SlideShare a Scribd company logo
Ernest Staats
MS Information Assurance, CISSP, CEH, CWNA,
Security+, MCSE, CNA, I-Net+, Network+, Server+, A​+
What does Your Phone Know?
Text messages,even deleted ones
Wordsin yourpersonaldictionary
Facebookcontacts
Tens ofthousandsoflocation
pings
Everywebsite visited
Whatlocationsyouhavemapped
(SwiftKey- Personalization)
Emailsgoing backa month
YourphotoswithGeolocationdataattached–even if
deleted
How manytimesyouhavechecked youremail
Anyapplicationever installedon yourdevice
Mobile Issues /Demo
Whois calling you
Justgoing toa websiteone cansteal all yourinfo:
Contacts, textmessages,photos,videos, creditcardinformation
PIN security–secureor easytodo1 handed
Cameraandmiccanbeturnedon withoutpermission
Before / After Digital Brain is MIA
Mobile / Laptop Security
Strong passcode (No Fingerprint)
Lock on sleep
Encrypt
“Find my phone – Device ”
Treat Like Cash
Disable Location tracking and history
Disable WiFi and Bluetooth
Check your email accounts often
https://haveibeenpwned.com/
TURN OFF WiFi/Bluetooth
Indicators of a Hacked Mobile
Battery Life & Temp
Apps behaving strangely
You or your contacts receive strange texts
Your call or message have some
unknown entries
Background noise
electrical interference when not getting txt/call
Excessive data usage
Does not include
StingRay, Hailstorm / DRT box
GEO-TAGGING
Adam Savage, of “MythBusters,” took a
photo then posted the photo to his Twitter
account
The tweet revealed:
1. Exact location of home
2. The vehicle he drives
3. The time he leaves for
work
Photo Demo:
http://regex.info/exif.cgi
TURN OFF GPS / Tracking
Before Crossing The Border
• Register with Smart Traveler Enrollment Program https://step.state.gov/step/
• First Backup Device and settings
• Establish a VPN account i.e. https://www.privateinternetaccess.com
• Make sure it is Encrypted Mobile, Laptop, & USB drive
• Factory Reset / reimage
– Configure VPN you established before
• Encrypt mobile
• Strong passcode six digit at least (No Fingerprint)
• Use a Secure phone - Silent Circle Phone “Blackphone”
https://goo.gl/WnXfOa
• Turn Off WiFi and Bluetooth
– Forget/ Remove all Wireless and Bluetooth networks (all the time)
• Disable Location tracking and history https://maps.google.com/locationhistory/b/0
• Delete all History before stepping off plane
• Turn off all location and tracking information
• Only user your Charger
• Setup a Temp email i.e. PBJapple@gmail.com Forward email if needed
Public “Free” WiFi – Tips
Use VPN tunnel https://www.privateinternetaccess.com/
Pay attention to certificate warnings
Be protected against dangerous sites
Use HTTPS (SSL) links if possible
Use multi-factor authentication
When in doubt, use data plan (SS7 is an issue)
Best Practices / Recommendations
APPS - Your Data – Your Privacy
Think twice before installing latest social app
Explore privacy settings within each app
Specify what permissions each app should have
(e.g. address book, location, microphone, etc.)
iCloud Backup? Photos?
Choose to back up or not to Google
(It is searchable)
Who’s doing what with my data?
Prevention is Best
Antivirus
Don’t “root” or “jailbreak”
Use trusted app sources
Watch for certificate warnings
Allow “Verify Apps”
Specify app permissions
Use Blur https://www.abine.com/index.html
Encrypted text messaging Telegram
https://telegram.org/
Cover your APPS!
Environmental Awareness
Social Media Exposure Demo
Location Aware: Everything has a Location
https://www.sociospyder.com/
http://www.pathar.net/clients.html
Maltego https://www.paterva.com
Cyberstalking SitesPeekYou
Give a lot ofInformationfor free just wait andscroll down
http://www.peekyou.com/
Pipl
Search fora person using nameandlocationhttps://pipl.com/
Check Mate
Search foraperson using nameandlocation
https://www.instantcheckmate.com
Spokeo
Searches lots ofpublic Records to find informationabout someone
http://www.spokeo.com
US Search
Search fora person using emailnameor user name
http://www.ussearch.com/
Security Tips
Don'tsign up using anothersocialnetworking account
Lockdownthosesocialnetwork privacysettings
Thinkbefore youpost
Lie. About.Everything
Never Plug ina USBdeviceto anuntrusted charger
Use a passwordmanagerandtwo-factorauthentication
Disposableemail DoNotTrackMe, and Yahoodisposable emails
Melt Mail
Use secure browser suchasFirefox with listed addons
Create personal andprofessional personas
Delete yourInformationonGoogle
Googleads https://www.google.com/settings/u/0/ads/authenticated
Privacyhttps://myaccount.google.com/
Identity Protection Tips
Personal Information:
Askquestionsbefore you share it
Lockitup
Shredit before you put intrash
Passwordprotect it
UseAnti-Virus,Anti-Malware,Web-filter
Freeze Credit (for all family members)
Check all family members digital foot print
Doxinghandout
Set Google Alerts for family
https://www.google.com/alerts#
Recommended APPS
Tor Browsers
Android https://play.google.com/store/apps/details?id=org.torproject.android&hl=en
iOS https://itunes.apple.com/us/app/red-onion-tor-powered-web/id829739720?mt=8
VPN https://www.privateinternetaccess.com/
Use Blur to mask email, Caller ID, and credit cards
Andorid AV: Avast Mobile Security
iOS AV: Avira Mobile Security for iOS
Browser Plugin’s / addons Disconnect
See list for Firefox
Telegram or BBM (SS7 Issues)
Cell Phone Booster Detector
Use own keyboard
Tails Live CD https://tails.boum.org/
on Encrypted USB http://www.kingston.com/us/usb/encrypted_security/dtvp30
After Crossing The Border
Backup any photos First
Factory Reset / re-image
– With Laptops Delete Drive or Destroy drive
Turn Off WiFi and Bluetooth
– Forget / Remove all Wireless and Bluetooth networks (all the time)
Delete all History before stepping off plane
Keep all location and tracking information off
Change Passwords for any site or system you used out of the country
i.e. email, shopping sites, credit card sites, or banking (I do not recommend banking
out of the country if avoidable. )
Check your email https://haveibeenpwned.com/
Review
More Resources below
Parent Control software
Filtering software:
On home router Open DNS Family Shield: http://goo.gl/7SFDXa
On Mobile Devices: Mobicip Safe Browser http://www.mobicip.com/pricing
On Social Media: Social Shield: http://www.socialshield.com/
Stealth mobile device Tracking / Filtering http://cell-phone-parental-control-
software-review.toptenreviews.com/
Put Google Alert on Your Name
This is an incredibly easy way to stay on top of what's being said about you online. Go to:
http://www.google.com/alerts and enter your name, and variations of your name, with quotation marks
around it... https://www.youtube.com/watch?v=eLcTF0YyK5Y

More Related Content

What's hot

Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
Camille Hazellie
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
teachesict
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Leelet1121
 
Information Security for the Jobseeker
Information Security for the JobseekerInformation Security for the Jobseeker
Information Security for the Jobseeker
Allison Peirce
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Online safety
Online safetyOnline safety
Online safety
Jason Murray
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
olususi kayode oluyemi
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
Naval OPSEC
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
Ernest Staats
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
ABHAY PATHAK
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
Naval OPSEC
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
Zoro18
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
GronHatchat
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
GronHatchat
 
Quiz
QuizQuiz
Quiz
smithz
 
Spyware
SpywareSpyware
Spyware
guest6fde72
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
Bijay Acharya
 

What's hot (20)

Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Information Security for the Jobseeker
Information Security for the JobseekerInformation Security for the Jobseeker
Information Security for the Jobseeker
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Online safety
Online safetyOnline safety
Online safety
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
 
Quiz
QuizQuiz
Quiz
 
Spyware
SpywareSpyware
Spyware
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
 

Similar to Border crossing mobile social media life-saving security tips

Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
Tjylen Veselyj
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
defconmoscow
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
Naval OPSEC
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
Tapan Khilar
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
Jeannine Hamilton
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
Jose L. Quiñones-Borrero
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
primomh
 
LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
InfraVision
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
Axle-IT
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 

Similar to Border crossing mobile social media life-saving security tips (20)

Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail6.3. How to get out of an inprivacy jail
6.3. How to get out of an inprivacy jail
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 

More from Ernest Staats

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
Ernest Staats
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
Ernest Staats
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
Ernest Staats
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
Ernest Staats
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbook
Ernest Staats
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
Ernest Staats
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
Ernest Staats
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
Ernest Staats
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
Ernest Staats
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
Ernest Staats
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
Ernest Staats
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
Ernest Staats
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
Ernest Staats
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
Ernest Staats
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
Ernest Staats
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
Ernest Staats
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
Ernest Staats
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
Ernest Staats
 

More from Ernest Staats (20)

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbook
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Border crossing mobile social media life-saving security tips

  • 1. Ernest Staats MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A​+
  • 2. What does Your Phone Know? Text messages,even deleted ones Wordsin yourpersonaldictionary Facebookcontacts Tens ofthousandsoflocation pings Everywebsite visited Whatlocationsyouhavemapped (SwiftKey- Personalization) Emailsgoing backa month YourphotoswithGeolocationdataattached–even if deleted How manytimesyouhavechecked youremail Anyapplicationever installedon yourdevice
  • 3. Mobile Issues /Demo Whois calling you Justgoing toa websiteone cansteal all yourinfo: Contacts, textmessages,photos,videos, creditcardinformation PIN security–secureor easytodo1 handed Cameraandmiccanbeturnedon withoutpermission
  • 4. Before / After Digital Brain is MIA Mobile / Laptop Security Strong passcode (No Fingerprint) Lock on sleep Encrypt “Find my phone – Device ” Treat Like Cash Disable Location tracking and history Disable WiFi and Bluetooth Check your email accounts often https://haveibeenpwned.com/
  • 6. Indicators of a Hacked Mobile Battery Life & Temp Apps behaving strangely You or your contacts receive strange texts Your call or message have some unknown entries Background noise electrical interference when not getting txt/call Excessive data usage Does not include StingRay, Hailstorm / DRT box
  • 7. GEO-TAGGING Adam Savage, of “MythBusters,” took a photo then posted the photo to his Twitter account The tweet revealed: 1. Exact location of home 2. The vehicle he drives 3. The time he leaves for work Photo Demo: http://regex.info/exif.cgi
  • 8. TURN OFF GPS / Tracking
  • 9. Before Crossing The Border • Register with Smart Traveler Enrollment Program https://step.state.gov/step/ • First Backup Device and settings • Establish a VPN account i.e. https://www.privateinternetaccess.com • Make sure it is Encrypted Mobile, Laptop, & USB drive • Factory Reset / reimage – Configure VPN you established before • Encrypt mobile • Strong passcode six digit at least (No Fingerprint) • Use a Secure phone - Silent Circle Phone “Blackphone” https://goo.gl/WnXfOa • Turn Off WiFi and Bluetooth – Forget/ Remove all Wireless and Bluetooth networks (all the time) • Disable Location tracking and history https://maps.google.com/locationhistory/b/0 • Delete all History before stepping off plane • Turn off all location and tracking information • Only user your Charger • Setup a Temp email i.e. PBJapple@gmail.com Forward email if needed
  • 10. Public “Free” WiFi – Tips Use VPN tunnel https://www.privateinternetaccess.com/ Pay attention to certificate warnings Be protected against dangerous sites Use HTTPS (SSL) links if possible Use multi-factor authentication When in doubt, use data plan (SS7 is an issue) Best Practices / Recommendations
  • 11. APPS - Your Data – Your Privacy Think twice before installing latest social app Explore privacy settings within each app Specify what permissions each app should have (e.g. address book, location, microphone, etc.) iCloud Backup? Photos? Choose to back up or not to Google (It is searchable) Who’s doing what with my data?
  • 12. Prevention is Best Antivirus Don’t “root” or “jailbreak” Use trusted app sources Watch for certificate warnings Allow “Verify Apps” Specify app permissions Use Blur https://www.abine.com/index.html Encrypted text messaging Telegram https://telegram.org/ Cover your APPS!
  • 14. Social Media Exposure Demo Location Aware: Everything has a Location https://www.sociospyder.com/ http://www.pathar.net/clients.html Maltego https://www.paterva.com
  • 15. Cyberstalking SitesPeekYou Give a lot ofInformationfor free just wait andscroll down http://www.peekyou.com/ Pipl Search fora person using nameandlocationhttps://pipl.com/ Check Mate Search foraperson using nameandlocation https://www.instantcheckmate.com Spokeo Searches lots ofpublic Records to find informationabout someone http://www.spokeo.com US Search Search fora person using emailnameor user name http://www.ussearch.com/
  • 16. Security Tips Don'tsign up using anothersocialnetworking account Lockdownthosesocialnetwork privacysettings Thinkbefore youpost Lie. About.Everything Never Plug ina USBdeviceto anuntrusted charger Use a passwordmanagerandtwo-factorauthentication Disposableemail DoNotTrackMe, and Yahoodisposable emails Melt Mail Use secure browser suchasFirefox with listed addons Create personal andprofessional personas Delete yourInformationonGoogle Googleads https://www.google.com/settings/u/0/ads/authenticated Privacyhttps://myaccount.google.com/
  • 17. Identity Protection Tips Personal Information: Askquestionsbefore you share it Lockitup Shredit before you put intrash Passwordprotect it UseAnti-Virus,Anti-Malware,Web-filter Freeze Credit (for all family members) Check all family members digital foot print Doxinghandout Set Google Alerts for family https://www.google.com/alerts#
  • 18. Recommended APPS Tor Browsers Android https://play.google.com/store/apps/details?id=org.torproject.android&hl=en iOS https://itunes.apple.com/us/app/red-onion-tor-powered-web/id829739720?mt=8 VPN https://www.privateinternetaccess.com/ Use Blur to mask email, Caller ID, and credit cards Andorid AV: Avast Mobile Security iOS AV: Avira Mobile Security for iOS Browser Plugin’s / addons Disconnect See list for Firefox Telegram or BBM (SS7 Issues) Cell Phone Booster Detector Use own keyboard Tails Live CD https://tails.boum.org/ on Encrypted USB http://www.kingston.com/us/usb/encrypted_security/dtvp30
  • 19. After Crossing The Border Backup any photos First Factory Reset / re-image – With Laptops Delete Drive or Destroy drive Turn Off WiFi and Bluetooth – Forget / Remove all Wireless and Bluetooth networks (all the time) Delete all History before stepping off plane Keep all location and tracking information off Change Passwords for any site or system you used out of the country i.e. email, shopping sites, credit card sites, or banking (I do not recommend banking out of the country if avoidable. ) Check your email https://haveibeenpwned.com/
  • 21. More Resources below Parent Control software Filtering software: On home router Open DNS Family Shield: http://goo.gl/7SFDXa On Mobile Devices: Mobicip Safe Browser http://www.mobicip.com/pricing On Social Media: Social Shield: http://www.socialshield.com/ Stealth mobile device Tracking / Filtering http://cell-phone-parental-control- software-review.toptenreviews.com/ Put Google Alert on Your Name This is an incredibly easy way to stay on top of what's being said about you online. Go to: http://www.google.com/alerts and enter your name, and variations of your name, with quotation marks around it... https://www.youtube.com/watch?v=eLcTF0YyK5Y

Editor's Notes

  1. Malware is a broad term used to describe software that can damage or enter a computer without the person’s consent or knowledge. Examples are viruses, trojan horses, spyware, and keystroke loggers. Usually Malware presents itself in an e-mail from an unknown sender with a link or an attachment, that once opened can infect your client’s computer by installing a program. This program allows an unauthorized individual to gain access to your client’s computer, email, personal files, etc. By design, malware is difficult to detect. It typically runs in the background unnoticed. Here are a couple of easy ways to reduce the risk of downloading malware: (1) Keep your anti-virus & online security software updated, (2) don’t click any links or open email attachments unless you know who sent it and what it is, and (3) use a pop-up blocker. Phishing – is the illegal attempt to mislead clients into providing personal or financial information, including account numbers, passwords, and SSNs, usually via email, telephone or fake websites. The most common example occurs through email, disguised as one sent from a legitimate financial institution or company such as Schwab or a bank. The email may ask the client to verify recent account activity by clicking the link provided in the e-mail and prompt the client enter his/her login, essentially hijacking the client’s formerly secure username and password. Other subject titles have been “Irregular Activity on Your Schwab Account!” or “Urgent: Account Restricted – Action Required”. These emails highlight some sort of urgency to entice individuals to read them and act immediately. Usually these e-mails are easy to identify upon closer inspection – spelling or grammatical errors, the e-mail address is incorrect (schwab.com.org), or the link is not the official website of the institution. If you or your client receive a phishing attempt, contact your Regional Service Team immediately. Social Engineering – Is another broad term describing an act of psychological manipulation, using human interaction or social skills to obtain or compromise information from an individual or an organization. It applies to many areas but in the one specific to this topic, it is the act of obtaining otherwise secure information by tricking an individual into revealing it. Both phishing and malware rely on social engineering to an extent to be successful. An example is an e-mail from a seemingly sounding legitimate charity or organization asking for a donation – for starving children, the homeless, some social cause to appeal to your humanity. Another example of social engineering is when you receive an e-mail or Facebook message from your college buddy with a subject line of “Long time no see!” with a link or e-mail attachment. Because the email is from someone you know, you may open either one, unknowingly providing access to your computer to the fraudster. Be cautious before you do so; this person may have been hacked as well and unaware the e-mail has been sent on their behalf. If it seems out of the ordinary or uncharacteristic of this person, do not reveal any personal or financial information in the email. This includes following links sent in email. Identity Theft – When we speak of identity theft, we usually think of stolen SSN’s. Here the term is much broader than that The client’s identity is essentially being stolen, when the fraudster hacks into the client’s e-mail and takes on the client’s identity, posing as your client, whether to you, us, or the custodian, with the ultimate goal of perpetuating wire fraud. Do not give sensitive information, such as full account balances, account numbers, etc. to anyone unless you are sure they are indeed who they claim to be and that they should have access to the information. This is not intended to be a scare tactic, rather an emphasis on the overall theme of prevention. You know your clients and their behaviors best. We’re merely stressing the importance of being vigilant with protecting your client’s personal information from these various schemes to prevent e-mail hacking and wire fraud.
  2. IOS From iOS 7 on a new control panel that can quickly turn Bluetooth On or Off.  Simply slide your finger up from the bottom edge of the screen to reveal the new control panel.  Tap the Bluetooth symbol to turn it off or back on again.  However, you cannot Or Open the iPad's settings by touching the icon shaped like gears in motion. The Bluetooth settings are at the top of the left-side menu, just under Wi-Fi. Once you've tapped the Bluetooth settings, you can slide the switch at the top of the screen to turn the service on or off. Once Bluetooth is turned on, all nearby devices that are discoverable will be shown in the list.  You can pair a device by tapping it in the list and pushing the discover button on your device.  Consult the device's manual on how to put it in discoverable mode. Android http://www.howtogeek.com/211186/how-to-disable-google-location-wi-fi-scanning-on-android/
  3. https://www.revealnews.org/article/chicago-and-los-angeles-have-used-dirt-box-surveillance-for-a-decade/ Can be triangulated even if the location services are off http://www.welivesecurity.com/2015/12/16/know-smartphone-compromised/ We must beware of the toxic psychological impact of media and technology on children, adolescents and young adults, particularly as it regards turning them into faux celebrities—the equivalent of lead actors in their own fictionalized life stories. Read more: On Facebook, young people can fool themselves into thinking they have hundreds or thousands of “friends.” They can delete unflattering comments. They can block anyone who disagrees with them or pokes holes in their inflated self-esteem. They can choose to show the world only flattering, sexy or funny photographs of themselves and publicly connect to movie stars and professional athletes and musicians they “like.” Read more: Using Twitter, young people can pretend they are worth “following,” as though they have real-life fans, when all that is really happening is the mutual fanning of false love and false fame. Using computer games, our sons and daughters can pretend they are Olympians, Formula 1 drivers, rock stars or sharpshooters.  And while they can turn off their Wii and Xbox machines and remember they are really in dens and playrooms on side streets and in triple deckers around America, that is after their hearts have raced and heads have swelled with false pride for “being” something they are not. Read more: http://www.foxnews.com/opinion/2013/01/08/are-raising-generation-deluded-narcissists/#ixzz2KB227p5o Cooperative Institutional Research Program CIRP from http://www.heri.ucla.edu/cirpoverview.php
  4. http://regex.info/exif.cgi Go to Jeffrey's Exif Viewer http://regex.info/exif.cgi Photo 1 http://es-es.org/resources/cm2011/photo.JPG Where was the photo what kind of device was used to take the photo Second photo http://es-es.org/resources/cm2011/cropped.jpg Who is in the photo besides the kids? What device was used to take the photo Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work.” The image contained metadata reveling the exact geographical location the photo. Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work.
  5. Steps to take before/after traveling in hostile regions  Backup  Establish a VPN account i.e. https://www.privateinternetaccess.com/  Setup a temporary email account forward normal accounts (Only if needed)  Encrypt  Factor reset  Encrypt  Use a Secure a phone - Silent Circle Phone “Blackphone” https://goo.gl/WnXfOa  Strong passcode six digit at least (No Fingerprint)  Lock on sleep  Set phone to always use VPN  Disable Location tracking and history  Disable WiFi and Bluetooth  Forget / Remove all Wireless and Bluetooth networks  Change passwords for any site accessed out of the country i.e. www.lastpass.com  DO NOT POST about trip until after return  Re-image, Delete, or Destroy any Hard Drive taken out of the country  Check email and credit https://haveibeenpwned.com/ https://www.annualcreditreport.com/index.action GPS Tra Can be triangulated even if the location services are off http://www.welivesecurity.com/2015/12/16/know-smartphone-compromised/ We must beware of the toxic psychological impact of media and technology on children, adolescents and young adults, particularly as it regards turning them into faux celebrities—the equivalent of lead actors in their own fictionalized life stories. Read more: On Facebook, young people can fool themselves into thinking they have hundreds or thousands of “friends.” They can delete unflattering comments. They can block anyone who disagrees with them or pokes holes in their inflated self-esteem. They can choose to show the world only flattering, sexy or funny photographs of themselves and publicly connect to movie stars and professional athletes and musicians they “like.” Read more: Using Twitter, young people can pretend they are worth “following,” as though they have real-life fans, when all that is really happening is the mutual fanning of false love and false fame. Using computer games, our sons and daughters can pretend they are Olympians, Formula 1 drivers, rock stars or sharpshooters.  And while they can turn off their Wii and Xbox machines and remember they are really in dens and playrooms on side streets and in triple deckers around America, that is after their hearts have raced and heads have swelled with false pride for “being” something they are not. Read more: http://www.foxnews.com/opinion/2013/01/08/are-raising-generation-deluded-narcissists/#ixzz2KB227p5o Cooperative Institutional Research Program CIRP from http://www.heri.ucla.edu/cirpoverview.php
  6. Signaling System 7 (SS7)
  7. Strong passcode Lock on sleep Encrypt “Find my phone” Allow “Verify Apps” Review app permissions Review in-app privacy settings Cloud backup settings
  8. http://www.zdnet.com/android-antivirus-comparison-review-malware-symantec-mcafee-kaspersky-sophos-norton-7000019189/ http://www.av-test.org/en/tests/mobile-devices/android/nov-2013/
  9. http://krebsonsecurity.com/2015/12/when-undercover-credit-card-buys-go-bad/ http://www.practicalecommerce.com/articles/91200-23-Tools-for-Social-Media-Monitoring
  10. Recommended Addons for Firefox HTTPS Everywhere HTTPS Everywhere is the king of all privacy addons. It’s developed as a collaboration between the Tor privacy project and the Electronic Frontier Foundation, which is an organization that fights for rights in a digital world. But what is HTTPS? In short, it’s a more secure web-browsing protocol that encrypts all of the web data that’s transmitted between the server and your browser using SSL/TLS. So, even if someone intercepts your connection, they won’t be able to read the data. HTTPS Everywhere forces HTTPS all the time. Even if a particular web page doesn’t support encryption, the addon can get around it by rewriting the requests behind the scenes. It’s a must-have Firefox security addon. Don’t skip it. Disconnect Like Ghostery, Disconnect is an addon that blocks web trackers from gathering your personal information. It’s so good that Popular Science even named it as one of the top 100 innovations in 2013. If that doesn’t earn it a good dose of credibility, I don’t know what will. Because it blocks tracking elements from over 2,000 sources, Disconnect claims to speed up page loading by upwards of 27%. That’s a pretty significant gain, especially because it’s on top of the security and privacy it already offers in the first place. Definitely a keeper. NoScript NoScript is a Firefox security addon that we’ve been recommending since 2008. As the name implies, this addon prevents active scripts from running on websites unless you grant permission to them. Marginally inconvenient, yes, but massively more secure in the long run. Permission is granted by adding trusted domains to your whitelist. Any domains that aren’t on your whitelist will be prevented from running JavaScript or Java, which will help protect you against cross-site scripting attacks, clickjacking attempts, and more. Blur Formerly known as DoNotTrackMe, Blur is one of the best addons for protecting your data. Not only does it block companies from collecting information about you, it also manages and protects your sensitive details like password credentials and payment information. Regarding passwords, Blur will one-click generate touch-to-crack combinations and will immediately encrypt and store them safely for later. Regarding payments, Blur lets you purchase online without ever giving away your credit card information by providing disposable masking credit cards through Abine, Inc. This feature is only available for premium users, which can be purchased for $5 per month. KeeFox Most modern browsers have built-in password management, but they’re rarely as good as dedicated solutions. Take KeeFox for instance, which is the browser variant of the renowned password manager, KeePass. Start using it if you aren’t already. In essence, KeeFox is a full-blown replacement for the built-in Firefox password manager. Just be aware that KeeFox will not work correctly if you have Firefox set to clear passwords every time it closes. LastPass for Firefox is a well-known alternative to KeeFox and it works great as well. However, KeeFox is open source and completely free, so it’s the one I prefer. Feel free to use whichever one you think suits you best. BetterPrivacy When you visit the addon page for BetterPrivacy, you might notice that it hasn’t been updated since early 2012. Don’t let that turn you away. Despite being three years in limbo, this addon still works just as it’s supposed to. What does it do? It combats the long-term super-cookies, also known as Flash cookies, that companies use for perpetual tracking of your web activity. BetterPrivacy lets you view and destroy these super-cookies, which is something most browsers won’t do on their own. Self-Destructing Cookies As far as regular cookies are concerned, most browsers offer a primitive “clear all cookies” function that can be done manually or whenever the browser closes. What if you want a bit more flexibility? Then you should install Self-Destructing Cookies. This addon allows cookies to persist until you close the tab. When a tab is closed, all relevant cookies are destroyed right on the spot. This method of dealing with cookies is especially effective against Zombie-cookies and Evercookies. If there are any cookies you want to keep, you can whitelist them. Bloody Vikings! Are you tired of email spam? Starting today, you can kiss email spam goodbye thanks to the advent of the Bloody Viking! addon. Look past the strange name and you’ll see a wonderful tool: one that makes it easy for you to use temporary email addresses when signing up for websites. Using services like 10MinuteMail and AnonBox, this addon provides you with a limited-time inbox where you can accept confirmation emails without risking the sanctity of your actual inbox. After a given period of time, the provided inbox implodes and disappears. Clean Links Lastly we have Clean Links, a humble little addon that’s been in development since 2011. Its premise is simple: whenever it detects an obfuscated or nested link — such as you might find with shady redirection or affiliate products — it replaces it with the clean, straight version. Not much else to say about this one except that you can now rest easy when clicking on links, knowing that you’ll be able to catch dodgy links before you actually click on them.
  11. Monitor your credit report for any suspicious activity by ordering free credit reports at Annualcreditreport.com, You're entitled to a free report from Equifax, Experian and TransUnion every 12 months. Consider a permanent security freeze A permanent security freeze puts your credit report under your control: No one can access it to open up new credit accounts in your name without your permission. Businesses cannot access your credit report unless you unlock it, and identity thieves can't set up new credit accounts in your name unless they can present the credentials required to unlock it. Equifax, Experian and TransUnion 1. Go to https://www.google.com/alerts# 2. "Set up search alerts for your data". 3. Click the check boxes for either "Your name", "Your email", or enter a custom search alert for your phone number, address, or any other personal data you want alerts on. 4. Choose how often you want to receive personal data alerts by clicking on the drop down box next to the words "How Often". 5. Click the "Save" button
  12. Tor Browsers Android https://play.google.com/store/apps/details?id=org.torproject.android&hl=en iOS https://itunes.apple.com/us/app/red-onion-tor-powered-web/id829739720?mt=8 VPN https://www.privateinternetaccess.com/ Telegram or BBM (SS7 Issues) Cell Phone Booster Detector Blur Device Sync Automatically sync passwords, logins, and masked info across all of your devices, giving you instant access to every account, everywhere. Secure Backup Get maximum security and avoid the risk of storing your Blur data only on your computer - backup your accounts and passwords on remote servers. Masked Cards Protect yourself from hackers and hidden charges by creating unlimited anonymous, disposable credit card numbers for your online purchases. Masked Phone Masked Email Block Hidden trackers Recommended Addons for Firefox HTTPS Everywhere HTTPS Everywhere is the king of all privacy addons. It’s developed as a collaboration between the Tor privacy project and the Electronic Frontier Foundation, which is an organization that fights for rights in a digital world. But what is HTTPS? In short, it’s a more secure web-browsing protocol that encrypts all of the web data that’s transmitted between the server and your browser using SSL/TLS. So, even if someone intercepts your connection, they won’t be able to read the data. HTTPS Everywhere forces HTTPS all the time. Even if a particular web page doesn’t support encryption, the addon can get around it by rewriting the requests behind the scenes. It’s a must-have Firefox security addon. Don’t skip it. Disconnect Like Ghostery, Disconnect is an addon that blocks web trackers from gathering your personal information. It’s so good that Popular Science even named it as one of the top 100 innovations in 2013. If that doesn’t earn it a good dose of credibility, I don’t know what will. Because it blocks tracking elements from over 2,000 sources, Disconnect claims to speed up page loading by upwards of 27%. That’s a pretty significant gain, especially because it’s on top of the security and privacy it already offers in the first place. Definitely a keeper. NoScript NoScript is a Firefox security addon that we’ve been recommending since 2008. As the name implies, this addon prevents active scripts from running on websites unless you grant permission to them. Marginally inconvenient, yes, but massively more secure in the long run. Permission is granted by adding trusted domains to your whitelist. Any domains that aren’t on your whitelist will be prevented from running JavaScript or Java, which will help protect you against cross-site scripting attacks, clickjacking attempts, and more. Blur Formerly known as DoNotTrackMe, Blur is one of the best addons for protecting your data. Not only does it block companies from collecting information about you, it also manages and protects your sensitive details like password credentials and payment information. Regarding passwords, Blur will one-click generate touch-to-crack combinations and will immediately encrypt and store them safely for later. Regarding payments, Blur lets you purchase online without ever giving away your credit card information by providing disposable masking credit cards through Abine, Inc. This feature is only available for premium users, which can be purchased for $5 per month. KeeFox Most modern browsers have built-in password management, but they’re rarely as good as dedicated solutions. Take KeeFox for instance, which is the browser variant of the renowned password manager, KeePass. Start using it if you aren’t already. In essence, KeeFox is a full-blown replacement for the built-in Firefox password manager. Just be aware that KeeFox will not work correctly if you have Firefox set to clear passwords every time it closes. LastPass for Firefox is a well-known alternative to KeeFox and it works great as well. However, KeeFox is open source and completely free, so it’s the one I prefer. Feel free to use whichever one you think suits you best. BetterPrivacy When you visit the addon page for BetterPrivacy, you might notice that it hasn’t been updated since early 2012. Don’t let that turn you away. Despite being three years in limbo, this addon still works just as it’s supposed to. What does it do? It combats the long-term super-cookies, also known as Flash cookies, that companies use for perpetual tracking of your web activity. BetterPrivacy lets you view and destroy these super-cookies, which is something most browsers won’t do on their own. Self-Destructing Cookies As far as regular cookies are concerned, most browsers offer a primitive “clear all cookies” function that can be done manually or whenever the browser closes. What if you want a bit more flexibility? Then you should install Self-Destructing Cookies. This addon allows cookies to persist until you close the tab. When a tab is closed, all relevant cookies are destroyed right on the spot. This method of dealing with cookies is especially effective against Zombie-cookies and Evercookies. If there are any cookies you want to keep, you can whitelist them. Bloody Vikings! Are you tired of email spam? Starting today, you can kiss email spam goodbye thanks to the advent of the Bloody Viking! addon. Look past the strange name and you’ll see a wonderful tool: one that makes it easy for you to use temporary email addresses when signing up for websites. Using services like 10MinuteMail and AnonBox, this addon provides you with a limited-time inbox where you can accept confirmation emails without risking the sanctity of your actual inbox. After a given period of time, the provided inbox implodes and disappears. Clean Links Lastly we have Clean Links, a humble little addon that’s been in development since 2011. Its premise is simple: whenever it detects an obfuscated or nested link — such as you might find with shady redirection or affiliate products — it replaces it with the clean, straight version. Not much else to say about this one except that you can now rest easy when clicking on links, knowing that you’ll be able to catch dodgy links before you actually click on them. http://netsecurity.about.com/od/advancedsecurity/a/Protecting-Your-Online-Reputation.htm I would advise against searching for your social security number because if your Google account is hacked and the hackers look at your alerts then they would see your social security number if you had an alert set for it.
  13. Can be triangulated even if the location services are off http://www.welivesecurity.com/2015/12/16/know-smartphone-compromised/ We must beware of the toxic psychological impact of media and technology on children, adolescents and young adults, particularly as it regards turning them into faux celebrities—the equivalent of lead actors in their own fictionalized life stories. Read more: On Facebook, young people can fool themselves into thinking they have hundreds or thousands of “friends.” They can delete unflattering comments. They can block anyone who disagrees with them or pokes holes in their inflated self-esteem. They can choose to show the world only flattering, sexy or funny photographs of themselves and publicly connect to movie stars and professional athletes and musicians they “like.” Read more: Using Twitter, young people can pretend they are worth “following,” as though they have real-life fans, when all that is really happening is the mutual fanning of false love and false fame. Using computer games, our sons and daughters can pretend they are Olympians, Formula 1 drivers, rock stars or sharpshooters.  And while they can turn off their Wii and Xbox machines and remember they are really in dens and playrooms on side streets and in triple deckers around America, that is after their hearts have raced and heads have swelled with false pride for “being” something they are not. Read more: http://www.foxnews.com/opinion/2013/01/08/are-raising-generation-deluded-narcissists/#ixzz2KB227p5o Cooperative Institutional Research Program CIRP from http://www.heri.ucla.edu/cirpoverview.php