SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Geo-Location Security: Issues &
        Best Practices
“Her father had taught her about a dog's paws. Whenever her father was alone
with a dog in a house he would lean over and smell the skin at the base of its paw.
This, he would say, as if coming away from a brandy snifter, is the greatest smell
in the world! A bouquet! Great rumours of travel! It's a cathedral! her father had
said, so-and-so's garden, that field of grasses, a walk through cyclamen--a
concentration of hints of all the paths the animal had taken during the day.”

                                             Michael Ondaatje, The English Patient
Getting to Know You


 • 07774 23X XXX
 • 07940 47X XXX
 • 07761 55X XXX
 • 07459 13X XXX
Where are you?
Value
How

Satellite tracking
Web browsing
Mobile phone
GPS devices
RFID tags
Credit / debit card transactions
Geo tags photos / postings
Proximity readers
How

A desktop browser is likely to use WiFi
(accurate to 20m) or IP Geolocation
which is accurate to the city or post code
depending on your ISP.

Mobile devices tend to use triangulation
techniques such as GPS (accurate to 10m
and only works outside), WiFi and
GSM/CDMA cell IDs (accurate to
1000m).
Browser Based
The Geolocation API is default in the following desktop
browsers:
•Firefox 3.5+
•Chrome 5.0+
•Safari 5.0+
•Opera 10.60+
•Internet Explorer 9.0+
•And for updates on earlier versions for all of the above
App Based
And the W3C Geolocation API on mobile devices:
•Android 2.0+
•iPhone 3.0+
•Opera Mobile 10.1+
•Symbian (S60 3rd & 5th generation)
•Blackberry OS 6
•Maemo
Detailed Of Data Captured
On the Road?
Down Loading It
Hacking It
Where You Live
Business Uses

 A US-based car rental company started using
 deployed GPS tracking devices to monitor
 driving speeds of its customers.

 If a customers car exceeded 79 miles per hour for
 2 continuous minutes, they were charged an
 additional $150 (without their consent).
Example

 A French Insurance company used both
 mobile phone and car GPS data to track sales
 executive locations and cross reference to
 their expense accounts.

 Policy resulted in 21 employee dismissals and
 the identification of over .5 million euro in
 false claims.
Example

 Earlier this year, a large New York-based
 charity used geo-location data from Grindr to
 identify homosexuals working in their offices.

 4 employees were fired for “inappropriate
 behavior.”
I’ll Be Watching You
Lay of the Land
Every Word You Say

 •   Tracking customers
 •   Tracking employees
 •   Tracking competitors
 •   Tracking subjects
Every Single Day

 • Competitive Intelligence
   – Location of executives easily disclose activities
     such as mergers and acquisitions or real estate
     sittings.
 • Targeting Intelligence
   – Location of subjects by private detectives
   – Location of subjects by the media
Every Claim You Stake
Can Someone Own
Your Whereabouts?
Can’t You See, You Belong To Me?
Every Pound They Make




                =
Every Law You Break
Every Arm You Break
Every Snack You Take
Every Move You Make
Every Word You Say

• How the app exposes the users is not the problem.
• How Google Maps, Facebook and Foursquare expose
  the users without their knowledge is the problem.
• Opt out is the default not opt in.
• Social networking business model = get everyone to
  share everything
• Your personal information (your life) is their product
I’ll Be Watching You


   "If you have something that you don't want
    anyone to know, maybe you shouldn't be
           doing it in the first place,"

                        Former Google CEO: Eric Schmidt
Industry Response



              User beware !
Every Window You Break
Every IP You Fake
Fake Your Location
Industry Location
Understand the Data

• Where you go
• Where you went

• What you do
• What you did

• Forever
Data Classification




      +               = PII
Regulatory Conundrum

Geo-location data falls under special category
of data subject to E-Privacy Directive. To
comply you must either:

  – Obtain prior consent - or:
  – Process the data anonymously (Good luck as this
    includes UDID, IMEI, Mac or IP addresses)
Best Practices?

     Information Security Governance Framework

           Policies
           Identification, Classification & Marking
           Prior Consent
           Identifier Sanitisation (UDID, IMEI, IPs)
           Privacy Statements
           Limited Retention
           Testing & Auditing
Find the Browser Secrets
Change Defaults
Change Defaults
DIY
Apple Safari:
• Go to the ‘Display a menu of General Safari settings’
• Go to ‘Preferences’
• Go to ‘Security’
• Uncheck ‘Allow websites to ask for location information’

Comodo Dragon:
• Go to the ‘Customize and control Comodo Dragon' icon
• Go to ‘Options’
• Go to ‘Under the Bonnet’
• Choose ‘Content Settings’
• Choose ‘Location’
• Check ‘Do not allow any site to track my physical location’

Facebook:
• Go to Privacy Settings
• Click ‘Custom’
• Click ‘Custom Settings’
• Disable ‘Places I check in’
• Disable ‘People here now’
• Disable ‘Friends can check me in to places’
DIY
Google Chrome:
• Go to the ‘Customize and control Google Chrome’ icon
• Go to ‘Options’
• Go to ‘Under the Bonnet’
• Choose ‘Content Settings’
• Choose ‘Location’
• Check ‘Do not allow any site to track my physical location’

Google GMail:
• Scroll down on your GMail page until your reach 'Last account activity:
• Hit 'Details'
• Scroll down
• Check 'Never show an alert for unusual activity'

Google Toolbar:
• Go to the ‘Adjust Toolbar options’ icon
• Go to Tools
• Uncheck ‘My Location’
• Hit 'Save'
Where are you?
Geo-Location Security

Weitere ähnliche Inhalte

Andere mochten auch (9)

Retail location
Retail locationRetail location
Retail location
 
Retail location
Retail locationRetail location
Retail location
 
Retail Store Location
Retail  Store  LocationRetail  Store  Location
Retail Store Location
 
Operations management location strategies (lecture)
Operations management location strategies  (lecture)Operations management location strategies  (lecture)
Operations management location strategies (lecture)
 
Chapter 7 retail locations ppt
Chapter 7 retail locations pptChapter 7 retail locations ppt
Chapter 7 retail locations ppt
 
Location Strategy
Location StrategyLocation Strategy
Location Strategy
 
Plant Maintenance
Plant MaintenancePlant Maintenance
Plant Maintenance
 
Factors affecting business location
Factors affecting business locationFactors affecting business location
Factors affecting business location
 
Plant maintenance
Plant maintenancePlant maintenance
Plant maintenance
 

Ähnlich wie Risk Factory Geo-location Security Issues & Best Practices

Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_Privacy
Matthew Hoy
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
Tom Eston
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
rafa_el_souza
 
How to Get Started in Mobile Marketing
How to Get Started in Mobile MarketingHow to Get Started in Mobile Marketing
How to Get Started in Mobile Marketing
SIXTY
 
Defrag 2014
Defrag 2014Defrag 2014
Defrag 2014
Keen
 

Ähnlich wie Risk Factory Geo-location Security Issues & Best Practices (20)

How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_Privacy
 
Presentation MONKINO for clients in english
Presentation MONKINO for clients in englishPresentation MONKINO for clients in english
Presentation MONKINO for clients in english
 
Digital investigations
Digital investigationsDigital investigations
Digital investigations
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Reo expo presentation_6-14-2011 vers1 6.11.11
Reo expo presentation_6-14-2011 vers1 6.11.11Reo expo presentation_6-14-2011 vers1 6.11.11
Reo expo presentation_6-14-2011 vers1 6.11.11
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Case study 6
Case study 6Case study 6
Case study 6
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
 
10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
 
How to Get Started in Mobile Marketing
How to Get Started in Mobile MarketingHow to Get Started in Mobile Marketing
How to Get Started in Mobile Marketing
 
Defrag 2014
Defrag 2014Defrag 2014
Defrag 2014
 

Mehr von Risk Crew

Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
Risk Crew
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
Risk Crew
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
Risk Crew
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Crew
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
Risk Crew
 

Mehr von Risk Crew (20)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a Hacker
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 Numbers
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big Data
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back Door
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an Identity
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Risk Factory Geo-location Security Issues & Best Practices

  • 1. Geo-Location Security: Issues & Best Practices
  • 2. “Her father had taught her about a dog's paws. Whenever her father was alone with a dog in a house he would lean over and smell the skin at the base of its paw. This, he would say, as if coming away from a brandy snifter, is the greatest smell in the world! A bouquet! Great rumours of travel! It's a cathedral! her father had said, so-and-so's garden, that field of grasses, a walk through cyclamen--a concentration of hints of all the paths the animal had taken during the day.” Michael Ondaatje, The English Patient
  • 3. Getting to Know You • 07774 23X XXX • 07940 47X XXX • 07761 55X XXX • 07459 13X XXX
  • 6. How Satellite tracking Web browsing Mobile phone GPS devices RFID tags Credit / debit card transactions Geo tags photos / postings Proximity readers
  • 7. How A desktop browser is likely to use WiFi (accurate to 20m) or IP Geolocation which is accurate to the city or post code depending on your ISP. Mobile devices tend to use triangulation techniques such as GPS (accurate to 10m and only works outside), WiFi and GSM/CDMA cell IDs (accurate to 1000m).
  • 8. Browser Based The Geolocation API is default in the following desktop browsers: •Firefox 3.5+ •Chrome 5.0+ •Safari 5.0+ •Opera 10.60+ •Internet Explorer 9.0+ •And for updates on earlier versions for all of the above
  • 9. App Based And the W3C Geolocation API on mobile devices: •Android 2.0+ •iPhone 3.0+ •Opera Mobile 10.1+ •Symbian (S60 3rd & 5th generation) •Blackberry OS 6 •Maemo
  • 10. Detailed Of Data Captured
  • 15. Business Uses A US-based car rental company started using deployed GPS tracking devices to monitor driving speeds of its customers. If a customers car exceeded 79 miles per hour for 2 continuous minutes, they were charged an additional $150 (without their consent).
  • 16. Example A French Insurance company used both mobile phone and car GPS data to track sales executive locations and cross reference to their expense accounts. Policy resulted in 21 employee dismissals and the identification of over .5 million euro in false claims.
  • 17. Example Earlier this year, a large New York-based charity used geo-location data from Grindr to identify homosexuals working in their offices. 4 employees were fired for “inappropriate behavior.”
  • 19. Lay of the Land
  • 20. Every Word You Say • Tracking customers • Tracking employees • Tracking competitors • Tracking subjects
  • 21. Every Single Day • Competitive Intelligence – Location of executives easily disclose activities such as mergers and acquisitions or real estate sittings. • Targeting Intelligence – Location of subjects by private detectives – Location of subjects by the media
  • 23. Can Someone Own Your Whereabouts?
  • 24. Can’t You See, You Belong To Me?
  • 26. Every Law You Break
  • 27. Every Arm You Break
  • 30.
  • 31.
  • 32. Every Word You Say • How the app exposes the users is not the problem. • How Google Maps, Facebook and Foursquare expose the users without their knowledge is the problem. • Opt out is the default not opt in. • Social networking business model = get everyone to share everything • Your personal information (your life) is their product
  • 33. I’ll Be Watching You "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place," Former Google CEO: Eric Schmidt
  • 34. Industry Response User beware !
  • 36. Every IP You Fake
  • 38.
  • 39.
  • 41. Understand the Data • Where you go • Where you went • What you do • What you did • Forever
  • 43. Regulatory Conundrum Geo-location data falls under special category of data subject to E-Privacy Directive. To comply you must either: – Obtain prior consent - or: – Process the data anonymously (Good luck as this includes UDID, IMEI, Mac or IP addresses)
  • 44. Best Practices? Information Security Governance Framework  Policies  Identification, Classification & Marking  Prior Consent  Identifier Sanitisation (UDID, IMEI, IPs)  Privacy Statements  Limited Retention  Testing & Auditing
  • 45. Find the Browser Secrets
  • 48. DIY Apple Safari: • Go to the ‘Display a menu of General Safari settings’ • Go to ‘Preferences’ • Go to ‘Security’ • Uncheck ‘Allow websites to ask for location information’ Comodo Dragon: • Go to the ‘Customize and control Comodo Dragon' icon • Go to ‘Options’ • Go to ‘Under the Bonnet’ • Choose ‘Content Settings’ • Choose ‘Location’ • Check ‘Do not allow any site to track my physical location’ Facebook: • Go to Privacy Settings • Click ‘Custom’ • Click ‘Custom Settings’ • Disable ‘Places I check in’ • Disable ‘People here now’ • Disable ‘Friends can check me in to places’
  • 49. DIY Google Chrome: • Go to the ‘Customize and control Google Chrome’ icon • Go to ‘Options’ • Go to ‘Under the Bonnet’ • Choose ‘Content Settings’ • Choose ‘Location’ • Check ‘Do not allow any site to track my physical location’ Google GMail: • Scroll down on your GMail page until your reach 'Last account activity: • Hit 'Details' • Scroll down • Check 'Never show an alert for unusual activity' Google Toolbar: • Go to the ‘Adjust Toolbar options’ icon • Go to Tools • Uncheck ‘My Location’ • Hit 'Save'

Hinweis der Redaktion

  1. “ Her father had taught her about a dog's paws. Whenever her father was alone with a dog in a house he would lean over and smell the skin at the base of its paw. This, he would say, as if coming away from a brandy snifter, is the greatest smell in the world! A bouquet! Great rumours of travel! It's a cathedral! her father had said, so-and-so's garden, that field of grasses, a walk through cyclamen--a concentration of hints of all the paths the animal had taken during the day.” I found this very true – my dogs day could be determined from the way she smelled- laying in the sun, swimming… I got to know my dog this way. These days = we implant GPS chips in our dogs. Is the same true for humans? Can you get to know a person by learning where they have been all day???? © 2005 Orthus Ltd
  2. So I found 4 attendees (here in this room today) who participate in social network geo tagging © 2005 Orthus Ltd
  3. 0774 - I saw you were in Kensington a few weeks ago coming out of the Olympia the same day as the Adult Erotica Show 2012 I remember because I was in Notting Hill that day and I saw 0794 was there – I thought that was odd because I had just called his office and they said he was out sick. I also noticed 0776 goes to St. Mary’s in Earl’s Court. I take my kids to day school there and noticed that you go there every Monday night. Don’t they hold AA meetings in the basement on Monday nights? And 0745 - Did you loose your phone? Because every night it shows you on Brompton Street in Soho…. By the way, how’s your wife??? Anyway – I think I now know most of you a little bit better. Though you may question that. The question every business is asking itself these days is: Where are you Why???? Two reasons: © 2005 Orthus Ltd
  4. What DHL pioneered with the 24/7 tracking of parcels – Businesses are now doing with people Nonetheless, businesses using geo data are struggling © 2005 Orthus Ltd
  5. Technology allows real time location of users © 2005 Orthus Ltd
  6. Technology allows real time location of users © 2005 Orthus Ltd
  7. Threats to Business © 2005 Orthus Ltd
  8. Threats to Business © 2005 Orthus Ltd
  9. Threats to Business © 2005 Orthus Ltd
  10. Threats to Business © 2005 Orthus Ltd
  11. Law enforcement favorite © 2005 Orthus Ltd
  12. Threats to Business © 2005 Orthus Ltd
  13. Threats to Business © 2005 Orthus Ltd
  14. © 2005 Orthus Ltd
  15. © 2005 Orthus Ltd
  16. Every single one of these uses resulted in law suits Judged – in favour of the companies… © 2005 Orthus Ltd
  17. Cept this one…. FTC 24.5 million fine = PAID with the proviso that they don’t admit their guilt. Ask yourself: Why is Google interested in mapping? Because if you write the map = you define the reality © 2005 Orthus Ltd
  18. Shortest distance between 2 points is a straight line A straight line drawn by Google will take you passed Starbucks. NYC: Nike/Starbucks projects © 2005 Orthus Ltd
  19. Can = reduced costs and increased revenue For businesses – it doesn’t get any better than that !!!! © 2005 Orthus Ltd
  20. Threats to Business © 2005 Orthus Ltd
  21. Businesses selling geo data are not struggling Companies are just taking it - © 2005 Orthus Ltd
  22. Threats to Business © 2005 Orthus Ltd
  23. Can someone “own” your whereabouts? A: YES ! © 2005 Orthus Ltd
  24. Geo data = cash Our lives are being mapped for money. Where you go Where you went What you do What you did THIS IS BIG BUSINESS © 2005 Orthus Ltd
  25. On the PII location data valuable for Burglary Stalking ID Theft … Kidnapping © 2005 Orthus Ltd
  26. What’s going on here??? © 2005 Orthus Ltd
  27. What’s going on here??? © 2005 Orthus Ltd
  28. On the personal side – this data is EXTREMELY © 2005 Orthus Ltd
  29. iTunes store 1.99 Funny and creepy Provokes laughter & tears Novelty or tool for rapists Dependent on the user… Wake up call about privacy Sonar/radar = depicting pole dancers Standard geo app based on maps app Published publically visible Facebook profiles through Foursquare Find a girl in a pub nearby Tap picture for information © 2005 Orthus Ltd
  30. Name: Zoe Looks like my kinda girl. 24 single Likes to party been on vacation in Ibiza Went to Stonebrook high school Then St Johns University Lives in Hammersmith Favorite actress: Keira Knightley Favorite movie Gone with the Wind Favorite Book: 50 Shades of Grey Has weakness for Margaritas…. Loves Lady Gaga Tap her photo album… © 2005 Orthus Ltd
  31. Leaving security to the user © 2005 Orthus Ltd
  32. Where’s the leadership © 2005 Orthus Ltd
  33. Leaving security to the user © 2005 Orthus Ltd
  34. Leaving security to the user © 2005 Orthus Ltd
  35. Leaving security to the user © 2005 Orthus Ltd
  36. Threats to Business © 2005 Orthus Ltd
  37. Leaving security to the user © 2005 Orthus Ltd
  38. © 2005 Orthus Ltd
  39. Once again we are behind the curve on this issue Like wireless, cloud computing, credit card data, medical records etc…. © 2005 Orthus Ltd
  40. © 2005 Orthus Ltd
  41. Its this simple: Geo data = PII – AND MUST BE PROTECTED AS SUCH 33B Sinclair Gardens - 6:30 – 5 blocks west to Shepard's Bush tube - © 2005 Orthus Ltd
  42. © 2005 Orthus Ltd
  43. © 2005 Orthus Ltd
  44. Threats to Business © 2005 Orthus Ltd
  45. Threats to Business © 2005 Orthus Ltd
  46. Threats to Business © 2005 Orthus Ltd
  47. We’re here as professionals. But this is personal Where you go Where you went What you do What you did It doesn’t get any more personal than that © 2005 Orthus Ltd