Internet surveillance - The Main Advantages

Size: px
Start display at page:

Download "Internet surveillance - The Main Advantages"

Transcription

1 INTERNET TECHNOLOGY: LIBERATING OR CONTROLLING? Dr. Farid Farahmand War & Peace Series Fall 2013

2 So!. Is the Internet technology! Internet has opened a new dimension of communications giving us more control! Facilitated out lives! Yet, it has become a tool of control! OR! governments and corporations continue to control flow, content, use, and infrastructure taking us under control?

3 Information Technology Nano- Technology Food processing and Agriculture Information Technology Other! Manufacturing Automotive & Robotics Semi-conductor Battery/Wind/ Solar Energy

4 Information Processing Cycle IT technology allows us to perform information Data processing cycle Information Technology Nano- Technology Inform. Food processing and Agriculture Manufacturing Information Technology Other! Automotive & Robotics Semi-conductor Battery/Wind/ Solar Energy

5 Information Processing Cycle Information Technology Data Inform. Manipulate/Store Nano- Technology Food processing and Agriculture Information Technology Other! Manufacturing Automotive & Robotics Semi-conductor Battery/Wind/ Solar Energy

6 IT Impacting All Other Technologies Digitizing the Information Nano- Technology Automotive Others Information Technology DIGITIZING THE DATA Semi-conductor Manufacturing Battery/Wind

7 IT Impacting All Other Technologies - Utilized by all other technologies Nano- Technology Others Information Technology DIGITIZING THE DATA Manufacturing Automotive Semi-conductor Battery/Wind

8 Internet & IT Infrastructure!The Internet is the enabling technology Internet

9 Internet & WWW!The World Wide Web is a technology that can provides many services over the Internet!! Finding Directions!! Shopping!! Chatting!! Music!! News!! File Sharing WWW

10 Access to the Internet Services - Increasingly via Smartphones Mainframes: Large machines, Limited access PCs: Promising Individual Freedom Laptops: Offering mobility Smart Phones: Anytime, anywhere! (smaller & more powerful) Today about half of Internet users in the U.S. use their smartphones to get online!

11 Smartphones: Integrated Part of Our Lives! 125 million iphones in million ipads in million Androids in 2013

12 Smartphones: Anywhere, Anytime! 3.37 Billion worldwide accounts 40 percent of people with iphones said they'd rather give up brushing their teeth for a week than go without their phone! (Chicago Tribune, 2011 ) Have access to cell phones Text Blindfolded! Percent who said they could only go a few hours without their mobile phone: 34%

13 I Cannot Get on the Internet!

14 What Were the Early Expectations of the Internet?

15 Early Expectations Early 70 s! Internet became the technology of liberation! Techno-utopian dreamers were promising a cybernetic meadow! Fred Turner coined the term Virtual Reality:! A technological paradise where people are linked together! An unconstrained reality free from existing physical, social & political boundaries! The WWW brought the notion of Heavenly City Promising liberation from rules and routines

16 The Reality of the Internet Fast forward 40 years! The Internet turned out to be an extremely powerful and a mysterious technology! Revolutionized our lives & empowered us in many ways! Education, Commerce, Healthcare, etc.! It has also become an instrument of bureaucratic control! Created a conduit for profiting & monitoring

17 In ten minutes!

18 Getting Connected to the Internet 18:87:00:bf:99: ! Internet-enabled Device! Each device has a unique hardware address 2.! Internet Service Provider (ISP)! Examples: AT&T, Vertizon, Netzero, etc.! They provide IP (Internet Protocol) address! Also offer services such as , web page, etc. 3.! Physical Connection! Provided by the phone company or the ISP IP: :87:00:bf:99:0

19 The Internet In Action Addressing IP: f0:f4:79:50:df:b6 HEADER IP: MAC: f0:f4:79:50:df:b6 ISP & Location The Internet

20 Tracing A Simple From YAHOO! HEADER IP: MAC: f0:f4:79:50:df:b6 ISP & Location

21

22 The Internet In Action Message Blocking (Firewall) IP: flexnet.com f0:f4:79:50:df:b6 The Internet

23 The Internet In Action Message Content Monitoring Lunch? Server IP: Lunch?

24 The Internet In Action Metadata Monitoring IP: To: Joe Metadata NOT Encrypted) Data Content (Payload) Maybe Encrypted From To Data: Let s Have Lunch

25 Metadata: What Does it Reveal?! Putting subtle pattern out of your data! Are you pregnant?! Are you Sick?! Where are you going to school?! Are you moving out?! Are you traveling soon?! Finding your connections! Whom are you communicating with Metadata is NOT encrypted! Does it mean we can collect them? MIT MEDIA LAB: Immersion Software

26 Who is Running the Internet? Internet Traffic Drop by 40% When Google Goes down for 2 min.! Server OR

27 The Big Picture Each Click Generates Revenue! Server!! Bulk data collection!! Out interests!! Purchasing patterns!! Impacting out Actions OR

28 Smartphones: Becoming More Traceable Digital Trail Reveal Our Connections Reveal Private Information

29 So!.! Internet has opened a new dimension of communications! Facilitated out lives Internet has changed our lives!! Yet, it has become a tool of control!! governments and corporations continue to control flow, content, use, and infrastructure Yet, It is increasingly becoming a tool to monitor & control!

30 Internet: Enabling Technology of Control!for very good reasons! Corporate Control of The Internet Government Control of The Internet 1-National Security! Terrorism! Preserve sovereignty 2-National Laws! cyber crime! child porn.,! Gambling,! Intel. property rights,! etc.)

31 Internet Liberation- A Common Perception Once the Internet reaches a country it is an unstoppable liberating force Color Revolutions of the former Soviet Union, it was mobile phones Saffron Revolution in Burma, it was YouTube Green Movement in Iran, it was Twitter

32 Internet Liberation An Illusion?!Governments are becoming more powerful & capable to control their domestic Internet!! Sophisticated filtering technology! Subtle removal of Web requests! Tracing s! Arresting bloggers For States: Internet is not the Problem! The trouble is Uncontrolled Internet Use!

33 Controlling The Internet: Governments Asking to Censor the Internet! In the second half of 2011 the total number of government requests to Google jumped by 103 percent! Google complied with 63 percent of the requests Google Transparency Report Content Removal Request 1,811 (18,070) Time Period Ending 2,285 (24,179)

34 Controlling The Internet: Governments Censoring The Internet 2011 Examples Spain: requested removal of 270 search results that linked to improper blogs and sites Canada: ordered removal of a YouTube clip disfiguring a public document (a man urinating on his Canadian passport) Thailand: requested blocking local users from viewing more than 100 videos insulting the monarchy Turkey: ordered restricting access to videos insulting the founder of modern Turkey (Ataturk)

35 Controlling The Internet: Blocking/Filtering! Saudi Arabia: The government filters any topics related to drugs, bombs, alcohol, gambling - authorities receive over 1,200 requests everyday to have web pages blocked! Kuwait: A 20 year old blogger gets 10 years in prison for defaming the Saudi & Bahraini government! Bahrain: Nabeel Rajab, president of the Bahrain Center for Human Rights was sentenced on July 10 to three months in prison for a tweet June 2013: WhatsApp must! Oman: Four young men received 3-6 months in prison for posting on social establish networks a local server that! U.K.: A 17 year allows old was detained officials after to monitor sending a malicious tweet to British Olympic Diver: You let your dad down, I hope you know it user activity!! Israel: "Facebook posts and Twitter feed matter of state security We [the censors] try to operate within the internet only in terms of elements related to us.

36 Internet In the U.S. New Revelations Early June of 2013 Former National Security Agent Contractor, Edward Snowden Revealed Secret Documents!

37 Massive Internet Surveillance Edward Snowden Documents! Intelligent agencies including Government Communication Headquarter & NSA working with high-tech companies were snooping on EVERYONE! $250 million/year

38 Massive Internet Surveillance Edward Snowden Documents (1) 1.! Conducting massive surveillance programs secretly! Bulk data collection on citizens (PRISM, 2007)! Creating taps on transatlantic fiber optic cables (TEMPORA) 2.! Spying on friendly foreign allies! Hacking into foreign targets computers, confiscating data and monitoring communiqué (TAO)

39 Massive Internet Surveillance Edward Snowden Documents (2) 3.! Defeating encryption programs! Developing counter encryption program (EDGEHILL & BULLRUN) 4.! Collecting and monitoring METADATA! Collecting social connections of U.S. citizens 5.! Compromising cyber security! Hardware backdoor: Encryption chips! Software malwares: BSAFE software,

40 The Big Leak! Server OR

41 The Big Leak!

42 So!.! Internet has opened a new dimension of communications! Facilitated out lives Jay Leno: "I am glad the government is shut down!! Yet, it has become a tool of control!! governments and corporations continue to control flow, content, use, and infrastructure For the first time in years it's safe to talk on the phone and send s without anybody listening in!"

43 Defending Internet Freedom or Conducting Internet Spying? Welcoming the whistle blowers from Iran, Cuba, and China NSA has created a massive surveillance system capable of snooping on every individual, company, or foreign government! Internet is American! Gmail is the preferred Internet service provider of terrorists worldwide, Hayden (Ex-NSA/CIA Chief)

44 Defending Internet Freedom or Conducting Internet Spying?

45 Internet Surveillance Hurting the Bottomlines! Information Technology and Innovation Foundation (ITIF): US cloud providers stand to lose $22-$35 billion over the next 2008 three years! 2013

46 Internet Surveillance Hurting the Bottomlines!

47 $e 62%# Potential Consequences Anyway, I Have Nothing to Hide!! In the modern communications age every thing we do leaves a digital trail!! Some valid questions:! Can we trust NSA Analysts to have so much power? Agents illegally spied on love interests! Does NSA really ensures the security of the gathered data? NSA still does not know the full extend of Snowden documents! Should there be a limit as to NSA s blank surveillance? Sen. Feinstein's NSA 'reform' bill would expand snooping powers

48 Future of the Internet? You Be the Judge! In a recent hearing Senator Mark Udall asked : Is it the goal of the NSA to collect the phone records of all Americans? In response, NSA director Keith Alexander replied: Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes, The new $1.5 billion NSA data center in Bluffdale, Utah, will be able to, by some estimates, store the equivalent of 250 trillion DVDs worth of data

49 Final Remarks.. Any technology can only fit within the socio-economic structure of the society Technology in a country with oppressive government will turn into tool of oppressor Become more more aware and demand public monitoring Know what you are disclosing Use privacy tools and filtering Protect your network address Promote Net Neutrality, Public Broadcasting, Internet Freedom Ask the right questions! How is your privacy protected? Who is monitoring? What is being monitored?

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

Brief on Did GCHQ Spy on You Illegally?

Brief on Did GCHQ Spy on You Illegally? Brief on Did GCHQ Spy on You Illegally? Privacy International on Monday launched a campaign and platform allowing people to ask the UK s surveillance court, the Investigatory Powers Tribunal, if GCHQ spied

More information

Can we maintain Human Rights in Our Cyber Empire?

Can we maintain Human Rights in Our Cyber Empire? Can we maintain Human Rights in Our Cyber Empire? Yvo Desmedt Univ. of Texas at Dallas USA and University College London UK December 11, 2014 c Yvo Desmedt 1. THE INDUSTRIAL EMPIRES The industrial empires

More information

Securing our information we have the technology; we just have to have the will to do it

Securing our information we have the technology; we just have to have the will to do it Interview with Arjen Kamphuis, information technology specialist Securing our information we have the technology; we just have to have the will to do it Author: Valentina Novak "The hackers need you as

More information

Revealed: how US and UK spy agencies defeat internet privacy and security

Revealed: how US and UK spy agencies defeat internet privacy and security http://www.theguardian.com/world /2013/sep/05/nsa gchq encryption codes security Revealed: how US and UK spy agencies defeat internet privacy and security NSA and GCHQ unlock encryption used to protect

More information

Security and Internet Censorship

Security and Internet Censorship Security and Internet Censorship Computer Literacy 1 Lecture 24 13/11/2008 Topics Security Hacker Viruses Phishing Firewall Censorship of the Internet 2 Examples Hacking or Cracking Cracking = Subverting

More information

OPEN ACCESS, PRIVACY AND HACKER CULTURE

OPEN ACCESS, PRIVACY AND HACKER CULTURE OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013

More information

Patriot Act Impact on Canadian Organizations Using Cloud Services

Patriot Act Impact on Canadian Organizations Using Cloud Services Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states

More information

In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.

In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014. Contents Introduction... 1 Main findings... 2 Methodology... 3 Section 1. Device usage... 4 Section 2. Online and on the move: Internet activity... 6 Section 3. The connected treasure chest: what is stored

More information

The Impact of the NSA on Hosting Decision Makers in the UK and Canada. Survey Findings prepared by March Communications January 2014

The Impact of the NSA on Hosting Decision Makers in the UK and Canada. Survey Findings prepared by March Communications January 2014 The Impact of the NSA on Hosting Decision Makers in the UK and Canada Survey Findings prepared by March Communications January 2014 1 Executive Summary A new independent survey of 300 UK and Canadian businesses,

More information

details, and numerous other data points. Enough information is often collected that even 2

details, and numerous other data points. Enough information is often collected that even 2 Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 650 Pennsylvania Avenue, NW Washington, D.C. 050 VIA E MAIL bigdata@ostp.gov March, 04 Re: Big Data Study, Document

More information

The Future of Associating is Mobile Webinar Series. Embracing the Mobile Opportunity: Reinventing Your Association's Value for The Third Screen

The Future of Associating is Mobile Webinar Series. Embracing the Mobile Opportunity: Reinventing Your Association's Value for The Third Screen The Future of Associating is Mobile Webinar Series Embracing the Mobile Opportunity: Reinventing Your Association's Value for The Third Screen Jeff De Cagna, Chief Strategist and Founder Principled Innovation

More information

As the US debates email privacy a Berlin start up surges with...

As the US debates email privacy a Berlin start up surges with... TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services

More information

SNOOPWALL FLASHLIGHT APPS THREAT ASSESSMENT REPORT

SNOOPWALL FLASHLIGHT APPS THREAT ASSESSMENT REPORT SNOOPWALL FLASHLIGHT APPS THREAT ASSESSMENT REPORT Summarized Privacy and Risk Analysis of Top 10 Android Apps by SnoopWall mobile security experts and the Privacy App scanner THREAT REPORT Apps Super-Bright

More information

Cloud storage buyer s guide

Cloud storage buyer s guide Cloud storage buyer s guide for small business sponsored by 1 Table of contents Why should you read this guide? 3 Step 1: Decide how much security you need 4 Step 2: Consider what you need cloud storage

More information

Hope for the best, prepare for the worst:

Hope for the best, prepare for the worst: Hope for the best, prepare for the worst: Why your customers will demand self-service back-up Presented by Ridley Ruth, COO 2014 a record year for hacking! 100K+ WordPress sites infected by mysterious

More information

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to

More information

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for

More information

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,

More information

submit your problem and we will be more than happy to cooperate with you to find the most effective solution.

submit your problem and we will be more than happy to cooperate with you to find the most effective solution. ]HackingTeam [ REMOTE CONTROL SYSTEM PROFESSIONAL SERVICES & SU PPORT HackingTeam does more than providing the software, we also provide professional services and support. We want you to get the maximum

More information

The Big Data Paradigm Shift. Insight Through Automation

The Big Data Paradigm Shift. Insight Through Automation The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.

More information

Hope for the best, prepare for the worst:

Hope for the best, prepare for the worst: Hope for the best, prepare for the worst: Why your customers will demand self-service back-up Presented by Ridley Ruth, COO Breaking News Yahoo email Accounts were hacked in Jan 2014 (Washington Post)

More information

In 2015, just under half (43%) the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.

In 2015, just under half (43%) the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014. Contents Introduction... 1 Main findings... 2 Methodology... 3 Section 1. Device usage... 4 Section 2. Online and on the move: Internet activity... 6 Section 3. The connected treasure chest: what is stored

More information

Premium Advertising Sweden UK France Germany

Premium Advertising Sweden UK France Germany Premium Advertising Sweden UK France Germany On behalf of Widespace 05.11.2015 Content Study design Management Summary Sample Results Total Sweden UK France Germany Contact 2 Study design Study characteristics

More information

Behind the great firewall

Behind the great firewall COPYRIGHT of /ted- talks/ Explain what you understand 1) What s BRIC and SICK? Behind the great firewall 2) How does the great Wall connect to modern technology? 3) Why is Chinese Internet booming even

More information

Data privacy and security in the post-snowden era

Data privacy and security in the post-snowden era Data privacy and security in the post-snowden era Matthew D. Sarrel, CISSP August 22, 2014 This report is underwritten by Verne Global. TABLE OF CONTENTS Executive summary... 3 Situational analysis...

More information

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Peter Hirsch Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Computation Software Applications Data access Storage services.that do not require

More information

Risk Analysis in Skype Software Security

Risk Analysis in Skype Software Security Risk Analysis in Skype Software Security Afnan AlOmrani, Rasheed AlZahrani, Eyas ElQawasmeh Information System Department College of Computer and Information Sciences King Saud University Riyadh, Saudi

More information

CERT's role in national Cyber Security: policy suggestions

CERT's role in national Cyber Security: policy suggestions CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula What is national Cyber Security is? In another

More information

Cyber Defense & Breach Response Privacy Issues

Cyber Defense & Breach Response Privacy Issues Cyber Defense & Breach Response Privacy Issues Kevin Boyle Partner 17 November 2014 Latham & Watkins is the business name of Latham & Watkins (London) LLP, a registered limited liability partnership organised

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure ICPAK ANNUAL FORENSIC AUDIT CONFERENCE Digital Forensics in Fraud & Corruption Investigations 9 October 2014 Leisure Lodge Hotel, Diani Kenya Faith Basiye, CFE Head Group Forensic Services KCB Banking

More information

CSA Survey Results Government Access to Information July 2013

CSA Survey Results Government Access to Information July 2013 CSA Survey Results Government Access to Information July 2013 EXECUTIVE OVERVIEW During June and July of 2013, news of a whistleblower, US government contractor Edward Snowden, dominated global headlines.

More information

Security Benefits of Cloud Computing

Security Benefits of Cloud Computing Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: alecu.felician@ie.ase.ro Abstract: The nature of the Internet is

More information

Internet, Smartphone & Social Media Usage Statistics

Internet, Smartphone & Social Media Usage Statistics Internet, Smartphone & Social Media Usage Statistics Presented by: RapidValue Solutions Date: 1 st December 2014 RapidValue Solutions Internet Demographics RapidValue Solutions 2 Number of Internet Users

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

Big Data Big Security Problems? Ivan Damgård, Aarhus University

Big Data Big Security Problems? Ivan Damgård, Aarhus University Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)

More information

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA

More information

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks

More information

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014 CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)

More information

SUNDAY, JUNE 16, 2013. MARINA Internet metadata

SUNDAY, JUNE 16, 2013. MARINA Internet metadata ABCDE SUNDAY, JUNE 16, 2013 NSA SURVEILLANCE The Architecture Four-pronged U.S. approach relies heavily on data behind Internet, phone communications By Barton Gellman On March 12, 2004, acting attorney

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure ICPAK ANNUAL FORENSIC AUDIT CONFERENCE Digital Forensics in Fraud & Corruption Investigations 9 October 2014 Leisure Lodge Hotel, Diani Kenya Faith Basiye, CFE Head Group Forensic Services KCB Banking

More information

Is Skype Safe for Judges?

Is Skype Safe for Judges? Is Skype Safe for Judges? By Martin Felsky, PhD, JD, for the Canadian Judicial Council, 1 Version 3.0 January 17, 2014 Microsoft Skype is a software application that permits its tens of millions of subscribers

More information

Online Freedom of Speech: The Battle Continues

Online Freedom of Speech: The Battle Continues Online Freedom of Speech: The Battle Continues Walid AL-SAQAF Diplo Foundation Webinar September 25, 2012 Relevant Questions 1. The UN Human Rights Council's issued a resolution affirming human rights

More information

Welcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network

More information

DIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy

DIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy A DIGITAL LIFE E-GUIDE How to Claim Your Online Privacy As more and more people go online for personal transactions like shopping and banking, you re bound to wonder how much information about you can

More information

Smart Policing Initiative Website and Social Media

Smart Policing Initiative Website and Social Media Smart Policing Initiative Website and Social Media Vivian Chu, CNA Research Specialist Iris Gonzalez, CNA Project Manager February 8, 2012 This project was supported by Grant No. 2009-DG-BX-K021 awarded

More information

VWC. Your gateway to a safe, secure and private Internet. Jeff Bermant, Co-Founder & Chief Executive Officer Jeff@vworldc.com - 805.845.

VWC. Your gateway to a safe, secure and private Internet. Jeff Bermant, Co-Founder & Chief Executive Officer Jeff@vworldc.com - 805.845. Your gateway to a safe, secure and private Internet Jeff Bermant, Co-Founder & Chief Executive Officer Jeff@vworldc.com - 805.845.9200x211 1 The Internet Can Be A Scary Place Malware infection up in Q2

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

High-Speed Internet Quick Start Guide

High-Speed Internet Quick Start Guide High-Speed Internet Quick Start Guide Connect Your World. NEED HELP? Call 1.800.239.4430 or visit Frontier.com/HelpCenter Contents PART #1: Wi-Fi Router Setup... 4 PART #2: Configure Wi-Fi Router... 8

More information

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014 Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:

More information

Internet!Surveillance!and!Boomerang!Routing!:! A!Call!for!Canadian!Network!Sovereignty!

Internet!Surveillance!and!Boomerang!Routing!:! A!Call!for!Canadian!Network!Sovereignty! JonathanA.Obar,AndrewClement InternetSurveillanceandBoomerangRouting: ACallforCanadianNetworkSovereignty InP.Ross&J.Shtern(Eds.),TEM$2013$:$Proceedings$of$the$Technology$&$Emerging$Media$Track Citation

More information

Cloud Storage and Sharing Platforms - The Fear of risk

Cloud Storage and Sharing Platforms - The Fear of risk 2014 Danger in the Cloud Report Tresorit research report: examining the attitudes on the safety and security of professional and private information online in the U.S. September 2014 Foreword by Istvan

More information

BBBT Podcast Transcript

BBBT Podcast Transcript BBBT Podcast Transcript About the BBBT Vendor: The Boulder Brain Trust, or BBBT, was founded in 2006 by Claudia Imhoff. Its mission is to leverage business intelligence for industry vendors, for its members,

More information

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

MOBILE MALWARE REPORT

MOBILE MALWARE REPORT TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores

More information

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere MAXPRO Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS Video Anytime, Anywhere HOSTED VIDEO SURVEILLANCE Video in the cloud 2 Anytime, Anywhere Why the Cloud? The cloud is everywhere. Whether

More information

What s Hot and What s Not in the World of Cyber Security and Cyber Crime

What s Hot and What s Not in the World of Cyber Security and Cyber Crime Department of Technology, Management & Budget (DTMB) What s Hot and What s Not in the World of Cyber Security and Cyber Crime Dan Lohrmann, Chief Technology Officer Department of Technology, Management

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

All can damage or destroy your company s computers along with the data and applications you rely on to run your business. All can damage or destroy your company s computers along with the data and applications you rely on to run your business. Losing your computers doesn t have to disrupt your business if you take advantage

More information

Outbound Email and Data Loss Prevention in Today s Enterprise, 2010

Outbound Email and Data Loss Prevention in Today s Enterprise, 2010 Outbound Email and Data Loss Prevention in Today s Enterprise, 2010 Results from Proofpoint s seventh annual survey on outbound messaging and content security issues, fielded by Osterman Research during

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

Understanding and Circumventing The Great Firewall of China

Understanding and Circumventing The Great Firewall of China Understanding and Circumventing The Great Firewall of China Lisa Fan Mentor: Ming Chow 12/12/15 Abstract The Great Firewall of China is nowadays almost as famous as the country s original Great Wall. However,

More information

Detecting Cyber Attacks in a Mobile and BYOD Organization

Detecting Cyber Attacks in a Mobile and BYOD Organization SOLUTION BRIEF Detecting Cyber Attacks in a Mobile and BYOD Organization Explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a

More information

Excellence in Engineering Since 1946

Excellence in Engineering Since 1946 Excellence in Engineering Since 1946 Strand Associates, Inc. ( ) Up in the Clouds Computing Wisconsin Wastewater Operators Association 47 th Annual Conference October 24, 2013 Eric M. Fisher, P.E. Outline

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

THE NATIONAL JUDICIAL COLLEGE

THE NATIONAL JUDICIAL COLLEGE E DUCATION I NNOVATION A DVANCING J USTICE THE NATIONAL JUDICIAL COLLEGE OUTSIDE THE BOX: INTERNET & NETWORK TECHNOLOGY DIVIDER 7 Professor Donald R. Mason OBJECTIVES: After this session, you will be able

More information

Rebooting Business, Capitalism and Work - and what technology has to do with it

Rebooting Business, Capitalism and Work - and what technology has to do with it Rebooting Business, Capitalism and Work - and what technology has to do with it @gleonhard FuturistGerd.com What is a Futurist? Technology always has 2 aspects we need to be aware of Is your business

More information

Personal Safety Tips For Public Information Technology

Personal Safety Tips For Public Information Technology IDENTITY THEFT Practical Tips to Do Your Best David L. Haase November 21, 2015 OPCUG / PATACS 1 Today s Agenda Who is This Guy? Are You a Target? I.D. Theft vs. Stalking What Do Thieves Target? Have a

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

A Match Made in Heaven: Marrying Information & Computation

A Match Made in Heaven: Marrying Information & Computation A Match Made in Heaven: Marrying Information & Computation OR: Why are we really doing Information-centric Networking? Dirk Trossen, Computer Laboratory We All Know About Video: Staggering Numbers 2 billion

More information

10 Steps to a Multichannel Strategy and an Exceptional Customer Experience

10 Steps to a Multichannel Strategy and an Exceptional Customer Experience 10 Steps to a Multichannel Strategy and an Exceptional Customer Experience Jesús Hoyos CRM industry analyst and advisor Brad Herrington Principal Solutions Architect Interactive Intelligence, Inc. Contents

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Internet Marketing Rules!

Internet Marketing Rules! Internet Marketing Rules! A Playbook of Game Changing Strategies for Marketing Your Business Online by Lane Jones, Content Strategist Internet Marketing Rules! Game Changing Strategies for Marketing Your

More information

Internet Security for Remote Users

Internet Security for Remote Users Internet Security for Remote Users ABSTRACT: This document explains the advantages of cloud-based Internet security services for remote/mobile email and Web users. Traditional gateway or in-house security

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT

CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT 2009 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All other trademarks

More information

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation

More information

Iran - Researched and compiled by the Refugee Documentation Centre of Ireland on 5 August 2011

Iran - Researched and compiled by the Refugee Documentation Centre of Ireland on 5 August 2011 Iran - Researched and compiled by the Refugee Documentation Centre of Ireland on 5 August 2011 Information on internet freedom, in particular social media websites. A report issued in May 2011 by Freedom

More information

POLICY BRIEF Why Trade Agreements are not Setting Information Free

POLICY BRIEF Why Trade Agreements are not Setting Information Free POLICY BRIEF Why Trade Agreements are not Setting Information Free Susan Ariel Aaronson, Ph.D. In December 2012, IIEP published a policy brief, Can Trade Policy Set Information Free? which compared US,

More information

Google Apps for Education in Sapienza: a service for students. Francesco Barcellona Centro InfoSapienza

Google Apps for Education in Sapienza: a service for students. Francesco Barcellona Centro InfoSapienza Google Apps for Education in Sapienza: a Francesco Barcellona Centro InfoSapienza service for students 26/06/14 Pagina 2 Students and teachers of Sapienza 190.000 of students and 10.000 teachers already

More information

CIS3210 Computer Networks. Ethics in Networking

CIS3210 Computer Networks. Ethics in Networking CIS3210 Computer Networks Ethics in Networking 1 Jason Ernst, University of Guelph - Fall 2011 Outline Benefits of Computer Networks Why Study Ethics & Cyberethics Privacy Property and Intellectual Property

More information

SafeCall Secure Communication System

SafeCall Secure Communication System SafeCall Secure Communication System Specifically Engineered for our Panama Clientele Trevor Grose [Panama Manager] Jim Sanders [Europe] Business Development Manager Managing Director Email: trevor@netdataltd.com

More information

Putting your best foot forward. Managing corporate security in a world of consumer devices an analysis of primary research

Putting your best foot forward. Managing corporate security in a world of consumer devices an analysis of primary research Putting your best foot forward Managing corporate security in a world of consumer devices an analysis of primary research Take two footwear manufacturers: one in Milan, Italy and one in Sao Paulo, Brazil.

More information

Compulogics, USA Hdqs: 675 Trout Lake Dr. Sanger, CA 93657 Sales: (559) 291-7222 info@pclogics.com

Compulogics, USA Hdqs: 675 Trout Lake Dr. Sanger, CA 93657 Sales: (559) 291-7222 info@pclogics.com Cloud Hosting Application Management Web and Email Services Co-location services IT Resource Planning Business Continuity Compulogics, USA Hdqs: 675 Trout Lake Dr. Sanger, CA 93657 Sales: (559) 291-7222

More information

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,

More information

Mobile multifactor security

Mobile multifactor security Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,

More information

Unlocking & Locking Big Data: Defending the DataLake

Unlocking & Locking Big Data: Defending the DataLake Day 2 DIGITAL BUSINESS TECHNOLOGIES Digital Business Transformation @ CeBIT Campus 2015 Unlocking & Locking Big Data: Defending the DataLake Part 1: Stephen Lloyd-Jones, MD, DataLake Solutions Part 2:

More information

Proactive controls to mitigate IT security risk

Proactive controls to mitigate IT security risk Proactive controls to mitigate IT security risk Policy Compliance Content Security Secure Access Endpoint Security Information security risk mitigation Empowering people to work securely The Cryptzone

More information

Home WiFi & Networking: Best Practices

Home WiFi & Networking: Best Practices 2 1. Change Default Administrator Passwords (and Usernames) When you install your wireless router, also known as an access point, the absolute first thing to do is change the default password. (Just Google

More information