SlideShare a Scribd company logo
Reining InThe Data
The Social Impacts of the Privacy
Crisis In the Post-Snowden Era
ITAG 2015 Andrew Schwabe
A Copy of this Presentation
• Will be shared via twitter:
– Follow me at @aschwabe
• Posted on my blog: PainInTheApps.com
Background
• Hacker Entrepreneur
• 20 yrs in Encryption + Data Security
• Big Data, Mobile, Privacy focus now
• Assisted FBI for online predator hunts
• Founder of Point.io
• Founder + CEO of Formatic.ly
• Privacy + OSS Advocate
• Just Launched in 2015!
• BehavioralAnalytics + Smarter Engagement
for web and mobile forms!
• See us at ‘Innovation in the Region’ @ 3:30
• http://formatic.ly
Ahhhhh the Internet!
• Back in my day…
Ignorance *was* bliss
• A smartphone was just a phone with
email and junk and stuff
• We didn’t care if our kids uploaded pictures and shared
where they were during the day (every day?)
• We didn’t think twice about emailing sensitive or
private stuff to ourselves or friends, even in gmail…
Then…
1.2 Billion Usernames and passwords compromised
Welcome to a new Era!
Used to be…
…the government would protect your privacy
and stealing your secrets…
…took effort and some paper moon trickery…
<Cthon98> hey, if you type in your pw, it will
show as stars
<Cthon98> ********* see!
<AzureDiamond> hunter2
<AzureDiamond> doesnt look like stars to me
<Cthon98> <AzureDiamond> *******
<Cthon98> thats what I see
<AzureDiamond> oh, really?
<Cthon98> Absolutely
…
<AzureDiamond> oh, ok.
SoWhat Happened???
• Mobile devices got powerful and complex
• Social media exploded onto the scene
• Consumerization of IT
• … and we didn’t know what was going on…
The Privacy Crisis
• We can at least be concerned that the NSA
have cracked and monitor:
– SSL (HTTPS) website activity
– RSA encryption certificates (public/private keys)
– 4G mobile networks (voice and data)
– VoIP voice services
– And any websites/etc. that use the above
NSA has been outed…
NSA security coverage
• Means that they *can* (not will)
hack/monitor most of the services we rely on
daily
• These all use the same core security tech
Anonymous Networks
Compromised
• Kremlin put out a bounty for info
to hackTOR
• Gov’t / law enforcement compromised
portions of theTOR network late 2014.
Google, Microsoft, other
email scans
What is next ?
And most recently…
Oh, great... The government
that has been spying on
citizens just got hacked…
And most recently…
… and hackers in
Asia know more
about you than
your siblings
Facts:
• Hacking incidents are here to stay.
• You are never truly anonymous.
• Adapt or be a continual victim.
Some companies are Desperate
Data creation explosion
We are creating huge
amounts of digital
content, much of
which lives longer in
the cloud than we
intended or have use
for.
Data creation
• A large portion of what we create will live on
disk somewhere beyond our use for it
People know enough to be
concerned
Google’s Right to be Forgotten
Apps that are helping
• Snapchat
• Wickr
• Spideroak
• All focused on being a “place” where your
stuff is secure
, sort of
, sort of
Apps that are NOT helping
• Snapchat
• Tinder
• Facebook
• Burner
• etc
We SHOULD…
• Be concerned about
– what gets shared
– with whom
– And how long it lasts
Ephemeral
• What does it mean?
• Origin: greek word “ephĕmeros”
• “lasting for a very short time”
• The new “bucket” for technology that
manages the life of digital content
How does it help
• Personal privacy
• Corporate Risk
• Facebook vs snapchat models
• The opposite of Big Data ?
Is it enough?
• The concept is still new
• People are building “apps” more than broad
sweeping “solutions”
• It doesn’t address the issue of being
monitored/collected by NSA/Others
Is AnonymityThe Answer?
• Can communication really be anonymous ?
• Only available for *some* activity online
• Whistleblowers – do we want to enable
WikiLeaks and Snowdens ?
• But isn’t true anonymity the….
Dark Side of the Internet
Tools exist for anonymity
• “Leak” website lets you send untrackable anonymous emails.
– Inappropriate emails anybody ?
– Harrassment, abuse ?
• Tor lets you encrypt your web traffic and make you difficult to track
– Porn and pirated content
• Bitcoin exists to keep the banks out of your financial dealings
– Silk Road. BUSTED.
• Wickr has been spotted being used to sell/traffic illegal drugs
But Still Enable Naughty Activity
• Gov’ts around the world cracking down on
porn and sex trafficking
• FBI InfectingTor users with Malware
• Google and Microsoft scan emails, etc. and
report questionable content to authorities
• Evil begets evil
But Still Enable Naughty Activity
InformantsTargeted
Accountability
• There is no way to make everybody behave
• As a global society we need new ways to
encourage law abiding netizens
OMG I’m Scared
• What should I do?
– Know the risks
– Use technologies to
protect yourself
– Don’t associate with those who don’t behave
Parents:
• Do you know what your kids are doing ?
– Multiple email addresses / facebook profiles ?
– Ephemeral and anonymous mobile apps
– Its too easy to share pictures and photos
What we need (the Future?)
• Smarter users, and smarter parents
• Anonymous peer validation for data integrity
• Anonymous submissions to known entities
only for whistleblowing
• Social content stays social and never collected
for “Big Data”
In Summary
• We are in a new era
• Keep Calm
• Stay Educated
• Don’t Share unless you know the risks
• Use the right tech for your security/privacy needs
For Some Fun Reading
• “Cryptonomicon” by Neal Stephenson
– A futuristic take on:
– Underground Data Haven
– Anonymous Internet Banking
– Digital Gold Currency
Q&A
Thank you for coming!
• Presentation will be shared via twitter:
• Follow me at @aschwabe
• AND Posted on my blog: PainInTheApps.com

More Related Content

What's hot

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Tom Eston
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
Tom Eston
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
Blake Carver
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
KnepperE
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
Flaskdata.io
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
Christian Martorella
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
OSINT
OSINTOSINT
privacy and security
privacy and securityprivacy and security
privacy and security
ronit_jadhav
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
Deepak Khari
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
Scott Burnett
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
Scott Burnett
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
ConnectSafely
 
Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2
RonHyams
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
Arjun Chetry
 

What's hot (19)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
OSINT
OSINTOSINT
OSINT
 
privacy and security
privacy and securityprivacy and security
privacy and security
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2Ron_Hyams_lightning_talk_wiad2016_final2
Ron_Hyams_lightning_talk_wiad2016_final2
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 

Viewers also liked

NeoNet - Introductie portfolio management
NeoNet - Introductie portfolio managementNeoNet - Introductie portfolio management
NeoNet - Introductie portfolio managementNeoNet
 
Pulp And Paper Isf
Pulp And Paper IsfPulp And Paper Isf
Pulp And Paper Isf
Monica Barros
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
Andrew Schwabe
 
Barros monica isf2012
Barros monica isf2012Barros monica isf2012
Barros monica isf2012
Monica Barros
 
Rm overview
Rm overviewRm overview
Rm overviewFulcrum
 
Icord 2007
Icord 2007Icord 2007
Icord 2007
Monica Barros
 
Southeast load
Southeast loadSoutheast load
Southeast load
Monica Barros
 
Barros Monica Isf2012
Barros Monica Isf2012Barros Monica Isf2012
Barros Monica Isf2012
Monica Barros
 
NeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitnessNeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitnessNeoNet
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Andrew Schwabe
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
ralindha
 
Devops With Boxfuse and Shippable
Devops With Boxfuse and ShippableDevops With Boxfuse and Shippable
Devops With Boxfuse and Shippable
Andrew Schwabe
 
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 BrazilResidential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Monica Barros
 
JJR Marketing Presentation
JJR Marketing PresentationJJR Marketing Presentation
JJR Marketing Presentation
Jackie Ruiz
 
Ecomod 2007
Ecomod 2007Ecomod 2007
Ecomod 2007
Monica Barros
 
Work Place Motivation
Work Place MotivationWork Place Motivation
Work Place Motivation
ralindha
 
Time series and forecasting from wikipedia
Time series and forecasting from wikipediaTime series and forecasting from wikipedia
Time series and forecasting from wikipedia
Monica Barros
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
ralindha
 

Viewers also liked (18)

NeoNet - Introductie portfolio management
NeoNet - Introductie portfolio managementNeoNet - Introductie portfolio management
NeoNet - Introductie portfolio management
 
Pulp And Paper Isf
Pulp And Paper IsfPulp And Paper Isf
Pulp And Paper Isf
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Barros monica isf2012
Barros monica isf2012Barros monica isf2012
Barros monica isf2012
 
Rm overview
Rm overviewRm overview
Rm overview
 
Icord 2007
Icord 2007Icord 2007
Icord 2007
 
Southeast load
Southeast loadSoutheast load
Southeast load
 
Barros Monica Isf2012
Barros Monica Isf2012Barros Monica Isf2012
Barros Monica Isf2012
 
NeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitnessNeoNet - Introductie organizational fitness
NeoNet - Introductie organizational fitness
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
 
Devops With Boxfuse and Shippable
Devops With Boxfuse and ShippableDevops With Boxfuse and Shippable
Devops With Boxfuse and Shippable
 
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 BrazilResidential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
Residential%20 Electrical%20 Energy%20 Consumption%20 Profile%20in%20 Brazil
 
JJR Marketing Presentation
JJR Marketing PresentationJJR Marketing Presentation
JJR Marketing Presentation
 
Ecomod 2007
Ecomod 2007Ecomod 2007
Ecomod 2007
 
Work Place Motivation
Work Place MotivationWork Place Motivation
Work Place Motivation
 
Time series and forecasting from wikipedia
Time series and forecasting from wikipediaTime series and forecasting from wikipedia
Time series and forecasting from wikipedia
 
Leadership Styles
Leadership StylesLeadership Styles
Leadership Styles
 

Similar to Reining in the Data ITAG tech360 Penn State Great Valley 2015

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
Donald E. Hester
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
Kenneth Carnesi, JD
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Melki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital ageMelki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital age
Salzburg Global Seminar
 
James Katz en MoRe
James Katz en MoReJames Katz en MoRe
James Katz en MoRe
Eduardo Arriagada
 
INTERNET
INTERNETINTERNET
INTERNET
yaharamazing
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
nealbd
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
LIFARS
 
Argumentative Essay On Internet Privacy
Argumentative Essay On Internet PrivacyArgumentative Essay On Internet Privacy
Argumentative Essay On Internet Privacy
Scientific Paper Writing Services Albuquerque
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
👀 Joe Gray
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
CreepSquash
 
Digital Identity
Digital IdentityDigital Identity
Digital Identity
Aaron Wong
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
Marta Barrio Marcos
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Mohammed Adam
 

Similar to Reining in the Data ITAG tech360 Penn State Great Valley 2015 (20)

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Melki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital ageMelki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital age
 
James Katz en MoRe
James Katz en MoReJames Katz en MoRe
James Katz en MoRe
 
INTERNET
INTERNETINTERNET
INTERNET
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Argumentative Essay On Internet Privacy
Argumentative Essay On Internet PrivacyArgumentative Essay On Internet Privacy
Argumentative Essay On Internet Privacy
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Digital Identity
Digital IdentityDigital Identity
Digital Identity
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 

Recently uploaded (16)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 

Reining in the Data ITAG tech360 Penn State Great Valley 2015

  • 1. Reining InThe Data The Social Impacts of the Privacy Crisis In the Post-Snowden Era ITAG 2015 Andrew Schwabe
  • 2. A Copy of this Presentation • Will be shared via twitter: – Follow me at @aschwabe • Posted on my blog: PainInTheApps.com
  • 3. Background • Hacker Entrepreneur • 20 yrs in Encryption + Data Security • Big Data, Mobile, Privacy focus now • Assisted FBI for online predator hunts • Founder of Point.io • Founder + CEO of Formatic.ly • Privacy + OSS Advocate
  • 4. • Just Launched in 2015! • BehavioralAnalytics + Smarter Engagement for web and mobile forms! • See us at ‘Innovation in the Region’ @ 3:30 • http://formatic.ly
  • 6. • Back in my day…
  • 7. Ignorance *was* bliss • A smartphone was just a phone with email and junk and stuff • We didn’t care if our kids uploaded pictures and shared where they were during the day (every day?) • We didn’t think twice about emailing sensitive or private stuff to ourselves or friends, even in gmail…
  • 9. 1.2 Billion Usernames and passwords compromised
  • 10.
  • 11.
  • 12. Welcome to a new Era!
  • 13. Used to be… …the government would protect your privacy
  • 14.
  • 15. and stealing your secrets… …took effort and some paper moon trickery… <Cthon98> hey, if you type in your pw, it will show as stars <Cthon98> ********* see! <AzureDiamond> hunter2 <AzureDiamond> doesnt look like stars to me <Cthon98> <AzureDiamond> ******* <Cthon98> thats what I see <AzureDiamond> oh, really? <Cthon98> Absolutely … <AzureDiamond> oh, ok.
  • 16. SoWhat Happened??? • Mobile devices got powerful and complex • Social media exploded onto the scene • Consumerization of IT • … and we didn’t know what was going on…
  • 17.
  • 18. The Privacy Crisis • We can at least be concerned that the NSA have cracked and monitor: – SSL (HTTPS) website activity – RSA encryption certificates (public/private keys) – 4G mobile networks (voice and data) – VoIP voice services – And any websites/etc. that use the above
  • 19. NSA has been outed…
  • 20. NSA security coverage • Means that they *can* (not will) hack/monitor most of the services we rely on daily • These all use the same core security tech
  • 21. Anonymous Networks Compromised • Kremlin put out a bounty for info to hackTOR • Gov’t / law enforcement compromised portions of theTOR network late 2014.
  • 22. Google, Microsoft, other email scans What is next ?
  • 23. And most recently… Oh, great... The government that has been spying on citizens just got hacked…
  • 24. And most recently… … and hackers in Asia know more about you than your siblings
  • 25. Facts: • Hacking incidents are here to stay. • You are never truly anonymous. • Adapt or be a continual victim.
  • 26. Some companies are Desperate
  • 27. Data creation explosion We are creating huge amounts of digital content, much of which lives longer in the cloud than we intended or have use for.
  • 28. Data creation • A large portion of what we create will live on disk somewhere beyond our use for it
  • 29. People know enough to be concerned
  • 30.
  • 31. Google’s Right to be Forgotten
  • 32. Apps that are helping • Snapchat • Wickr • Spideroak • All focused on being a “place” where your stuff is secure , sort of , sort of
  • 33. Apps that are NOT helping • Snapchat • Tinder • Facebook • Burner • etc
  • 34. We SHOULD… • Be concerned about – what gets shared – with whom – And how long it lasts
  • 35. Ephemeral • What does it mean? • Origin: greek word “ephĕmeros” • “lasting for a very short time” • The new “bucket” for technology that manages the life of digital content
  • 36. How does it help • Personal privacy • Corporate Risk • Facebook vs snapchat models • The opposite of Big Data ?
  • 37. Is it enough? • The concept is still new • People are building “apps” more than broad sweeping “solutions” • It doesn’t address the issue of being monitored/collected by NSA/Others
  • 38. Is AnonymityThe Answer? • Can communication really be anonymous ? • Only available for *some* activity online • Whistleblowers – do we want to enable WikiLeaks and Snowdens ? • But isn’t true anonymity the….
  • 39. Dark Side of the Internet
  • 40. Tools exist for anonymity • “Leak” website lets you send untrackable anonymous emails. – Inappropriate emails anybody ? – Harrassment, abuse ? • Tor lets you encrypt your web traffic and make you difficult to track – Porn and pirated content • Bitcoin exists to keep the banks out of your financial dealings – Silk Road. BUSTED. • Wickr has been spotted being used to sell/traffic illegal drugs
  • 41. But Still Enable Naughty Activity • Gov’ts around the world cracking down on porn and sex trafficking • FBI InfectingTor users with Malware • Google and Microsoft scan emails, etc. and report questionable content to authorities • Evil begets evil
  • 42. But Still Enable Naughty Activity
  • 44. Accountability • There is no way to make everybody behave • As a global society we need new ways to encourage law abiding netizens
  • 45. OMG I’m Scared • What should I do? – Know the risks – Use technologies to protect yourself – Don’t associate with those who don’t behave
  • 46. Parents: • Do you know what your kids are doing ? – Multiple email addresses / facebook profiles ? – Ephemeral and anonymous mobile apps – Its too easy to share pictures and photos
  • 47. What we need (the Future?) • Smarter users, and smarter parents • Anonymous peer validation for data integrity • Anonymous submissions to known entities only for whistleblowing • Social content stays social and never collected for “Big Data”
  • 48. In Summary • We are in a new era • Keep Calm • Stay Educated • Don’t Share unless you know the risks • Use the right tech for your security/privacy needs
  • 49. For Some Fun Reading • “Cryptonomicon” by Neal Stephenson – A futuristic take on: – Underground Data Haven – Anonymous Internet Banking – Digital Gold Currency
  • 50. Q&A
  • 51. Thank you for coming! • Presentation will be shared via twitter: • Follow me at @aschwabe • AND Posted on my blog: PainInTheApps.com

Editor's Notes

  1. Death of Privacy!
  2. Hackers
  3. Will it work? Is it enough ?