SlideShare a Scribd company logo
1 of 130
PRIVACY IN THE
DIGITAL AGE
A Fourth Amendment as a Service Workshop
www.FourthAmendmentAsAService.org - @4thAsAService
2
LEGAL DISCLAIMER
• We are not lawyers
• We are not your lawyers
• None of the presented or provided content
constitutes legal advice.
• This is general security & privacy advice from
security & privacy advocates.
• Consult with a lawyer before making your
decisions.
www.FourthAmendmentAsAService.org - @4thAsAService
www.FourthAmendmentAsAService.org - @4thAsAService
About Us, About the Course, and Agenda
INTRODUCTIONS
4
ABOUT THE PRESENTER(S)
www.FourthAmendmentAsAService.org - @4thAsAService
@eanmeyer
ean@eanmeyer.com
Ean Meyer
•Security Professional working with Fortune 500
Companies
•Focused on compliance, risk management, and
security programs
•Bsides Speaker
•Tripwire State of Security Guest Blogger
•Course Director for Full Sail University
•Security Mentor
•Privacy Advocate
Hobbies – Lockpicking, Makerscene, Writing
5www.FourthAmendmentAsAService.org - @4thAsAService
How did we get here?
6
ABOUT THE COURSE
www.FourthAmendmentAsAService.org - @4thAsAService
• Topics we will cover
– Your Right to Privacy
– Secure Communications
– Online Privacy
– Help installing and configuring privacy tools
• Things we won’t cover
– Illegal or unethical use
– If you are here to learn how to avoid the law… leave
– Law enforcement has a hard enough job as is
– In-depth discussions of technology
– In-depth State and Local Law
– Legality as it applies to your specific situation
7
ABOUT THE PRESENTERS
@infosecanon
hlawrence@hackucf.org
Heather Lawrence
•Naval Nuclear Veteran
•MS Computer Engineering (in May)
•President Hack@UCF
•B-Sides Orlando Organizer
• SunshineCTF
Hobbies – Research, Crafting, Photography,
CTFing
www.FourthAmendmentAsAService.org - @4thAsAService
8
ABOUT THE PRESENTER(S)
@GaelanAdams
Gadams@hackucf.org
Gaelan Adams
•Professional Cat Herder
•Senior Engineer Hack All The Things
•Privacy Advocate
Hobbies – Technology, Education, Batman
www.FourthAmendmentAsAService.org - @4thAsAService
9
ABOUT THE PRESENTER(S)
@jcknrmn
jack@jacknorman.com
Jack Norman
• MS, IA and Cyber Security, FIT
• EM and Homeland Security Certificate, UCF
• Executive MBA, UCF
• BS Electrical Engineering, UB
• Board Member - OWASP Orlando
• Sr. Information Security Engineer
Hobbies – Outdoors, firearms, swinging a hammer, anything not
involving a computer.
www.FourthAmendmentAsAService.org - @4thAsAService
10
ABOUT THE PRESENTER(S)
@sk4ld
owen@hackallthethings.com
Owen Redwood
• PhD dissertation on Cyber Physical Systems Vulnerability
Research, FSU
• CEO Hack All The Things, LLC
• Senior Lead Cyber Researcher of the Nebraska Applied
Research Institute
• DoD Advisor on Critical Infrastructure
Hobbies – DnD, Video Games, Firearms, Breaking the Grid,
Exploiting the World
www.FourthAmendmentAsAService.org - @4thAsAService
11
ABOUT THE PRESENTER(S)
www.FourthAmendmentAsAService.org - @4thAsAService
@corq
corq@corq.co
Corq
•Sysadmin turned Threat Analyst
•Subject of numerous 3rd party breaches
•Subject of one (very weak) doxing campaign
•Cold War History Buff
•Privacy Advocate
Hobbies – Shortwave Radio, Raspberry Pi/ARM
computer hobbyist, Crazy Cat Lady
12
ABOUT THE PRESENTER(S)
www.FourthAmendmentAsAService.org - @4thAsAService
@willasaywhat
willa@willasaywhat.com
Willa
•Senior Penetration Tester @ Veracode
•DEF CON 24 Speaker
•B.S. Computer Science @ UCF ℅ 2007
•M.P.S. Information Science @ Penn State
Hobbies – Hardware hacking, micro drone racing,
PC gaming, and chasing my toddler.
13
AGENDA
• Sections and Breaks
– 08:30 - 09:00 Check-in
– 09:00 - 09:15 Opening remarks
– 09:15 - 10:00 Your Rights (45 min lecture)
– QA and or Break optional
– 10:00 - 10:30 Secure Communications
– 10:30 - 11:00 Configuring tools from Secure Communications
– 11:30 - 12:00 Online Privacy
– 12:00 - 12:30 Configuring tools from Online Privacy
• House Keeping Notes
– Bathroom Locations
– Food and Drink
– Cell phones
– Leaving and Entering the Room
– We are recording the talks to be placed online
www.FourthAmendmentAsAService.org - @4thAsAService
14
BEFORE WE START
ARE THEIR ANY
QUESTIONS?
www.FourthAmendmentAsAService.org - @4thAsAService
15
YOUR RIGHTS
Heather Lawrence and Gaelan Adams
www.FourthAmendmentAsAService.org - @4thAsAService
16
AGENDA
•Political Climate
•Why should I care?
•The Law and Your Rights
•What should I do when…
•Your data (and what it says)
www.FourthAmendmentAsAService.org - @4thAsAService
17www.FourthAmendmentAsAService.org - @4thAsAService
Some history and our current political state
Political Climate
1818www.FourthAmendmentAsAService.org - @4thAsAService
"Big Brother in the form of an increasingly
powerful government and in an
increasingly powerful private sector will
pile the records high with reasons why
privacy should give way to national
security, to law and order, to efficiency of
operation, to scientific advancement and
the like.”
William O. Douglas (1898-1980),
U. S. Supreme Court Justice
1919www.FourthAmendmentAsAService.org - @4thAsAService
“There is nothing new in the
realization that the Constitution
sometimes insulates the
criminality of a few in order to
protect the privacy of us all.”
Antonin Scalia(1936-2016),
U. S. Supreme Court Justice
20www.FourthAmendmentAsAService.org - @4thAsAService
Mario M. Cuomo
The New Republic (4 April 1985)
“You campaign in poetry.
You govern in prose.”
21www.FourthAmendmentAsAService.org - @4thAsAService
From important figures in politics and government
Campaign and Political Statements
22
Obama signs CISA
http://www.cnbc.com/2015/12/22/the-
controversial-surveillance-act-obama-just-
signed.html
• The Cybersecurity Information
Sharing Act (CISA) was signed
into law as part of a budget
package
• The bill permits private companies
to handover information to federal
agencies
• This creates significant privacy
issues around private user data
moving into government hands
www.FourthAmendmentAsAService.org - @4thAsAService
23
On Surveillance
"I want surveillance of certain
mosques if that's OK," Trump told
the often-raucous and approving
crowd.
"We've had it before.”
- Donald Trump
September 21st, 2015
https://www.youtube.com/watch?v=1SzrhYKya00
http://www.cnn.com/2015/11/21/politics/trump-muslims-
surveillance/
www.FourthAmendmentAsAService.org - @4thAsAService
24
Obama Expands Surveillance Access
https://www.nytimes.com/2017/01/12/us/politics/n
a-gets-more-latitude-to-share-intercepted-
communications.html
• An expansion of Executive Order
12333 Relax longstanding limits
on N.S.A. data sharing
• Data was collected via means
unregulated by American
wiretapping laws
• Increases the risk private
information about innocent people
will be shared without court
oversight
www.FourthAmendmentAsAService.org - @4thAsAService
25
On Free Speech and Freedom of Press
“I'm going to open up our
libel laws so when they
write purposely negative
and horrible and false
articles, we can sue them
and win lots of money.”
–Donald Trump
February 26, 2016
https://www.washingtonpost.com/news/volokh-
conspiracy/wp/2016/02/26/donald-trump-says-hell-
open-up-libel-laws/
www.FourthAmendmentAsAService.org - @4thAsAService
26
On Free Speech
“We have to talk to them about, maybe
in certain areas, closing that Internet up
in some way. Somebody will say,
'Oh freedom of speech, freedom of
speech.'
These are foolish people. We have a
lot of foolish people."
- Donald Trump
December 8, 2016
http://money.cnn.com/2015/12/08/technology/don
ald-trump-internet/
www.FourthAmendmentAsAService.org - @4thAsAService
27
On Encryption
“I think security, overall,
we have to open it up
and we have to use our
heads. We have to use
common sense”
-Donald Trump
February 17, 2016
https://www.cnet.com/news/trump-apple-iphone-san-
bernardino-encryption-fbi-terrorist/
www.FourthAmendmentAsAService.org - @4thAsAService
28
On Encryption Backdoors
Compliance with Court Orders Act of
2016
– Initial attempt to require backdoors into
encryption
– Bill would require companies to create a
mechanism that would allow for encrypted
data to be retrieved without consent
– Proposed by Sen. Richard Burr –
Chairman of the Senate Intelligence
Committee and Sen. Diane Feinstein https://www.wired.com/2016/04/senates-draft-
encryption-bill-privacy-nightmare/
www.FourthAmendmentAsAService.org - @4thAsAService
29www.FourthAmendmentAsAService.org - @4thAsAService
If it’s a legal request, shouldn’t there be a back door for law enforcement?
What’s wrong with backdoors?
30
Encryption Backdoors
Tools created to leverage backdoor vulnerabilities in
code to listen in to encrypted conversations.
Although authorized organizations could use this
backdoor there was nothing stopping anyone who
knew it existed from using it.
Juniper is the second largest network equipment
manufacturer behind Cisco
https://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-
backdoors/
www.FourthAmendmentAsAService.org - @4thAsAService
31
Encryption Backdoors
A report from the Encryption Working group put
together by two House committees found:
- There is no way to stop bad actors from
adopting encryption.
- The Committees should explore other
strategies to address the needs of the law
enforcement community
https://judiciary.house.gov/wp-
content/uploads/2016/12/20161220
EWGFINALReport.pdf
Page 5
Encryption Working Group Year End Report - 2016
www.FourthAmendmentAsAService.org - @4thAsAService
32www.FourthAmendmentAsAService.org - @4thAsAService
There will be a quiz later
News Story
33www.FourthAmendmentAsAService.org - @4thAsAService
I have nothing to hide.
Why should I care?
3434www.FourthAmendmentAsAService.org - @4thAsAService
“First they came for the Socialists, and I did not speak out— Because I
was not a Socialist.
Then they came for the Trade Unionists, and I did not speak out—
Because I was not a Trade Unionist.
Then they came for the Jews, and I did not speak out—
Because I was not a Jew.
Then they came for me—and there was no one left to speak for me.”
Martin Niemöller
(1892–1984)
35
This Couldn’t Happen to Me
• Reddit investigations gone wrong – Sunil
Tripathi
• Find my Phone leads to wrong home and
threats
• Farm in Kansas becomes site of threats as
online tracking goes wrong
• #PizzaGate leads armed man to “investigate”
pizza parlor
• Three Felonies a Day
www.FourthAmendmentAsAService.org - @4thAsAService
36
This Couldn’t Happen to Me
•Central Park Five
http://www.pbs.org/kenburns/centralparkfive/
•Earl Washington, Jr.
http://www.innocenceproject.org/cases/earl-washington/
•Nga Truong
http://www.pbs.org/wgbh/frontline/article/a-rare-look-at-the-
police-tactics-that-can-lead-to-false-confessions/
All had coerced, forced, or fabricated confessions after interrogation that lead
them to incarceration.
www.FourthAmendmentAsAService.org - @4thAsAService
37www.FourthAmendmentAsAService.org - @4thAsAService
Aren’t we safer by giving up some information?
But, don’t the ends justify the means?
3838www.FourthAmendmentAsAService.org - @4thAsAService
“If you want to control someone,
all you have to do is to make
them feel afraid.”
― Paulo Coelho
39
Being Black in Public
•Collegiate Cyber Defense Club @ UCF
Secretary
–Detained and vehicle searched while sitting in
his car, in a UCF parking garage.
www.FourthAmendmentAsAService.org - @4thAsAService
40
Being Black in Public
Alabama police officers
detain a black man for
jogging at night
• Reason for stop was an unidentified
man running
• Officer stated “Burglaries were
reported
• Alabama is a Stop and Identify State
• Maintaining your rights can be difficult
(Credit: The Free Thought Project)
https://www.salon.com/2015/10/15/where_you_been_run
ning_from_watch_officers_try_to_detain_alabama_man_f
or_jogging_at_night_while_black/
www.FourthAmendmentAsAService.org - @4thAsAService
41
Marginalized Groups
•#BlackLivesMatter
•People of Color
•LGBTQ+
•Occupy Wall street
•Foreigners
•Non-Christians
•Dissenting Political Voices
www.FourthAmendmentAsAService.org - @4thAsAService
42www.FourthAmendmentAsAService.org - @4thAsAService
“To learn who rules over you, simply find out who you are not allowed to criticize.”
- Voltaire
Censorship
43
How it starts
•Think of the children!
•Stop the pedophiles!
•The terrorists will win!
•This is un-American, ban it!
•We can’t give you that
information and keep you safe!
www.FourthAmendmentAsAService.org - @4thAsAService
44
Taking a stand
•No one wants to stand up and say:
“I like pornography.”
“I have an unusual legal sexual fetish.”
“I have genital herpes.”
www.FourthAmendmentAsAService.org - @4thAsAService
45
But How Bad Could It Be, Really?
•“Snoopers Charter” UK
•N. Korea
•Great Firewall of China
•Arab Spring
•Dictatorships
•Egypt shuts down the Internet
http://big-digital.de/360socialmedia
www.FourthAmendmentAsAService.org - @4thAsAService
46
But How Bad Could It Be, Really?
•Snapchat Revenge Sites
•The Fappening
•Ashley Madison
•Adult Friend Finder
•Office of Personnel
Management Jennifer Lawrence | by Gage Skidmore
www.FourthAmendmentAsAService.org - @4thAsAService
47www.FourthAmendmentAsAService.org - @4thAsAService
I just won’t use the Internet
Perfect Security
48
Perfect Security
•It doesn’t exist
•Going off the grid is near impossible
•No protection is unbreakable
•It’s about reducing your attack surface
www.FourthAmendmentAsAService.org - @4thAsAService
49www.FourthAmendmentAsAService.org - @4thAsAService
The amendments are here for you
Your rights
50
Fourth Amendment
The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly
describing the place to be searched, and the persons
or things to be seized.
https://www.law.cornell.edu/constitution/fourth_amendment
www.FourthAmendmentAsAService.org - @4thAsAService
51
Fourth Amendment
How does it protect me?
•Unreasonable searches and seizures
•Arbitrary arrests
•Basis
–Search Warrants
–Stop-and-frisk / Safety inspections
•Wiretaps
www.FourthAmendmentAsAService.org - @4thAsAService
52
Other Constitutional Amendments
These also help define privacy:
•1st – “Freedoms”
•5th – “Self Incrimination”
•14th – “Equal Protections” (“Personal
Autonomy”)
www.FourthAmendmentAsAService.org - @4thAsAService
53
5th Amendment - Right to remain silent
“…Shall not be compelled in any criminal case
to be a witness against himself…”
–Protects you in Criminal Court
–Protects you in Civil Court
McCarthy v. Arndstein (1924)
www.FourthAmendmentAsAService.org - @4thAsAService
54
5th Amendment
“Too many, even those who should be better
advised, view this privilege as a shelter for
wrongdoers. They too readily assume that
those invoke it are either guilty of crime or
commit perjury in claiming the privilege”
- Ullman v. United States (1956)
www.FourthAmendmentAsAService.org - @4thAsAService
55
5th Amendment – Right to Remain Silent
“One of the Fifth Amendments basic functions is to
protect innocent men who otherwise might be
ensnared by ambiguous circumstances. Truthful
responses of an innocent witness, as well as those
of a wrongdoer, may provide the government
incriminating evidence from the speakers own mouth”
- U.S. Supreme Court – Ohio v. Reiner (2001)
www.FourthAmendmentAsAService.org - @4thAsAService
56
5th Amendment - Right to Remain Silent
You must invoke your right to remain silent
–Supreme Court ruling that unless verbally invoked
(right to remain silent) all statements voluntary
provided could be used in court and police could
continue to interact with a suspect.
–Responding after being silent, can be interpreted as
a wavier of this right.
- Berghuis v. Thompkins (2010)
www.FourthAmendmentAsAService.org - @4thAsAService
57
5th Amendment – Invoking your right
You can no longer remain silent as it can be
construed to imply guilt, you must verbally
invoke your right to the fifth amendment.
- Salinas v. Texas (2013)
–U.S. Supreme Court
www.FourthAmendmentAsAService.org - @4thAsAService
58
6th Amendment - Right to Counsel
•Requires the “assistance of counsel” for the accused “in
all criminal prosecutions”
•You can be in jail without an attorney until arraignment
•You don’t have to be provided an attorney until
arraignment
•You don’t have to be provided an attorney until court
begins.
www.FourthAmendmentAsAService.org - @4thAsAService
59www.FourthAmendmentAsAService.org - @4thAsAService
Complying with law does not mean waiving your rights
The Law of the Land
60www.FourthAmendmentAsAService.org - @4thAsAService
What should I do?
The police want to talk to me!
61
The police want to talk to me
While Walking While Driving While At Home
Warrant/Subpoena
• What are my
Rights?
• What do I
need to say?
• How do I
comply with
the law?
While Traveling While At Work
www.FourthAmendmentAsAService.org - @4thAsAService
62
While Walking
DO
• Be polite, respect their authority
• Write down or record details of the encounter
• Ask – “Am I being detained, am I free to go?”
• State – “I am exercising my right to remain silent and will answer no
further questions.”
• State – If Arrested – “I am exercising my to speak to an attorney.”
DO NOT
• Do not interfere with or obstruct police
• Lie or give false documents
ADDITIONAL
• State laws may very – You may be required to present ID
• You are not required to give consent for a search of your persons
(Stop and Frisk, vehicle, or dwelling)
www.FourthAmendmentAsAService.org - @4thAsAService
63
Stop and Frisk
•Terry v. Ohio (1968)
•Officers are allowed to temporarily detain you and
‘frisk’ (pat down) of you based upon reasonable
suspicion to ensure officer safety
•This does not mean police may reach in to pockets
or search a bag without permission
•You do not have to consent
www.FourthAmendmentAsAService.org - @4thAsAService
64
While Driving
DO
• Slow down, pull into a safe well lit area, be polite, respect their authority
• Remain in your vehicle and write down or record details of the encounter
• Ask – “Why was I stopped?”
• Ask – “Am I being detained, am I free to go?”
• State – “I am exercising my right to remain silent and will answer no further questions.”
• State – If Arrested – “I am exercising my to speak to an attorney.”
DO NOT
• Do not interfere with or obstruct police
• Lie or give false documents
ADDITIONAL
• State laws may very – You may be required to present ID
• You are not required to give consent for a search of your persons
– (Stop and Frisk, vehicle, or dwelling)
www.FourthAmendmentAsAService.org - @4thAsAService
65
Terry Stop
•Traffic Stop
•Drivers and passengers may be searched for weapons
upon reasonable suspicion they are armed and
dangerous
•Police may perform a protective search of the cabin if
they believe persons are armed and dangerous or can
access a weapon
•You do not have to consent to search of your vehicle
www.FourthAmendmentAsAService.org - @4thAsAService
66
While at Home
DO
• Be polite, respect their authority
• Write down or record details of the encounter
• Ask – “Am I being detained, am I free to go?”
• State – “I am exercising my right to remain silent and will answer
no further questions?
• State – If Arrested – “I am exercising my to speak to an attorney.”
DO NOT
• Do not interfere with or obstruct police
• Lie or give false documents
ADDITIONAL
• State laws may vary – You may be required to present ID
• You are not required to give consent for a search of your persons
(Stop and Frisk, vehicle, or dwelling
www.FourthAmendmentAsAService.org - @4thAsAService
67
Home Searches
•Arrest and Bench Warrants do not always allow for the
search of a home.
•Exigent Circumstances – Police can bypass a warrant if
they feel evidence may be destroyed
•A warrant must contain:
–the judge’s name, your name and address, the date, place to be
searched, a description of any items being searched for, and the
name of the agency that is conducting the search or arrest.
•Without a warrant you may refuse entry to your home and
refuse to speak futher with the police
www.FourthAmendmentAsAService.org - @4thAsAService
68
While at Work
DO
• Be polite, respect their authority
• Write down or record details of the encounter
• Ask – “Am I being detained, am I free to go?”
• State – “I am exercising my right to remain silent and will answer
no further questions?
• State – If Arrested – “I am exercising my to speak to an attorney.”
DO NOT
• Do not interfere with or obstruct police
• Lie or give false documents
ADDITIONAL
• State laws may vary – You may be required to present ID
• You are not required to give consent for a search of your persons
(Stop and Frisk, vehicle, or dwelling
www.FourthAmendmentAsAService.org - @4thAsAService
69
Workplace Searches
•Your business may already have a policy regarding the
search of your belongings
•They cannot search your person without a warrant or
your consent
•As a general rule they cannot search your person
•Computers, Lockers, Desks, Company Cars, and other
company property can be searched with the companies
consent
www.FourthAmendmentAsAService.org - @4thAsAService
70
While Traveling
DO
• Be polite, respect their authority
• Remember/write down the encounter – you may not be able to record
• Remember your rights do not apply in other countries
• Contact the Embassy or Ambassador – CIA World Factbook
• Familiarize yourself with local laws and customs
DO NOT
• Do not interfere with or obstruct police
• Lie or give false documents
ADDITIONAL
• International laws may vary greatly from US law
• Police and law enforcement may not need consent to search your
person or belongs at borders
www.FourthAmendmentAsAService.org - @4thAsAService
71
Border search exception
•It allows for search and seizures at
international borders and their functional
equivalent without a warrant or probable
cause.
•Laptops are considered “closed containers”
•No first amendment protections at a border
www.FourthAmendmentAsAService.org - @4thAsAService
72
Warrants and Subpoenas
DO
• Be polite
• Write down or record details of the encounter
• Ask – “Am I being detained, am I free to go?”
• State – “I am exercising my right to remain silent and will answer
no further questions?
• State – If Arrested – “I am exercising my to speak to an attorney.”
DO NOT
• Do not interfere with or obstruct police
• Lie or give false documents
ADDITIONAL
• State laws may vary – You may be required to present ID
• You are not required to give consent for a search of your persons
(Stop and Frisk, vehicle, or dwelling
www.FourthAmendmentAsAService.org - @4thAsAService
73
4th Amendment - Warrants
“… no Warrants shall issue, but upon probable
cause, supported by Oath or affirmation…”
–Arrest Warrants
–Bench Warrants
–Search Warrants
www.FourthAmendmentAsAService.org - @4thAsAService
74
4th Amendment – Warrant Requirements
• Reasonable Suspicion –
–It most often requires that “…Officers have an objectively reasonable basis for suspecting
criminal activity before detaining someone…”
–“specific and articulable facts” and “taken together with rational inferences from those facts”
• Preponderance of evidence -
–More than 50% true
–“More probable than not”- Miller v. Minister of Pensions (1947)
• Probable Cause –
–“A reasonable amount of suspicion, supported by circumstances sufficiently strong to justify
a prudent and cautious person’s belief that certain facts are probably true”
•Handler, J. G. (1994). Ballentine's Law Dictionary (Legal Assistant ed.). Albany: Delmar. p. 431.
www.FourthAmendmentAsAService.org - @4thAsAService
75
Search Warrants
•Based upon probable cause and sworn
testimony (Affidavit)
•Must specify what they are looking for
•Must specify where they are looking for it
www.FourthAmendmentAsAService.org - @4thAsAService
76
Police are trained
•Police are trained to respect your rights
•Police are also trained in techniques to get you
to waive your rights
•In most cases they do this with good intentions
•“If you don’t cooperate now, it’ll be worse for
you later.”
www.FourthAmendmentAsAService.org - @4thAsAService
77
Interfacing with Law Enforcement
•Turn off your phone to prevent a search without a
warrant or consent (Does not work with biometrics)
•“I am exercising my right to remain silent; I wish to
remain silent. I want to speak with a (or my) attorney.”
•If you are witnessing an interaction with the police it is
your right to record as long as you are not interfering
with their work
www.FourthAmendmentAsAService.org - @4thAsAService
78www.FourthAmendmentAsAService.org - @4thAsAService
When should I talk to the police?
79
When should I talk to the police?
“[A]ny lawyer worth his (or her)
salt will tell the suspect in no
uncertain terms to make NO
statements to the police under
any circumstances.”
- Justice Robert Jackson
- U. S. Supreme Court Justice
www.FourthAmendmentAsAService.org - @4thAsAService
80
Why not to talk to the police
•There is no way it can help.
–Everything you say can and will be used against
you, not for you.
•Admit nothing, confirm nothing
–It can be used against you if you confirm
anything
www.FourthAmendmentAsAService.org - @4thAsAService
81
News Story Quiz
How many people did the police find shot to
death last night in the Pine Hills apartment?
A. One
B. Two
C. Three
D. Four
www.FourthAmendmentAsAService.org - @4thAsAService
82www.FourthAmendmentAsAService.org - @4thAsAService
NEVER talk to the police
You are all wrong – No one was shot
83
Why not talk to the police
•White lies or misrepresentations of facts lead
to convictions
•Any information can lead to a conviction of
you
•The police can mistakenly recall your
statements or questions
www.FourthAmendmentAsAService.org - @4thAsAService
84
Why not talk to the police
•Your answers can be used to crucify you
•“People are inherently honest or want to tell
their story”
www.FourthAmendmentAsAService.org - @4thAsAService
85www.FourthAmendmentAsAService.org - @4thAsAService
My what stories they tell
Technology and Data
86
Data vs Information definitions
•Data is simply facts, figures or bits of
information.
•Information is structed data to provide a
context
www.FourthAmendmentAsAService.org - @4thAsAService
87
Metadata
What is metadata?
- Data that provides information about other data
Remember library card catalogues?
- Metadata
- Cards contain information about the books
www.FourthAmendmentAsAService.org - @4thAsAService
88
4chan ISIS Strike
•4chan used meta data analysis
to located ISIS fighters
•Utilizing data gleaned from social
media posts, photos, and other
information found online they
identified ISIS sites
•This information was used to call
in strikes on those sites. http://www.vocativ.com/326039/how-one-4chan-
board-is-trying-to-fight-isis-in-syria/
www.FourthAmendmentAsAService.org - @4thAsAService
89
Identifying People
•We can identify 87% of the population,
uniquely using only:
–Gender
–Date of Birth
–Zip Code
http://dataprivacylab.org/projects/identifiability/paper1.pdf
www.FourthAmendmentAsAService.org - @4thAsAService
90
Advertising Networks
•You can be uniquely identified
by your browser with 97%
accuracy
•Information is shared, sold
and auctioned.
•Target determined a 16 year
old was pregnant before the
family knew based off of
search queries. http://www.forbes.com/sites/kashmirhill/2012/02/16/how-
target-figured-out-a-teen-girl-was-pregnant-before-her-
father-did/#7f93522d34c6
www.FourthAmendmentAsAService.org - @4thAsAService
91
QUESTION
S
www.FourthAmendmentAsAService.org - @4thAsAService
92
You let us know
Break or Start Lab?
www.FourthAmendmentAsAService.org - @4thAsAService
93
LAB – OSINT and Records
•FL VOTER DB
•Removing Records
Time: 30 Minutes
Materials: Computer and Internet Connection
Cost: $0.00
www.FourthAmendmentAsAService.org - @4thAsAService
94
You don’t have to be a spy to care about OpSec
- Corq
Secure Communications
Moscow Rules
www.FourthAmendmentAsAService.org - @4thAsAService
95
Fundamentals (Rational Paranoia)
1. Assume nothing.
2. Never go against your gut.
3. Everyone is potentially under opposition control.
4. Do not look back; you are never completely alone.
5. Go with the flow, blend in.
Moscow Rules number anywhere from 10 to 40; we went with the fundamentals.
6. Vary your pattern and stay within your cover.
7. Lull them into a sense of complacency.
8. Do not harass the opposition.
9. Pick the time and place for action.
10. Keep your options open.
www.FourthAmendmentAsAService.org - @4thAsAService
96
These seem silly, why would you do this?
www.FourthAmendmentAsAService.org - @4thAsAService
Use cases:
• Domestic abuse situations where formerly shared accounts with abuser may be
compromised
• If you or peers are members of an at-risk demographic group
• Any situation concerning personal safety that requires alternate communications
with trusted partners
• Protecting activism communication channels, future-proofing against eventual
compromise, or where past activism has come under scrutiny
• General communication hygiene, any concern one might have for future breaches
or compromises, these are good practices
97
Practical Application of “The Rules”
www.FourthAmendmentAsAService.org - @4thAsAService
Assume nothing. Privacy and private communications should always be considered fragile. Segregate
accounts. Review your security practices often, have fallback plans in place.
Never go against your gut. You won’t always be able to validate your instincts with real world evidence, but make
the effort, for your own assurances. Caveat: Irrational paranoia is NOT a product of
instinct. Remember: Fear is the Mind-Killer.
Everyone is potentially
under opposition control.
Plan for failure! Even tools we’ll suggest here today, could be breached tomorrow.
ISPs, free mail providers, any online service. See Also: “Warrant Canaries.”
Do not look back; you are
never completely alone.
Reinforcement of the mantra above. Digital comms should be avoided for truly critical
information matters. Meatspace meetups can be arranged in places difficult to monitor.
Go with the flow, blend in.
Continue to use your “Public”, or known accounts for inconsequential matters. Talk
sports, TMZ gossip, non-political matters. Make your conversations seem “boring.”
98
Practical Application of “The Rules”
www.FourthAmendmentAsAService.org - @4thAsAService
Assume nothing. Privacy and private communications should always be considered fragile. Segregate
accounts. Review your security practices often, have fallback plans in place.
Never go against your gut. You won’t always be able to validate your instincts with real world evidence, but make
the effort, for your own assurances. Caveat: Irrational paranoia is NOT a product of
instinct. Remember: Fear is the Mind-Killer.
Everyone is potentially
under opposition control.
Plan for failure! Even tools we’ll suggest here today, could be breached tomorrow.
ISPs, free mail providers, any online service. See Also: “Warrant Canaries.”
Do not look back; you are
never completely alone.
Reinforcement of the mantra above. Digital comms should be avoided for truly critical
information matters. Meatspace meetups can be arranged in places difficult to monitor.
Go with the flow, blend in.
Continue to use your “Public”, or known accounts for inconsequential matters. Talk
sports, TMZ gossip, non-political matters. Make your conversations seem “boring.”
99
Practical Application of “The Rules” 2
www.FourthAmendmentAsAService.org - @4thAsAService
Vary your pattern and stay
within your cover.
If practical, use specific burner accounts only for specific purposes, sparingly. Change
providers in between messages if comms are critical and IRL meetings are not
possible. Have alts. Have alts of your alts. Simple phrases, “I’ll be in touch” can be
used to alert your friend that you’ll be changing accounts for next communication.
Lull them into a sense of
complacency.
As mentioned, continue to use compromised accounts, very carefully. Where possible:
inject noise. Look active, unassuming.
Do not harass the
opposition.
TL;DR: No trollin’. Don’t be goaded into “proving” anything online. Don’t let emotional
dialogue with adversary trip you up. Especially true if domestic situation.
Pick the time and place for
action.
Plan for failure! Set threshold for anything suspicious, know when to abandon a used
account, when to carefully arrange or abort a meeting, set a fallback plan with trusted
partners.
Keep your options open. Be fluid and ready to change tactics as needed, i.e. did your mail provider just remove
their canary? Was your stealth account shared by accident? Have backup options
ready.
100
QUESTION
S
www.FourthAmendmentAsAService.org - @4thAsAService
101
Keep your conversations private, and your selfies too.
- Willa
Secure Communications – Tools and Tech
www.FourthAmendmentAsAService.org - @4thAsAService
102www.FourthAmendmentAsAService.org - @4thAsAService
It’s not just for watching Netflix overseas anymore.
Using a Virtual Private Network (VPN)
103
• It’s like virtually plugging into another
network in another state, country, continent.
• Your traffic can be viewed after it comes out
of the virtual network.
• A great stop-gap for public WiFi privacy.
What is a VPN anyways?
www.FourthAmendmentAsAService.org - @4thAsAService
104
PIA: Private Internet Access
• Easy to use
• Anonymous sign up with gift cards
• Works on almost all devices
• Plenty of tutorials and informational guides
www.FourthAmendmentAsAService.org - @4thAsAService
105www.FourthAmendmentAsAService.org - @4thAsAService
Onions are like politicians. They have layers, and they’re awful.
Why not TOR?
106
• It doesn’t protect your traffic from being
seen; only makes it anonymous.
• It’s slower, and unreliable for things like
video streaming or downloading files.
• Often blocked by major services and sites.
• Governments are actively targeting it.
Why not use TOR?
www.FourthAmendmentAsAService.org - @4thAsAService
107www.FourthAmendmentAsAService.org - @4thAsAService
Broadcasting your every move while you sip your latte.
Open WiFi
108
• Any traffic that isn’t encrypted can be sniffed
• Malicious attacker could inject code into the
page to gather information or exploit you
• VPN can help alleviate these concerns
Open WiFi
www.FourthAmendmentAsAService.org - @4thAsAService
109www.FourthAmendmentAsAService.org - @4thAsAService
If you’re going to say it, make it a Whisper (System).
Messaging
110110
Facebook Messenger
Pros:
www.FourthAmendmentAsAService.org - @4thAsAService
• Most people have it.
• It’s easy to use.
• It provides end to end
encryption via the Signal
system.
• Ability to delete message
after time like Snapchat.
Cons:
• You have to turn it on for
each conversation.
• It only works in the
Messenger app.
• Facebook is a high value
target.
111111
WhatsApp
Pros:
• It uses the Signal
encryption system.
• There’s an app and a
web version.
• End to end encryption is
on by default.
Cons:
• Facebook data sharing.
• Unencrypted backups by
default.
• Key changes aren’t
obvious by default.
www.FourthAmendmentAsAService.org - @4thAsAService
112112
Pretty Good Privacy / GPG
Pros:
• Great email, file, and
other messaging
encryption method.
Cons:
• Very difficult to setup
and configure.
• Key trust is hard to
establish.
• Key changes aren’t easy
either.
• Basically it’s a pain.
www.FourthAmendmentAsAService.org - @4thAsAService
113
QUESTION
S
www.FourthAmendmentAsAService.org - @4thAsAService
114
LAB – Signal and PIA
•Setup Signal
•Setup PIA
Time: 30 Minutes
Materials: Computer and Internet Connection
Cost: $0.00
www.FourthAmendmentAsAService.org - @4thAsAService
115www.FourthAmendmentAsAService.org - @4thAsAService
If you don’t protect your personal privacy, who will?
Owen and Jack
Online Privacy
116
What the Pros Do
Reference: http://arstechnica.com/security/2015/07/what-amateurs-can-learn-from-security-pros-about-staying-safe-online/
www.FourthAmendmentAsAService.org - @4thAsAService
117
In the News - Sarah Palin’s Email Hack
• Hacker obtains access to Sarah
Palin’s personal Yahoo account.
• Hacker leverages simple ”Security
Questions” to reset Palin’s password.
• If your email account gets owned, you
are owned!
“What would you do?”
“How could this have been prevented?”
https://www.wired.com/2008/09/palin-e-mail-ha/
www.FourthAmendmentAsAService.org - @4thAsAService
118
Best Practices - Email
DO…
1. Use a strong and unique password
2. Use two-factor authentication
3. Confirm suspicious attachments/links from known contacts
4. Look closely at the sender’s email address
5. Unsubscribe from mailing lists
6. Delete emails older than 180 days!
DO NOT…
1. Use a simple password
2. Click on suspicious attachments/links
3. Enter any personal information into a pop-up screen
4. Use real information for “Security Questions”
“A password is like a toothbrush. Choose a good one. Don’t share it with anyone. Change it
frequently.”
www.FourthAmendmentAsAService.org - @4thAsAService
119
In the News – YouTube Hosts Infected Ads
• YouTube, Reuters, and Yahoo host
infected ads on their sites.
• Violates golden rule that “Only “shady”
sites can hurt you”.
• Research shows that hackers are seeing
1,425% ROI with these attacks.**
“What would you do?”
“How could this have been prevented?”
https://www.wired.com/insights/2014/11/ma
lvertising-is-cybercriminals-latest-sweet-
spot/
www.FourthAmendmentAsAService.org - @4thAsAService
120
Best Practices - Browser
DO…
1. Use a modern browser
2. Use anti-virus software that scans all downloads
3. Use a pop-up blocker
4. Use HTTPS (The “S” stands for secure)
5. Use a Virtual Private Network (VPN)
DO NOT…
1. Use public or free WiFi
2. Let your browser store your passwords
3. Enter any personal information into an unexpected pop-up
“Think of the internet as a public place. Don’t leave your details lying around!”
www.FourthAmendmentAsAService.org - @4thAsAService
121
In the News – Anthony Cumia Fired
• Opie and Anthony’s Anthony Cumia
is fired from Sirius radio after making
“racially charged” tweets.
• Details of the situation were not “cut
and dry”.
“What would you do?”
“How could this have been prevented?” http://www.cnn.com/2014/07/04/showbiz/ce
lebrity-news-gossip/anthony-fired-tweets-
opie-and-anthony/
www.FourthAmendmentAsAService.org - @4thAsAService
122
Best Practices – Social Media
DO…
1. Use privacy settings
2. Understand the terms and conditions
3. Use false information strategically
4. Use caution before clicking links
5. Minimize third party applications
DO NOT…
1. Post, Tweet, or SnapChat ANYTHING that you would not want your employer to see!
2. Use your legal name as your profile name
3. Link your social media with your work email
“If you are not paying, you are the product!”
www.FourthAmendmentAsAService.org - @4thAsAService
123
In the News – Beyonce’s “Unflattering” Photos
• Beyonce’s publicists and legal team
try to have “unflattering” photos from
the Super Bowl removed from the
internet.
• Memes around these photos go viral.
“What would you do?”
“How could this have been prevented?” http://www.sbnation.com/lookit/2015/2/1/75
47851/beyonce-super-bowl-photo-never-
forget
www.FourthAmendmentAsAService.org - @4thAsAService
124
Best Practices – Mobile Device
DO…
1. Lock your device with a password or PIN
2. Back up your data
3. Keep your software up-to-date
4. Enable the ability to remotely wipe your device
DO NOT…
1. Send any image/video that you do not want to be public!
2. Use biometrics
3. Jailbreak/Root your device
4. Leave WiFi and Bluetooth on all the time!
“If Beyonce’s high powered legal team cannot get pictures removed from the internet
…NEITHER CAN YOU!!!”
www.FourthAmendmentAsAService.org - @4thAsAService
125
Best Practices – Tools
Password Managers
• Lastpass, 1Password, Keypass
Remote Wipe Utilities
• iCloud, Android Device Manager
Browser Plugins
• Privacy Badger, uBlock Origin, HTTPS
everywhere
VPN Clients
• Private Internet Access, PrivateXPN, IP Vanish
AntiVirus Packages
• Windows Defender, Avast, AVG
www.FourthAmendmentAsAService.org - @4thAsAService
126
LAB – Browser Plugins
•Setup Privacy Badger
•Setup uBlock Origin
Time: 30 Minutes
Materials: Computer and Internet Connection
Cost: $0.00
www.FourthAmendmentAsAService.org - @4thAsAService
127
QUESTION
S
www.FourthAmendmentAsAService.org - @4thAsAService
128
THANKS!
www.FourthAmendmentAsAService.org - @4thAsAService
129
QUESTIONS AND CONTACT
Contact Us at:
www.FourthAsAService.org
@4thAsAService
James.Madison@FourthAmendmentAsAService.org
www.FourthAmendmentAsAService.org - @4thAsAService
130
RESOURCES & SOURCES
RESOURCES – Include any resources referenced in the presentation and any additional sources for later reading
Fourth Amendment As A Service – www.fourthamendmentasaservice.org
Fourth Amendment As A Service Twitter – www.twitter.com/4thAsAServce
Surveillance Self-Defense - https://ssd.eff.org/
SOURCES – Include ALL sources for content, images, and intellectual property
James Madison Portrait - John Vanderlyn (1775–1852) - Ths White House Historical Association- Ths White House
Historical Association. the painting is in the White House collection[1]
Flat Icon – Open Book - http://www.flaticon.com/authors/zlatko-najdenovski
Flat Icon – Map - http://www.flaticon.com/authors/madebyoliver
Flat Icon Clock - http://www.flaticon.com
www.FourthAmendmentAsAService.org - @4thAsAService

More Related Content

What's hot

The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyDan Houser
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyMultiscope
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggersjtownend
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalistsEllyn Angelotti
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Brian Rowe
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
The Dark Web
The Dark WebThe Dark Web
The Dark WebJan Siy
 
Internet Law Google
Internet Law    GoogleInternet Law    Google
Internet Law Googlemtigas
 

What's hot (20)

The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggers
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalists
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Keynote - Cindy Cohn
Keynote - Cindy CohnKeynote - Cindy Cohn
Keynote - Cindy Cohn
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
File000160
File000160File000160
File000160
 
Policy Briefing Presentation
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Internet Law Google
Internet Law    GoogleInternet Law    Google
Internet Law Google
 
DRM - IGF 2007 Rio
DRM - IGF 2007 RioDRM - IGF 2007 Rio
DRM - IGF 2007 Rio
 

Similar to Fourth Amendment as a Service - Workshop - 2-21-17

Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Small Business Trends
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...Shawn Tuma
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinFecomercioSP
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
 

Similar to Fourth Amendment as a Service - Workshop - 2-21-17 (20)

Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
 

Recently uploaded

The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...Henrik Hanke
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxnoorehahmad
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEMCharmi13
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.KathleenAnnCordero2
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptxogubuikealex
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this periodSaraIsabelJimenez
 

Recently uploaded (20)

The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEM
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptx
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this period
 

Fourth Amendment as a Service - Workshop - 2-21-17

  • 1. PRIVACY IN THE DIGITAL AGE A Fourth Amendment as a Service Workshop www.FourthAmendmentAsAService.org - @4thAsAService
  • 2. 2 LEGAL DISCLAIMER • We are not lawyers • We are not your lawyers • None of the presented or provided content constitutes legal advice. • This is general security & privacy advice from security & privacy advocates. • Consult with a lawyer before making your decisions. www.FourthAmendmentAsAService.org - @4thAsAService
  • 3. www.FourthAmendmentAsAService.org - @4thAsAService About Us, About the Course, and Agenda INTRODUCTIONS
  • 4. 4 ABOUT THE PRESENTER(S) www.FourthAmendmentAsAService.org - @4thAsAService @eanmeyer ean@eanmeyer.com Ean Meyer •Security Professional working with Fortune 500 Companies •Focused on compliance, risk management, and security programs •Bsides Speaker •Tripwire State of Security Guest Blogger •Course Director for Full Sail University •Security Mentor •Privacy Advocate Hobbies – Lockpicking, Makerscene, Writing
  • 6. 6 ABOUT THE COURSE www.FourthAmendmentAsAService.org - @4thAsAService • Topics we will cover – Your Right to Privacy – Secure Communications – Online Privacy – Help installing and configuring privacy tools • Things we won’t cover – Illegal or unethical use – If you are here to learn how to avoid the law… leave – Law enforcement has a hard enough job as is – In-depth discussions of technology – In-depth State and Local Law – Legality as it applies to your specific situation
  • 7. 7 ABOUT THE PRESENTERS @infosecanon hlawrence@hackucf.org Heather Lawrence •Naval Nuclear Veteran •MS Computer Engineering (in May) •President Hack@UCF •B-Sides Orlando Organizer • SunshineCTF Hobbies – Research, Crafting, Photography, CTFing www.FourthAmendmentAsAService.org - @4thAsAService
  • 8. 8 ABOUT THE PRESENTER(S) @GaelanAdams Gadams@hackucf.org Gaelan Adams •Professional Cat Herder •Senior Engineer Hack All The Things •Privacy Advocate Hobbies – Technology, Education, Batman www.FourthAmendmentAsAService.org - @4thAsAService
  • 9. 9 ABOUT THE PRESENTER(S) @jcknrmn jack@jacknorman.com Jack Norman • MS, IA and Cyber Security, FIT • EM and Homeland Security Certificate, UCF • Executive MBA, UCF • BS Electrical Engineering, UB • Board Member - OWASP Orlando • Sr. Information Security Engineer Hobbies – Outdoors, firearms, swinging a hammer, anything not involving a computer. www.FourthAmendmentAsAService.org - @4thAsAService
  • 10. 10 ABOUT THE PRESENTER(S) @sk4ld owen@hackallthethings.com Owen Redwood • PhD dissertation on Cyber Physical Systems Vulnerability Research, FSU • CEO Hack All The Things, LLC • Senior Lead Cyber Researcher of the Nebraska Applied Research Institute • DoD Advisor on Critical Infrastructure Hobbies – DnD, Video Games, Firearms, Breaking the Grid, Exploiting the World www.FourthAmendmentAsAService.org - @4thAsAService
  • 11. 11 ABOUT THE PRESENTER(S) www.FourthAmendmentAsAService.org - @4thAsAService @corq corq@corq.co Corq •Sysadmin turned Threat Analyst •Subject of numerous 3rd party breaches •Subject of one (very weak) doxing campaign •Cold War History Buff •Privacy Advocate Hobbies – Shortwave Radio, Raspberry Pi/ARM computer hobbyist, Crazy Cat Lady
  • 12. 12 ABOUT THE PRESENTER(S) www.FourthAmendmentAsAService.org - @4thAsAService @willasaywhat willa@willasaywhat.com Willa •Senior Penetration Tester @ Veracode •DEF CON 24 Speaker •B.S. Computer Science @ UCF ℅ 2007 •M.P.S. Information Science @ Penn State Hobbies – Hardware hacking, micro drone racing, PC gaming, and chasing my toddler.
  • 13. 13 AGENDA • Sections and Breaks – 08:30 - 09:00 Check-in – 09:00 - 09:15 Opening remarks – 09:15 - 10:00 Your Rights (45 min lecture) – QA and or Break optional – 10:00 - 10:30 Secure Communications – 10:30 - 11:00 Configuring tools from Secure Communications – 11:30 - 12:00 Online Privacy – 12:00 - 12:30 Configuring tools from Online Privacy • House Keeping Notes – Bathroom Locations – Food and Drink – Cell phones – Leaving and Entering the Room – We are recording the talks to be placed online www.FourthAmendmentAsAService.org - @4thAsAService
  • 14. 14 BEFORE WE START ARE THEIR ANY QUESTIONS? www.FourthAmendmentAsAService.org - @4thAsAService
  • 15. 15 YOUR RIGHTS Heather Lawrence and Gaelan Adams www.FourthAmendmentAsAService.org - @4thAsAService
  • 16. 16 AGENDA •Political Climate •Why should I care? •The Law and Your Rights •What should I do when… •Your data (and what it says) www.FourthAmendmentAsAService.org - @4thAsAService
  • 17. 17www.FourthAmendmentAsAService.org - @4thAsAService Some history and our current political state Political Climate
  • 18. 1818www.FourthAmendmentAsAService.org - @4thAsAService "Big Brother in the form of an increasingly powerful government and in an increasingly powerful private sector will pile the records high with reasons why privacy should give way to national security, to law and order, to efficiency of operation, to scientific advancement and the like.” William O. Douglas (1898-1980), U. S. Supreme Court Justice
  • 19. 1919www.FourthAmendmentAsAService.org - @4thAsAService “There is nothing new in the realization that the Constitution sometimes insulates the criminality of a few in order to protect the privacy of us all.” Antonin Scalia(1936-2016), U. S. Supreme Court Justice
  • 20. 20www.FourthAmendmentAsAService.org - @4thAsAService Mario M. Cuomo The New Republic (4 April 1985) “You campaign in poetry. You govern in prose.”
  • 21. 21www.FourthAmendmentAsAService.org - @4thAsAService From important figures in politics and government Campaign and Political Statements
  • 22. 22 Obama signs CISA http://www.cnbc.com/2015/12/22/the- controversial-surveillance-act-obama-just- signed.html • The Cybersecurity Information Sharing Act (CISA) was signed into law as part of a budget package • The bill permits private companies to handover information to federal agencies • This creates significant privacy issues around private user data moving into government hands www.FourthAmendmentAsAService.org - @4thAsAService
  • 23. 23 On Surveillance "I want surveillance of certain mosques if that's OK," Trump told the often-raucous and approving crowd. "We've had it before.” - Donald Trump September 21st, 2015 https://www.youtube.com/watch?v=1SzrhYKya00 http://www.cnn.com/2015/11/21/politics/trump-muslims- surveillance/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 24. 24 Obama Expands Surveillance Access https://www.nytimes.com/2017/01/12/us/politics/n a-gets-more-latitude-to-share-intercepted- communications.html • An expansion of Executive Order 12333 Relax longstanding limits on N.S.A. data sharing • Data was collected via means unregulated by American wiretapping laws • Increases the risk private information about innocent people will be shared without court oversight www.FourthAmendmentAsAService.org - @4thAsAService
  • 25. 25 On Free Speech and Freedom of Press “I'm going to open up our libel laws so when they write purposely negative and horrible and false articles, we can sue them and win lots of money.” –Donald Trump February 26, 2016 https://www.washingtonpost.com/news/volokh- conspiracy/wp/2016/02/26/donald-trump-says-hell- open-up-libel-laws/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 26. 26 On Free Speech “We have to talk to them about, maybe in certain areas, closing that Internet up in some way. Somebody will say, 'Oh freedom of speech, freedom of speech.' These are foolish people. We have a lot of foolish people." - Donald Trump December 8, 2016 http://money.cnn.com/2015/12/08/technology/don ald-trump-internet/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 27. 27 On Encryption “I think security, overall, we have to open it up and we have to use our heads. We have to use common sense” -Donald Trump February 17, 2016 https://www.cnet.com/news/trump-apple-iphone-san- bernardino-encryption-fbi-terrorist/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 28. 28 On Encryption Backdoors Compliance with Court Orders Act of 2016 – Initial attempt to require backdoors into encryption – Bill would require companies to create a mechanism that would allow for encrypted data to be retrieved without consent – Proposed by Sen. Richard Burr – Chairman of the Senate Intelligence Committee and Sen. Diane Feinstein https://www.wired.com/2016/04/senates-draft- encryption-bill-privacy-nightmare/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 29. 29www.FourthAmendmentAsAService.org - @4thAsAService If it’s a legal request, shouldn’t there be a back door for law enforcement? What’s wrong with backdoors?
  • 30. 30 Encryption Backdoors Tools created to leverage backdoor vulnerabilities in code to listen in to encrypted conversations. Although authorized organizations could use this backdoor there was nothing stopping anyone who knew it existed from using it. Juniper is the second largest network equipment manufacturer behind Cisco https://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government- backdoors/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 31. 31 Encryption Backdoors A report from the Encryption Working group put together by two House committees found: - There is no way to stop bad actors from adopting encryption. - The Committees should explore other strategies to address the needs of the law enforcement community https://judiciary.house.gov/wp- content/uploads/2016/12/20161220 EWGFINALReport.pdf Page 5 Encryption Working Group Year End Report - 2016 www.FourthAmendmentAsAService.org - @4thAsAService
  • 33. 33www.FourthAmendmentAsAService.org - @4thAsAService I have nothing to hide. Why should I care?
  • 34. 3434www.FourthAmendmentAsAService.org - @4thAsAService “First they came for the Socialists, and I did not speak out— Because I was not a Socialist. Then they came for the Trade Unionists, and I did not speak out— Because I was not a Trade Unionist. Then they came for the Jews, and I did not speak out— Because I was not a Jew. Then they came for me—and there was no one left to speak for me.” Martin Niemöller (1892–1984)
  • 35. 35 This Couldn’t Happen to Me • Reddit investigations gone wrong – Sunil Tripathi • Find my Phone leads to wrong home and threats • Farm in Kansas becomes site of threats as online tracking goes wrong • #PizzaGate leads armed man to “investigate” pizza parlor • Three Felonies a Day www.FourthAmendmentAsAService.org - @4thAsAService
  • 36. 36 This Couldn’t Happen to Me •Central Park Five http://www.pbs.org/kenburns/centralparkfive/ •Earl Washington, Jr. http://www.innocenceproject.org/cases/earl-washington/ •Nga Truong http://www.pbs.org/wgbh/frontline/article/a-rare-look-at-the- police-tactics-that-can-lead-to-false-confessions/ All had coerced, forced, or fabricated confessions after interrogation that lead them to incarceration. www.FourthAmendmentAsAService.org - @4thAsAService
  • 37. 37www.FourthAmendmentAsAService.org - @4thAsAService Aren’t we safer by giving up some information? But, don’t the ends justify the means?
  • 38. 3838www.FourthAmendmentAsAService.org - @4thAsAService “If you want to control someone, all you have to do is to make them feel afraid.” ― Paulo Coelho
  • 39. 39 Being Black in Public •Collegiate Cyber Defense Club @ UCF Secretary –Detained and vehicle searched while sitting in his car, in a UCF parking garage. www.FourthAmendmentAsAService.org - @4thAsAService
  • 40. 40 Being Black in Public Alabama police officers detain a black man for jogging at night • Reason for stop was an unidentified man running • Officer stated “Burglaries were reported • Alabama is a Stop and Identify State • Maintaining your rights can be difficult (Credit: The Free Thought Project) https://www.salon.com/2015/10/15/where_you_been_run ning_from_watch_officers_try_to_detain_alabama_man_f or_jogging_at_night_while_black/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 41. 41 Marginalized Groups •#BlackLivesMatter •People of Color •LGBTQ+ •Occupy Wall street •Foreigners •Non-Christians •Dissenting Political Voices www.FourthAmendmentAsAService.org - @4thAsAService
  • 42. 42www.FourthAmendmentAsAService.org - @4thAsAService “To learn who rules over you, simply find out who you are not allowed to criticize.” - Voltaire Censorship
  • 43. 43 How it starts •Think of the children! •Stop the pedophiles! •The terrorists will win! •This is un-American, ban it! •We can’t give you that information and keep you safe! www.FourthAmendmentAsAService.org - @4thAsAService
  • 44. 44 Taking a stand •No one wants to stand up and say: “I like pornography.” “I have an unusual legal sexual fetish.” “I have genital herpes.” www.FourthAmendmentAsAService.org - @4thAsAService
  • 45. 45 But How Bad Could It Be, Really? •“Snoopers Charter” UK •N. Korea •Great Firewall of China •Arab Spring •Dictatorships •Egypt shuts down the Internet http://big-digital.de/360socialmedia www.FourthAmendmentAsAService.org - @4thAsAService
  • 46. 46 But How Bad Could It Be, Really? •Snapchat Revenge Sites •The Fappening •Ashley Madison •Adult Friend Finder •Office of Personnel Management Jennifer Lawrence | by Gage Skidmore www.FourthAmendmentAsAService.org - @4thAsAService
  • 47. 47www.FourthAmendmentAsAService.org - @4thAsAService I just won’t use the Internet Perfect Security
  • 48. 48 Perfect Security •It doesn’t exist •Going off the grid is near impossible •No protection is unbreakable •It’s about reducing your attack surface www.FourthAmendmentAsAService.org - @4thAsAService
  • 49. 49www.FourthAmendmentAsAService.org - @4thAsAService The amendments are here for you Your rights
  • 50. 50 Fourth Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. https://www.law.cornell.edu/constitution/fourth_amendment www.FourthAmendmentAsAService.org - @4thAsAService
  • 51. 51 Fourth Amendment How does it protect me? •Unreasonable searches and seizures •Arbitrary arrests •Basis –Search Warrants –Stop-and-frisk / Safety inspections •Wiretaps www.FourthAmendmentAsAService.org - @4thAsAService
  • 52. 52 Other Constitutional Amendments These also help define privacy: •1st – “Freedoms” •5th – “Self Incrimination” •14th – “Equal Protections” (“Personal Autonomy”) www.FourthAmendmentAsAService.org - @4thAsAService
  • 53. 53 5th Amendment - Right to remain silent “…Shall not be compelled in any criminal case to be a witness against himself…” –Protects you in Criminal Court –Protects you in Civil Court McCarthy v. Arndstein (1924) www.FourthAmendmentAsAService.org - @4thAsAService
  • 54. 54 5th Amendment “Too many, even those who should be better advised, view this privilege as a shelter for wrongdoers. They too readily assume that those invoke it are either guilty of crime or commit perjury in claiming the privilege” - Ullman v. United States (1956) www.FourthAmendmentAsAService.org - @4thAsAService
  • 55. 55 5th Amendment – Right to Remain Silent “One of the Fifth Amendments basic functions is to protect innocent men who otherwise might be ensnared by ambiguous circumstances. Truthful responses of an innocent witness, as well as those of a wrongdoer, may provide the government incriminating evidence from the speakers own mouth” - U.S. Supreme Court – Ohio v. Reiner (2001) www.FourthAmendmentAsAService.org - @4thAsAService
  • 56. 56 5th Amendment - Right to Remain Silent You must invoke your right to remain silent –Supreme Court ruling that unless verbally invoked (right to remain silent) all statements voluntary provided could be used in court and police could continue to interact with a suspect. –Responding after being silent, can be interpreted as a wavier of this right. - Berghuis v. Thompkins (2010) www.FourthAmendmentAsAService.org - @4thAsAService
  • 57. 57 5th Amendment – Invoking your right You can no longer remain silent as it can be construed to imply guilt, you must verbally invoke your right to the fifth amendment. - Salinas v. Texas (2013) –U.S. Supreme Court www.FourthAmendmentAsAService.org - @4thAsAService
  • 58. 58 6th Amendment - Right to Counsel •Requires the “assistance of counsel” for the accused “in all criminal prosecutions” •You can be in jail without an attorney until arraignment •You don’t have to be provided an attorney until arraignment •You don’t have to be provided an attorney until court begins. www.FourthAmendmentAsAService.org - @4thAsAService
  • 59. 59www.FourthAmendmentAsAService.org - @4thAsAService Complying with law does not mean waiving your rights The Law of the Land
  • 60. 60www.FourthAmendmentAsAService.org - @4thAsAService What should I do? The police want to talk to me!
  • 61. 61 The police want to talk to me While Walking While Driving While At Home Warrant/Subpoena • What are my Rights? • What do I need to say? • How do I comply with the law? While Traveling While At Work www.FourthAmendmentAsAService.org - @4thAsAService
  • 62. 62 While Walking DO • Be polite, respect their authority • Write down or record details of the encounter • Ask – “Am I being detained, am I free to go?” • State – “I am exercising my right to remain silent and will answer no further questions.” • State – If Arrested – “I am exercising my to speak to an attorney.” DO NOT • Do not interfere with or obstruct police • Lie or give false documents ADDITIONAL • State laws may very – You may be required to present ID • You are not required to give consent for a search of your persons (Stop and Frisk, vehicle, or dwelling) www.FourthAmendmentAsAService.org - @4thAsAService
  • 63. 63 Stop and Frisk •Terry v. Ohio (1968) •Officers are allowed to temporarily detain you and ‘frisk’ (pat down) of you based upon reasonable suspicion to ensure officer safety •This does not mean police may reach in to pockets or search a bag without permission •You do not have to consent www.FourthAmendmentAsAService.org - @4thAsAService
  • 64. 64 While Driving DO • Slow down, pull into a safe well lit area, be polite, respect their authority • Remain in your vehicle and write down or record details of the encounter • Ask – “Why was I stopped?” • Ask – “Am I being detained, am I free to go?” • State – “I am exercising my right to remain silent and will answer no further questions.” • State – If Arrested – “I am exercising my to speak to an attorney.” DO NOT • Do not interfere with or obstruct police • Lie or give false documents ADDITIONAL • State laws may very – You may be required to present ID • You are not required to give consent for a search of your persons – (Stop and Frisk, vehicle, or dwelling) www.FourthAmendmentAsAService.org - @4thAsAService
  • 65. 65 Terry Stop •Traffic Stop •Drivers and passengers may be searched for weapons upon reasonable suspicion they are armed and dangerous •Police may perform a protective search of the cabin if they believe persons are armed and dangerous or can access a weapon •You do not have to consent to search of your vehicle www.FourthAmendmentAsAService.org - @4thAsAService
  • 66. 66 While at Home DO • Be polite, respect their authority • Write down or record details of the encounter • Ask – “Am I being detained, am I free to go?” • State – “I am exercising my right to remain silent and will answer no further questions? • State – If Arrested – “I am exercising my to speak to an attorney.” DO NOT • Do not interfere with or obstruct police • Lie or give false documents ADDITIONAL • State laws may vary – You may be required to present ID • You are not required to give consent for a search of your persons (Stop and Frisk, vehicle, or dwelling www.FourthAmendmentAsAService.org - @4thAsAService
  • 67. 67 Home Searches •Arrest and Bench Warrants do not always allow for the search of a home. •Exigent Circumstances – Police can bypass a warrant if they feel evidence may be destroyed •A warrant must contain: –the judge’s name, your name and address, the date, place to be searched, a description of any items being searched for, and the name of the agency that is conducting the search or arrest. •Without a warrant you may refuse entry to your home and refuse to speak futher with the police www.FourthAmendmentAsAService.org - @4thAsAService
  • 68. 68 While at Work DO • Be polite, respect their authority • Write down or record details of the encounter • Ask – “Am I being detained, am I free to go?” • State – “I am exercising my right to remain silent and will answer no further questions? • State – If Arrested – “I am exercising my to speak to an attorney.” DO NOT • Do not interfere with or obstruct police • Lie or give false documents ADDITIONAL • State laws may vary – You may be required to present ID • You are not required to give consent for a search of your persons (Stop and Frisk, vehicle, or dwelling www.FourthAmendmentAsAService.org - @4thAsAService
  • 69. 69 Workplace Searches •Your business may already have a policy regarding the search of your belongings •They cannot search your person without a warrant or your consent •As a general rule they cannot search your person •Computers, Lockers, Desks, Company Cars, and other company property can be searched with the companies consent www.FourthAmendmentAsAService.org - @4thAsAService
  • 70. 70 While Traveling DO • Be polite, respect their authority • Remember/write down the encounter – you may not be able to record • Remember your rights do not apply in other countries • Contact the Embassy or Ambassador – CIA World Factbook • Familiarize yourself with local laws and customs DO NOT • Do not interfere with or obstruct police • Lie or give false documents ADDITIONAL • International laws may vary greatly from US law • Police and law enforcement may not need consent to search your person or belongs at borders www.FourthAmendmentAsAService.org - @4thAsAService
  • 71. 71 Border search exception •It allows for search and seizures at international borders and their functional equivalent without a warrant or probable cause. •Laptops are considered “closed containers” •No first amendment protections at a border www.FourthAmendmentAsAService.org - @4thAsAService
  • 72. 72 Warrants and Subpoenas DO • Be polite • Write down or record details of the encounter • Ask – “Am I being detained, am I free to go?” • State – “I am exercising my right to remain silent and will answer no further questions? • State – If Arrested – “I am exercising my to speak to an attorney.” DO NOT • Do not interfere with or obstruct police • Lie or give false documents ADDITIONAL • State laws may vary – You may be required to present ID • You are not required to give consent for a search of your persons (Stop and Frisk, vehicle, or dwelling www.FourthAmendmentAsAService.org - @4thAsAService
  • 73. 73 4th Amendment - Warrants “… no Warrants shall issue, but upon probable cause, supported by Oath or affirmation…” –Arrest Warrants –Bench Warrants –Search Warrants www.FourthAmendmentAsAService.org - @4thAsAService
  • 74. 74 4th Amendment – Warrant Requirements • Reasonable Suspicion – –It most often requires that “…Officers have an objectively reasonable basis for suspecting criminal activity before detaining someone…” –“specific and articulable facts” and “taken together with rational inferences from those facts” • Preponderance of evidence - –More than 50% true –“More probable than not”- Miller v. Minister of Pensions (1947) • Probable Cause – –“A reasonable amount of suspicion, supported by circumstances sufficiently strong to justify a prudent and cautious person’s belief that certain facts are probably true” •Handler, J. G. (1994). Ballentine's Law Dictionary (Legal Assistant ed.). Albany: Delmar. p. 431. www.FourthAmendmentAsAService.org - @4thAsAService
  • 75. 75 Search Warrants •Based upon probable cause and sworn testimony (Affidavit) •Must specify what they are looking for •Must specify where they are looking for it www.FourthAmendmentAsAService.org - @4thAsAService
  • 76. 76 Police are trained •Police are trained to respect your rights •Police are also trained in techniques to get you to waive your rights •In most cases they do this with good intentions •“If you don’t cooperate now, it’ll be worse for you later.” www.FourthAmendmentAsAService.org - @4thAsAService
  • 77. 77 Interfacing with Law Enforcement •Turn off your phone to prevent a search without a warrant or consent (Does not work with biometrics) •“I am exercising my right to remain silent; I wish to remain silent. I want to speak with a (or my) attorney.” •If you are witnessing an interaction with the police it is your right to record as long as you are not interfering with their work www.FourthAmendmentAsAService.org - @4thAsAService
  • 79. 79 When should I talk to the police? “[A]ny lawyer worth his (or her) salt will tell the suspect in no uncertain terms to make NO statements to the police under any circumstances.” - Justice Robert Jackson - U. S. Supreme Court Justice www.FourthAmendmentAsAService.org - @4thAsAService
  • 80. 80 Why not to talk to the police •There is no way it can help. –Everything you say can and will be used against you, not for you. •Admit nothing, confirm nothing –It can be used against you if you confirm anything www.FourthAmendmentAsAService.org - @4thAsAService
  • 81. 81 News Story Quiz How many people did the police find shot to death last night in the Pine Hills apartment? A. One B. Two C. Three D. Four www.FourthAmendmentAsAService.org - @4thAsAService
  • 82. 82www.FourthAmendmentAsAService.org - @4thAsAService NEVER talk to the police You are all wrong – No one was shot
  • 83. 83 Why not talk to the police •White lies or misrepresentations of facts lead to convictions •Any information can lead to a conviction of you •The police can mistakenly recall your statements or questions www.FourthAmendmentAsAService.org - @4thAsAService
  • 84. 84 Why not talk to the police •Your answers can be used to crucify you •“People are inherently honest or want to tell their story” www.FourthAmendmentAsAService.org - @4thAsAService
  • 85. 85www.FourthAmendmentAsAService.org - @4thAsAService My what stories they tell Technology and Data
  • 86. 86 Data vs Information definitions •Data is simply facts, figures or bits of information. •Information is structed data to provide a context www.FourthAmendmentAsAService.org - @4thAsAService
  • 87. 87 Metadata What is metadata? - Data that provides information about other data Remember library card catalogues? - Metadata - Cards contain information about the books www.FourthAmendmentAsAService.org - @4thAsAService
  • 88. 88 4chan ISIS Strike •4chan used meta data analysis to located ISIS fighters •Utilizing data gleaned from social media posts, photos, and other information found online they identified ISIS sites •This information was used to call in strikes on those sites. http://www.vocativ.com/326039/how-one-4chan- board-is-trying-to-fight-isis-in-syria/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 89. 89 Identifying People •We can identify 87% of the population, uniquely using only: –Gender –Date of Birth –Zip Code http://dataprivacylab.org/projects/identifiability/paper1.pdf www.FourthAmendmentAsAService.org - @4thAsAService
  • 90. 90 Advertising Networks •You can be uniquely identified by your browser with 97% accuracy •Information is shared, sold and auctioned. •Target determined a 16 year old was pregnant before the family knew based off of search queries. http://www.forbes.com/sites/kashmirhill/2012/02/16/how- target-figured-out-a-teen-girl-was-pregnant-before-her- father-did/#7f93522d34c6 www.FourthAmendmentAsAService.org - @4thAsAService
  • 92. 92 You let us know Break or Start Lab? www.FourthAmendmentAsAService.org - @4thAsAService
  • 93. 93 LAB – OSINT and Records •FL VOTER DB •Removing Records Time: 30 Minutes Materials: Computer and Internet Connection Cost: $0.00 www.FourthAmendmentAsAService.org - @4thAsAService
  • 94. 94 You don’t have to be a spy to care about OpSec - Corq Secure Communications Moscow Rules www.FourthAmendmentAsAService.org - @4thAsAService
  • 95. 95 Fundamentals (Rational Paranoia) 1. Assume nothing. 2. Never go against your gut. 3. Everyone is potentially under opposition control. 4. Do not look back; you are never completely alone. 5. Go with the flow, blend in. Moscow Rules number anywhere from 10 to 40; we went with the fundamentals. 6. Vary your pattern and stay within your cover. 7. Lull them into a sense of complacency. 8. Do not harass the opposition. 9. Pick the time and place for action. 10. Keep your options open. www.FourthAmendmentAsAService.org - @4thAsAService
  • 96. 96 These seem silly, why would you do this? www.FourthAmendmentAsAService.org - @4thAsAService Use cases: • Domestic abuse situations where formerly shared accounts with abuser may be compromised • If you or peers are members of an at-risk demographic group • Any situation concerning personal safety that requires alternate communications with trusted partners • Protecting activism communication channels, future-proofing against eventual compromise, or where past activism has come under scrutiny • General communication hygiene, any concern one might have for future breaches or compromises, these are good practices
  • 97. 97 Practical Application of “The Rules” www.FourthAmendmentAsAService.org - @4thAsAService Assume nothing. Privacy and private communications should always be considered fragile. Segregate accounts. Review your security practices often, have fallback plans in place. Never go against your gut. You won’t always be able to validate your instincts with real world evidence, but make the effort, for your own assurances. Caveat: Irrational paranoia is NOT a product of instinct. Remember: Fear is the Mind-Killer. Everyone is potentially under opposition control. Plan for failure! Even tools we’ll suggest here today, could be breached tomorrow. ISPs, free mail providers, any online service. See Also: “Warrant Canaries.” Do not look back; you are never completely alone. Reinforcement of the mantra above. Digital comms should be avoided for truly critical information matters. Meatspace meetups can be arranged in places difficult to monitor. Go with the flow, blend in. Continue to use your “Public”, or known accounts for inconsequential matters. Talk sports, TMZ gossip, non-political matters. Make your conversations seem “boring.”
  • 98. 98 Practical Application of “The Rules” www.FourthAmendmentAsAService.org - @4thAsAService Assume nothing. Privacy and private communications should always be considered fragile. Segregate accounts. Review your security practices often, have fallback plans in place. Never go against your gut. You won’t always be able to validate your instincts with real world evidence, but make the effort, for your own assurances. Caveat: Irrational paranoia is NOT a product of instinct. Remember: Fear is the Mind-Killer. Everyone is potentially under opposition control. Plan for failure! Even tools we’ll suggest here today, could be breached tomorrow. ISPs, free mail providers, any online service. See Also: “Warrant Canaries.” Do not look back; you are never completely alone. Reinforcement of the mantra above. Digital comms should be avoided for truly critical information matters. Meatspace meetups can be arranged in places difficult to monitor. Go with the flow, blend in. Continue to use your “Public”, or known accounts for inconsequential matters. Talk sports, TMZ gossip, non-political matters. Make your conversations seem “boring.”
  • 99. 99 Practical Application of “The Rules” 2 www.FourthAmendmentAsAService.org - @4thAsAService Vary your pattern and stay within your cover. If practical, use specific burner accounts only for specific purposes, sparingly. Change providers in between messages if comms are critical and IRL meetings are not possible. Have alts. Have alts of your alts. Simple phrases, “I’ll be in touch” can be used to alert your friend that you’ll be changing accounts for next communication. Lull them into a sense of complacency. As mentioned, continue to use compromised accounts, very carefully. Where possible: inject noise. Look active, unassuming. Do not harass the opposition. TL;DR: No trollin’. Don’t be goaded into “proving” anything online. Don’t let emotional dialogue with adversary trip you up. Especially true if domestic situation. Pick the time and place for action. Plan for failure! Set threshold for anything suspicious, know when to abandon a used account, when to carefully arrange or abort a meeting, set a fallback plan with trusted partners. Keep your options open. Be fluid and ready to change tactics as needed, i.e. did your mail provider just remove their canary? Was your stealth account shared by accident? Have backup options ready.
  • 101. 101 Keep your conversations private, and your selfies too. - Willa Secure Communications – Tools and Tech www.FourthAmendmentAsAService.org - @4thAsAService
  • 102. 102www.FourthAmendmentAsAService.org - @4thAsAService It’s not just for watching Netflix overseas anymore. Using a Virtual Private Network (VPN)
  • 103. 103 • It’s like virtually plugging into another network in another state, country, continent. • Your traffic can be viewed after it comes out of the virtual network. • A great stop-gap for public WiFi privacy. What is a VPN anyways? www.FourthAmendmentAsAService.org - @4thAsAService
  • 104. 104 PIA: Private Internet Access • Easy to use • Anonymous sign up with gift cards • Works on almost all devices • Plenty of tutorials and informational guides www.FourthAmendmentAsAService.org - @4thAsAService
  • 105. 105www.FourthAmendmentAsAService.org - @4thAsAService Onions are like politicians. They have layers, and they’re awful. Why not TOR?
  • 106. 106 • It doesn’t protect your traffic from being seen; only makes it anonymous. • It’s slower, and unreliable for things like video streaming or downloading files. • Often blocked by major services and sites. • Governments are actively targeting it. Why not use TOR? www.FourthAmendmentAsAService.org - @4thAsAService
  • 107. 107www.FourthAmendmentAsAService.org - @4thAsAService Broadcasting your every move while you sip your latte. Open WiFi
  • 108. 108 • Any traffic that isn’t encrypted can be sniffed • Malicious attacker could inject code into the page to gather information or exploit you • VPN can help alleviate these concerns Open WiFi www.FourthAmendmentAsAService.org - @4thAsAService
  • 109. 109www.FourthAmendmentAsAService.org - @4thAsAService If you’re going to say it, make it a Whisper (System). Messaging
  • 110. 110110 Facebook Messenger Pros: www.FourthAmendmentAsAService.org - @4thAsAService • Most people have it. • It’s easy to use. • It provides end to end encryption via the Signal system. • Ability to delete message after time like Snapchat. Cons: • You have to turn it on for each conversation. • It only works in the Messenger app. • Facebook is a high value target.
  • 111. 111111 WhatsApp Pros: • It uses the Signal encryption system. • There’s an app and a web version. • End to end encryption is on by default. Cons: • Facebook data sharing. • Unencrypted backups by default. • Key changes aren’t obvious by default. www.FourthAmendmentAsAService.org - @4thAsAService
  • 112. 112112 Pretty Good Privacy / GPG Pros: • Great email, file, and other messaging encryption method. Cons: • Very difficult to setup and configure. • Key trust is hard to establish. • Key changes aren’t easy either. • Basically it’s a pain. www.FourthAmendmentAsAService.org - @4thAsAService
  • 114. 114 LAB – Signal and PIA •Setup Signal •Setup PIA Time: 30 Minutes Materials: Computer and Internet Connection Cost: $0.00 www.FourthAmendmentAsAService.org - @4thAsAService
  • 115. 115www.FourthAmendmentAsAService.org - @4thAsAService If you don’t protect your personal privacy, who will? Owen and Jack Online Privacy
  • 116. 116 What the Pros Do Reference: http://arstechnica.com/security/2015/07/what-amateurs-can-learn-from-security-pros-about-staying-safe-online/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 117. 117 In the News - Sarah Palin’s Email Hack • Hacker obtains access to Sarah Palin’s personal Yahoo account. • Hacker leverages simple ”Security Questions” to reset Palin’s password. • If your email account gets owned, you are owned! “What would you do?” “How could this have been prevented?” https://www.wired.com/2008/09/palin-e-mail-ha/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 118. 118 Best Practices - Email DO… 1. Use a strong and unique password 2. Use two-factor authentication 3. Confirm suspicious attachments/links from known contacts 4. Look closely at the sender’s email address 5. Unsubscribe from mailing lists 6. Delete emails older than 180 days! DO NOT… 1. Use a simple password 2. Click on suspicious attachments/links 3. Enter any personal information into a pop-up screen 4. Use real information for “Security Questions” “A password is like a toothbrush. Choose a good one. Don’t share it with anyone. Change it frequently.” www.FourthAmendmentAsAService.org - @4thAsAService
  • 119. 119 In the News – YouTube Hosts Infected Ads • YouTube, Reuters, and Yahoo host infected ads on their sites. • Violates golden rule that “Only “shady” sites can hurt you”. • Research shows that hackers are seeing 1,425% ROI with these attacks.** “What would you do?” “How could this have been prevented?” https://www.wired.com/insights/2014/11/ma lvertising-is-cybercriminals-latest-sweet- spot/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 120. 120 Best Practices - Browser DO… 1. Use a modern browser 2. Use anti-virus software that scans all downloads 3. Use a pop-up blocker 4. Use HTTPS (The “S” stands for secure) 5. Use a Virtual Private Network (VPN) DO NOT… 1. Use public or free WiFi 2. Let your browser store your passwords 3. Enter any personal information into an unexpected pop-up “Think of the internet as a public place. Don’t leave your details lying around!” www.FourthAmendmentAsAService.org - @4thAsAService
  • 121. 121 In the News – Anthony Cumia Fired • Opie and Anthony’s Anthony Cumia is fired from Sirius radio after making “racially charged” tweets. • Details of the situation were not “cut and dry”. “What would you do?” “How could this have been prevented?” http://www.cnn.com/2014/07/04/showbiz/ce lebrity-news-gossip/anthony-fired-tweets- opie-and-anthony/ www.FourthAmendmentAsAService.org - @4thAsAService
  • 122. 122 Best Practices – Social Media DO… 1. Use privacy settings 2. Understand the terms and conditions 3. Use false information strategically 4. Use caution before clicking links 5. Minimize third party applications DO NOT… 1. Post, Tweet, or SnapChat ANYTHING that you would not want your employer to see! 2. Use your legal name as your profile name 3. Link your social media with your work email “If you are not paying, you are the product!” www.FourthAmendmentAsAService.org - @4thAsAService
  • 123. 123 In the News – Beyonce’s “Unflattering” Photos • Beyonce’s publicists and legal team try to have “unflattering” photos from the Super Bowl removed from the internet. • Memes around these photos go viral. “What would you do?” “How could this have been prevented?” http://www.sbnation.com/lookit/2015/2/1/75 47851/beyonce-super-bowl-photo-never- forget www.FourthAmendmentAsAService.org - @4thAsAService
  • 124. 124 Best Practices – Mobile Device DO… 1. Lock your device with a password or PIN 2. Back up your data 3. Keep your software up-to-date 4. Enable the ability to remotely wipe your device DO NOT… 1. Send any image/video that you do not want to be public! 2. Use biometrics 3. Jailbreak/Root your device 4. Leave WiFi and Bluetooth on all the time! “If Beyonce’s high powered legal team cannot get pictures removed from the internet …NEITHER CAN YOU!!!” www.FourthAmendmentAsAService.org - @4thAsAService
  • 125. 125 Best Practices – Tools Password Managers • Lastpass, 1Password, Keypass Remote Wipe Utilities • iCloud, Android Device Manager Browser Plugins • Privacy Badger, uBlock Origin, HTTPS everywhere VPN Clients • Private Internet Access, PrivateXPN, IP Vanish AntiVirus Packages • Windows Defender, Avast, AVG www.FourthAmendmentAsAService.org - @4thAsAService
  • 126. 126 LAB – Browser Plugins •Setup Privacy Badger •Setup uBlock Origin Time: 30 Minutes Materials: Computer and Internet Connection Cost: $0.00 www.FourthAmendmentAsAService.org - @4thAsAService
  • 129. 129 QUESTIONS AND CONTACT Contact Us at: www.FourthAsAService.org @4thAsAService James.Madison@FourthAmendmentAsAService.org www.FourthAmendmentAsAService.org - @4thAsAService
  • 130. 130 RESOURCES & SOURCES RESOURCES – Include any resources referenced in the presentation and any additional sources for later reading Fourth Amendment As A Service – www.fourthamendmentasaservice.org Fourth Amendment As A Service Twitter – www.twitter.com/4thAsAServce Surveillance Self-Defense - https://ssd.eff.org/ SOURCES – Include ALL sources for content, images, and intellectual property James Madison Portrait - John Vanderlyn (1775–1852) - Ths White House Historical Association- Ths White House Historical Association. the painting is in the White House collection[1] Flat Icon – Open Book - http://www.flaticon.com/authors/zlatko-najdenovski Flat Icon – Map - http://www.flaticon.com/authors/madebyoliver Flat Icon Clock - http://www.flaticon.com www.FourthAmendmentAsAService.org - @4thAsAService