindered by privacy –Identity Theft Some the only defence is privacy –Stalking

Real World Crime and Cyberspace Talking about cybercrime often blends into physical world crime –Planning terrorist acts with –Drug Trafficking –Money Laundering –Fencing Stolen Goods Who wants to shut down Ebay? –Kiddie Porn

Real World Crime and Investigation Who cares if its encrypted? Subject under investigation can be targetted even with encryption –Traditional Surveillance –Computer Security is poor –Undercover Activity

Real World Policing and Cybercrime Desire for Perfect Information –Doesn’t exist offline –Won’t exist online Perfect information is a myth Why try to create it online? –Good reasons not to Fundamental liberties Cost of transactions Risk of “perfect” data being abused

Privacy and Criminals Criminals have privacy –Motivation to learn –Motivation to buy –Identity theft Normal People and Police don’t The worst of all possible worlds

Privacy and Hackers Hackers have privacy –Break into system –Destroy the logs –Repeat as needed –They don’t use or need our software Normal People and Police don’t The worst of all possible worlds

Overview of Talk Our Goals A Short history of Privacy Crime in Cyberspace Monitoring of Cyberspace Technologies of Privacy Opening a dialog

Monitoring of Cyberspace Investigation Traffic Analysis and Surveillance Undercover Operations The Threat of Perfect Knowledge

Investigation Freedom reduces utility of logs Freedom blocks sniffers Freedom hides information that an investigator may want Freedom does not prevent –People from revealing information –People hacking into computers (DIRT, Back Orrifice) –One-on-One surveillance (TEMPEST, video)

Traffic Analysis and Surveillance Freedom reduces ease of traffic analysis –We’re not sure how much Use of Freedom is observable by analyst

Undercover Operations Are an effective tool Freedom makes it easy for a law enforcement officer to infiltrate Freedom protects privacy of family of LE

Overview of Talk Our Goals A Short history of Privacy Crime in Cyberspace Monitoring of Cyberspace Technologies of Privacy Opening a dialogue

Technologies of Privacy The Freedom System Critical Infrastructure Protection Minimal Disclosure Technologies

The Freedom Network Designed to maximize privacy No back doors Known flaws listed in whitepaper

The Freedom Network Diagrams etc Identity/Anonymity Slider Distributed Ownership and Control Zero Knowledge

No Back Doors Systems with backdoors are hard to defend Digital Millenium Copyright Act (US) Raytheon, Northwest Airlines Too many keys must be distributed Due Process weakened by back door Weakens evidence chain Industrial Espionage Rouge States

Known Flaws Enumerated Security Experts like public analysis We encourage analysis and examination Some flaws can be exploited Listed in a whitepaper

Critical Infrastructure Protection Freedom can protect –Whistleblowers –Security Exploit Information Privacy is part of the information infrastructure –Requires Protection –Enables growth of the medium

Minimal Disclosure Technologies Exciting new privacy tools Invented by Chaum, extended by Brands Envelope with a window Certified information revealed selectively Online Spaces where different levels of “True Name” are accepted

Minimal Disclosure Technologies Exciting new privacy tools Invented by Chaum, extended by Brands Envelope with a window Certified information revealed selectively –Dating services require over 18 Online spaces where different levels of “True Name” are accepted: –Stock boards require identity

Overview of Talk Our Goals A Short history of Privacy Crime in Cyberspace Monitoring of Cyberspace Technologies of Privacy Opening a dialogue

Our goal today is to open a dialogue with you –We’ve explained what we do and why –We share many goals We look forward to working together –Education Risks Proper Behavior –Sharing information and education

Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc