SlideShare a Scribd company logo
How private is your Privacy?
2nd April, 2014
Jerric Lyns John
Orion India Systems Pvt. Ltd.
What is privacy?
Privacy is the ability of an individual
or group to seclude themselves
or information about themselves
and thereby express themselves
selectively
What is privacy?
Privacy is the ability of an individual
or group to seclude themselves or
information about themselves
and thereby express themselves
selectively
Lets go back in
time!
1700’s – Initial Postal Mails - opened
by the system
1791 –The bill of rights – freedom
of speech & freedom from
unreasonable search and seizure
1800’s – Sealed Envelops
1868 – Right to privacy irrespective
of race and color
1890’s – Govt. tapping telephone
networks
1907 – First bugging apparatus –
Dictograph
Lets go back in
time!
1934 – FCAAct Section 605:
Prohibits 3rd party interception of
communication
1950’s – Govt begins public
surveillance
1967 – Interception requires
Warrant
1989 –WWW service added to
internet
2001 – Authorities allowed to search
databases, after 9/11
2004 – Facebook debuts
And recently…
2008 – Expands surveillance power
of authorities.
2009 – Bradley Manning leaks
classified information,Wiki Leaks
2013 – Edward Snowden leaks,
highly classified intelligence
information
- Govt wiretaps
- PRISM – Surveillance program
- Now he’s somewhere in Russia
Edward
Snowden
AtTEDVancouver
Lets watch
him
The PRISM
Every bit that passes through
American soil was monitored
80% internet
trafficpasses
throughUSA
It is so laid down in their rules, that
they can observe any data that
passes through American soil
Because 80% of
the services are
American  Tell me one service that you prominently use and is not an
American?The top US companies are the
forerunners in Machine Learning, so
its completely normal to be
paranoid!
How safe is your data?
Now that you know about the revelations, I’m changing the
question.
Adam L.
Penenberg
A journalism professor at NewYork
University
- Pando Daily
- NewYorkTimes
- Forbes
- FastCompany
- The Economist
PandoDaily  “I challenged hackers to investigate me and what they found out is
chilling” –Adam L. Penenberg26th October, 2013
The hacker
was..
Nicholas Percoco
Nicholas
Percoco
Director at KPMG
Earlier :VP of SpiderLabs
Adam L.P.
 It’s my first class of the semester at NewYork University. I’m
discussing the evils of plagiarism and falsifying sources with 11
graduate journalism students when, without warning, my
computer freezes. I fruitlessly tap on the keyboard as my laptop
takes on a life of its own and reboots. Seconds later the screen
flashes a message.To receive the four-digit code I need to unlock
it I’ll have to dial a number with a 312 area code.Then my iPhone,
set on vibrate and sitting idly on the table, beeps madly.
 I’m being hacked — and only have myself to blame.
Excerpts from the article.
Two months
before the hack,
he signed a
contract with
Nicolas
 Over the years he has performed hundreds of pen-tests and
physical break-ins, slipping into hospitals, insurance companies,
manufacturers, magazine and newspaper companies, power
companies, and many more
 But these were on-site intrusion,Adam didn’t want an on-site
intrusion
A personal “pen-test” contract
Rules
 Percoco would leaveAdam’s kids out of pen-test
 Adam shouldn’t sue Percoco
Made withTrustware lawyers
TheTeam
 Nicolas Percoco –VP
 Garret Picchioni – Security Analyst
 Josh Grunzweig – Digital Forensic Specialist
 Matthew Jakubowski (Jaku) – Hacker
 Jaku - Majored in “Sandwich Engineering” and minored in “Witch
Hunting” at “College University.” – LinkedIn
SpiderLab
Planning
From confidential report after the
hack
This is an initial rough plan
Plan failures
You know real world scenario of an
individual is different from the
corporates
I mean break into ones house,
obviously he was working on-site
for long to get this idea!
Wi-Fi Hack
These are just the publicWi-Fi
Hotspots
Nicolas found 1200 spots within a
tenth of a mile from Brownstone,
Brooklyn Heights
Adam used a Mac so they were able
to narrow it down.
Legal limitation made this a failure
PilatesStudio
His wife was the next vulnerable
point of contact
A female friend of Jaku, the hacker,
signed up for a Pilates group class at
the wife’s studio
User a Flash drive to print “Resume”
But the remote backdoor
installation was too good for the old
Mac
Brooklyn
Heights
Brownstone is too good a place to
be sniffing around.
They had to drop plans since
neighbors started to notice!
Post and reply
Adam posted an article to get an
instant reply
“We really wanted to get into your
basement” –Twitter
Apparently the reply was from
Jaku’s friend
PhishAttack - 1
ToAdam
Obviously he didn’t open because of
.jar
PhishAttack - 2
To “the wife”
Obviously she seldom reads the
mail
PhishAttack - 3
They resend the mail
Obviously when she reads the mail
she will open the attachment
But the code had a bug , so it didn’t
work
“The attachment didn’t work” –
replied the wife
Success!
PhishAttack - 4
The newly updatedOSX malware,
which another member of the
team, digital forensics specialist
Josh Grunzweig coded, was
dropped on to her machine
They now have full access over her
computer
Got hold ofW2S – SSN, Credit Card,
Bank A/C, income etc..
Password
They got router password
Chase Bank account Password (used
her cookies to prevent 2 step
verification)
Now I hope you are getting cramps!
• Secure Socket Layer (SSL)
• Chase Dual ControlSM.
• Positive Pay Service and Reverse
Positive Pay Service
Password +
Forensic
They were able to creep more of his
Passwords which were some how
similar and followed a pattern
Humans do these and forensics
knows that!
- Amazon
- Twitter
- Facebook
iCloud - Hacked
Adam was anApple fanboy
SpiderLabs reported Adams iPhone
and Mac as lost.
So coming back to that slide
Adam L.P.
 It’s my first class of the semester at NewYork University. I’m
discussing the evils of plagiarism and falsifying sources with 11
graduate journalism students when, without warning, my
computer freezes. I fruitlessly tap on the keyboard as my laptop
takes on a life of its own and reboots. Seconds later the screen
flashes a message.To receive the four-digit code I need to unlock
it I’ll have to dial a number with a 312 area code.Then my iPhone,
set on vibrate and sitting idly on the table, beeps madly.
 I’m being hacked — and only have myself to blame.
Excerpts from the article.
How “safe” are you?
Privacy revisited.
Heartbleed Bug
8 April 2014
OpenSSL – Heartbleed data –during
an activeTLS connection - 64KB
Although we can’t call this an
infiltration, this is significant
Who do we hold accountable? –
Well this is rectified and updated,
but dates back to about 2 years
“Without using any privileged information or credentials we were able steal from
ourselves the secret keys used for our X.509 certificates, user names and
passwords, instant messages, emails and business critical documents and
communication” – heartbleed.com
“if you need strong anonymity or privacy on the internet, you might want to stay
away from the internet entirely for the next few days while things settle.”–
torproject.org
RSA
December 2013
$10 million NSA-RSA deal
Used random number generator
with skeleton key this was certified
by National Institute of Standards
andTechnology (NIST)
Who do we hold accountable?
“RSATells Its Developer Customers: Stop Using NSA-Linked Algorithm”
– WIRED.com
Laptop bug
December 2013
Implant bugs on laptops/accessories
purchased online
It's a USB "hardware implant" that
secretly provides the NSA with
remote access to the compromised
machine.
Who do we hold accountable?
“NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts
shipping deliveries”
“It appears the NSA also incorporates routers and servers from non-NSA
networks into its covert network by infecting these networks with "implants"
that then allow the government hackers to control the computers remotely”
– spiegel.de
It goes on!
What do we do then?
Lets do Radio-Technico
Zetas Drug
Cartel  $90 million in cash, 61 tons of narcotics, and "enough weapons to
equip an insurgency,"Mexico viaTX
Methods
The rest of the methods are nasty!
This is EPIC!
TakeControl
 Its time our governments come together and address this as a
humanitarian issue and must be redressed.
 Security againstTerrorism shouldn’t hold our privacy at stake.
 World is changing, Lets all hope for good!
 If that doesn’t happen, then its time we become the “anon”
Of this situation
Lets not say it!
We are anonymous
We are legion
We do not forgive
We do not forget
Expect Us
-Should we be paranoid about the
government, then they should fear us!
This work by Jerric Lyns John is
licensed under a Creative Commons
Attribution-NonCommercial-
ShareAlike 4.0 International
License.

More Related Content

PPT
C|EH Introduction
PPTX
Powerpoint
PDF
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
PPT
Cybercrime123
PPT
Cybercrime
PPT
Cybercrime and IT ACT
PPT
Cybercrime
C|EH Introduction
Powerpoint
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Cybercrime123
Cybercrime
Cybercrime and IT ACT
Cybercrime

What's hot (17)

DOCX
Smartphone Encryption and the FBI Demystified
PPT
Cybercrime
PPT
Cyber crimes and their prevention
PDF
Empowerment Technologies - Module 2
PPTX
Cybercrime
PPTX
BSidesPDX "An update from the crypto wars 2.0"
PPTX
Attack on Sony
PPT
Cybercrime
PPTX
Deep web, the unIndexed web
PPTX
Cyber crime against children
PPT
Cyber crime
PDF
The house believes that internet acces is a human right
PPT
Say NO to Piracy
PPTX
Cyber Security for 5th and 6th Graders
PDF
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Smartphone Encryption and the FBI Demystified
Cybercrime
Cyber crimes and their prevention
Empowerment Technologies - Module 2
Cybercrime
BSidesPDX "An update from the crypto wars 2.0"
Attack on Sony
Cybercrime
Deep web, the unIndexed web
Cyber crime against children
Cyber crime
The house believes that internet acces is a human right
Say NO to Piracy
Cyber Security for 5th and 6th Graders
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ad

Similar to How private is your privacy? (20)

PPTX
Reining in the Data ITAG tech360 Penn State Great Valley 2015
PDF
2600 - V01 N01 (january 1984)
PPTX
Cyber crime &_info_security
PDF
NTXISSACSC1 Conference - Security is Doomed by Jesse Lee
PDF
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
PPTX
Frontiers of Computational Journalism week 11 - Privacy and Security
PDF
Why My E Identity Needs Protection
PPTX
ETHICS09 - Case Study - The Cuckoo's Egg
PDF
Security in the News
PPTX
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
PDF
2600 v08 n2 (summer 1991)
PDF
Secure encryption in a wiretapped future
PDF
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
PDF
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
PPTX
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
PPTX
Digital Defense for Activists (and the rest of us)
PDF
Hacking The Future Privacy Identity And Anonymity On The Web Cole Stryker
PPTX
Computer Security For Activists & Everyone (Oct 2018)
PDF
Social engineering via social media
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Reining in the Data ITAG tech360 Penn State Great Valley 2015
2600 - V01 N01 (january 1984)
Cyber crime &_info_security
NTXISSACSC1 Conference - Security is Doomed by Jesse Lee
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Frontiers of Computational Journalism week 11 - Privacy and Security
Why My E Identity Needs Protection
ETHICS09 - Case Study - The Cuckoo's Egg
Security in the News
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
2600 v08 n2 (summer 1991)
Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
Digital Defense for Activists (and the rest of us)
Hacking The Future Privacy Identity And Anonymity On The Web Cole Stryker
Computer Security For Activists & Everyone (Oct 2018)
Social engineering via social media
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Ad

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Chapter 3 Spatial Domain Image Processing.pdf

How private is your privacy?

  • 1. How private is your Privacy? 2nd April, 2014 Jerric Lyns John Orion India Systems Pvt. Ltd.
  • 2. What is privacy? Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby express themselves selectively
  • 3. What is privacy? Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby express themselves selectively
  • 4. Lets go back in time! 1700’s – Initial Postal Mails - opened by the system 1791 –The bill of rights – freedom of speech & freedom from unreasonable search and seizure 1800’s – Sealed Envelops 1868 – Right to privacy irrespective of race and color 1890’s – Govt. tapping telephone networks 1907 – First bugging apparatus – Dictograph
  • 5. Lets go back in time! 1934 – FCAAct Section 605: Prohibits 3rd party interception of communication 1950’s – Govt begins public surveillance 1967 – Interception requires Warrant 1989 –WWW service added to internet 2001 – Authorities allowed to search databases, after 9/11 2004 – Facebook debuts
  • 6. And recently… 2008 – Expands surveillance power of authorities. 2009 – Bradley Manning leaks classified information,Wiki Leaks 2013 – Edward Snowden leaks, highly classified intelligence information - Govt wiretaps - PRISM – Surveillance program - Now he’s somewhere in Russia
  • 9. The PRISM Every bit that passes through American soil was monitored
  • 10. 80% internet trafficpasses throughUSA It is so laid down in their rules, that they can observe any data that passes through American soil
  • 11. Because 80% of the services are American  Tell me one service that you prominently use and is not an American?The top US companies are the forerunners in Machine Learning, so its completely normal to be paranoid!
  • 12. How safe is your data? Now that you know about the revelations, I’m changing the question.
  • 13. Adam L. Penenberg A journalism professor at NewYork University - Pando Daily - NewYorkTimes - Forbes - FastCompany - The Economist
  • 14. PandoDaily  “I challenged hackers to investigate me and what they found out is chilling” –Adam L. Penenberg26th October, 2013
  • 17. Adam L.P.  It’s my first class of the semester at NewYork University. I’m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. Seconds later the screen flashes a message.To receive the four-digit code I need to unlock it I’ll have to dial a number with a 312 area code.Then my iPhone, set on vibrate and sitting idly on the table, beeps madly.  I’m being hacked — and only have myself to blame. Excerpts from the article.
  • 18. Two months before the hack, he signed a contract with Nicolas  Over the years he has performed hundreds of pen-tests and physical break-ins, slipping into hospitals, insurance companies, manufacturers, magazine and newspaper companies, power companies, and many more  But these were on-site intrusion,Adam didn’t want an on-site intrusion A personal “pen-test” contract
  • 19. Rules  Percoco would leaveAdam’s kids out of pen-test  Adam shouldn’t sue Percoco Made withTrustware lawyers
  • 20. TheTeam  Nicolas Percoco –VP  Garret Picchioni – Security Analyst  Josh Grunzweig – Digital Forensic Specialist  Matthew Jakubowski (Jaku) – Hacker  Jaku - Majored in “Sandwich Engineering” and minored in “Witch Hunting” at “College University.” – LinkedIn SpiderLab
  • 21. Planning From confidential report after the hack This is an initial rough plan
  • 22. Plan failures You know real world scenario of an individual is different from the corporates I mean break into ones house, obviously he was working on-site for long to get this idea!
  • 23. Wi-Fi Hack These are just the publicWi-Fi Hotspots Nicolas found 1200 spots within a tenth of a mile from Brownstone, Brooklyn Heights Adam used a Mac so they were able to narrow it down. Legal limitation made this a failure
  • 24. PilatesStudio His wife was the next vulnerable point of contact A female friend of Jaku, the hacker, signed up for a Pilates group class at the wife’s studio User a Flash drive to print “Resume” But the remote backdoor installation was too good for the old Mac
  • 25. Brooklyn Heights Brownstone is too good a place to be sniffing around. They had to drop plans since neighbors started to notice!
  • 26. Post and reply Adam posted an article to get an instant reply “We really wanted to get into your basement” –Twitter Apparently the reply was from Jaku’s friend
  • 27. PhishAttack - 1 ToAdam Obviously he didn’t open because of .jar
  • 28. PhishAttack - 2 To “the wife” Obviously she seldom reads the mail
  • 29. PhishAttack - 3 They resend the mail Obviously when she reads the mail she will open the attachment But the code had a bug , so it didn’t work “The attachment didn’t work” – replied the wife
  • 30. Success! PhishAttack - 4 The newly updatedOSX malware, which another member of the team, digital forensics specialist Josh Grunzweig coded, was dropped on to her machine They now have full access over her computer Got hold ofW2S – SSN, Credit Card, Bank A/C, income etc..
  • 31. Password They got router password Chase Bank account Password (used her cookies to prevent 2 step verification) Now I hope you are getting cramps! • Secure Socket Layer (SSL) • Chase Dual ControlSM. • Positive Pay Service and Reverse Positive Pay Service
  • 32. Password + Forensic They were able to creep more of his Passwords which were some how similar and followed a pattern Humans do these and forensics knows that! - Amazon - Twitter - Facebook
  • 33. iCloud - Hacked Adam was anApple fanboy SpiderLabs reported Adams iPhone and Mac as lost. So coming back to that slide
  • 34. Adam L.P.  It’s my first class of the semester at NewYork University. I’m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. Seconds later the screen flashes a message.To receive the four-digit code I need to unlock it I’ll have to dial a number with a 312 area code.Then my iPhone, set on vibrate and sitting idly on the table, beeps madly.  I’m being hacked — and only have myself to blame. Excerpts from the article.
  • 35. How “safe” are you? Privacy revisited.
  • 36. Heartbleed Bug 8 April 2014 OpenSSL – Heartbleed data –during an activeTLS connection - 64KB Although we can’t call this an infiltration, this is significant Who do we hold accountable? – Well this is rectified and updated, but dates back to about 2 years “Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication” – heartbleed.com “if you need strong anonymity or privacy on the internet, you might want to stay away from the internet entirely for the next few days while things settle.”– torproject.org
  • 37. RSA December 2013 $10 million NSA-RSA deal Used random number generator with skeleton key this was certified by National Institute of Standards andTechnology (NIST) Who do we hold accountable? “RSATells Its Developer Customers: Stop Using NSA-Linked Algorithm” – WIRED.com
  • 38. Laptop bug December 2013 Implant bugs on laptops/accessories purchased online It's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine. Who do we hold accountable? “NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries” “It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely” – spiegel.de
  • 40. What do we do then? Lets do Radio-Technico
  • 41. Zetas Drug Cartel  $90 million in cash, 61 tons of narcotics, and "enough weapons to equip an insurgency,"Mexico viaTX
  • 42. Methods The rest of the methods are nasty! This is EPIC!
  • 43. TakeControl  Its time our governments come together and address this as a humanitarian issue and must be redressed.  Security againstTerrorism shouldn’t hold our privacy at stake.  World is changing, Lets all hope for good!  If that doesn’t happen, then its time we become the “anon” Of this situation
  • 44. Lets not say it! We are anonymous We are legion We do not forgive We do not forget Expect Us -Should we be paranoid about the government, then they should fear us!
  • 45. This work by Jerric Lyns John is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 4.0 International License.