This document provides an introduction to privacy tools for surviving in a surveillance society. It discusses the extent of surveillance in the UK through CCTV cameras and internet data interception programs. It then summarizes privacy tools like Tor, TAILS, and DuckDuckGo that can help provide anonymity online by routing traffic through volunteer networks or not tracking users. The document recommends using these tools correctly to anonymize web use while recognizing they must be used properly to be effective. It cites whistleblower Edward Snowden's revelations about global surveillance programs as motivation for protecting online privacy.
2. Contents
• The Surveillance State
• Who is currently watching you online (in the UK)?
• If you have nothing to fear, you have nothing to hide!
• Ask yourself
• Edward Snowden
• Privacy Tools Tor, TAILS, Disposable e-mail, DuckDuckGo
• Anonymity
• Bibliography
3. The Surveillance State
• There are up to 5.9 million closed-circuit television cameras in the
country, including 750,000 in “sensitive locations” such as schools,
hospitals and care homes. - British Security Industry Authority
• GCHQ had placed data interceptors on fibre-optic cables that carry
internet data in and out of the UK. 850,000 NSA contractors have
access to the data
• Since April 2004, the police in England and Wales have been able to
take DNA samples without consent from anyone arrested on
suspicion of any recordable offence.
4.
5. Who is currently watching you online?
(in the UK)
Your mobile phone provider
Your ISP
6. If you have nothing to hide, you have nothing
to fear!
“If we have nothing to hide, why are we under surveillance?”
Jake Lawler
“Wanting my privacy is NOT equal to having something to hide.”
James Earl Walsh
7. Ask yourself: who would you like reading
personal communications
• Your parents?
• Your school?
• A stranger?
• The government?
Then ask yourself if you believe privacy is a right or an inconvenient
option
8. Edward Snowden
Edward Snowden is an American privacy
activist, computer professional,
former CIA employee, and former government
contractor who leaked classified information from
the United States National Security Agency (NSA)
in 2013.
The information revealed numerous global
surveillance programs, many run by the NSA and
the Five Eyes with the cooperation
of telecommunication companies and European
governments.
(Source: Wikipedia)
10. Privacy Tools:
The Onion Router (Tor)
Tor is a service that helps you to protect your anonymity while using the
Internet. Tor is comprised of two parts:
• software you can download that allows you to use the Internet
anonymously,
and the
• volunteer network of computers that makes it possible for that software to
work.
When you use the Tor software, your IP address remains hidden and it
appears that your connection is coming from the IP address of a Tor exit
relay, which can be anywhere in the world.
13. Privacy Tools:
The Amnesiac Incognito Live System (TAILS)
TAILS is a Linux-based live OS that runs off a CD or USB
All its outgoing connections are forced to go through Tor, and direct
(non-anonymous) connections are blocked.
The system leaves no trace on the machine unless explicitly told to do
so.
A completely new session is started every time you log in
14. Privacy Tools:
Disposable e-mail
Disposable e-mail addresses are available from a number of sources,
for the purpose of this discussion I will mention Guerrilla e-mail
Guerrilla Mail gives you a disposable email address. There is no need to
register, simply visit Guerrilla Mail and a random address will be given.
You can also choose your own address.
You can give your email address to whoever you do not trust. You can
view the email on Guerrilla Mail, click on any confirmation link, then
delete it.
Guerrilla Mail deletes all email that was delivered to an inbox after 1
hour. Logs are deleted after 24 hours.
16. The tools mentioned in this presentation are freely available online
Using them correctly will enable you to anonymise a large part of your
web use, however it is up to you to make sure the tools are used
correctly otherwise their usefulness will be limited.
17. Anonymity is a shield from the tyranny of the
majority. . . .
It thus exemplifies the purpose behind the Bill of
Rights and of the First Amendment in particular: to
protect unpopular individuals from retaliation . . .
at the hand of an intolerant society.
McIntyre v. Ohio Elections Commission (93-986), 514 U.S. 334 (1995)
18. Bibliography
Amnesty International, (2015). [online] Available at:
https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-
response-to-mass-surveillance/ [Accessed 14 Oct. 2015].
DuckDuckGo, (2015). DuckDuckGo. [online] Available at: https://duckduckgo.com/ [Accessed 16 Oct. 2015].
Electronic Frontier Foundation, (2015). Electronic Frontier Foundation. [online] Available at:
https://www.eff.org/en-gb [Accessed 14 Oct. 2015].
Electronic Frontier Foundation, (2011). What is a Tor Relay?. [online] Available at:
https://www.eff.org/pages/what-tor-relay [Accessed 14 Oct. 2015].
Guerrillamail.com, (2015). ✉ Guerrilla Mail - Disposable Temporary E-Mail Address. [online] Available at:
https://www.guerrillamail.com [Accessed 14 Oct. 2015].
The Tor Project, (2015). Tor Project: Anonymity Online. [online] Torproject.org. Available at:
https://www.torproject.org/ [Accessed 14 Oct. 2015].
Wikipedia, (2015). Edward Snowden. [online] Available at: https://en.wikipedia.org/wiki/Edward_Snowden
[Accessed 14 Oct. 2015].
Wired UK, (2015). A simple guide to GCHQ's internet surveillance programme Tempora (Wired UK). [online]
Available at: http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101 [Accessed 16 Oct. 2015].
Hinweis der Redaktion
The population of the UK is one of the most closely surveilled in the western world
There is roughly one CCTV camera for every 11 people in the UK
The GCHQ internet surveillance programme is known as Tempora
This is a tweet from the National Police Aerial Service, in case anyone doubts the efficacy of eyes in the sky or the lack of professionalism of people supposedly watching us
The Government Communications Headquarters (GCHQ) is a British intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.
The National Security Agency (NSA) is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes
Google is a former search company that still maintains a search engine but focuses much of its energy these days on advertising and online services
Microsoft is a software company that provides the most widely used OS in the modern world
Apply is a technology company that creates some of the most desired technological devices in the world today
If you use a Windows phone, an iPhone or an Android-based phone then unless you use anonymising software the three companies know what you are doing and where you are!
The usual line trotted out to defend invasive monitoring and two rebuttals from Amnesty International
Even if you hold the government up to be an organisation with our best interests at heart remember that this can change and then all the information gathered over the years will be in the hands of people that wish to crush us
Discuss use of digital communications e.g.:
E-mail
Snapchat
Text messaging
Online chat programs
How embarrassing would it be if someone got hold of messages to a significant other and made them public or worse blackmailed you into doing something that you found morally reprehensible because of something you thought was secure turned out not to be.
We know quite a bit of what spy agencies in the western world are up to, thanks largely to the efforts of Edward Snowden, currently in hiding in Russia.
Tor was developed by the US Naval Research Laboratory wo released the source code, it was initially sponsored by the Electronic Frontier Foundation and is currently run by The Tor Project
It is used by journalists, human rights campaigners, political activists and many other people both here and abroad whose life & liberty would be at risk if they were discovered
Diagrams that show how Tor works
Linux – an open source OS developed by Linus Torvalds and maintained by thousands of people worldwide. It is one of the best-known examples of Free & Open Source Software (FOSS)
Good for sending one-off e-mails or setting up an online account that requires initial e-mail verification
DuckDuckGo is an Internet search engine that emphasizes protecting searchers' privacy and avoiding the filter bubble of personalized search results.
DDG distinguishes itself from other search engines by not profiling its users and by deliberately showing all users the same search results for a given search term.
When using the tools discussed today make sure you read up on using them correctly.
Future discussions will focus on each of the tools mentioned