SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Internet
                           Privacy & Security
                            Follies & Foibles
                                Jordan Jones
                         NGS Luncheon / RootsTech 2013




Saturday, March 23, 13                                   1
How Many of You Use?


                    Evernote        Pinterest

                    Dropbox         Amazon

                    Twitter         Tumblr

                    Google          Apple

                    Facebook        Microsoft




Saturday, March 23, 13                          2
How Privacy Can be Breached

              The Privacy Rights Clearinghouse categorizes privacy
              breaches as:

                         Unintended Disclosure   Portable Device

                         Hacking or Malware      Stationary Device

                         Payment Card Fraud      Unknown or Other

                         Insider

                         Physical Loss


Saturday, March 23, 13                                               3
Read It and Weep


             In 2011, it was revealed that the iOS and Android apps
             of Facebook and Dropbox were accessible to anyone
             with physical access to the mobile device ...

             ... the passwords were in unencrypted text ïŹles.

             Cause: Unintended Disclosure




Saturday, March 23, 13                                                4
4 Hour Free-for-All


                June 20, 2011 – Dropbox announced that during a four-
                hour period ...

                ... a bug in their authentication software would have
                allowed anyone access to any account, without a
                password.
                Cause: Unintended Disclosure




Saturday, March 23, 13                                                  5
E-mail Switcheroo


              August 1, 2012 – Dropbox revealed that someone
              hacked into an employee’s account and gained access to
              a list of customer e-mail addresses, which were then
              spammed.

             Additionally, “usernames and passwords stolen from
             other sites had also been used to sign in to” Dropbox
             accounts.
             Cause: Unintended Disclosure / Hacking or Malware



Saturday, March 23, 13                                                 6
The Zen of Hacking



             February 21, 2013 – Zendesk was hacked. Customer e-
             mail addresses, the subject lines of support e-mail (and
             possibly phone numbers) for users of Twitter, Pinterest,
             and Tumblr were stolen.
             Cause: Hacking or Malware




Saturday, March 23, 13                                                  7
Yes, Microsoft runs Mac OS


              February 22, 2013 – Microsoft was hacked. It is unclear
              what information if any was stolen. The method was
              similar to one recently used successfully against Apple,
              Facebook, and Twitter.

             A virus was placed on a legitimate website. This
             exploited a “zero day” (as yet unknown) security hole
             in Java for Mac OS X.
             Cause: Hacking or Malware



Saturday, March 23, 13                                                   8
Hacktopia


              March 3, 2013 – Evernote was hacked. “User names,
              email addresses, and encrypted passwords may have
              been exposed.”

              “A total of 50 million users were told to reset their
              passwords.”

             Cause: Hacking or Malware




Saturday, March 23, 13                                                9
Information Wants to Be Free




Saturday, March 23, 13                            10
Information Wants to be Free


              “On the one hand information wants to be expensive,
              because it’s so valuable. The right information in the
              right place just changes your life. On the other hand,
              information wants to be free, because the cost of getting
              it out is getting lower and lower all the time. So you
              have these two ïŹghting against each other.”

                    — Stewart Brand, 1st Hackers Conference, 1984




Saturday, March 23, 13                                                    11
Two Kinds of Freedom




              1. Free as in beer

              2. Free as in speech




Saturday, March 23, 13                          12
Jones’s Corollary to Brand’s
                                    Law
              “Information is like water; information wants to ïŹ‚ow
              free.” Thanks to Moore’s law and innovation, it is
              constantly getting cheaper and easier for:

                         You to share data with people

                         You accidentally to share information with people

                         Others to share information you gave them, wider
                         than you wanted

                         Someone to steal or leak your information

Saturday, March 23, 13                                                       13
Consequences for Records
                         Access of Jones’s Corollary




Saturday, March 23, 13                                 14
Open Access vs. Privacy

                    Especially since 9/11, federal and state agencies have
                    been tightening access to public records of interest to
                    genealogists.

                    The fact that information wants to ïŹ‚ow like water
                    means anything private and divulged can be
                    disseminated further than prior to the Internet.

                    The most obvious example of government tightening
                    down access to electronic records is the SSDI.



Saturday, March 23, 13                                                        15
SSDI


                    The Social Security Death Index (SSDI) is based on
                    the Social Security Administration’s Master Death
                    File (MDF).

                    The MDF includes about 90 million names of people
                    who have died and whose deaths have been reported
                    to the SSA.




Saturday, March 23, 13                                                   16
Fraud Based on
                                  MDF Data
                    The MDF was released due to a Freedom-of-
                    Information ruling.

                    It was expected to help combat fraud.

                    Banks and other creditors could quickly determine
                    whether the person was dead according to the MDF.

                    The IRS was apparently not using this method to
                    check returns and several people had the identities of
                    their deceased children stolen.


Saturday, March 23, 13                                                       17
Removal of State Records


                    In the process of looking at the privacy implications
                    of the MDF / SSDI, the SSA noticed that some state
                    records were being improperly divulged. As a result:

                         SSA expunged 4 million records in Nov. 2011

                         SSA decreased the number of records added
                         annually by about 1/3 (from 2.8 to 1.8 million)




Saturday, March 23, 13                                                      18
What’s Happening Now


                    At least four federal bills have been introduced that
                    would limit access to the MDF / SSDI:
                         HR 295 “Protect and Save Act of 2013”

                         HR 466 “Social Security Death Master File Privacy Act of 2013”

                         HR 531 “Tax Crimes and Identity Theft Prevention”


                         HR 926 “Social Security Identity Defense Act of 2013”




Saturday, March 23, 13                                                                    19
Genealogy Partnerships


                    Records Preservation and Access Committee
                         Voting Members: The National Genealogical Society (NGS), the
                         Federation of Genealogical Societies (FGS) and the International
                         Association of Jewish Genealogical Societies (IAJGS)

                         Non-Voting Members: The Association of Professional Genealogists
                         (APG), the Board for CertiïŹcation of Genealogists (BCG), the American
                         Society of Genealogists (ASG), ProQuest and Ancestry.com




Saturday, March 23, 13                                                                           20
Digital Due Process Coalition

                    RPAC has joined the Digital Due Process coalition,
                    along with

                         key technology leaders (Adobe, Apple, Dell,
                         Facebook, Google, HP, IBM, Intel, Microsoft,
                         Oracle, Twitter) as well as

                         leaders in content (Newspaper Association of
                         America, American Library Association,
                         Association of Research Libraries)



Saturday, March 23, 13                                                   21
Why This Matters


                    What we need is a balance between open access and
                    privacy

                    As members of the privacy community, we can reïŹ‚ect
                    our existing goals to maintain privacy while retaining
                    open records




Saturday, March 23, 13                                                       22
What Can You Do?




Saturday, March 23, 13                      23
Protect Your Data

                         Protect your data as much as you can.

                           Post wisely. Don’t post anything on the Internet
                           that would harm you if it were divulged

                           Encrypt your most sensitive data.

                           Clear browser cookies and cache periodically

                           Use private browsing when on public computers

                           Create strong, unique passwords


Saturday, March 23, 13                                                        24
Act Responsibly

                    Avoid sharing personally identifying information,
                    especially of living or recently deceased persons

                         Use privacy ïŹltering and never publish
                         information on living persons without their
                         permission

                         Consider creating a public ïŹle and a private ïŹle if
                         sharing information in genealogical databases, as
                         the ïŹlters might not do what you expect.



Saturday, March 23, 13                                                         25
Advocate for a
                               Balanced Approach

                    Learn about the need for balance between privacy
                    and openness in genealogical data.

                    Share what you learn with your

                         genealogy society

                         genealogy software providers

                         legislators



Saturday, March 23, 13                                                 26
REFERENCES




Saturday, March 23, 13                27
References


                    Digital Data Breach Search Tool:
                    http://www.privacyrights.org/data-breach/new

                    FAQ Entry on the SSDI
                    https://www.privacyrights.org/fs/fs10-ssn.htm#death

                    Letter to the House Ways and Means Committee from Leslie Brinkley
                    Lawson, President, Council for the Advancement of Forensic Genealogy
                    http://waysandmeans.house.gov/uploadedïŹles/sfr_cafg_ss_2_2_12.pdf




Saturday, March 23, 13                                                                     28
References


                    BBC, “Dropbox details security breach that caused spam attack” http://
                    www.bbc.co.uk/news/technology-19079353

                    New York Times, “Researchers Wring Hands as U.S. Clamps Down on Death
                    Record Access”
                    http://www.nytimes.com/2012/10/09/us/social-security-death-record-
                    limits-hinder-researchers.html

                    Wired, “Zendesk Security Breach Affects Twitter, Tumblr and Pinterest,”
                    http://www.wired.com/threatlevel/2013/02/twitter-tumblr-pinterest/




Saturday, March 23, 13                                                                        29
References


                    Records Preservation and Access Committee
                    A joint committee of FGS, NGS, and IAJGS
                    http://www.fgs.org/rpac/

                    Digital Due Process Coalition
                    http://www.digitaldueprocess.org/

                    Center for Democracy & Technology
                    https://www.cdt.org/




Saturday, March 23, 13                                          30
References


                    Genealogical Privacy blog
                    http://www.genealogicalprivacy.org/

                    Electronic Freedom Foundation
                    https://www.eff.org/

                    Electronic Privacy Information Center
                    http://epic.org/




Saturday, March 23, 13                                      31
Forthcoming




Saturday, March 23, 13                 32
Join us in Las Vegas




Saturday, March 23, 13                          33
These slides will be available at

                           genealogymedia.com/talks

                                       and

                         slideshare.net/genealogymedia




Saturday, March 23, 13                                       34

Weitere Àhnliche Inhalte

Ähnlich wie Internet Privacy and Security Follies and Foibles

Social Networks and the Patent Information Industry
Social Networks and the Patent Information IndustrySocial Networks and the Patent Information Industry
Social Networks and the Patent Information IndustryArne Krueger
 
Data protection & government schemes
Data protection & government schemesData protection & government schemes
Data protection & government schemesMathew Thomas
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
Open Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata Commons
Open Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata CommonsOpen Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata Commons
Open Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata CommonsDomino Data Lab
 
Authorship: Copyleft Basics
Authorship: Copyleft BasicsAuthorship: Copyleft Basics
Authorship: Copyleft BasicsKrista Kennedy
 
1- Read Chapter 3 of the textbook  Question 08What character.docx
1- Read Chapter 3 of the textbook  Question 08What character.docx1- Read Chapter 3 of the textbook  Question 08What character.docx
1- Read Chapter 3 of the textbook  Question 08What character.docxkarisariddell
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 

Ähnlich wie Internet Privacy and Security Follies and Foibles (8)

Social Networks and the Patent Information Industry
Social Networks and the Patent Information IndustrySocial Networks and the Patent Information Industry
Social Networks and the Patent Information Industry
 
Data protection & government schemes
Data protection & government schemesData protection & government schemes
Data protection & government schemes
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Open Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata Commons
Open Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata CommonsOpen Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata Commons
Open Data Bay Area (OBDA) | Kurt Bollacker: Public Metadata Commons
 
Authorship: Copyleft Basics
Authorship: Copyleft BasicsAuthorship: Copyleft Basics
Authorship: Copyleft Basics
 
1- Read Chapter 3 of the textbook  Question 08What character.docx
1- Read Chapter 3 of the textbook  Question 08What character.docx1- Read Chapter 3 of the textbook  Question 08What character.docx
1- Read Chapter 3 of the textbook  Question 08What character.docx
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 

Mehr von GenealogyMedia.com

Turbo Charge Your Research Planning with Trello.pdf
Turbo Charge Your Research Planning with Trello.pdfTurbo Charge Your Research Planning with Trello.pdf
Turbo Charge Your Research Planning with Trello.pdfGenealogyMedia.com
 
Turbo Charge Your Research Planning with Trello.pptx
Turbo Charge Your Research Planning with Trello.pptxTurbo Charge Your Research Planning with Trello.pptx
Turbo Charge Your Research Planning with Trello.pptxGenealogyMedia.com
 
Evernote for Genealogists
Evernote for GenealogistsEvernote for Genealogists
Evernote for GenealogistsGenealogyMedia.com
 
Beyond Google: The Evolution of Search - NGS 2017
Beyond Google: The Evolution of Search - NGS 2017Beyond Google: The Evolution of Search - NGS 2017
Beyond Google: The Evolution of Search - NGS 2017GenealogyMedia.com
 
Researching Your Civil War Carolinian
Researching Your Civil War CarolinianResearching Your Civil War Carolinian
Researching Your Civil War CarolinianGenealogyMedia.com
 
Genealogy in the Cloud - NGS 2015
Genealogy in the Cloud - NGS 2015Genealogy in the Cloud - NGS 2015
Genealogy in the Cloud - NGS 2015GenealogyMedia.com
 
Evernote for Genealogists - NGS 2015
Evernote for Genealogists - NGS 2015Evernote for Genealogists - NGS 2015
Evernote for Genealogists - NGS 2015GenealogyMedia.com
 
FGS 2014 - Electronic Publishing Fundamentals for Society Leaders
FGS 2014 - Electronic Publishing Fundamentals for Society LeadersFGS 2014 - Electronic Publishing Fundamentals for Society Leaders
FGS 2014 - Electronic Publishing Fundamentals for Society LeadersGenealogyMedia.com
 
FGS 2015 - Strategic Planning for Society Leaders
FGS 2015 - Strategic Planning for Society LeadersFGS 2015 - Strategic Planning for Society Leaders
FGS 2015 - Strategic Planning for Society LeadersGenealogyMedia.com
 
Beyond Google: Advanced Search
Beyond Google: Advanced SearchBeyond Google: Advanced Search
Beyond Google: Advanced SearchGenealogyMedia.com
 
Social Media: Share Your Genealogy
Social Media: Share Your GenealogySocial Media: Share Your Genealogy
Social Media: Share Your GenealogyGenealogyMedia.com
 
Cloud Computing and Genealogical Collaboration
Cloud Computing and Genealogical CollaborationCloud Computing and Genealogical Collaboration
Cloud Computing and Genealogical CollaborationGenealogyMedia.com
 
Building and Maintaining Genealogical Websites
Building and Maintaining Genealogical WebsitesBuilding and Maintaining Genealogical Websites
Building and Maintaining Genealogical WebsitesGenealogyMedia.com
 
Blogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: SyllabusBlogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: SyllabusGenealogyMedia.com
 
Beyond Google: Advanced Internet Search Tips and Tricks
Beyond Google: Advanced Internet Search Tips and TricksBeyond Google: Advanced Internet Search Tips and Tricks
Beyond Google: Advanced Internet Search Tips and TricksGenealogyMedia.com
 
Blogs, Wikis, & Flickr: Oh My!
Blogs, Wikis, & Flickr: Oh My!Blogs, Wikis, & Flickr: Oh My!
Blogs, Wikis, & Flickr: Oh My!GenealogyMedia.com
 
Genealogy: Getting Started
Genealogy: Getting StartedGenealogy: Getting Started
Genealogy: Getting StartedGenealogyMedia.com
 
Smart Internet Searching for Genealogists
Smart Internet Searching for GenealogistsSmart Internet Searching for Genealogists
Smart Internet Searching for GenealogistsGenealogyMedia.com
 
Web 2.0 for Genealogists
Web 2.0 for GenealogistsWeb 2.0 for Genealogists
Web 2.0 for GenealogistsGenealogyMedia.com
 

Mehr von GenealogyMedia.com (19)

Turbo Charge Your Research Planning with Trello.pdf
Turbo Charge Your Research Planning with Trello.pdfTurbo Charge Your Research Planning with Trello.pdf
Turbo Charge Your Research Planning with Trello.pdf
 
Turbo Charge Your Research Planning with Trello.pptx
Turbo Charge Your Research Planning with Trello.pptxTurbo Charge Your Research Planning with Trello.pptx
Turbo Charge Your Research Planning with Trello.pptx
 
Evernote for Genealogists
Evernote for GenealogistsEvernote for Genealogists
Evernote for Genealogists
 
Beyond Google: The Evolution of Search - NGS 2017
Beyond Google: The Evolution of Search - NGS 2017Beyond Google: The Evolution of Search - NGS 2017
Beyond Google: The Evolution of Search - NGS 2017
 
Researching Your Civil War Carolinian
Researching Your Civil War CarolinianResearching Your Civil War Carolinian
Researching Your Civil War Carolinian
 
Genealogy in the Cloud - NGS 2015
Genealogy in the Cloud - NGS 2015Genealogy in the Cloud - NGS 2015
Genealogy in the Cloud - NGS 2015
 
Evernote for Genealogists - NGS 2015
Evernote for Genealogists - NGS 2015Evernote for Genealogists - NGS 2015
Evernote for Genealogists - NGS 2015
 
FGS 2014 - Electronic Publishing Fundamentals for Society Leaders
FGS 2014 - Electronic Publishing Fundamentals for Society LeadersFGS 2014 - Electronic Publishing Fundamentals for Society Leaders
FGS 2014 - Electronic Publishing Fundamentals for Society Leaders
 
FGS 2015 - Strategic Planning for Society Leaders
FGS 2015 - Strategic Planning for Society LeadersFGS 2015 - Strategic Planning for Society Leaders
FGS 2015 - Strategic Planning for Society Leaders
 
Beyond Google: Advanced Search
Beyond Google: Advanced SearchBeyond Google: Advanced Search
Beyond Google: Advanced Search
 
Social Media: Share Your Genealogy
Social Media: Share Your GenealogySocial Media: Share Your Genealogy
Social Media: Share Your Genealogy
 
Cloud Computing and Genealogical Collaboration
Cloud Computing and Genealogical CollaborationCloud Computing and Genealogical Collaboration
Cloud Computing and Genealogical Collaboration
 
Building and Maintaining Genealogical Websites
Building and Maintaining Genealogical WebsitesBuilding and Maintaining Genealogical Websites
Building and Maintaining Genealogical Websites
 
Blogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: SyllabusBlogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: Syllabus
 
Beyond Google: Advanced Internet Search Tips and Tricks
Beyond Google: Advanced Internet Search Tips and TricksBeyond Google: Advanced Internet Search Tips and Tricks
Beyond Google: Advanced Internet Search Tips and Tricks
 
Blogs, Wikis, & Flickr: Oh My!
Blogs, Wikis, & Flickr: Oh My!Blogs, Wikis, & Flickr: Oh My!
Blogs, Wikis, & Flickr: Oh My!
 
Genealogy: Getting Started
Genealogy: Getting StartedGenealogy: Getting Started
Genealogy: Getting Started
 
Smart Internet Searching for Genealogists
Smart Internet Searching for GenealogistsSmart Internet Searching for Genealogists
Smart Internet Searching for Genealogists
 
Web 2.0 for Genealogists
Web 2.0 for GenealogistsWeb 2.0 for Genealogists
Web 2.0 for Genealogists
 

KĂŒrzlich hochgeladen

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 

KĂŒrzlich hochgeladen (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 

Internet Privacy and Security Follies and Foibles

  • 1. Internet Privacy & Security Follies & Foibles Jordan Jones NGS Luncheon / RootsTech 2013 Saturday, March 23, 13 1
  • 2. How Many of You Use? Evernote Pinterest Dropbox Amazon Twitter Tumblr Google Apple Facebook Microsoft Saturday, March 23, 13 2
  • 3. How Privacy Can be Breached The Privacy Rights Clearinghouse categorizes privacy breaches as: Unintended Disclosure Portable Device Hacking or Malware Stationary Device Payment Card Fraud Unknown or Other Insider Physical Loss Saturday, March 23, 13 3
  • 4. Read It and Weep In 2011, it was revealed that the iOS and Android apps of Facebook and Dropbox were accessible to anyone with physical access to the mobile device ... ... the passwords were in unencrypted text ïŹles. Cause: Unintended Disclosure Saturday, March 23, 13 4
  • 5. 4 Hour Free-for-All June 20, 2011 – Dropbox announced that during a four- hour period ... ... a bug in their authentication software would have allowed anyone access to any account, without a password. Cause: Unintended Disclosure Saturday, March 23, 13 5
  • 6. E-mail Switcheroo August 1, 2012 – Dropbox revealed that someone hacked into an employee’s account and gained access to a list of customer e-mail addresses, which were then spammed. Additionally, “usernames and passwords stolen from other sites had also been used to sign in to” Dropbox accounts. Cause: Unintended Disclosure / Hacking or Malware Saturday, March 23, 13 6
  • 7. The Zen of Hacking February 21, 2013 – Zendesk was hacked. Customer e- mail addresses, the subject lines of support e-mail (and possibly phone numbers) for users of Twitter, Pinterest, and Tumblr were stolen. Cause: Hacking or Malware Saturday, March 23, 13 7
  • 8. Yes, Microsoft runs Mac OS February 22, 2013 – Microsoft was hacked. It is unclear what information if any was stolen. The method was similar to one recently used successfully against Apple, Facebook, and Twitter. A virus was placed on a legitimate website. This exploited a “zero day” (as yet unknown) security hole in Java for Mac OS X. Cause: Hacking or Malware Saturday, March 23, 13 8
  • 9. Hacktopia March 3, 2013 – Evernote was hacked. “User names, email addresses, and encrypted passwords may have been exposed.” “A total of 50 million users were told to reset their passwords.” Cause: Hacking or Malware Saturday, March 23, 13 9
  • 10. Information Wants to Be Free Saturday, March 23, 13 10
  • 11. Information Wants to be Free “On the one hand information wants to be expensive, because it’s so valuable. The right information in the right place just changes your life. On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two ïŹghting against each other.” — Stewart Brand, 1st Hackers Conference, 1984 Saturday, March 23, 13 11
  • 12. Two Kinds of Freedom 1. Free as in beer 2. Free as in speech Saturday, March 23, 13 12
  • 13. Jones’s Corollary to Brand’s Law “Information is like water; information wants to ïŹ‚ow free.” Thanks to Moore’s law and innovation, it is constantly getting cheaper and easier for: You to share data with people You accidentally to share information with people Others to share information you gave them, wider than you wanted Someone to steal or leak your information Saturday, March 23, 13 13
  • 14. Consequences for Records Access of Jones’s Corollary Saturday, March 23, 13 14
  • 15. Open Access vs. Privacy Especially since 9/11, federal and state agencies have been tightening access to public records of interest to genealogists. The fact that information wants to ïŹ‚ow like water means anything private and divulged can be disseminated further than prior to the Internet. The most obvious example of government tightening down access to electronic records is the SSDI. Saturday, March 23, 13 15
  • 16. SSDI The Social Security Death Index (SSDI) is based on the Social Security Administration’s Master Death File (MDF). The MDF includes about 90 million names of people who have died and whose deaths have been reported to the SSA. Saturday, March 23, 13 16
  • 17. Fraud Based on MDF Data The MDF was released due to a Freedom-of- Information ruling. It was expected to help combat fraud. Banks and other creditors could quickly determine whether the person was dead according to the MDF. The IRS was apparently not using this method to check returns and several people had the identities of their deceased children stolen. Saturday, March 23, 13 17
  • 18. Removal of State Records In the process of looking at the privacy implications of the MDF / SSDI, the SSA noticed that some state records were being improperly divulged. As a result: SSA expunged 4 million records in Nov. 2011 SSA decreased the number of records added annually by about 1/3 (from 2.8 to 1.8 million) Saturday, March 23, 13 18
  • 19. What’s Happening Now At least four federal bills have been introduced that would limit access to the MDF / SSDI: HR 295 “Protect and Save Act of 2013” HR 466 “Social Security Death Master File Privacy Act of 2013” HR 531 “Tax Crimes and Identity Theft Prevention” HR 926 “Social Security Identity Defense Act of 2013” Saturday, March 23, 13 19
  • 20. Genealogy Partnerships Records Preservation and Access Committee Voting Members: The National Genealogical Society (NGS), the Federation of Genealogical Societies (FGS) and the International Association of Jewish Genealogical Societies (IAJGS) Non-Voting Members: The Association of Professional Genealogists (APG), the Board for CertiïŹcation of Genealogists (BCG), the American Society of Genealogists (ASG), ProQuest and Ancestry.com Saturday, March 23, 13 20
  • 21. Digital Due Process Coalition RPAC has joined the Digital Due Process coalition, along with key technology leaders (Adobe, Apple, Dell, Facebook, Google, HP, IBM, Intel, Microsoft, Oracle, Twitter) as well as leaders in content (Newspaper Association of America, American Library Association, Association of Research Libraries) Saturday, March 23, 13 21
  • 22. Why This Matters What we need is a balance between open access and privacy As members of the privacy community, we can reïŹ‚ect our existing goals to maintain privacy while retaining open records Saturday, March 23, 13 22
  • 23. What Can You Do? Saturday, March 23, 13 23
  • 24. Protect Your Data Protect your data as much as you can. Post wisely. Don’t post anything on the Internet that would harm you if it were divulged Encrypt your most sensitive data. Clear browser cookies and cache periodically Use private browsing when on public computers Create strong, unique passwords Saturday, March 23, 13 24
  • 25. Act Responsibly Avoid sharing personally identifying information, especially of living or recently deceased persons Use privacy ïŹltering and never publish information on living persons without their permission Consider creating a public ïŹle and a private ïŹle if sharing information in genealogical databases, as the ïŹlters might not do what you expect. Saturday, March 23, 13 25
  • 26. Advocate for a Balanced Approach Learn about the need for balance between privacy and openness in genealogical data. Share what you learn with your genealogy society genealogy software providers legislators Saturday, March 23, 13 26
  • 28. References Digital Data Breach Search Tool: http://www.privacyrights.org/data-breach/new FAQ Entry on the SSDI https://www.privacyrights.org/fs/fs10-ssn.htm#death Letter to the House Ways and Means Committee from Leslie Brinkley Lawson, President, Council for the Advancement of Forensic Genealogy http://waysandmeans.house.gov/uploadedïŹles/sfr_cafg_ss_2_2_12.pdf Saturday, March 23, 13 28
  • 29. References BBC, “Dropbox details security breach that caused spam attack” http:// www.bbc.co.uk/news/technology-19079353 New York Times, “Researchers Wring Hands as U.S. Clamps Down on Death Record Access” http://www.nytimes.com/2012/10/09/us/social-security-death-record- limits-hinder-researchers.html Wired, “Zendesk Security Breach Affects Twitter, Tumblr and Pinterest,” http://www.wired.com/threatlevel/2013/02/twitter-tumblr-pinterest/ Saturday, March 23, 13 29
  • 30. References Records Preservation and Access Committee A joint committee of FGS, NGS, and IAJGS http://www.fgs.org/rpac/ Digital Due Process Coalition http://www.digitaldueprocess.org/ Center for Democracy & Technology https://www.cdt.org/ Saturday, March 23, 13 30
  • 31. References Genealogical Privacy blog http://www.genealogicalprivacy.org/ Electronic Freedom Foundation https://www.eff.org/ Electronic Privacy Information Center http://epic.org/ Saturday, March 23, 13 31
  • 33. Join us in Las Vegas Saturday, March 23, 13 33
  • 34. These slides will be available at genealogymedia.com/talks and slideshare.net/genealogymedia Saturday, March 23, 13 34