Successfully reported this slideshow.
Your SlideShare is downloading. ×

Threat modeling librarian freedom conference

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 83 Ad
Advertisement

More Related Content

Viewers also liked (20)

Advertisement

Similar to Threat modeling librarian freedom conference (20)

Recently uploaded (20)

Advertisement

Threat modeling librarian freedom conference

  1. 1. Threat Modeling Library Freedom Edition Morgan Marquis-Boire & Eva Galperin @headhntr @evacide
  2. 2. Who are we?
  3. 3. What are we talking about? What the hell is threat modeling? How do you do it? What makes this trickier than it looks?
  4. 4. Librarians are doing it for themselves
  5. 5. How not to go crazy
  6. 6. What the hell is threat modeling? 111sdgisjfoisejfoijs11. What do you want to protect?kok 1. What do you want to protect? 2.1. What do you want to protect? ASSETS1. What do you want to protect 1. What do you want to protect?
  7. 7. What the hell is threat modeling? 111sdgisjfoisejfoijs11. What do you want to protect?kok 1. What do you want to protect? 2.1. What do you want to protect? ASSETS1. What do you want to protect 1. What do you want to protect? 2. Who do you want to protect it from?
  8. 8. What the hell is threat modeling? 111sdgisjfoisejfoijs11. What do you want to protect?kok 1. What do you want to protect? 2.1. What do you want to protect? ASSETS1. What do you want to protect 1. What do you want to protect? 2. Who do you want to protect it from? 3. How likely is it you will need to protect it?
  9. 9. What the hell is threat modeling? 111sdgisjfoisejfoijs11. What do you want to protect?kok 1. What do you want to protect? 2.1. What do you want to protect? ASSETS1. What do you want to protect 1. What do you want to protect? 2. Who do you want to protect it from? 3. How likely is it you will need to protect it? 4. How bad are the consequences if you fail?
  10. 10. What the hell is threat modeling? 111sdgisjfoisejfoijs11. What do you want to protect?kok 1. What do you want to protect? 2.1. What do you want to protect? ASSETS1. What do you want to protect 1. What do you want to protect? 2. Who do you want to protect it from? 3. How likely is it you will need to protect it? 4. How bad are the consequences if you fail? 5. How much trouble are you willing to go through in order to prevent those consequences?
  11. 11. What do you need to know? Assets Adversary Threat Capability Risk
  12. 12. Surveillance is magic.
  13. 13. VS
  14. 14. COST = $0
  15. 15. COST = $$
  16. 16. Replenishing the minibar? Or...
  17. 17. COST = $$$
  18. 18. COST = PRICELESS
  19. 19. Those are the types of actors, but who are the players?
  20. 20. High End FVEY - US / UK / CA / AU / NZ ISRAEL CHINA RUSSIA FRANCE etc etc etc etc
  21. 21. Artisanal, Small-Batch, Locally made, home grown...
  22. 22. Commercial Market ● Law Enforcement ● Intelligence agencies ● Security companies
  23. 23. Pay for tools
  24. 24. Pay per job
  25. 25. Gotta get paid, yo
  26. 26. Attacker resources vs $$$$ vs target value
  27. 27. Surveillance Starts at Home
  28. 28. Stalkers
  29. 29. “When we share information, we are building power of our own. Potential harassers may deterred by the thought that we are both capable of and willing to turn the eye of internet surveillance back on them.” Liz Henry, Model View Culture Investigation Online: Gathering Information to Assess Risk
  30. 30. Amina Araaf: a gay girl in Damascus
  31. 31. Tom MacMaster: middle aged guy in Scotland
  32. 32. Domestic abuser
  33. 33. I smell a RAT
  34. 34. StealthGenie
  35. 35. Other kinds of criminals
  36. 36. “Before his gauche upload, he posted a picture of his lobster salad and tagged the restaurant.” New York Post
  37. 37. Hey teacher, leave those kids alone
  38. 38. “One day soon, home room teachers in your local middle and high schools may stop scanning rows of desks and making each student yell out ‘Here!’ during a morning roll call. Instead, small cards, or tags, carried by each student will transmit a unique serial number via radio signal to an electronic reader near the school door.” AT&T advertising brochure
  39. 39. The blended threat landscape Not discrete categories: many delicious flavors!
  40. 40. Risk
  41. 41. Different appetites for risk
  42. 42. Meet the nihilists
  43. 43. Alaa Abdel Fattah says “Come at me, bro.”
  44. 44. Meet the vegans
  45. 45. Further reading What Every Librarian Should Know About HTTPS: https://www.eff.org/deeplinks/2015/05/what-every-librarian-needs-know-about- https Surveillance Self Defense: https://ssd.eff.org. COMSEC: Beyond Encryption: https://grugq.github.io/presentations/COMSEC%20beyond%20encryption.pdf Digital First Aid Kit: http://digitaldefenders.org/digitalfirstaid/

Editor's Notes

  • On January 12, 2010, the same day as Google announced about the aurora targeted attacks, it was announced that gmail traffic would be encrypted by default. Since that time, facebook, twitter, and recently Yahoo have moved to using HTTPS traffic by default. Skype has provided encypted voice calls for many years.

    In addition to this, people like The Tor Project, The EFF’s HTTPS Everywhere plugin, Whisper Systems providing encrypted voice and text messaging means that passive sniffing of traffic has started to yield less interesting results. It’s still useful, in order to surveill persons of interest that have decent security understanding, active targeting becomes necessary.

  • Computer viruses were just something that happened to computers and people shrugged their shoulders and figured they’d have to reinstall. Now this is fine if malware isn’t targeted and indeed, you’ve become part of a viagra spam botnet, however, it’s problematic for people that discover that they’ve been targeted by a nation-state.

    Because...
  • Computer viruses were just something that happened to computers and people shrugged their shoulders and figured they’d have to reinstall. Now this is fine if malware isn’t targeted and indeed, you’ve become part of a viagra spam botnet, however, it’s problematic for people that discover that they’ve been targeted by a nation-state.

    Because...
  • Cyber mercenaries using the police tools sold to repressive governments

    In fact the Turkmenistan secret service and the Australian police use the same tool!
  • only sell to military
  • Computer viruses were just something that happened to computers and people shrugged their shoulders and figured they’d have to reinstall. Now this is fine if malware isn’t targeted and indeed, you’ve become part of a viagra spam botnet, however, it’s problematic for people that discover that they’ve been targeted by a nation-state.

    Because...
  • Hammad Akbar was fined $500k by the district court in Virginia in December of last year for selling and distributing “StealthGenie.”
  • 'Please Rob Me' aggregates and streams location check-ins into a list of 'all those empty homes out there,' and describes the recently-shared locations as 'new opportunities.'
  • a Texas school district just begun implanting the devices on student identification cards to monitor pupils’ movements on campus, and to track them as they come and go from school.
    Tagging school children with RFID chips is uncommon, but not new. A federally funded preschool in Richmond, California, began embedding RFID chips in students’ clothing in 2010. And an elementary school outside of Sacramento, California, scrubbed a plan in 2005 amid a parental uproar. And a Houston, Texas, school district began using the chips to monitor students on 13 campuses in 2004.
  • Cyber mercenaries using the police tools sold to repressive governments

    In fact the Turkmenistan secret service and the Australian police use the same tool!
  • Cyber mercenaries using the police tools sold to repressive governments

    In fact the Turkmenistan secret service and the Australian police use the same tool!

×