The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
Keynote address for the National Conference of State Legislatures (NCSL) Luncheon for Legislative Information and Communications Staff and National Association of Legislative Information Technology professionals on October 10, 2012.
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
Keynote address for the National Conference of State Legislatures (NCSL) Luncheon for Legislative Information and Communications Staff and National Association of Legislative Information Technology professionals on October 10, 2012.
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
The digital divide in the post-Snowden eraIan Clark
This presentation seeks to explore the digital divide in the light of the revelations by Edward Snowden in 2013. It looks at state and corporate surveillance, the impact of these upon individual citizens with respect to the democratic process, the tools with which individuals can protect themselves, the impact of the digital divide upon the ability of the individual to ensure their intellectual privacy and what libraries and librarians are doing to bridge this particular aspect of the digital divide.
Social media in politics, digital economy, social business reportNiall Devitt
The impact of Social Media on politics and on democratic participation continues to divide opinion. The following report on the use of social media within politics includes the first comprehensive review of the use of social media by Irish political parties, politicians and government bodies.
The “Social Media in Politics” report looks at how use of Social Media is impacting politicians and political engagement, both here in Ireland and internationally.
It includes:
• The tactics used by President Obama and other world leaders and governments to engage with their peoples on Social Media
• A detailed analysis on use of Social Media by Irish political parties, politicians, state departments and bodies
• Examples and case studies of the positive and negative consequences of democratic participation on Social Media
John Twohig, Managing Partner of The Ahain Group, said “Our analysis indicates that many Irish political parties and their leadership are yet to develop an overarching strategy (or party line) when it comes to their Social Media presence, and, as a result, individual members are more often left to their own devices.”
For more information, contact The Ahain Group:
Email: info@ahaingroup.com
This presentation was given by the State Library of Ohio for state employees and focused on providing information about social networking for government agencies.
Coverage of the following topics: Tech growth, social media, Internet of things, how business are using social media in HR, how people expose their information online, privacy, the ramifications of your online life, how criminals, terrorist, governments and organizations use your online information, cyberbullying, data breaches, and Hacktivisim.
Going beyond google 2 philadelphia loss conferencemikep007
Some attorneys have argued that scouring social networking sites in search of a reason not to hire someone, or evidence of insurance fraud, is an invasion of privacy. But insurance companies and their attorneys argue that internet searches for public social networking profiles are similar to the informal video surveillance investigations of property-casualty claimants that are common in the industry.
We are living in the ear of post-truth. After the surge of fake news stories during the 2016 U.S. elections, several initiatives have been introduced to mitigate the problem like fact-checker organization, artificial intelligence and government aggressive measures. All this are promising, but are we really winning the battle against disinformation?
Presentation by Dominic White at ISSA in 2010.
This presentation is about online privacy.
The presentation begins with a look at what privacy is. Where online privacy leaks occur and the implications of the leaks are discussed. The presentation ends with a brief discussion on how you can protect your online privacy.
Roundtable at the 2018 AoIR conference.
Anatoliy Gruzd, Jenna Jacobson, Ryerson University, Canada
Jacquelyn Burkell, Western University
Joanne McNeish, Ryerson University
Anabel Quan-Haase, Western University
Abstract
The transnational flows of information across nations and borders make it difficult to introduce and implement privacy-preserving policies relating to social media data. Social media data are a rich source of behavioural data that can reveal how we connect and interact with each other online in real time. Furthermore, the materiality of new digital intermediaries (such as the Internet of Things, AI, and algorithms) raises additional anticipated and unanticipated privacy challenges that need to be addressed as we continue to speed towards an increasingly digitally-mediated future.
A by-product of the large-scale social media adoption is social media data mining; publicly available social media data is largely free and legally available to be mined, analyzed, and used (Kennedy 2016) for whatever purposes by third parties. Researchers have begun to suggest that ethics need to be considered even if the data is public (boyd & Crawford 2012).
In the wake of the EU's recent legislation of the General Data Protection Regulation and the Right to be Forgotten, as well as increasing critical attention around the world, the roundtable will discuss how to navigate the transnational and material, as well as the complex and competing, interests associated with using social media, including ethics, privacy, security, and intellectual property rights. By balancing people's individual rights to exercise autonomy over "their" data and the societal benefits of using and analyzing the data for insights, the roundtable aims to generate theoretically-rich discussion and debate with internet researchers about the ethics, privacy, and best practices of using social media data.
The digital divide in the post-Snowden eraIan Clark
This presentation seeks to explore the digital divide in the light of the revelations by Edward Snowden in 2013. It looks at state and corporate surveillance, the impact of these upon individual citizens with respect to the democratic process, the tools with which individuals can protect themselves, the impact of the digital divide upon the ability of the individual to ensure their intellectual privacy and what libraries and librarians are doing to bridge this particular aspect of the digital divide.
Social media in politics, digital economy, social business reportNiall Devitt
The impact of Social Media on politics and on democratic participation continues to divide opinion. The following report on the use of social media within politics includes the first comprehensive review of the use of social media by Irish political parties, politicians and government bodies.
The “Social Media in Politics” report looks at how use of Social Media is impacting politicians and political engagement, both here in Ireland and internationally.
It includes:
• The tactics used by President Obama and other world leaders and governments to engage with their peoples on Social Media
• A detailed analysis on use of Social Media by Irish political parties, politicians, state departments and bodies
• Examples and case studies of the positive and negative consequences of democratic participation on Social Media
John Twohig, Managing Partner of The Ahain Group, said “Our analysis indicates that many Irish political parties and their leadership are yet to develop an overarching strategy (or party line) when it comes to their Social Media presence, and, as a result, individual members are more often left to their own devices.”
For more information, contact The Ahain Group:
Email: info@ahaingroup.com
This presentation was given by the State Library of Ohio for state employees and focused on providing information about social networking for government agencies.
Coverage of the following topics: Tech growth, social media, Internet of things, how business are using social media in HR, how people expose their information online, privacy, the ramifications of your online life, how criminals, terrorist, governments and organizations use your online information, cyberbullying, data breaches, and Hacktivisim.
Going beyond google 2 philadelphia loss conferencemikep007
Some attorneys have argued that scouring social networking sites in search of a reason not to hire someone, or evidence of insurance fraud, is an invasion of privacy. But insurance companies and their attorneys argue that internet searches for public social networking profiles are similar to the informal video surveillance investigations of property-casualty claimants that are common in the industry.
We are living in the ear of post-truth. After the surge of fake news stories during the 2016 U.S. elections, several initiatives have been introduced to mitigate the problem like fact-checker organization, artificial intelligence and government aggressive measures. All this are promising, but are we really winning the battle against disinformation?
Presentation by Dominic White at ISSA in 2010.
This presentation is about online privacy.
The presentation begins with a look at what privacy is. Where online privacy leaks occur and the implications of the leaks are discussed. The presentation ends with a brief discussion on how you can protect your online privacy.
Roundtable at the 2018 AoIR conference.
Anatoliy Gruzd, Jenna Jacobson, Ryerson University, Canada
Jacquelyn Burkell, Western University
Joanne McNeish, Ryerson University
Anabel Quan-Haase, Western University
Abstract
The transnational flows of information across nations and borders make it difficult to introduce and implement privacy-preserving policies relating to social media data. Social media data are a rich source of behavioural data that can reveal how we connect and interact with each other online in real time. Furthermore, the materiality of new digital intermediaries (such as the Internet of Things, AI, and algorithms) raises additional anticipated and unanticipated privacy challenges that need to be addressed as we continue to speed towards an increasingly digitally-mediated future.
A by-product of the large-scale social media adoption is social media data mining; publicly available social media data is largely free and legally available to be mined, analyzed, and used (Kennedy 2016) for whatever purposes by third parties. Researchers have begun to suggest that ethics need to be considered even if the data is public (boyd & Crawford 2012).
In the wake of the EU's recent legislation of the General Data Protection Regulation and the Right to be Forgotten, as well as increasing critical attention around the world, the roundtable will discuss how to navigate the transnational and material, as well as the complex and competing, interests associated with using social media, including ethics, privacy, security, and intellectual property rights. By balancing people's individual rights to exercise autonomy over "their" data and the societal benefits of using and analyzing the data for insights, the roundtable aims to generate theoretically-rich discussion and debate with internet researchers about the ethics, privacy, and best practices of using social media data.
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
Part of the Fourth Amendment as a Service Workshops - @4thasaservice and www.fourthamendmentasaservice.org
This workshop will discuss matters of online privacy, your rights to privacy, protecting yourself from stalking, and more. We will incorporate live walkthroughs of how to install and configure popular privacy tools and demonstrate common ways to communicate in a safe, secure, and legal manner if you feel you are being targeted unfairly or illegally by people looking to do you harm.
Speakers
Ean Meyer – Course Director, Cloud Technologies
Jack Norman – Course Director, Cloud Technologies
Moderator: Jay Bunner – Program Director, Cloud Technologies
-“Facts” about NSA/Snowden/Prism
-data classification
-guideline to Safe use of “Cloud”:
-choosing and using Cloud
-open source, alternative cloud services
Online Privacy in the Year of the DragonPhil Cryer
Description: Businesses change online privacy policies to make user's data, and their interaction with websites, more profitable for the website's owners. Users need to understand what privacy is being lost, how their data is being used and how they can improve their online privacy with knowledge and open source software.
What is big data, and what are its potential benefits and risks?
Presentation given by Sir Mark Walport at the Oxford Martin School on 3 December 2013.
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapitolTechU
Slides from a Webinar presented on Oct. 6, 2022, by Dr. Kellup Charles, Chair of Cybersecurity at Capitol Technology University. Dr. Charles looks at OSINT--Open Source Intelligence, including the Process, Method, and Techniques.
Fourth Amendment as a Service - Workshop - 2-21-17FourthAsAService
Slides from the Fourth Amendment as a Service Workshop held at the University of Central Florida on January 21st, 2017. Find more at www.fourthamendmentasaservice.org or @4thasaservice
Presented at Diana Initiative, Queercon 16, and DEFCON 27 Recon Village 8/9-10, 2019.
When we think of the process for attacking an organization, OSINT comes to the front and center of our minds. This presentation takes a presenter with experience in applying OSINT to effective penetration testing and social engineering and reverse engineers the process to determine what steps can be taken to further complicate their efforts. This is a presentation that talks about online deception, decoy accounts, canary data, encryption, maintaining one’s social media in a secure manner, and protecting one’s identity as much as possible. While nothing is absolute, this is a presentation that will leave attendees more aware of techniques to make it harder for attackers to collect accurate OSINT, either by removal or deception.
Guest Lecturer BSU CS 498 Presentations. Discussion to show the different type of roles in cyber security and the value of a team with diverse experience with diverse talent.
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...Sandra (Sandy) Dunn
A high performance Cyber Security team is essential for today’s successful and profitable enterprise business navigating through an increasingly difficult and dangerous internet. These teams need a strong leader who embraces the role as a Transactional Leader and uses its four foundational components: Idealized Influence, Intellectual Stimulation, Individualized Consideration and Inspirational Motivation to successfully manage the team. There are substantial financial benefits for business’s that invest and embed Inspirational Motivation into their culture. Inspirational Motivation increases profits, accelerates creativity, engages employees more deeply, and employee sick days and turnover are reduced.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
Osint part 1_personal_privacy
1. How Personal Data is Collected & Used, and Steps to Protect Your Digital Footprint
Sandy Dunn
1.23.19
Public Information
1
2. OSINT Talk One
o What is OSINT
o Why you should care
o Steps to protect your privacy
OSINT Talk Two
o BCI Attack Surface
o Third Party Vendor Assessment
At The End Of This
Presentation
• Aware of how OSINT information is
captured
• Take steps to protect your personal data
• Be conscientious about sharing what
member data is shared and with who
2
3. What is OSINT
OSINT
Open Source Intelligence Information
Publicly available information located inside newspapers, blogs, web pages,
tweets, social media cards, images, podcasts, or videos as long as it is public,
free and legal.
The U.S. Director of National Intelligence and the U.S. Department of Defense
have defined it as intelligence “produced from publicly available information
that is collected, exploited, and disseminated in a timely manner to an
appropriate audience for the purpose addressing a specific intelligence
requirement.”
Intelligence Discipline
Intelligence produced form publicly available information this collected
3
5. How Personal Data Happens
Social Media Data Breaches Public Records
Credit or Debit
Card / Loyalty
programs
Friends, Family,
School Athletics,
Clubs, Hobby
DNA Testing,
Ancestry Sites
5
6. Swatting
Swatting “is the harassment tactic of deceiving
an emergency service into sending a police and
emergency service response team to another
person's address. ..This is triggered by false
reporting of a serious law enforcement
emergency, such as a bomb threat, murder,
hostage situation, or other alleged incident. It can
also be triggered by a false report of a "mental
health" emergency, such as reporting that a
person is allegedly feeling suicidal or homicidal
and may or may not be armed.”1
• 1 https://en.wikipedia.org/wiki/Swatting
• https://arstechnica.com/information-technology/2019/01/facebook-executive-swatting-sends-significant-
police-response-to-his-home/
• https://arstechnica.com/tech-policy/2017/12/kansas-mans-death-may-have-resulted-from-call-of-duty-
swatting/
6
8. Doxxing
Doxxing “is the Internet-based practice of
researching and broadcasting private or
identifiable information (especially personally
identifiable information) about an individual or
organization.
The methods employed to acquire this
information include searching publicly available
databases and social media websites (like
Facebook), hacking, and social engineering.”1
• 1 https://en.wikipedia.org/wiki/Doxing
• https://hornet.com/stories/doxxed-ice-employees/
• https://www.audible.in/pd/How-Doxxing-Became-a-Mainstream-Tool-in-the-Culture-Wars-
Audiobook/B073QWNZ33
8
9. I Don’t Have Anything to
Hide
What do you have to protect ?
9
10. Social Media
• Facebook
• Google
• Instagram
• Snapchat
• Twitter
• LinkedIn
• WhatsApp
• Pinterest
• Tumbler
• Reddit
• Dating sites
• https://www.wired.com/story/facebook-10-year-meme-challenge/
10
11. What They
Have
• Name, gender, email, date of
birth, email, mobile, IP
address, all user activity,
likes, tags
• Tracking non- face book users
• Applications, contacts
• Access to your webcam
• Where you have been
• Everything you’ve searched &
deleted
• They have an advertisement
profile for you
• What apps you use
• News you have read
• Fitness level, fitness goals
• Upcoming plans
• Calendar
• https://www.theguardian.com/commentisfree/2018/mar/28/all-the-data-facebook-google-has-on-you-
privacy
11
12. Data
Breaches
• Records Breached: 11,582,116,452
• 9,033 Data Breaches made public
since 2005
• https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
• https://www.privacyrights.org/data-breaches
12
13. Genetic
Testing &
Ancestry
Sites
“If you’re white, live in the United States, and a distant relative
has uploaded their DNA to a public ancestry database, there’s a
good chance an internet sleuth can identify you from a DNA
sample you left somewhere. “
• https://www.businessinsider.com/dna-testing-delete-your-data-23andme-ancestry-2018-7
13
14. EXIF Data
from
Photos
What can be captured
•GPS Data
•Who created it and when
•Who last modified it and when
•Tags and it’s categories'
•Who can access and update
Sites to be careful
•Most photo sharing sites
•Flickr
•Tumbler
•Pinterest
Sites that remove metadata
•Facebook
•LinkedIn
•Twitter
•Blogger
• https://www.peerlyst.com/posts/extracting-juicy-info-from-an-image-using-exif-metadata-shaquib-izhar
14
15. Meta Data From Documents
Metagoofill
• Searching file types in the target
domain using the Google search engine
• Downloading all of the documents
found and saving them to the local
disk.
• Extracting the metadata from the
downloaded documents
• Saving the result in an HTML file
Checklists for removing document meta data
from Microsoft and PDF files
15
16. Other
Public Records
• Taxes, arrests, births, death, divorce, marriages
• Voter data, name, street, party affiliation, elections in which you
did or did not vote, phone number, email
Credit or Debit Card Transactions / Loyalty programs
Friends, Family, School Athletics, Clubs, or Hobby
Classified listings, Craigslist, Ebay, Amazon,
Business search sites
LinkedIn
Job Sites
Online Communities and Blogs
Reverse Image Search – Google, Tineye
Real Estate Listing
16
17. How Data is
Captured
• GPS Data – Fitness trackers,
Facebook, Google , Twitter,
• Health Data - Fitness Trackers,
Apps
• Loyalty cards
• Smart TV
• Alexa, Google
• Car Movements – Every car
since 2006 contains a chip that
records your speed, braking,
turns, mileage, accidents,
when you start your car
• License plates
• Police – vehicle
location tracking
• Toll booth
• Cell Phone
• https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html
• https://lifehacker.com/how-retail-stores-track-you-using-your-smartphone-and-827512308
17
19. How it OSINT
Information used
• Ads
• Marketing information
• Password breaches
• AI Training
• Police & Law
Enforcement
• Identity Theft
• Phishing Attacks
Detecting Crime
• ShotSpotter triangulate the location of a gunshot
• Cloud Walk’s AI technology seeks to predict if a person
will commit a crime through facial recognition and gait
analysis.
Predicting Crime
• Attempts to forecast when and where crime will occur.
Tacoma, Washington, implemented Predpol in January,
2013, it saw a 22 percent decrease in residential
burglaries within two years
• https://www.washingtonpost.com/apps/g/page/world/how-the-nsa-is-tracking-people-right-
now/634/?noredirect=on
• https://medium.com/qadius/improving-law-enforcement-intelligence-gathering-and-use-with-open-
source-intelligence-osint-and-9dbe64a1f9f9
19
22. What You Can Do
1. Understand your threat profile
• Google yourself & your family, what information is out there?
2. Never ever ever reuse a password, use a password manager
3. Credit Freeze
4. Use social media thoughtfully
5. Opt out of any option to “share data”
6. Turn off Bluetooth and Wifi on your phone unless your in a
trusted location
7. Understand the risk if you give an application access to your PC or
phone
8. Use tools like PrivacyBadger when surfing the net
9. Think about the trade off when signing up for reward’s programs
10. Push back when asked for personal information “What do you
need that information for?”
11. Two-Factor Authentication
12. Request to have your data removed
13. Use a VPN
14. Use a VOIP number and have it forward calls and texts to your
cell number
15. Use burner numbers for things like Craigslist
16. Create separate accounts for the different type of email
• Financial
• Social Media
22
27. Podcasts, Sites, & Books
• Michael Bazzel’s Site https://inteltechniques.com
• Troy Hunt https://haveibeenpwned.com/
27
28. Topics Next Session
• What is a Puppet?
• BCI Attack Surface
• OSINT and Third Party Vendor
Management
• Tools and turning OSINT into
Business Intelligence
• OSINT and Legal Considerations
28