0
Knowing Me, Knowing You (the Dangers of Social Networks)
Introduction <ul><li>My Name is Marie Boran </li></ul><ul><li>29 years of age </li></ul><ul><ul><ul><li>Born 27th July 198...
I Like <ul><li>Travel </li></ul><ul><ul><ul><li>Paris  </li></ul></ul></ul><ul><ul><ul><li>New York  </li></ul></ul></ul><...
My Blusher
Home
Home
My Parents
My Dad Worked Here <ul><li>Financial Director for Oglesby & Butler </li></ul><ul><ul><li>Resigned 31st March 2008 </li></u...
Work <ul><li>Technology Journalist </li></ul><ul><ul><ul><li>SiliconRepublic.com </li></ul></ul></ul><ul><ul><ul><li>The I...
Education <ul><li>St Leo’s College Carlow </li></ul><ul><ul><li>University College Dublin </li></ul></ul><ul><ul><li>BSc C...
In 2008 <ul><li>I was voted Technology Journalist of the Year </li></ul>
In 2008 <ul><li>Someone Stole My Identity </li></ul>
How Did I Steal Marie’s ID?
LinkedIN
MySpace
Amazon Wish List
Date Of Birth
PhotoSynth
PhotoSynth
General Register Office
With That Information I Got
I Could Then Get
Which In Turn Allows me to
But ..
Maybe Not
Automating the Attack
Automating the Attack – 123People
Automating the Attack – 123People
Automating the Attack – Friendscall.me
Automating the Attack – Knowem.com
Automating the Attack – Pipl.com
Automating the Attack - Maltego
Automating the Attack - Maltego
Automating the Attack - Maltego
Automating the Attack - Maltego
Automating the Attack – Maltego
<ul><li>Personal Data Can Reside on Servers not in EU </li></ul><ul><ul><ul><ul><ul><li>Covered by Data Protection Act? </...
<ul><li>Beware of Social Networks </li></ul><ul><ul><ul><li>Friends Can Leak Your Information </li></ul></ul></ul><ul><ul>...
<ul><li>Virtual World Can Impact Real World </li></ul><ul><ul><ul><ul><ul><li>Bullying </li></ul></ul></ul></ul></ul><ul><...
<ul><li>FBI Warns of Asian-Specific Telephone Extortion Scam </li></ul><ul><ul><ul><li>Network World 10th June ’09 </li></...
<ul><li>Tweets Lead to Burglary ? </li></ul>Real World Example
Real World Examples
<ul><li>What Goes on the Net stays on the Net </li></ul><ul><li>Friends Can Compromise You </li></ul><ul><li>There Are No ...
<ul><li>Review How You Identify  </li></ul><ul><ul><li>Remote Users </li></ul></ul><ul><ul><ul><li>Staff </li></ul></ul></...
Questions ?
Upcoming SlideShare
Loading in...5
×

Knowing Me Knowing You

3,664

Published on

Presentation on how Brian Honan stole the identity of an Irish journalist using only information found on the Internet.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,664
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
36
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Knowing Me Knowing You"

  1. 1. Knowing Me, Knowing You (the Dangers of Social Networks)
  2. 2. Introduction <ul><li>My Name is Marie Boran </li></ul><ul><li>29 years of age </li></ul><ul><ul><ul><li>Born 27th July 1980 </li></ul></ul></ul><ul><li>Single </li></ul>
  3. 3. I Like <ul><li>Travel </li></ul><ul><ul><ul><li>Paris </li></ul></ul></ul><ul><ul><ul><li>New York </li></ul></ul></ul><ul><li>Music </li></ul><ul><ul><ul><li>Especially Kraftwerk </li></ul></ul></ul><ul><li>Knitting </li></ul><ul><li>Photography </li></ul><ul><li>Science Fiction </li></ul><ul><li>Paranormal </li></ul>
  4. 4. My Blusher
  5. 5. Home
  6. 6. Home
  7. 7. My Parents
  8. 8. My Dad Worked Here <ul><li>Financial Director for Oglesby & Butler </li></ul><ul><ul><li>Resigned 31st March 2008 </li></ul></ul>
  9. 9. Work <ul><li>Technology Journalist </li></ul><ul><ul><ul><li>SiliconRepublic.com </li></ul></ul></ul><ul><ul><ul><li>The Irish Independent </li></ul></ul></ul><ul><ul><ul><li>GadgetRepublic.com </li></ul></ul></ul><ul><li>Previously </li></ul><ul><ul><ul><li>Court Editor Merril Legal Solutions </li></ul></ul></ul><ul><ul><ul><li>PC Live Magazine </li></ul></ul></ul><ul><ul><ul><li>Dublin Anna Livia FM </li></ul></ul></ul>
  10. 10. Education <ul><li>St Leo’s College Carlow </li></ul><ul><ul><li>University College Dublin </li></ul></ul><ul><ul><li>BSc Computer Science </li></ul></ul><ul><ul><li>Griffith College Dublin </li></ul></ul><ul><ul><li>BA Journalism </li></ul></ul><ul><ul><li>Dublin Institute of Technology </li></ul></ul><ul><ul><ul><li>Digital Media Technologies </li></ul></ul></ul>
  11. 11. In 2008 <ul><li>I was voted Technology Journalist of the Year </li></ul>
  12. 12. In 2008 <ul><li>Someone Stole My Identity </li></ul>
  13. 13. How Did I Steal Marie’s ID?
  14. 14. LinkedIN
  15. 15. MySpace
  16. 16. Amazon Wish List
  17. 17. Date Of Birth
  18. 18. PhotoSynth
  19. 19. PhotoSynth
  20. 20. General Register Office
  21. 21. With That Information I Got
  22. 22. I Could Then Get
  23. 23. Which In Turn Allows me to
  24. 24. But ..
  25. 25. Maybe Not
  26. 26. Automating the Attack
  27. 27. Automating the Attack – 123People
  28. 28. Automating the Attack – 123People
  29. 29. Automating the Attack – Friendscall.me
  30. 30. Automating the Attack – Knowem.com
  31. 31. Automating the Attack – Pipl.com
  32. 32. Automating the Attack - Maltego
  33. 33. Automating the Attack - Maltego
  34. 34. Automating the Attack - Maltego
  35. 35. Automating the Attack - Maltego
  36. 36. Automating the Attack – Maltego
  37. 37. <ul><li>Personal Data Can Reside on Servers not in EU </li></ul><ul><ul><ul><ul><ul><li>Covered by Data Protection Act? </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Sites May Not Have Stringent Privacy Policies </li></ul></ul></ul><ul><li>Data is Permanent </li></ul><ul><ul><ul><ul><li>What Goes on the Internet Stays on the Internet </li></ul></ul></ul></ul>Lessons Learnt (1)
  38. 38. <ul><li>Beware of Social Networks </li></ul><ul><ul><ul><li>Friends Can Leak Your Information </li></ul></ul></ul><ul><ul><ul><li>Data Matching Provides Overall Picture </li></ul></ul></ul><ul><ul><ul><li>You May Not Own Your Private Data </li></ul></ul></ul><ul><ul><ul><li>Review Privacy Statements </li></ul></ul></ul><ul><ul><ul><li>Terms of Use </li></ul></ul></ul>Lessons Learnt (2)
  39. 39. <ul><li>Virtual World Can Impact Real World </li></ul><ul><ul><ul><ul><ul><li>Bullying </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Burglary </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Stalking </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Physical Attacks </li></ul></ul></ul></ul></ul>Other Lessons Learnt
  40. 40. <ul><li>FBI Warns of Asian-Specific Telephone Extortion Scam </li></ul><ul><ul><ul><li>Network World 10th June ’09 </li></ul></ul></ul><ul><li>Criminals Gleaned Personal Details from Internet </li></ul><ul><li>Threatened Victims </li></ul><ul><li>Demand Money </li></ul>Real World Example
  41. 41. <ul><li>Tweets Lead to Burglary ? </li></ul>Real World Example
  42. 42. Real World Examples
  43. 43. <ul><li>What Goes on the Net stays on the Net </li></ul><ul><li>Friends Can Compromise You </li></ul><ul><li>There Are No Secret Questions </li></ul><ul><li>Virtual World Impacts Real World </li></ul><ul><li>No Umbilical Chord = No ID </li></ul>Remember
  44. 44. <ul><li>Review How You Identify </li></ul><ul><ul><li>Remote Users </li></ul></ul><ul><ul><ul><li>Staff </li></ul></ul></ul><ul><ul><ul><li>Customers </li></ul></ul></ul><ul><li>Ensure Your Secret Questions Are Secret </li></ul><ul><li>Revise Acceptable Usage Policies For Social Networking Sites </li></ul><ul><li>Security Awareness is Key </li></ul>Applying This to Your Environment
  45. 45. Questions ?
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×