An Introduction to Surviving in a Surveillance Society
-
Upload
matt-imrie -
Category
Education
-
view
1.180 -
download
0
Transcript of An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a
Surveillance Society
Contents• The Surveillance State• Who is currently watching you online (in the UK)?• If you have nothing to fear, you have nothing to hide!• Ask yourself• Edward Snowden• Privacy Tools Tor, TAILS, Disposable e-mail, DuckDuckGo• Anonymity• Bibliography
The Surveillance State• There are up to 5.9 million closed-circuit television cameras in the country,
including 750,000 in “sensitive locations” such as schools, hospitals and care homes. - British Security Industry Authority
• GCHQ had placed data interceptors on fibre-optic cables that carry internet data in and out of the UK. 850,000 NSA contractors have access to the data• Since April 2004, the police in England and Wales have been able to take
DNA samples without consent from anyone arrested on suspicion of any recordable offence.
Who is currently watching you online? (in the UK)Your mobile phone providerYour ISP
If you have nothing to hide, you have nothing to fear!
“If we have nothing to hide, why are we under surveillance?” Jake Lawler“Wanting my privacy is NOT equal to having something to hide.” James Earl Walsh
Ask yourself: who would you like reading personal communications• Your parents?• Your school?• A stranger?• The government?
Then ask yourself if you believe privacy is a right or an inconvenient option
Edward SnowdenEdward Snowden is an American privacy activist, computer professional, former CIA employee, and former government contractor who leaked classified information from the United States National Security Agency (NSA) in 2013. The information revealed numerous global surveillance programs, many run by the NSA and the Five Eyes with the cooperation of telecommunication companies and European governments.(Source: Wikipedia)
Privacy Tools• Tor• TAILS• Disposable e-mail• DuckDuckGo
Privacy Tools: The Onion Router (Tor)
Tor is a service that helps you to protect your anonymity while using the Internet. Tor is comprised of two parts: • software you can download that allows you to use the Internet anonymously, and the • volunteer network of computers that makes it possible for that software to
work.
When you use the Tor software, your IP address remains hidden and it appears that your connection is coming from the IP address of a Tor exit relay, which can be anywhere in the world.
How Tor Works
How Tor Works
Privacy Tools: The Amnesiac Incognito Live System
(TAILS)TAILS is a Linux-based live OS that runs off a CD or USB All its outgoing connections are forced to go through Tor, and direct (non-anonymous) connections are blocked. The system leaves no trace on the machine unless explicitly told to do so.A completely new session is started every time you log in
Privacy Tools: Disposable e-mail
Disposable e-mail addresses are available from a number of sources, for the purpose of this discussion I will mention Guerrilla e-mailGuerrilla Mail gives you a disposable email address. There is no need to register, simply visit Guerrilla Mail and a random address will be given. You can also choose your own address.You can give your email address to whoever you do not trust. You can view the email on Guerrilla Mail, click on any confirmation link, then delete it. Guerrilla Mail deletes all email that was delivered to an inbox after 1 hour. Logs are deleted after 24 hours.
Privacy Tools:DuckDuckGo
DDG is a search engine that does not track or collect information about its users
The tools mentioned in this presentation are freely available onlineUsing them correctly will enable you to anonymise a large part of your web use, however it is up to you to make sure the tools are used correctly otherwise their usefulness will be limited.
Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society.McIntyre v. Ohio Elections Commission (93-986), 514 U.S. 334 (1995)
BibliographyAmnesty International, (2015). [online] Available at: https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-response-to-mass-surveillance/ [Accessed 14 Oct. 2015].DuckDuckGo, (2015). DuckDuckGo. [online] Available at: https://duckduckgo.com/ [Accessed 16 Oct. 2015].Electronic Frontier Foundation, (2015). Electronic Frontier Foundation. [online] Available at: https://www.eff.org/en-gb [Accessed 14 Oct. 2015].Electronic Frontier Foundation, (2011). What is a Tor Relay?. [online] Available at: https://www.eff.org/pages/what-tor-relay [Accessed 14 Oct. 2015].Guerrillamail.com, (2015). Guerrilla Mail - Disposable Temporary E-Mail Address✉ . [online] Available at: https://www.guerrillamail.com [Accessed 14 Oct. 2015].The Tor Project, (2015). Tor Project: Anonymity Online. [online] Torproject.org. Available at: https://www.torproject.org/ [Accessed 14 Oct. 2015]. Wikipedia, (2015). Edward Snowden. [online] Available at: https://en.wikipedia.org/wiki/Edward_Snowden [Accessed 14 Oct. 2015].Wired UK, (2015). A simple guide to GCHQ's internet surveillance programme Tempora (Wired UK). [online] Available at: http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101 [Accessed 16 Oct. 2015].