SlideShare ist ein Scribd-Unternehmen logo
1 von 18
An Introduction to Surviving
in a Surveillance Society
Contents
• The Surveillance State
• Who is currently watching you online (in the UK)?
• If you have nothing to fear, you have nothing to hide!
• Ask yourself
• Edward Snowden
• Privacy Tools Tor, TAILS, Disposable e-mail, DuckDuckGo
• Anonymity
• Bibliography
The Surveillance State
• There are up to 5.9 million closed-circuit television cameras in the
country, including 750,000 in “sensitive locations” such as schools,
hospitals and care homes. - British Security Industry Authority
• GCHQ had placed data interceptors on fibre-optic cables that carry
internet data in and out of the UK. 850,000 NSA contractors have
access to the data
• Since April 2004, the police in England and Wales have been able to
take DNA samples without consent from anyone arrested on
suspicion of any recordable offence.
Who is currently watching you online?
(in the UK)
Your mobile phone provider
Your ISP
If you have nothing to hide, you have nothing
to fear!
“If we have nothing to hide, why are we under surveillance?”
Jake Lawler
“Wanting my privacy is NOT equal to having something to hide.”
James Earl Walsh
Ask yourself: who would you like reading
personal communications
• Your parents?
• Your school?
• A stranger?
• The government?
Then ask yourself if you believe privacy is a right or an inconvenient
option
Edward Snowden
Edward Snowden is an American privacy
activist, computer professional,
former CIA employee, and former government
contractor who leaked classified information from
the United States National Security Agency (NSA)
in 2013.
The information revealed numerous global
surveillance programs, many run by the NSA and
the Five Eyes with the cooperation
of telecommunication companies and European
governments.
(Source: Wikipedia)
Privacy Tools
• Tor
• TAILS
• Disposable e-mail
• DuckDuckGo
Privacy Tools:
The Onion Router (Tor)
Tor is a service that helps you to protect your anonymity while using the
Internet. Tor is comprised of two parts:
• software you can download that allows you to use the Internet
anonymously,
and the
• volunteer network of computers that makes it possible for that software to
work.
When you use the Tor software, your IP address remains hidden and it
appears that your connection is coming from the IP address of a Tor exit
relay, which can be anywhere in the world.
How Tor Works
How Tor Works
Privacy Tools:
The Amnesiac Incognito Live System (TAILS)
TAILS is a Linux-based live OS that runs off a CD or USB
All its outgoing connections are forced to go through Tor, and direct
(non-anonymous) connections are blocked.
The system leaves no trace on the machine unless explicitly told to do
so.
A completely new session is started every time you log in
Privacy Tools:
Disposable e-mail
Disposable e-mail addresses are available from a number of sources,
for the purpose of this discussion I will mention Guerrilla e-mail
Guerrilla Mail gives you a disposable email address. There is no need to
register, simply visit Guerrilla Mail and a random address will be given.
You can also choose your own address.
You can give your email address to whoever you do not trust. You can
view the email on Guerrilla Mail, click on any confirmation link, then
delete it.
Guerrilla Mail deletes all email that was delivered to an inbox after 1
hour. Logs are deleted after 24 hours.
Privacy Tools:
DuckDuckGo
DDG is a search engine that does not track or collect information about
its users
The tools mentioned in this presentation are freely available online
Using them correctly will enable you to anonymise a large part of your
web use, however it is up to you to make sure the tools are used
correctly otherwise their usefulness will be limited.
Anonymity is a shield from the tyranny of the
majority. . . .
It thus exemplifies the purpose behind the Bill of
Rights and of the First Amendment in particular: to
protect unpopular individuals from retaliation . . .
at the hand of an intolerant society.
McIntyre v. Ohio Elections Commission (93-986), 514 U.S. 334 (1995)
Bibliography
Amnesty International, (2015). [online] Available at:
https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-
response-to-mass-surveillance/ [Accessed 14 Oct. 2015].
DuckDuckGo, (2015). DuckDuckGo. [online] Available at: https://duckduckgo.com/ [Accessed 16 Oct. 2015].
Electronic Frontier Foundation, (2015). Electronic Frontier Foundation. [online] Available at:
https://www.eff.org/en-gb [Accessed 14 Oct. 2015].
Electronic Frontier Foundation, (2011). What is a Tor Relay?. [online] Available at:
https://www.eff.org/pages/what-tor-relay [Accessed 14 Oct. 2015].
Guerrillamail.com, (2015). ✉ Guerrilla Mail - Disposable Temporary E-Mail Address. [online] Available at:
https://www.guerrillamail.com [Accessed 14 Oct. 2015].
The Tor Project, (2015). Tor Project: Anonymity Online. [online] Torproject.org. Available at:
https://www.torproject.org/ [Accessed 14 Oct. 2015].
Wikipedia, (2015). Edward Snowden. [online] Available at: https://en.wikipedia.org/wiki/Edward_Snowden
[Accessed 14 Oct. 2015].
Wired UK, (2015). A simple guide to GCHQ's internet surveillance programme Tempora (Wired UK). [online]
Available at: http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101 [Accessed 16 Oct. 2015].

Weitere ähnliche Inhalte

Was ist angesagt?

Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 

Was ist angesagt? (19)

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Darknet
DarknetDarknet
Darknet
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and Securities
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Darknet
DarknetDarknet
Darknet
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Dark web
Dark webDark web
Dark web
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 
Darknet
DarknetDarknet
Darknet
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 

Andere mochten auch

Andere mochten auch (10)

Is it a library
Is it a libraryIs it a library
Is it a library
 
CILIP Action Plan 2016-2020 & School Libraries
CILIP Action Plan 2016-2020 & School LibrariesCILIP Action Plan 2016-2020 & School Libraries
CILIP Action Plan 2016-2020 & School Libraries
 
Google
GoogleGoogle
Google
 
What is a Word?
What is a Word?What is a Word?
What is a Word?
 
Barometre fidélité - annales 2009
Barometre  fidélité - annales 2009 Barometre  fidélité - annales 2009
Barometre fidélité - annales 2009
 
Observatoire fidelite barometre 2010
Observatoire fidelite barometre 2010Observatoire fidelite barometre 2010
Observatoire fidelite barometre 2010
 
World book day quiz x
World book day quiz xWorld book day quiz x
World book day quiz x
 
Présentation observatoire fidélité 8avril 2015
Présentation observatoire fidélité 8avril 2015Présentation observatoire fidélité 8avril 2015
Présentation observatoire fidélité 8avril 2015
 
Observatoire fidelite 4 mars 2016
Observatoire fidelite 4 mars 2016Observatoire fidelite 4 mars 2016
Observatoire fidelite 4 mars 2016
 
Observatoire fidelite barometre 4 mars 2016
Observatoire fidelite  barometre 4 mars 2016Observatoire fidelite  barometre 4 mars 2016
Observatoire fidelite barometre 4 mars 2016
 

Ähnlich wie An Introduction to Surviving in a Surveillance Society

Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us free
Mathias Klang
 

Ähnlich wie An Introduction to Surviving in a Surveillance Society (20)

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Tor
TorTor
Tor
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us free
 
Cryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalistsCryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalists
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Dark Web
Dark WebDark Web
Dark Web
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
File000154
File000154File000154
File000154
 
.Onion
.Onion.Onion
.Onion
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 

Mehr von Matt Imrie

Mehr von Matt Imrie (7)

The Moderately Large World Book Day Quiz 2018
The Moderately Large World Book Day Quiz 2018The Moderately Large World Book Day Quiz 2018
The Moderately Large World Book Day Quiz 2018
 
The quest-for-the-missing-duck-an-introduction-to-using-the-library
The quest-for-the-missing-duck-an-introduction-to-using-the-libraryThe quest-for-the-missing-duck-an-introduction-to-using-the-library
The quest-for-the-missing-duck-an-introduction-to-using-the-library
 
Turning Japanese
Turning JapaneseTurning Japanese
Turning Japanese
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
The Quest for the Missing Duck: an Introduction to Using the Library
The Quest for the Missing Duck: an Introduction to Using the LibraryThe Quest for the Missing Duck: an Introduction to Using the Library
The Quest for the Missing Duck: an Introduction to Using the Library
 
Graphic Novels: from Action Comics to Zenda (Prisoner of)
Graphic Novels: from Action Comics to Zenda (Prisoner of)Graphic Novels: from Action Comics to Zenda (Prisoner of)
Graphic Novels: from Action Comics to Zenda (Prisoner of)
 
Manga & Anime
Manga & AnimeManga & Anime
Manga & Anime
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

An Introduction to Surviving in a Surveillance Society

  • 1. An Introduction to Surviving in a Surveillance Society
  • 2. Contents • The Surveillance State • Who is currently watching you online (in the UK)? • If you have nothing to fear, you have nothing to hide! • Ask yourself • Edward Snowden • Privacy Tools Tor, TAILS, Disposable e-mail, DuckDuckGo • Anonymity • Bibliography
  • 3. The Surveillance State • There are up to 5.9 million closed-circuit television cameras in the country, including 750,000 in “sensitive locations” such as schools, hospitals and care homes. - British Security Industry Authority • GCHQ had placed data interceptors on fibre-optic cables that carry internet data in and out of the UK. 850,000 NSA contractors have access to the data • Since April 2004, the police in England and Wales have been able to take DNA samples without consent from anyone arrested on suspicion of any recordable offence.
  • 4.
  • 5. Who is currently watching you online? (in the UK) Your mobile phone provider Your ISP
  • 6. If you have nothing to hide, you have nothing to fear! “If we have nothing to hide, why are we under surveillance?” Jake Lawler “Wanting my privacy is NOT equal to having something to hide.” James Earl Walsh
  • 7. Ask yourself: who would you like reading personal communications • Your parents? • Your school? • A stranger? • The government? Then ask yourself if you believe privacy is a right or an inconvenient option
  • 8. Edward Snowden Edward Snowden is an American privacy activist, computer professional, former CIA employee, and former government contractor who leaked classified information from the United States National Security Agency (NSA) in 2013. The information revealed numerous global surveillance programs, many run by the NSA and the Five Eyes with the cooperation of telecommunication companies and European governments. (Source: Wikipedia)
  • 9. Privacy Tools • Tor • TAILS • Disposable e-mail • DuckDuckGo
  • 10. Privacy Tools: The Onion Router (Tor) Tor is a service that helps you to protect your anonymity while using the Internet. Tor is comprised of two parts: • software you can download that allows you to use the Internet anonymously, and the • volunteer network of computers that makes it possible for that software to work. When you use the Tor software, your IP address remains hidden and it appears that your connection is coming from the IP address of a Tor exit relay, which can be anywhere in the world.
  • 13. Privacy Tools: The Amnesiac Incognito Live System (TAILS) TAILS is a Linux-based live OS that runs off a CD or USB All its outgoing connections are forced to go through Tor, and direct (non-anonymous) connections are blocked. The system leaves no trace on the machine unless explicitly told to do so. A completely new session is started every time you log in
  • 14. Privacy Tools: Disposable e-mail Disposable e-mail addresses are available from a number of sources, for the purpose of this discussion I will mention Guerrilla e-mail Guerrilla Mail gives you a disposable email address. There is no need to register, simply visit Guerrilla Mail and a random address will be given. You can also choose your own address. You can give your email address to whoever you do not trust. You can view the email on Guerrilla Mail, click on any confirmation link, then delete it. Guerrilla Mail deletes all email that was delivered to an inbox after 1 hour. Logs are deleted after 24 hours.
  • 15. Privacy Tools: DuckDuckGo DDG is a search engine that does not track or collect information about its users
  • 16. The tools mentioned in this presentation are freely available online Using them correctly will enable you to anonymise a large part of your web use, however it is up to you to make sure the tools are used correctly otherwise their usefulness will be limited.
  • 17. Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society. McIntyre v. Ohio Elections Commission (93-986), 514 U.S. 334 (1995)
  • 18. Bibliography Amnesty International, (2015). [online] Available at: https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong- response-to-mass-surveillance/ [Accessed 14 Oct. 2015]. DuckDuckGo, (2015). DuckDuckGo. [online] Available at: https://duckduckgo.com/ [Accessed 16 Oct. 2015]. Electronic Frontier Foundation, (2015). Electronic Frontier Foundation. [online] Available at: https://www.eff.org/en-gb [Accessed 14 Oct. 2015]. Electronic Frontier Foundation, (2011). What is a Tor Relay?. [online] Available at: https://www.eff.org/pages/what-tor-relay [Accessed 14 Oct. 2015]. Guerrillamail.com, (2015). ✉ Guerrilla Mail - Disposable Temporary E-Mail Address. [online] Available at: https://www.guerrillamail.com [Accessed 14 Oct. 2015]. The Tor Project, (2015). Tor Project: Anonymity Online. [online] Torproject.org. Available at: https://www.torproject.org/ [Accessed 14 Oct. 2015]. Wikipedia, (2015). Edward Snowden. [online] Available at: https://en.wikipedia.org/wiki/Edward_Snowden [Accessed 14 Oct. 2015]. Wired UK, (2015). A simple guide to GCHQ's internet surveillance programme Tempora (Wired UK). [online] Available at: http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101 [Accessed 16 Oct. 2015].

Hinweis der Redaktion

  1. The population of the UK is one of the most closely surveilled in the western world There is roughly one CCTV camera for every 11 people in the UK The GCHQ internet surveillance programme is known as Tempora
  2. This is a tweet from the National Police Aerial Service, in case anyone doubts the efficacy of eyes in the sky or the lack of professionalism of people supposedly watching us
  3. The Government Communications Headquarters (GCHQ) is a British intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces. The National Security Agency (NSA) is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes Google is a former search company that still maintains a search engine but focuses much of its energy these days on advertising and online services Microsoft is a software company that provides the most widely used OS in the modern world Apply is a technology company that creates some of the most desired technological devices in the world today If you use a Windows phone, an iPhone or an Android-based phone then unless you use anonymising software the three companies know what you are doing and where you are!
  4. The usual line trotted out to defend invasive monitoring and two rebuttals from Amnesty International Even if you hold the government up to be an organisation with our best interests at heart remember that this can change and then all the information gathered over the years will be in the hands of people that wish to crush us
  5. Discuss use of digital communications e.g.: E-mail Snapchat Text messaging Online chat programs How embarrassing would it be if someone got hold of messages to a significant other and made them public or worse blackmailed you into doing something that you found morally reprehensible because of something you thought was secure turned out not to be.
  6. We know quite a bit of what spy agencies in the western world are up to, thanks largely to the efforts of Edward Snowden, currently in hiding in Russia.
  7. Tor was developed by the US Naval Research Laboratory wo released the source code, it was initially sponsored by the Electronic Frontier Foundation and is currently run by The Tor Project It is used by journalists, human rights campaigners, political activists and many other people both here and abroad whose life & liberty would be at risk if they were discovered
  8. Diagrams that show how Tor works
  9. Linux – an open source OS developed by Linus Torvalds and maintained by thousands of people worldwide. It is one of the best-known examples of Free & Open Source Software (FOSS)
  10. Good for sending one-off e-mails or setting up an online account that requires initial e-mail verification
  11. DuckDuckGo is an Internet search engine that emphasizes protecting searchers' privacy and avoiding the filter bubble of personalized search results. DDG distinguishes itself from other search engines by not profiling its users and by deliberately showing all users the same search results for a given search term.
  12. When using the tools discussed today make sure you read up on using them correctly. Future discussions will focus on each of the tools mentioned