Protecting Privacy
Total Page:16
File Type:pdf, Size:1020Kb
It Could Happen To You Protecting Privacy Tim Hoffman, MS, CISSP, ISP, C|EH, GCIH, ITIL, CCSK, CTT+, Security+… © Tim Hoffman & Associates, LLC 2020 Agenda o Community Changes Everything Overview – Qualifications o Privacy Right Laptop Lounge and Alida Connection o Top Threat of the Day: CYBER CRIME Privacy – What Is It ? o DARKNET FULLZ Google Search Right of Privacy – PERSONAL AUTONOMY o Staying Anonymous Good Old Days o Finding Information Our World Has Changed (I and II) Who Has Our Information: EVERYONE Social Media Addiction o We Give Our Data Away For Free o Identity Theft (Financial) Legal Residual Risks in Social Media o Identity Theft (Medical) o Let’s Get Technical © Tim Hoffman & Associates, LLC 2020 Overview - Qualifications President/CEO – Alida Connection Lead Information Security Engineer UCSF and for Center for Digital Health Innovation EVP ISSA Colorado Springs - Fellow Former US Navy Cryptologic Officer - part of the Intelligence Community Director of Threat at NSA spending time in Off-Line Crypto, Signals Intelligence/SIGSEC and Taught Electronic Warfare – Radio Fingerprinting – Mensuration Mensuration, a branch of mathematics that deals with measurement of various parameters of geometric figures Co-Author of technical series Network+ Certification Guide, TCP/IP for Windows NT 4.0, TCP/IP for Windows 2000, Microsoft Proxy Server 2.0, UBS Warburg Rollout Policy MS, CISSP, ISP, C|EH, GCIH, ITIL, CCSK, CTT+, Security+… © Tim Hoffman & Associates, LLC 2020 Laptop Lounge and the Alida Connection This presentation will not: Make you thinner. Put $12,000,000 in your bank account. Help you find the LOVE of your life. If you are receiving many advertisements in email for Cialis and Viagra – this discussion may be for you. © Tim Hoffman & Associates, LLC 2020 PRIVACY – What Is It? Privacy (from Latin: privatus) is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. When something is private to a person, it usually means there is something to them inherently special or sensitive. The domain of privacy partially overlaps security, including for instance the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity. Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very often with specific dangers and losses, although this is a very strategic view of human relationships. In the business world, a person may volunteer personal details (often for advertising purposes) in order to gamble on winning a prize. Personal information which is voluntarily shared but subsequently stolen or misused can lead to identity theft. © Tim Hoffman & Associates, LLC 2020 Right of Privacy: PERSONAL AUTONOMY The right of privacy has evolved to protect the freedom of individuals to choose whether or not to perform certain acts or subject themselves to certain experiences. This personal autonomy has grown into a 'liberty' protected by the Due Process Clause of the 14th Amendment. This liberty is narrowly defined and generally only protects privacy of family, marriage, motherhood, procreation, and child rearing. There have been attempts to further extend the right of privacy under other Amendments (1st, 4th, and 5th) to the U.S. Constitution; however, a general right to personal autonomy has yet to take hold beyond limited circumstances. Source: Cornell Law In the 1940s we assumed everyone was honest – good citizens. What are our assumptions today? © Tim Hoffman & Associates, LLC 2020 Good Old Days Those who cannot remember the past are condemned to repeat it. Analogy - SLOW - versus - FAST - and LOCAL versus GLOBAL. Investigations - Information Collection - Step-by-Step Privacy by Design – everything was local – so choices were limited Data was collected and used locally A background check for Government work was a lengthy process – one element at a time. Local Agency Check (Police Records) – National Agency Check (ENT – NAC or NAC) SBI – SSBI and beyond (nuclear programs etc.) Name – Address – Phone – Family & Relatives – Mother’s Maiden Name - SSN – DOB – Past Addresses – Place of Employment – Real Property – Marriage – Divorce – Voter Registration – Civil Court and Public Filings – Permits – Licenses – Church Affiliations – Tax Filing – Donations – Credit Report – Credit Cards – Phone Bills – © Tim Hoffman & Associates, LLC 2020 Our World Has Changed Computing Power (speed, hard drive storage and memory) Everyone has a cell phone / smart phone Everything is immediate and digital - Travel, Medical records, Credit Card Department of Homeland Security save 75 years of exit and entry to the US Google – stores 100 Years of every Newspaper in the US Every Twitter tweet turned over to the Library of Congress Optical Character Readers can scan thousands of sheets every day Google mapped every WI-FI node in North America Creation of new Search Models and new video to text - translators Precision Target Marketing – merchants want to sell stuff © Tim Hoffman & Associates, LLC 2020 Our World Has Changed There is no forgetting – everything you have ever done Every Rant – post – picture – ticket – newsgroup – telephone call and Every Bit and Byte of Activity Everything is forever cached – indexed – and stored for posterity No privacy any more – no shame – LinedIn – Name Address Phone Sexual Orientation What you did last night – life casting – real reality Where you are going on vacation (and your children) Blippy.com – putting your entire set of purchases online GPS is always on – Everyone wants to know everything about you Augmented Reality (facial recognition – building - landmark recognition) Picasa now has Built in Facial Recognition Tag everything – right ? © Tim Hoffman & Associates, LLC 2020 Social Media Addiction © Tim Hoffman & Associates, LLC 2020 We Give Our Data Away For Free Before computers were used as primary tools - people used anonymity to protect their privacy. Are you anonymous today? No - today anonymity is close to non-existent for anyone alive. Cyber crime is increasing exponentially – Nation State Sponsored. Once you give your data to a company who does it belong to? What’s in your account? Facebook Google Drive Identify theft is rampant. Twitter AWS (Amazon) Ever tried to delete? Tumblr Azure (Microsoft) Foursquare Box Look at Wayback at Pinterest DROPBOX archive.org Shutterfly iCloud © Tim Hoffman & Associates, LLC 2020 Instagram … Community Changes Everything Today – Everyone has a megaphone The end of Forgetting is here – all communications are permanent and indelible Data points exist on everything that is put online in any format Social media means: Everyone talks Everyone listens Everyone remembers EVERYTHING ! The line between personal and professional – private and public is a BLUR ! Social media creates both internal and external legal risks that did not exist before. © Tim Hoffman & Associates, LLC 2020 Legal Residual Risks in Social Media Disclosure of RESTRICTED (Confidential/SECRET) information Trademark Infringement Copyright Infringement Defamation E-Discovery Endorsements Privacy and Publicity RIGHTS HR Issues © Tim Hoffman & Associates, LLC 2020 Privacy Right Privacy is one of the most widely sought of rights and among rights most valued The TO DO LIST: Consider what you reveal about personal details to strangers or just-met “friends” (think social engineering) Beware of web sites that offer rewards and prizes Be aware of home computer and device security Examine privacy policies Use encryption everywhere possible (look for the lock) The NOT DO LIST: Do not reveal personal information inadvertently Do not reply to spammers - for any reason © Tim Hoffman & Associates, LLC 2020 Top Threat of the Day: CYBER CRIME In the evolution of CYBER CRIME - In days past – Perhaps a teenager or a couple friends got together with some energy drinks or a Mountain Dew and set out to find a web server with vulnerabilities they could exploit for fun. Cyber Crime Today – Lone criminal is still out there but the predominant form of threat is the organized group of cyber criminals who are intent on hacking for profit. Many of the groups that do this are made up of highly skilled professionals who seek financial gains. Credit cards are worth a dollar ($1) each Medical Record with some history is worth up to $214 (Ponemon Institute) © Tim Hoffman & Associates, LLC 2020 DARKNET FULLZ Google Search Hello I'm hacker and seller and I offer stuff for serious carders. If you need CVV or ***** (track1/track2 original), or something else I will be glad to help you. Always in stock Us , EU , UK , CN database of *****, COB's, Full Info, CVV's... ***** - include original track1/track2, also have some ***** with card holder info (ZIP , SSN , MMN , CVV2) CVVs - include CC#, CVV2, EXP.DATE, full name, full address. My service is well-known, and verified at carding forums. I am a verified seller at these sites: Netcarding.ru OffCarding DarkNet CardingWorld I do shopping to any address in US and UK,I shop iphones,laptops,perfums and more,Laptop is 100$,Iphone is 100$,Normal phone is 80$............. Come for more deal Contact me if u want buy: sellcvv_good14 1 Visa card..........3$ 1 master card..........3$ 1 amex card..........5$ 1 Dicover card..........5$ 1 Company card..........8$ 1 Uk Card Nornal CC..........5$ 1 Uk Card With DOB ..........20$ 1 Track 1& 2 CC..........30$