An Introduction to Surviving in a Surveillance Society

18
An Introduction to Surviving in a Surveillance Society

Transcript of An Introduction to Surviving in a Surveillance Society

Page 1: An Introduction to Surviving in a Surveillance Society

An Introduction to Surviving in a

Surveillance Society

Matthew Imrie
Page 2: An Introduction to Surviving in a Surveillance Society

Contents• The Surveillance State• Who is currently watching you online (in the UK)?• If you have nothing to fear, you have nothing to hide!• Ask yourself• Edward Snowden• Privacy Tools Tor, TAILS, Disposable e-mail, DuckDuckGo• Anonymity• Bibliography

Page 3: An Introduction to Surviving in a Surveillance Society

The Surveillance State• There are up to 5.9 million closed-circuit television cameras in the country,

including 750,000 in “sensitive locations” such as schools, hospitals and care homes. - British Security Industry Authority

• GCHQ had placed data interceptors on fibre-optic cables that carry internet data in and out of the UK. 850,000 NSA contractors have access to the data• Since April 2004, the police in England and Wales have been able to take

DNA samples without consent from anyone arrested on suspicion of any recordable offence.

Page 4: An Introduction to Surviving in a Surveillance Society
Page 5: An Introduction to Surviving in a Surveillance Society

Who is currently watching you online? (in the UK)Your mobile phone providerYour ISP

Page 6: An Introduction to Surviving in a Surveillance Society

If you have nothing to hide, you have nothing to fear!

“If we have nothing to hide, why are we under surveillance?” Jake Lawler“Wanting my privacy is NOT equal to having something to hide.” James Earl Walsh

Page 7: An Introduction to Surviving in a Surveillance Society

Ask yourself: who would you like reading personal communications• Your parents?• Your school?• A stranger?• The government?

Then ask yourself if you believe privacy is a right or an inconvenient option

Page 8: An Introduction to Surviving in a Surveillance Society

Edward SnowdenEdward Snowden is an American privacy activist, computer professional, former CIA employee, and former government contractor who leaked classified information from the United States National Security Agency (NSA) in 2013. The information revealed numerous global surveillance programs, many run by the NSA and the Five Eyes with the cooperation of telecommunication companies and European governments.(Source: Wikipedia)

Page 9: An Introduction to Surviving in a Surveillance Society

Privacy Tools• Tor• TAILS• Disposable e-mail• DuckDuckGo

Page 10: An Introduction to Surviving in a Surveillance Society

Privacy Tools: The Onion Router (Tor)

Tor is a service that helps you to protect your anonymity while using the Internet. Tor is comprised of two parts: • software you can download that allows you to use the Internet anonymously, and the • volunteer network of computers that makes it possible for that software to

work.

When you use the Tor software, your IP address remains hidden and it appears that your connection is coming from the IP address of a Tor exit relay, which can be anywhere in the world.

Page 11: An Introduction to Surviving in a Surveillance Society

How Tor Works

Page 12: An Introduction to Surviving in a Surveillance Society

How Tor Works

Page 13: An Introduction to Surviving in a Surveillance Society

Privacy Tools: The Amnesiac Incognito Live System

(TAILS)TAILS is a Linux-based live OS that runs off a CD or USB All its outgoing connections are forced to go through Tor, and direct (non-anonymous) connections are blocked. The system leaves no trace on the machine unless explicitly told to do so.A completely new session is started every time you log in

Page 14: An Introduction to Surviving in a Surveillance Society

Privacy Tools: Disposable e-mail

Disposable e-mail addresses are available from a number of sources, for the purpose of this discussion I will mention Guerrilla e-mailGuerrilla Mail gives you a disposable email address. There is no need to register, simply visit Guerrilla Mail and a random address will be given. You can also choose your own address.You can give your email address to whoever you do not trust. You can view the email on Guerrilla Mail, click on any confirmation link, then delete it. Guerrilla Mail deletes all email that was delivered to an inbox after 1 hour. Logs are deleted after 24 hours.

Page 15: An Introduction to Surviving in a Surveillance Society

Privacy Tools:DuckDuckGo

DDG is a search engine that does not track or collect information about its users

Page 16: An Introduction to Surviving in a Surveillance Society

The tools mentioned in this presentation are freely available onlineUsing them correctly will enable you to anonymise a large part of your web use, however it is up to you to make sure the tools are used correctly otherwise their usefulness will be limited.

Page 17: An Introduction to Surviving in a Surveillance Society

Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society.McIntyre v. Ohio Elections Commission (93-986), 514 U.S. 334 (1995)

Page 18: An Introduction to Surviving in a Surveillance Society

BibliographyAmnesty International, (2015). [online] Available at: https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-response-to-mass-surveillance/ [Accessed 14 Oct. 2015].DuckDuckGo, (2015). DuckDuckGo. [online] Available at: https://duckduckgo.com/ [Accessed 16 Oct. 2015].Electronic Frontier Foundation, (2015). Electronic Frontier Foundation. [online] Available at: https://www.eff.org/en-gb [Accessed 14 Oct. 2015].Electronic Frontier Foundation, (2011). What is a Tor Relay?. [online] Available at: https://www.eff.org/pages/what-tor-relay [Accessed 14 Oct. 2015].Guerrillamail.com, (2015). Guerrilla Mail - Disposable Temporary E-Mail Address✉ . [online] Available at: https://www.guerrillamail.com [Accessed 14 Oct. 2015].The Tor Project, (2015). Tor Project: Anonymity Online. [online] Torproject.org. Available at: https://www.torproject.org/ [Accessed 14 Oct. 2015]. Wikipedia, (2015). Edward Snowden. [online] Available at: https://en.wikipedia.org/wiki/Edward_Snowden [Accessed 14 Oct. 2015].Wired UK, (2015). A simple guide to GCHQ's internet surveillance programme Tempora (Wired UK). [online] Available at: http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101 [Accessed 16 Oct. 2015].