How to Be Anonymous Online

Views:
 
     
 

Presentation Description

How to Be Anonymous Online

Comments

Presentation Transcript

How to Be Anonymous Online:

How to Be Anonymous Online William Favre Slater, III, M.S. MBA, PMP, CISSP, CISA Sr. Cybersecurity Consultant / Project Manager / Program Manager Chicago, Illinois United States of America March 14, 2018

 Presentation Abstract:

 Presentation Abstract In the day and age of big Data Breaches and loss of privacy, many people wonder how they can do a better job of guarding their privacy and their data, and possibly even attempting to be invisible or anonymous when they use the Internet. This presentation will cover the challenges of privacy, and the methods and tools that can be used to allow Internet users become anonymous and do a better job of guarding their digital privacy. March 14, 2018 How To Be Anonymous Online 2

 How to Be Anonymous Online Agenda:

 How to Be Anonymous Online Agenda Introduction Legal Stuff The Internet is a Huge Place The Problem Why Would You Want to Be Anonymous Online? 17 Steps to Being Completely Anonymous Online 17 Essential Tools to Protect Your Online Identity, Privacy Other Threats to Your Privacy and Identity – Life in The Surveillance Society Other Forms of Accomplishing Anonymity in Your Daily Life 10 Tips for Data Privacy in Businesses Advantages and Disadvantages Parting Thoughts Conclusion Questions References March 14, 2018 How To Be Anonymous Online 3

Introduction:

Introduction The creators of the ARPANET (1969) which evolved into the Internet (1983) created something that was designed to be simple, reliable, platform-independent, and perform well. The Internet population had 50 million users in less than four years, and today there are over 2.5 billion on the Internet. Since the Internet went “business critical” in 1997, lack of security and loss of privacy have been constant issues, and every year it has continued to get worse, leading to serious crimes involving hacking, identity theft, stalking, harassment, etc. It is no wonder then that many Internet users are pondering the idea of going online as anonymous users to protect their privacy. This presentation will address the problems related to lack of privacy, and how to plan and implement methods and tools to protect privacy. While many of these tools and techniques are free, it still requires regular efforts and knowledge to stay abreast of the threats, as well as the selecting the right tool at the right time to meet each threat. Suffice it to say that privacy protection must become a new way of operating on the Internet and using your smartphone, if it is to be done successfully. March 14, 2018 How To Be Anonymous Online 4

Legal stuff:

Legal stuff March 14, 2018 How To Be Anonymous Online 5

4th Amendment U.S. Constitution – Bill of Rights:

4 th Amendment U.S. Constitution – Bill of Rights March 14, 2018 How To Be Anonymous Online 6

Data Privacy Laws by State:

Data Privacy Laws by State March 14, 2018 How To Be Anonymous Online 7

Personal Information Protection and Electronic Documents Act (PIPEDA):

Personal Information Protection and Electronic Documents Act (PIPEDA) March 14, 2018 How To Be Anonymous Online 8 Canadian Federal Data Privacy Law Enforcement

March 6, 2018:

March 6, 2018 State of Illinois Attorney General Lisa Madigan noted that the number one consumer crime that was reported in 2017 was Identity Theft, and this surge was largely due to data breaches like the Equifax Data Breach of 2017. March 14, 2018 How To Be Anonymous Online 9

The Internet is a Huge place:

The Internet is a Huge place March 14, 2018 How To Be Anonymous Online 10

What Happens on The Internet in 60 Seconds?:

What Happens on The Internet in 60 Seconds? March 14, 2018 How To Be Anonymous Online 11

What Happens on The Internet in One Second?:

What Happens on The Internet in One Second? March 14, 2018 How To Be Anonymous Online 12

Slide13:

March 14, 2018 How To Be Anonymous Online 13 “If something is free, you’re not the customer; you’re the product.” Bruce Schneier Cybersecurity Researcher & Author 2016 Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World "You have zero privacy anyway… Get over it.” --Scott McNealy Former chief executive officer of Sun Microsystems 1999

The Problem:

The Problem The Internet was not designed to be secure. Privacy, especially digital privacy, has become increasing difficult to achieve in the 21 st Century. If we access and use the Internet and Smart Phones, we are unwittingly “leaking data”. Companies like Google, Facebook, Twitter, LinkedIn and thousands of others are harvesting (and selling) data about us when we use their services. Data brokerage firms such as Acxiom, Epsilon, Lotame, and Spokeo, etc., are buying, processing and categorizing our data and selling to other companies that in turn make decisions as important as hiring and firing of people. Thousands of Data Breaches in the last few years, especially with entities like Equifax, Target, Anthem, Home Depot, OPM have exposed our PII at an unprecedented rate. Bad actors misuse our data to hack accounts and steal identify, money, etc. and put it out for sale on the Dark Web, where people can buy it. March 14, 2018 How To Be Anonymous Online 14

Why Would You Want to Be Anonymous Online?:

Why Would You Want to Be Anonymous Online? March 14, 2018 How To Be Anonymous Online 15 Self-Preservation Reputation Protection You’re a private person The massive amount of news on Data Breaches and Hack Attacks is sinking in You want to take back control of your online life Paranoia

17 Ways to Being Completely Anonymous Online:

17 Ways to Being Completely Anonymous Online Find a safe country that values privacy Get an anonymizing operating system Use an anonymous VPN Use Tor Don't use plug-ins Stick with HTTPS Avoid the usual applications Set up anonymous burner accounts Never use credit cards Test for DNS leaks and browser tracking Test your overall privacy protection Share files anonymously Use a search engine that doesn’t track your behavior Turn off your location Block Javascript Keep your webmail private Delete cookies and your browsing history March 14, 2018 How To Be Anonymous Online 16 Source: 17 Ways to Being Completely Anonymous Online: https://www.csoonline.com/article/2975193/data-protection/9-steps-completely-anonymous-online.html

17 Essential Tools to Protect Your Online Identity, Privacy:

17 Essential Tools to Protect Your Online Identity, Privacy TPM UEFI BIOS Secure storage (encrypted) Two-factor authentication Logon account lockout Remote find Remote wipe Secure VPN Tor Anonymity services Anonymity hardware Secure browsing Secure e-mail Secure chat Secure payments Secure file transfers Anything Phil Zimmerman creates March 14, 2018 How To Be Anonymous Online 17 Source: 17 Essential Tools to Protect Your Online Identity, Privacy: https://www.infoworld.com/article/3135324/security/17-essential-tools-to-protect-your-online-identity-and-privacy.html

Three additional free tools:

Three additional free tools March 14, 2018 How To Be Anonymous Online 18

haveibeenpwned.com:

haveibeenpwned.com March 14, 2018 How To Be Anonymous Online 19

panopticlick.eff.org:

panopticlick.eff.org March 14, 2018 How To Be Anonymous Online 20

www.eff.org/privacybadger:

www.eff.org/privacybadger March 14, 2018 How To Be Anonymous Online 21

Other Threats to Your Privacy and Identity – Life in The Surveillance Society:

Other Threats to Your Privacy and Identity – Life in The Surveillance Society NSA FBI Local Police – Sting Ray Your Big Screen Digital TV Your Grocery Store Retail stores – everywhere you use a credit or debit card Your Cell Phone Internet of Things Devices (Think Amazon Echo ) Surveillance Satellites Drones Private Eyes (Detectives) Nosey and Untrustworthy Neighbors Untrustworthy Family Members and Friends Bad Actors March 14, 2018 How To Be Anonymous Online 22

Other Threats to Your Privacy and Identity – Life in The Surveillance Society:

Other Threats to Your Privacy and Identity – Life in The Surveillance Society March 14, 2018 How To Be Anonymous Online 23

Other Threats to Your Privacy and Identity – Life in The Surveillance Society:

Other Threats to Your Privacy and Identity – Life in The Surveillance Society March 14, 2018 How To Be Anonymous Online 24

Other Threats to Your Privacy and Identity – Life in The Surveillance Society:

Other Threats to Your Privacy and Identity – Life in The Surveillance Society March 14, 2018 How To Be Anonymous Online 25

Other Forms of Accomplishing Anonymity in Your Daily Life:

Other Forms of Accomplishing Anonymity in Your Daily Life Block your webcam on every computer you use. Vary your travel routines for work and recreation. Never throw anything away with your name and address on it. Get your mail and packages at a commercial package delivery store. Never give your phone numbers or address to anyone. Trust No One. March 14, 2018 How To Be Anonymous Online 26

Big Caution About the Dark Web:

Big Caution About the Dark Web Some people go Anonymous so they can do illegal things on The Dark Web If you know such people, let them know they can be caught and prosecuted March 14, 2018 How To Be Anonymous Online 27

Advantages and Disadvantages:

Advantages and Disadvantages Advantages Risk avoidance. You get to have privacy and protect yourself and your personal data from the perils of data leakage. You will make it very difficult for the bad guys to steal your data and cause hurt and/or damage. You will become a data privacy subject matter expert and role model for your family, friends, and colleagues. Disadvantages It’s a never-ending effort if you are actively using the Internet via a laptop, desktop, and or smartphone. Essentially, you must always stay vigilant to protect yourself. Well-intentioned people may find it difficult to reach you. People may think you have dark intentions for going anonymous People will think you are paranoid. March 14, 2018 How To Be Anonymous Online 28

10 Privacy Tips for Businesses:

10 Privacy Tips for Businesses Limit your collection and retention of personal information. Know what personal information you collect, where you store it and what you do with it. Ensure staff receive appropriate privacy protection training. Limit and monitor access to personal information and take appropriate action when an employee accesses information without authorization. Think twice before collecting sensitive personal information, such as driver’s licenses. Inform customers if you are using video surveillance. Have a privacy policy and be upfront about your collection and use of personal information. Protect personal information on laptops, USB keys and portable hard drives through technological safeguards such as encryption and password protection. Respond to requests for access to personal information in a timely manner. Make sure your customers know who to speak to if they have questions about privacy. March 14, 2018 How To Be Anonymous Online 29 Source: 10 Privacy Tips for Businesses https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/pipeda-compliance-help/pipeda-compliance-and-training-tools/tips-bus_info_201501/

Parting Thoughts - 001: U.S. Government Surveillance Capability Was Officially Revealed by U.S. Senator Frank Church (D. – Idaho) on Meet the Press in August 1975 :

Parting Thoughts - 001: U.S. Government Surveillance Capability Was Officially Revealed by U.S. Senator Frank Church (D. – Idaho) on Meet the Press in August 1975 March 14, 2018 How To Be Anonymous Online 30

Parting Thoughts - 002: Amazon allows Echo to spy on you.:

Parting Thoughts - 002: Amazon allows Echo to spy on you. March 14, 2018 How To Be Anonymous Online 31

Conclusion:

Conclusion Threats to our privacy and PII are pervasive and ubiquitous You must work diligently to maintain your privacy, particularly in the U.S. There are modern tools and methods to help maintain your privacy and anonymity. Consequences of leaked PII are significant, especially when it’s YOUR data As Cybersecurity professionals, we have a responsibility to understand the importance of and best methods for data and privacy protection. March 14, 2018 How To Be Anonymous Online 32

Questions?:

Questions? March 14, 2018 How To Be Anonymous Online 33

References:

References AICPA. (2011). Privacy Maturity Model. A presentation presented to ISACA. Retrieved on March 5, 2018 from https://www.kscpa.org/writable/files/AICPADocuments/10-229_aicpa_cica_privacy_maturity_model_finalebook.pdf . Clancy, H. (2012). "Where are U.S. data breach laws toughest? Check this map". An article published at ZDNet on August 28, 2012. Retrieved on March 4, 2018 from http://www.zdnet.com/article/where-are-us-data-breach-laws-toughest-check-this-map/. Frozen PII. (2018). Hacking IDentity . Retrieved on March 4, 2018 from http://hackingidentity.com/index.php/226-2/ . Grimes, R. A. (2016). "17 essential tools to protect your online identity, privacy". Published by InfoWorld Online. Retrieved on March 4, 2018 from https://www.infoworld.com/article/3135324/security/17-essential-tools-to-protect-your-online-identity-and-privacy.html . Grimes, R. A. and Gralla , P. (2018). "17 Steps to Being Completely Anonymous Online". Published at CSO Online. Retrieved on March 4, 2018 from https://www.csoonline.com/article/2975193/data-protection/9-steps-completely-anonymous-online.html . Henderson, L. (2012). Anonymous File Sharing and Darknet: How to be a ghost in the machine. [Place of publication not identified] : [publisher not identified]. Meet the Press. (1975). Senator Frank Church discusses U.S. Government Surveillance Capabilities on Meeting the Press August 17, 1875. Retrieved October 15, 2011 from https://www.youtube.com/watch?v=YAG1N4a84Dk&t=2s . Nadeau, M. (2017). "State of Cybercrime 2017: Security events decline, but not the impact." An article published in CSO Online on July 28, 2017. Retrieved on March 4, 2018 from https://www.csoonline.com/article/3211491/security/state-of-cybercrime-2017-security-events-decline-but-not-the-impact.html . March 14, 2018 How To Be Anonymous Online 34

References:

References Office of the Privacy Commissioner of Canada. (2018). Privacy Toolkit for Businesses. Retrieved on March 4, 2018 from https://www.priv.gc.ca/media/2038/guide_org_e.pdf . Office of the Privacy Commissioner of Canada. (2017). Enforcement of PIPEDA. Retrieved on March 4, 2018 from https://www.priv.gc.ca/biens-assets/compliance-framework/en/index . Office of the Privacy Commissioner of Canada. (2018). Personal Information Protection and Electronic Documents Act (PIPEDA). Retrieved on March 4, 2018 from https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/pipeda_brief/ . Robideau , R. (2014). Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Commuicating , Publishing, Buying, and Researching Online. [Place of publication not identified] : [publisher not identified]. Rumer, D. B. (2015).Digital Anonymity: Investigating the Open Threat by the Hidden User Retrieved on March 5, 2018 from https://digitalcommons.apus.edu/cgi/viewcontent.cgi?article=1040&context=theses . Schneier , B. (2016). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. New York, NY: W. W. Norton & Company. Sprenger, P. (1999). Sun on Privacy: 'GET OVER IT'. A Wired Magazine article from January 28, 1999. Retrieved on March 4, 2018 from https://www.wired.com/1999/01/sun-on-privacy-get-over-it/ . Winkler, S. and Zeadally , S. (2015). "An Analysis of Tools for Online Anonymity." A scholarly research paper published at the University of Kentucky. Information Science Faculty Publications. 20. Retrieved on March 4, 2018 from https://pdfs.semanticscholar.org/4796/edaaa1e02ee7c815d2320c80725bc6e849d7.pdf . March 14, 2018 How To Be Anonymous Online 35

Presenter Bio: William Favre Slater, III:

Presenter Bio: William Favre Slater, III Lives in Chicago; Cybersecurity professional by day, Professor at night Current Position – Project Manager / Sr. IT Consultant at Slater Technologies, Inc. Working on projects related to Security reviews and auditing Blockchain consulting ISO 27001 Project Implementations Subject Matter Expert for preparing Risk Management and Security Exams at Western Governor’s State University in UT Created an eBook with articles about Security, Risk Management, Cyberwarfare, Project Management and Data Center Operations Providing subject matter expert services to Data Center product vendors and other local businesses. Designing and creating a database application that streamlines program management, security management, risk management and reporting activities, for management of teams of IT workers and developers in teleworking environments. It will first be a Windows application and then be ported to the web. Developing and presenting technical training materials for undergraduate and graduate students at the Illinois Institute of Technology in the areas of Blockchain and Blockchain development, Data Center Operations, Data Center Architecture, Cybersecurity Management, and Information Technology hardware and software. March 14, 2018 How To Be Anonymous Online 36

William Favre Slater, II:

William Favre Slater, II William Favre Slater, III 37 312-758-0307 slater@billslater.com williamslater@gmail.com http://billslater.com/interview 1515 W. Haddon Ave., Unit 309 Chicago, IL 60642 United States of America March 14, 2018 How To Be Anonymous Online

authorStream Live Help