SlideShare a Scribd company logo
How Personal Data is Collected & Used, and Steps to Protect Your Digital Footprint
Sandy Dunn
1.23.19
Public Information
1
OSINT Talk One
o What is OSINT
o Why you should care
o Steps to protect your privacy
OSINT Talk Two
o BCI Attack Surface
o Third Party Vendor Assessment
At The End Of This
Presentation
• Aware of how OSINT information is
captured
• Take steps to protect your personal data
• Be conscientious about sharing what
member data is shared and with who
2
What is OSINT
OSINT
Open Source Intelligence Information
Publicly available information located inside newspapers, blogs, web pages,
tweets, social media cards, images, podcasts, or videos as long as it is public,
free and legal.
The U.S. Director of National Intelligence and the U.S. Department of Defense
have defined it as intelligence “produced from publicly available information
that is collected, exploited, and disseminated in a timely manner to an
appropriate audience for the purpose addressing a specific intelligence
requirement.”
Intelligence Discipline
Intelligence produced form publicly available information this collected
3
Josh Huff
• https://www.youtube.com/watch?v=6kBOCnOlwqI
4
How Personal Data Happens
Social Media Data Breaches Public Records
Credit or Debit
Card / Loyalty
programs
Friends, Family,
School Athletics,
Clubs, Hobby
DNA Testing,
Ancestry Sites
5
Swatting
Swatting “is the harassment tactic of deceiving
an emergency service into sending a police and
emergency service response team to another
person's address. ..This is triggered by false
reporting of a serious law enforcement
emergency, such as a bomb threat, murder,
hostage situation, or other alleged incident. It can
also be triggered by a false report of a "mental
health" emergency, such as reporting that a
person is allegedly feeling suicidal or homicidal
and may or may not be armed.”1
• 1 https://en.wikipedia.org/wiki/Swatting
• https://arstechnica.com/information-technology/2019/01/facebook-executive-swatting-sends-significant-
police-response-to-his-home/
• https://arstechnica.com/tech-policy/2017/12/kansas-mans-death-may-have-resulted-from-call-of-duty-
swatting/
6
©2015 by Blue Cross of Idaho, an Independent Licensee of the Blue Cross and Blue Shield Association
7
PRIVATEANDCONFIDENTIAL 1.10.19
• https://arstechnica.com/information-technology/2019/01/facebook-executive-swatting-sends-significant-
police-response-to-his-home/
7
Doxxing
Doxxing “is the Internet-based practice of
researching and broadcasting private or
identifiable information (especially personally
identifiable information) about an individual or
organization.
The methods employed to acquire this
information include searching publicly available
databases and social media websites (like
Facebook), hacking, and social engineering.”1
• 1 https://en.wikipedia.org/wiki/Doxing
• https://hornet.com/stories/doxxed-ice-employees/
• https://www.audible.in/pd/How-Doxxing-Became-a-Mainstream-Tool-in-the-Culture-Wars-
Audiobook/B073QWNZ33
8
I Don’t Have Anything to
Hide
What do you have to protect ?
9
Social Media
• Facebook
• Google
• Instagram
• Snapchat
• Twitter
• LinkedIn
• WhatsApp
• Pinterest
• Tumbler
• Reddit
• Dating sites
• https://www.wired.com/story/facebook-10-year-meme-challenge/
10
What They
Have
• Name, gender, email, date of
birth, email, mobile, IP
address, all user activity,
likes, tags
• Tracking non- face book users
• Applications, contacts
• Access to your webcam
• Where you have been
• Everything you’ve searched &
deleted
• They have an advertisement
profile for you
• What apps you use
• News you have read
• Fitness level, fitness goals
• Upcoming plans
• Calendar
• https://www.theguardian.com/commentisfree/2018/mar/28/all-the-data-facebook-google-has-on-you-
privacy
11
Data
Breaches
• Records Breached: 11,582,116,452
• 9,033 Data Breaches made public
since 2005
• https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
• https://www.privacyrights.org/data-breaches
12
Genetic
Testing &
Ancestry
Sites
“If you’re white, live in the United States, and a distant relative
has uploaded their DNA to a public ancestry database, there’s a
good chance an internet sleuth can identify you from a DNA
sample you left somewhere. “
• https://www.businessinsider.com/dna-testing-delete-your-data-23andme-ancestry-2018-7
13
EXIF Data
from
Photos
What can be captured
•GPS Data
•Who created it and when
•Who last modified it and when
•Tags and it’s categories'
•Who can access and update
Sites to be careful
•Most photo sharing sites
•Flickr
•Tumbler
•Pinterest
Sites that remove metadata
•Facebook
•LinkedIn
•Twitter
•Blogger
• https://www.peerlyst.com/posts/extracting-juicy-info-from-an-image-using-exif-metadata-shaquib-izhar
14
Meta Data From Documents
Metagoofill
• Searching file types in the target
domain using the Google search engine
• Downloading all of the documents
found and saving them to the local
disk.
• Extracting the metadata from the
downloaded documents
• Saving the result in an HTML file
Checklists for removing document meta data
from Microsoft and PDF files
15
Other
Public Records
• Taxes, arrests, births, death, divorce, marriages
• Voter data, name, street, party affiliation, elections in which you
did or did not vote, phone number, email
Credit or Debit Card Transactions / Loyalty programs
Friends, Family, School Athletics, Clubs, or Hobby
Classified listings, Craigslist, Ebay, Amazon,
Business search sites
LinkedIn
Job Sites
Online Communities and Blogs
Reverse Image Search – Google, Tineye
Real Estate Listing
16
How Data is
Captured
• GPS Data – Fitness trackers,
Facebook, Google , Twitter,
• Health Data - Fitness Trackers,
Apps
• Loyalty cards
• Smart TV
• Alexa, Google
• Car Movements – Every car
since 2006 contains a chip that
records your speed, braking,
turns, mileage, accidents,
when you start your car
• License plates
• Police – vehicle
location tracking
• Toll booth
• Cell Phone
• https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html
• https://lifehacker.com/how-retail-stores-track-you-using-your-smartphone-and-827512308
17
Cell Phone Providers
• https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-
microbilt-zumigo-tmobile
18
How it OSINT
Information used
• Ads
• Marketing information
• Password breaches
• AI Training
• Police & Law
Enforcement
• Identity Theft
• Phishing Attacks
Detecting Crime
• ShotSpotter triangulate the location of a gunshot
• Cloud Walk’s AI technology seeks to predict if a person
will commit a crime through facial recognition and gait
analysis.
Predicting Crime
• Attempts to forecast when and where crime will occur.
Tacoma, Washington, implemented Predpol in January,
2013, it saw a 22 percent decrease in residential
burglaries within two years 
• https://www.washingtonpost.com/apps/g/page/world/how-the-nsa-is-tracking-people-right-
now/634/?noredirect=on
• https://medium.com/qadius/improving-law-enforcement-intelligence-gathering-and-use-with-open-
source-intelligence-osint-and-9dbe64a1f9f9
19
E-Discovery
• https://www.runnersworld.com/news/a25924256/mark-fellows-runner-hitman-murder/
• https://blogs.findlaw.com/technologist/2017/02/the-tell-tale-pacemaker-man-charged-with-arson-after-
police-examine-pacemaker-data.html
• https://ediscovery.co/ediscoverydaily/electronic-discovery/tinder-date-murder-case-highlights-the-
increasing-complexity-of-ediscovery-in-criminal-investigations-ediscovery-trends/
20
Protecting
Your
Personal
Data
21
What You Can Do
1. Understand your threat profile
• Google yourself & your family, what information is out there?
2. Never ever ever reuse a password, use a password manager
3. Credit Freeze
4. Use social media thoughtfully
5. Opt out of any option to “share data”
6. Turn off Bluetooth and Wifi on your phone unless your in a
trusted location
7. Understand the risk if you give an application access to your PC or
phone
8. Use tools like PrivacyBadger when surfing the net
9. Think about the trade off when signing up for reward’s programs
10. Push back when asked for personal information “What do you
need that information for?”
11. Two-Factor Authentication
12. Request to have your data removed
13. Use a VPN
14. Use a VOIP number and have it forward calls and texts to your
cell number
15. Use burner numbers for things like Craigslist
16. Create separate accounts for the different type of email
• Financial
• Social Media
22
How Many of Me ?
23
https://knowem.com
• https://cybersecurityventures.com/407-women-in-cybersecurity-to-follow-on-twitter-crowdsourcing-
more-names/ [cybersecurityventures.com]
24
Follow The Privacy Workbook
https://www.lifewire.com/remove-personal-information-from-internet-3482691 [lifewire.com]
25
DeleteMe
https://joindeleteme.com/privacy-protection-plans/
Privacyduck
26
Podcasts, Sites, & Books
• Michael Bazzel’s Site https://inteltechniques.com
• Troy Hunt https://haveibeenpwned.com/
27
Topics Next Session
• What is a Puppet?
• BCI Attack Surface
• OSINT and Third Party Vendor
Management
• Tools and turning OSINT into
Business Intelligence
• OSINT and Legal Considerations
28

More Related Content

What's hot

Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
AnnaliseKnudson
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
AnnaliseKnudson
 
Social Media and E-Discovery
Social Media and E-DiscoverySocial Media and E-Discovery
Social Media and E-Discovery
Jeremy Richter
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
MmIT - Multimedia Information Technology Group for CILIP
 
Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...
IL Group (CILIP Information Literacy Group)
 
The 21st Century Kid
The 21st Century KidThe 21st Century Kid
The 21st Century Kid
Joquetta Johnson
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
Ian Clark
 
Social media in politics, digital economy, social business report
Social media in politics, digital economy, social business reportSocial media in politics, digital economy, social business report
Social media in politics, digital economy, social business report
Niall Devitt
 
Government2.0
Government2.0Government2.0
Government2.0
ksabol
 
Why radical librarianship? An introduction...
Why radical librarianship? An introduction...Why radical librarianship? An introduction...
Why radical librarianship? An introduction...
Ian Clark
 
Equipping educators to tackle fake news
Equipping educators to tackle fake newsEquipping educators to tackle fake news
Equipping educators to tackle fake news
Emma Scott
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social mediaJames Palitzsch
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
Donald E. Hester
 
Karin wahl jorgensen normalisation of surveillance ssn2016
Karin wahl jorgensen normalisation of surveillance ssn2016Karin wahl jorgensen normalisation of surveillance ssn2016
Karin wahl jorgensen normalisation of surveillance ssn2016
Karin Wahl-Jorgensen
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentationKyle Basedow
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conference
mikep007
 
Intro to Blogs and the Blogosphere
Intro to Blogs and the BlogosphereIntro to Blogs and the Blogosphere
Intro to Blogs and the Blogosphere
evgeny.morozov
 
In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?
Demetris Paschalides
 

What's hot (19)

Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Social Media and E-Discovery
Social Media and E-DiscoverySocial Media and E-Discovery
Social Media and E-Discovery
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...
 
The 21st Century Kid
The 21st Century KidThe 21st Century Kid
The 21st Century Kid
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
Social media in politics, digital economy, social business report
Social media in politics, digital economy, social business reportSocial media in politics, digital economy, social business report
Social media in politics, digital economy, social business report
 
Government2.0
Government2.0Government2.0
Government2.0
 
Why radical librarianship? An introduction...
Why radical librarianship? An introduction...Why radical librarianship? An introduction...
Why radical librarianship? An introduction...
 
Equipping educators to tackle fake news
Equipping educators to tackle fake newsEquipping educators to tackle fake news
Equipping educators to tackle fake news
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social media
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Karin wahl jorgensen normalisation of surveillance ssn2016
Karin wahl jorgensen normalisation of surveillance ssn2016Karin wahl jorgensen normalisation of surveillance ssn2016
Karin wahl jorgensen normalisation of surveillance ssn2016
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conference
 
Uwtalk
UwtalkUwtalk
Uwtalk
 
Intro to Blogs and the Blogosphere
Intro to Blogs and the BlogosphereIntro to Blogs and the Blogosphere
Intro to Blogs and the Blogosphere
 
In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?In mitigating Fake News and Hate-speech: Are we winning?
In mitigating Fake News and Hate-speech: Are we winning?
 

Similar to Osint part 1_personal_privacy

Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
SensePost
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Toronto Metropolitan University
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
Sloan Carne
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
FourthAsAService
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
Tomppa Järvinen
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
Medpricer
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationsMedpricer
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
Phil Cryer
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
Hsuan-Ting Chen
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
bis_foresight
 
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapitolTechU
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
FourthAsAService
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
👀 Joe Gray
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebook
rahul8793
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
Logikcull.com
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywhere
Phil Bradley
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
Elizabeth T. "Eli" Edwards
 

Similar to Osint part 1_personal_privacy (20)

Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebook
 
Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywhere
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 

More from Sandra (Sandy) Dunn

Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
Sandra (Sandy) Dunn
 
Your're Special (But Not That Special)
Your're Special (But Not That Special)Your're Special (But Not That Special)
Your're Special (But Not That Special)
Sandra (Sandy) Dunn
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurity
Sandra (Sandy) Dunn
 
Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8
Sandra (Sandy) Dunn
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Sandra (Sandy) Dunn
 
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Sandra (Sandy) Dunn
 
Presentation2 certificate farce
Presentation2 certificate farcePresentation2 certificate farce
Presentation2 certificate farce
Sandra (Sandy) Dunn
 

More from Sandra (Sandy) Dunn (7)

Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Your're Special (But Not That Special)
Your're Special (But Not That Special)Your're Special (But Not That Special)
Your're Special (But Not That Special)
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurity
 
Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8Step by-step-guide risk-security-dunn_firth_v.1.8
Step by-step-guide risk-security-dunn_firth_v.1.8
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
 
Presentation2 certificate farce
Presentation2 certificate farcePresentation2 certificate farce
Presentation2 certificate farce
 

Recently uploaded

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 

Recently uploaded (20)

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 

Osint part 1_personal_privacy

  • 1. How Personal Data is Collected & Used, and Steps to Protect Your Digital Footprint Sandy Dunn 1.23.19 Public Information 1
  • 2. OSINT Talk One o What is OSINT o Why you should care o Steps to protect your privacy OSINT Talk Two o BCI Attack Surface o Third Party Vendor Assessment At The End Of This Presentation • Aware of how OSINT information is captured • Take steps to protect your personal data • Be conscientious about sharing what member data is shared and with who 2
  • 3. What is OSINT OSINT Open Source Intelligence Information Publicly available information located inside newspapers, blogs, web pages, tweets, social media cards, images, podcasts, or videos as long as it is public, free and legal. The U.S. Director of National Intelligence and the U.S. Department of Defense have defined it as intelligence “produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose addressing a specific intelligence requirement.” Intelligence Discipline Intelligence produced form publicly available information this collected 3
  • 5. How Personal Data Happens Social Media Data Breaches Public Records Credit or Debit Card / Loyalty programs Friends, Family, School Athletics, Clubs, Hobby DNA Testing, Ancestry Sites 5
  • 6. Swatting Swatting “is the harassment tactic of deceiving an emergency service into sending a police and emergency service response team to another person's address. ..This is triggered by false reporting of a serious law enforcement emergency, such as a bomb threat, murder, hostage situation, or other alleged incident. It can also be triggered by a false report of a "mental health" emergency, such as reporting that a person is allegedly feeling suicidal or homicidal and may or may not be armed.”1 • 1 https://en.wikipedia.org/wiki/Swatting • https://arstechnica.com/information-technology/2019/01/facebook-executive-swatting-sends-significant- police-response-to-his-home/ • https://arstechnica.com/tech-policy/2017/12/kansas-mans-death-may-have-resulted-from-call-of-duty- swatting/ 6
  • 7. ©2015 by Blue Cross of Idaho, an Independent Licensee of the Blue Cross and Blue Shield Association 7 PRIVATEANDCONFIDENTIAL 1.10.19 • https://arstechnica.com/information-technology/2019/01/facebook-executive-swatting-sends-significant- police-response-to-his-home/ 7
  • 8. Doxxing Doxxing “is the Internet-based practice of researching and broadcasting private or identifiable information (especially personally identifiable information) about an individual or organization. The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering.”1 • 1 https://en.wikipedia.org/wiki/Doxing • https://hornet.com/stories/doxxed-ice-employees/ • https://www.audible.in/pd/How-Doxxing-Became-a-Mainstream-Tool-in-the-Culture-Wars- Audiobook/B073QWNZ33 8
  • 9. I Don’t Have Anything to Hide What do you have to protect ? 9
  • 10. Social Media • Facebook • Google • Instagram • Snapchat • Twitter • LinkedIn • WhatsApp • Pinterest • Tumbler • Reddit • Dating sites • https://www.wired.com/story/facebook-10-year-meme-challenge/ 10
  • 11. What They Have • Name, gender, email, date of birth, email, mobile, IP address, all user activity, likes, tags • Tracking non- face book users • Applications, contacts • Access to your webcam • Where you have been • Everything you’ve searched & deleted • They have an advertisement profile for you • What apps you use • News you have read • Fitness level, fitness goals • Upcoming plans • Calendar • https://www.theguardian.com/commentisfree/2018/mar/28/all-the-data-facebook-google-has-on-you- privacy 11
  • 12. Data Breaches • Records Breached: 11,582,116,452 • 9,033 Data Breaches made public since 2005 • https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ • https://www.privacyrights.org/data-breaches 12
  • 13. Genetic Testing & Ancestry Sites “If you’re white, live in the United States, and a distant relative has uploaded their DNA to a public ancestry database, there’s a good chance an internet sleuth can identify you from a DNA sample you left somewhere. “ • https://www.businessinsider.com/dna-testing-delete-your-data-23andme-ancestry-2018-7 13
  • 14. EXIF Data from Photos What can be captured •GPS Data •Who created it and when •Who last modified it and when •Tags and it’s categories' •Who can access and update Sites to be careful •Most photo sharing sites •Flickr •Tumbler •Pinterest Sites that remove metadata •Facebook •LinkedIn •Twitter •Blogger • https://www.peerlyst.com/posts/extracting-juicy-info-from-an-image-using-exif-metadata-shaquib-izhar 14
  • 15. Meta Data From Documents Metagoofill • Searching file types in the target domain using the Google search engine • Downloading all of the documents found and saving them to the local disk. • Extracting the metadata from the downloaded documents • Saving the result in an HTML file Checklists for removing document meta data from Microsoft and PDF files 15
  • 16. Other Public Records • Taxes, arrests, births, death, divorce, marriages • Voter data, name, street, party affiliation, elections in which you did or did not vote, phone number, email Credit or Debit Card Transactions / Loyalty programs Friends, Family, School Athletics, Clubs, or Hobby Classified listings, Craigslist, Ebay, Amazon, Business search sites LinkedIn Job Sites Online Communities and Blogs Reverse Image Search – Google, Tineye Real Estate Listing 16
  • 17. How Data is Captured • GPS Data – Fitness trackers, Facebook, Google , Twitter, • Health Data - Fitness Trackers, Apps • Loyalty cards • Smart TV • Alexa, Google • Car Movements – Every car since 2006 contains a chip that records your speed, braking, turns, mileage, accidents, when you start your car • License plates • Police – vehicle location tracking • Toll booth • Cell Phone • https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html • https://lifehacker.com/how-retail-stores-track-you-using-your-smartphone-and-827512308 17
  • 18. Cell Phone Providers • https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone- microbilt-zumigo-tmobile 18
  • 19. How it OSINT Information used • Ads • Marketing information • Password breaches • AI Training • Police & Law Enforcement • Identity Theft • Phishing Attacks Detecting Crime • ShotSpotter triangulate the location of a gunshot • Cloud Walk’s AI technology seeks to predict if a person will commit a crime through facial recognition and gait analysis. Predicting Crime • Attempts to forecast when and where crime will occur. Tacoma, Washington, implemented Predpol in January, 2013, it saw a 22 percent decrease in residential burglaries within two years  • https://www.washingtonpost.com/apps/g/page/world/how-the-nsa-is-tracking-people-right- now/634/?noredirect=on • https://medium.com/qadius/improving-law-enforcement-intelligence-gathering-and-use-with-open- source-intelligence-osint-and-9dbe64a1f9f9 19
  • 20. E-Discovery • https://www.runnersworld.com/news/a25924256/mark-fellows-runner-hitman-murder/ • https://blogs.findlaw.com/technologist/2017/02/the-tell-tale-pacemaker-man-charged-with-arson-after- police-examine-pacemaker-data.html • https://ediscovery.co/ediscoverydaily/electronic-discovery/tinder-date-murder-case-highlights-the- increasing-complexity-of-ediscovery-in-criminal-investigations-ediscovery-trends/ 20
  • 22. What You Can Do 1. Understand your threat profile • Google yourself & your family, what information is out there? 2. Never ever ever reuse a password, use a password manager 3. Credit Freeze 4. Use social media thoughtfully 5. Opt out of any option to “share data” 6. Turn off Bluetooth and Wifi on your phone unless your in a trusted location 7. Understand the risk if you give an application access to your PC or phone 8. Use tools like PrivacyBadger when surfing the net 9. Think about the trade off when signing up for reward’s programs 10. Push back when asked for personal information “What do you need that information for?” 11. Two-Factor Authentication 12. Request to have your data removed 13. Use a VPN 14. Use a VOIP number and have it forward calls and texts to your cell number 15. Use burner numbers for things like Craigslist 16. Create separate accounts for the different type of email • Financial • Social Media 22
  • 23. How Many of Me ? 23
  • 25. Follow The Privacy Workbook https://www.lifewire.com/remove-personal-information-from-internet-3482691 [lifewire.com] 25
  • 27. Podcasts, Sites, & Books • Michael Bazzel’s Site https://inteltechniques.com • Troy Hunt https://haveibeenpwned.com/ 27
  • 28. Topics Next Session • What is a Puppet? • BCI Attack Surface • OSINT and Third Party Vendor Management • Tools and turning OSINT into Business Intelligence • OSINT and Legal Considerations 28