SlideShare a Scribd company logo
And How You Can Avoid It
Ashley Raymond
   Moving towards police state
    -UK monitoring


   Wiretap Act
    -The surveillance should include all Internet
    traffic, Mueller said, "whether it be .mil, .gov, .com--
    whichever network you're talking about."
•    Maybe not. They types of crime they’re
     searching for:
                    • Child Pornography
                    • Sex soliciting with minors etc.


    • Next could be monitoring specific target’s e-mail, chat, searches, and
    social networking pages for drug trafficking.

    •Torrenting movies, music, other media isn’t their main priority at the
    moment.
   Want to have privacy?
•   Download Free Software at
    www.torproject.org
   “To create a private network pathway with Tor, the user's
    software builds a circuit of encrypted connections through
    relays on the network. The circuit is extended one hop at a
    time, and each spot along the way knows only which spot
    gave it data, and which spot it is giving data to. No individual
    spot ever knows the complete path that a data packet has
    taken. The software negotiates a separate set of encryption
    keys for each hop along the circuit to ensure that each spot
    can't trace these connections as they pass through.”
   Protect your private information from
    unscrupulous marketers and identity thieves.
   Research sensitive topics. Perhaps in your
    country, access to information on AIDS, birth
    control, abortion, etc. isn’t readily available.
   Truly anonymous tip lines.
   Protect your children online. If a creeper is
    determined enough, IP addresses can be
    literally mapped to a city or even street
    location, and can reveal other information. In
    the United States, the government is pushing
    to make this mapping increasingly precise.
AND REMEMBER, REMEMBER, IT’S YOUR RIGHT TO STAY ANONOYMOUS

More Related Content

What's hot

Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS
 
Piracy
PiracyPiracy
Piracy
Manasa Mona
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
John Liu
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
Mark Fisher
 
Darknet
DarknetDarknet
Darknet
Matthew Kwong
 
Dark web investigation
Dark web investigationDark web investigation
Dark web investigation
Cobinweb
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
Pierluigi Paganini
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
Jan Siy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Manali Khadaria
 
Deep web
Deep webDeep web
Deep web
ANKIT OJHA
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
Dr. Ajith Sundaram
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Mark Jhon Oxillo
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
Bangladesh Network Operators Group
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
German Teran
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
Michelle Devanny
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
Darwin de Leon
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
albafg55
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
 

What's hot (20)

Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Piracy
PiracyPiracy
Piracy
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
Darknet
DarknetDarknet
Darknet
 
Dark web investigation
Dark web investigationDark web investigation
Dark web investigation
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Deep web
Deep webDeep web
Deep web
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 

Viewers also liked

Virtual resume
Virtual resumeVirtual resume
Virtual resume
ncsurf
 
Ejers. blog
Ejers. blogEjers. blog
Ejers. blogsvalero
 
Majors Fair PWPNT
Majors Fair PWPNTMajors Fair PWPNT
Majors Fair PWPNT
allisongg
 
Ucas process 61211
Ucas process 61211Ucas process 61211
Ucas process 61211
ZFisher
 
Portfolio
PortfolioPortfolio
Portfolio
Karen
 
Kl homes nowandthen
Kl homes nowandthenKl homes nowandthen
Kl homes nowandthen
sheree.tonks
 
Portfolio
PortfolioPortfolio
Portfolio
Karen
 
Ecampus Registration Seminar
Ecampus Registration SeminarEcampus Registration Seminar
Ecampus Registration Seminar
allisongg
 
Wio 10 Februari Goed Werknemerschap
Wio 10 Februari Goed WerknemerschapWio 10 Februari Goed Werknemerschap
Wio 10 Februari Goed Werknemerschap
Scholt
 
Arbeid & Scholing Voor Jongeren Binnen De Jeugdzorg
Arbeid & Scholing Voor Jongeren Binnen De JeugdzorgArbeid & Scholing Voor Jongeren Binnen De Jeugdzorg
Arbeid & Scholing Voor Jongeren Binnen De Jeugdzorg
Scholt
 
Tong hop kien thuc vat ly 9
Tong hop kien thuc vat ly 9Tong hop kien thuc vat ly 9
Tong hop kien thuc vat ly 9
Bão Sv
 
How to prepare greek gyro
How to prepare greek gyroHow to prepare greek gyro
How to prepare greek gyro
Elias Rosales
 
Ejers. blog
Ejers. blogEjers. blog
Ejers. blogsvalero
 
Test amistad
Test amistadTest amistad
Test amistad
teamojose
 
update portfolio
update portfolioupdate portfolio
update portfoliosilviogioia
 

Viewers also liked (18)

Virtual resume
Virtual resumeVirtual resume
Virtual resume
 
Ejers. blog
Ejers. blogEjers. blog
Ejers. blog
 
Majors Fair PWPNT
Majors Fair PWPNTMajors Fair PWPNT
Majors Fair PWPNT
 
Ucas process 61211
Ucas process 61211Ucas process 61211
Ucas process 61211
 
Portfolio
PortfolioPortfolio
Portfolio
 
Kl homes nowandthen
Kl homes nowandthenKl homes nowandthen
Kl homes nowandthen
 
Resume
ResumeResume
Resume
 
Portfolio
PortfolioPortfolio
Portfolio
 
Bm edit
Bm editBm edit
Bm edit
 
Ecampus Registration Seminar
Ecampus Registration SeminarEcampus Registration Seminar
Ecampus Registration Seminar
 
Wio 10 Februari Goed Werknemerschap
Wio 10 Februari Goed WerknemerschapWio 10 Februari Goed Werknemerschap
Wio 10 Februari Goed Werknemerschap
 
Img 130515034932-0001
Img 130515034932-0001Img 130515034932-0001
Img 130515034932-0001
 
Arbeid & Scholing Voor Jongeren Binnen De Jeugdzorg
Arbeid & Scholing Voor Jongeren Binnen De JeugdzorgArbeid & Scholing Voor Jongeren Binnen De Jeugdzorg
Arbeid & Scholing Voor Jongeren Binnen De Jeugdzorg
 
Tong hop kien thuc vat ly 9
Tong hop kien thuc vat ly 9Tong hop kien thuc vat ly 9
Tong hop kien thuc vat ly 9
 
How to prepare greek gyro
How to prepare greek gyroHow to prepare greek gyro
How to prepare greek gyro
 
Ejers. blog
Ejers. blogEjers. blog
Ejers. blog
 
Test amistad
Test amistadTest amistad
Test amistad
 
update portfolio
update portfolioupdate portfolio
update portfolio
 

Similar to Cs cpresentation police

DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
University of Dayton
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
Paul Elliott
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
Jonathan Stray
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
Aparajeeta Salu
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
OllieShoresna
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
Gim Andrade Vidal
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
Felipe Prado
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
Jayna Mistry
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
Ahmed Mater
 
Deep web
Deep webDeep web
Deep web
JANNAULIT
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
Dominic Karunesudas
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 

Similar to Cs cpresentation police (20)

DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Deep web
Deep webDeep web
Deep web
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Cs cpresentation police

  • 1. And How You Can Avoid It Ashley Raymond
  • 2. Moving towards police state -UK monitoring  Wiretap Act -The surveillance should include all Internet traffic, Mueller said, "whether it be .mil, .gov, .com-- whichever network you're talking about."
  • 3. Maybe not. They types of crime they’re searching for: • Child Pornography • Sex soliciting with minors etc. • Next could be monitoring specific target’s e-mail, chat, searches, and social networking pages for drug trafficking. •Torrenting movies, music, other media isn’t their main priority at the moment.
  • 4. Want to have privacy? • Download Free Software at www.torproject.org
  • 5. “To create a private network pathway with Tor, the user's software builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each spot along the way knows only which spot gave it data, and which spot it is giving data to. No individual spot ever knows the complete path that a data packet has taken. The software negotiates a separate set of encryption keys for each hop along the circuit to ensure that each spot can't trace these connections as they pass through.”
  • 6.
  • 7.
  • 8.
  • 9. Protect your private information from unscrupulous marketers and identity thieves.  Research sensitive topics. Perhaps in your country, access to information on AIDS, birth control, abortion, etc. isn’t readily available.  Truly anonymous tip lines.  Protect your children online. If a creeper is determined enough, IP addresses can be literally mapped to a city or even street location, and can reveal other information. In the United States, the government is pushing to make this mapping increasingly precise.
  • 10. AND REMEMBER, REMEMBER, IT’S YOUR RIGHT TO STAY ANONOYMOUS