71
Frontiers of Computational Journalism Columbia JournalismSchool Week 12: Privacy and Security December 11, 2015

Privacy and Security. Computational Journalism week 12

Tags:

Embed Size (px)

DESCRIPTION

Jonathan Stray, Columbia University, Fall 2015Syllabus at http://www.compjournalism.com/?p=133

Citation preview

Page 1: Privacy and Security. Computational Journalism week 12

FrontiersofComputationalJournalism

ColumbiaJournalismSchoolWeek12:PrivacyandSecurity

December11,2015

Page 2: Privacy and Security. Computational Journalism week 12
Page 3: Privacy and Security. Computational Journalism week 12

LaptopfallsintoSyriangovt.hands,sourcesforcedtoflee

Page 4: Privacy and Security. Computational Journalism week 12

APsourcebustedthroughphonelogs

.

.

.

Page 5: Privacy and Security. Computational Journalism week 12

OpenNetworkInitiativeglobal filteringmap-- opennet.net

Page 6: Privacy and Security. Computational Journalism week 12
Page 7: Privacy and Security. Computational Journalism week 12
Page 8: Privacy and Security. Computational Journalism week 12
Page 9: Privacy and Security. Computational Journalism week 12
Page 10: Privacy and Security. Computational Journalism week 12

FromProtectingConsumerPrivacyinanEraofRapidChange, FTC,2010

Page 11: Privacy and Security. Computational Journalism week 12

JournalismSecurityDisasters

• Hackedaccountsandsites– AP–WashingtonPost,NewYorkTimes,– etc.

• Sourcesexposed– VicerevealsJohnMcAfee’s location– APphonerecordssubpoena– Filmmaker’slaptopseizedinSyria

Page 12: Privacy and Security. Computational Journalism week 12

WhatAreWeProtecting?

• Commitmentstosources• Physicalsafety• Legalconcerns• Ourabilitytooperate• Ourreputation

Page 13: Privacy and Security. Computational Journalism week 12

Holisticsecurity(What“digitalsecurity”isn’t)Thepredominant digitalsecuritydiscoursetakeslittleornoheedoftheelementsofpersonal,organisational orpsychologicalsecurityinherent totheestablishmentofaneffectiveandcohesivesecuritystrategies.

Thetendency,aggravatedbytimeconstraintsandnecessarytechnicalskill-building, hasbeentotreatdigitalsecurityasatechnicalproblemwithtechnicalsolutions, andthereforetofocusonasoftwareortool-centricapproach,generallywithoutdueconsiderationofthewiderorganisational andpersonalnecessityorimpactthereof.

Meanwhile,practitionersfocusingonthepersonal,organisational,andpsycho-socialwell-beingofHRDsmustadapttotheimplicationsoftherapidproliferationofdigitaltoolsandICTsasanaspectofhumanrightsdefenders’workandpersonallives.

- TowardsHolisticSecurityforRightsAdvocates,TacticalTech

Page 14: Privacy and Security. Computational Journalism week 12

DigitalSecuritystrategies

• Basicsecuritypractice:simplethingsthatprotectagainstmanythreats.

• Threatmodeling:discoveranddefendagainstspecificthreats

• Recipes:howhandlespecificreportingsituations

Page 15: Privacy and Security. Computational Journalism week 12

LinkedInfrom June 2012 breach

Gawkerfrom Dec 2010 breach

Page 16: Privacy and Security. Computational Journalism week 12
Page 17: Privacy and Security. Computational Journalism week 12

Two-FactorAuthentication

•Somethingyouknow,plussomethingyouhave

Page 18: Privacy and Security. Computational Journalism week 12

GoodPasswordPractice

• Ifyouusethesamepasswordformultiple sites,yourpasswordisonlyasstrongasthesecurityon theweakestsite.

• Don'tuseacommonpassword.Avoidwordsinthedictionary.

• Usetwo-factorauthentication

• Considerpassphrases,andpasswordmanagementtoolslikeOnePass

Page 19: Privacy and Security. Computational Journalism week 12

PhishingByfarthemostcommonattack.Sendamessagetousertrickingthemintoentering theirpassword.

Typicallydirectsuserstoafakeloginpage.

Protection:bewarelinksthattakeyoutoaloginpage!AlwaysreadtheURLafterclickingalinkfromamessage.

Page 20: Privacy and Security. Computational Journalism week 12
Page 21: Privacy and Security. Computational Journalism week 12

APTwitterHackedbyPhishing

Page 22: Privacy and Security. Computational Journalism week 12

APPhishingEmail

The link didn’t really go to washingtonpost.com!

Page 23: Privacy and Security. Computational Journalism week 12

ReadtheURLBeforeYouClick!

Page 24: Privacy and Security. Computational Journalism week 12
Page 25: Privacy and Security. Computational Journalism week 12

SpearPhishing

Selectedtargets,personalizedmessages.

Page 26: Privacy and Security. Computational Journalism week 12

SyrianFacebookphishing

Arabictextreads:"Urgentandcritical..videoleakedbysecurityforcesandthugs..therevengeofAssad'sthugsagainstthefreemenandwomenofBabaAmr incaptivityandtakingturnsrapingoneofthewomenincaptivitybyAssad'sdogs..pleasespreadthis."

Page 27: Privacy and Security. Computational Journalism week 12

Chineseemailspear-phishing

FromFireEyeblogpost:“InAugust2015,thethreatactorssentspearphishingemailstoanumberofHongKong-basedmediaorganizations,includingnewspapers,radio,andtelevision.ThefirstemailreferencesthecreationofaChristiancivilsocietyorganizationtocoincidewiththeanniversaryofthe2014protests inHongKongknown astheUmbrellaMovement.ThesecondemailreferencesaHongKongUniversityalumniorganizationthatfearsvotes inareferendumtoappointaVice-Chancellorwillbeco-optedbypro-Beijinginterests”

Page 28: Privacy and Security. Computational Journalism week 12

DefendingAgainstPhishing

•Besuspiciousofgenericmessages

•ReadtheURLbeforeyouclick

•AlwaysreadtheURLbefore typinginapassword

•Reportsuspicious linkstoITsecurity

Page 29: Privacy and Security. Computational Journalism week 12

ThreatmodelingWhatdoIwanttokeepprivate?(Messages,locations,identities,networks...)

Whowantstoknow?(storysubject,governments,lawenforcement,corporations...)

Whatcantheydo?(eavesdrop,subpoena...orexploit securitylapsesandaccidents!)

Whathappensiftheysucceed?(story'sblown,legalproblemsforasource,someonegetskilled...)

Page 30: Privacy and Security. Computational Journalism week 12

WhatMustBePrivate?

• Whichdata?– Emailsandothercommunications– Photos,footage,notes– Youraddressbook,travelitineraries,etc.

• Privacyvs.anonymity– EncryptionprotectscontentofanemailorIM– Nottheidentityofsenderandrecipient

Page 31: Privacy and Security. Computational Journalism week 12

WhoWantstoKnow?

•Mostofthetime,theNSAisnottheproblem•Youradversarycouldbethesubjectofastory,agovernment,anothernewsorganization,etc.

Page 32: Privacy and Security. Computational Journalism week 12

WhatCantheAdversaryDo?

• Technical– Hacking, interceptingcommunications, code-breaking

• Legal– Lawsuits,subpoenas, detention

• Social– Phishing, “socialengineering,” exploiting trust

• Operational– Theone timeyoudidn’tuseasecurechannel– Personyoushouldn’t havetold

• Physical– Theft,installationofmalware,networktaps,torture

Page 33: Privacy and Security. Computational Journalism week 12
Page 34: Privacy and Security. Computational Journalism week 12

Legalthreat:NYTreporterinvestigated

Page 35: Privacy and Security. Computational Journalism week 12

WhatAreYouRisking?

• Securityisneverfree– Itcoststime,money,andconvenience

• “Howmuch”securitydoyouneed?– Itdependsontherisk• Blownstory• Arrestedsource• Deadsource

Page 36: Privacy and Security. Computational Journalism week 12

ThreatModelingScenario#1

YouareaphotojournalistinSyriawithdigitalimagesyouwanttogetoutofthecountry.LimitedInternetaccessisavailableatacafé.Someoftheimagesmayidentifypeopleworkingwiththerebelswhocouldbetargetedbythegovernmentiftheiridentityisrevealed.

Page 37: Privacy and Security. Computational Journalism week 12

ThreatModelingScenario#2

Youarereportingoninsidertradingatalargebankandtalkingsecretlytotwowhistleblowerswhomaygiveyoudocuments.Ifthesesourcesareidentifiedbeforethestorycomesout,attheveryleastyouwillloseyoursources.

Page 38: Privacy and Security. Computational Journalism week 12

ThreatModelingScenario#3

Youarereportingastoryaboutlocalpolicemisconduct.Youhavetalkedtosourcesincludingpoliceofficersandvictims.Youwouldprefer thatthepolicecommissionernotknowofyourstorybeforeitispublished.

Page 39: Privacy and Security. Computational Journalism week 12

ThreatModelingScenario#4

YouarereportingondrugcartelsinCentralAmerica.Previoussourcesandjournalistshavebeenmurdered.

Page 40: Privacy and Security. Computational Journalism week 12

Encryptionvs.Anonymity

Encrypted message is like a sealed envelope.Anyone can still read the address (metadata)

Page 41: Privacy and Security. Computational Journalism week 12

DataatRest/DatainMotion

Page 42: Privacy and Security. Computational Journalism week 12

SecuringDataatRest• Howmanycopiesarethere?

– Theoriginal filemightbeonyourphone,cameraSDcard,etc.– Whataboutbackupsandcloudsyncing?– Usesecureeraseproducts

• Could"they"getacopy?– Hackintoyournetworkorcomputer– Walkintoyourofficeatlunch– Takeyourcameraattheborder

• Iftheyhadacopy,couldtheyreadit?– UseBitLocker(Windows), FileVault (Mac),LUKS(Linux)– Turnondeviceencryption forAndroid (iOSonbydefault)

Page 43: Privacy and Security. Computational Journalism week 12

Filemetadata

Photos,PDFs,documentsallhavehidden info inthefile

Page 44: Privacy and Security. Computational Journalism week 12

LegalSecurity

IntheU.S.,thePrivacyProtectionActpreventspolicefromseizingjournalists’datawithoutawarrant...ifyou'retheonestoringit.

Thirdpartydoctrine:ifit’sinthecloud,noprotection!

Page 45: Privacy and Security. Computational Journalism week 12

SurveillanceLaw:theU.S.situationDoyouneedawarranttoseewhoIcalled?Nope.Supremecourt,Smithvs.Maryland,1979controls"metadata."

Doyouneedawarranttoreadmyemail(orIM,etc.)?Electronic CommunicationsPrivacyAct(1986):Notifit'solderthan180daysDepartmentofJusticemanual:no,ifithasbeen"opened"U.S.v.Warshak,sixthcircuit (2010):yesProposedbill incongress(Dec2015)wouldrequirewarrant

Doyouneedawarranttotracksomeonethroughtheirphone?ACLUFOIAof200policedepartments:somesayyes,somesaynoU.S.v.Jones(2012),SupremeCourt:can'tputaGPSonsomeonewithoutawarrant.Butdoesn'tmentiontheGPSinourphones.

Doyouneedawarranttolookatthedataonmyphoneafteranarrest?Yes.Supremecourtsaidsoin2014,Rileyvs.California.

Page 46: Privacy and Security. Computational Journalism week 12

"Inthefirstpublicaccountingofitskind,cellphonecarriersreported thattheyresponded toastartling1.3milliondemands forsubscriberinformation lastyearfromlawenforcementagenciesseekingtextmessages,callerlocationsandotherinformation inthecourseofinvestigations."

-WirelessFirmsAreFloodedbyRequeststoAidSurveillance,NewYorkTimes,July82012

Page 47: Privacy and Security. Computational Journalism week 12

GoogleTransparencyReport

Twitter,Facebookhavesimilar.ButwhataboutSnapchat?Sina?

Page 48: Privacy and Security. Computational Journalism week 12

SecuringDatainMotion

• Wheredoesyourdataphysicallygobetweensourceanddestination?

• Whichlinksareencrypted?• Toolsyoushouldknow– iMessage,Signal:securetext,calls– CryptoCat — EasyOTRthroughyourbrowser– Tor— Anonymity– SecureDrop — Anonymoussubmission– PGP— Secureemail– OTR—Off-the-recordmessagingprotocol

Page 49: Privacy and Security. Computational Journalism week 12
Page 50: Privacy and Security. Computational Journalism week 12

SSL

Aka,HTTPS.

Dependsonasystemof rootcertificateauthorities (CAs)thatgeneratecertificates(cryptographically signkeys)forsitesthatuseHTTPS.

BrowsershaveCAkeysbuiltin,sotheycanverifythatasitehasavalidsignedkey.

Worksgreat,exceptthatcertificateauthoritiescanbehacked,andwemustexpectthatmoststatescaneasilysignacertificatethrough aproxy.

Page 51: Privacy and Security. Computational Journalism week 12

RealMITMattacks

Page 52: Privacy and Security. Computational Journalism week 12

MobileSecurity

• Yourphone– Isalocationtrackingdevice– Containsallyourcontacts– Isusedforeveryformofcommunication– Storesalotofinformation

Page 53: Privacy and Security. Computational Journalism week 12

Tell-AllTelephone(zeit.de)

Page 54: Privacy and Security. Computational Journalism week 12

Somedigitalsecuritytools

Page 55: Privacy and Security. Computational Journalism week 12

iMessage

End-to-endencrypted.Encryptedonthedevice.Appleclaimstheydonothaveabackdoor.

Ongoingcourtcasevs.FBI

Page 56: Privacy and Security. Computational Journalism week 12

Signal(OpenWhisperSystems)

FreeappforiOSandAndroidEnd-to-endencryptedchat,voice.OWSclaimsserverdoesnotsaveyouraddressbook.

Page 57: Privacy and Security. Computational Journalism week 12

Torproject.org

Page 58: Privacy and Security. Computational Journalism week 12

TorBrowserBundle

Page 59: Privacy and Security. Computational Journalism week 12
Page 60: Privacy and Security. Computational Journalism week 12

TheGuardianProject

Page 61: Privacy and Security. Computational Journalism week 12

SilentCircle

• Commercialservice– Securemobilecalls,video,texts– Canhandprepaidcardstosources

Page 62: Privacy and Security. Computational Journalism week 12

Securingyourcomputer

Reallyonlytwochoicesagainstanadvancedadversary:

• Buyanewcomputer,neverputitonanynetwork

• UseasecureoperatingsystemlikeTAILS

Bothapproachesassumenoonehastamperedwiththehardware(perhapsinstallingahardwarekeylogger?)

Page 63: Privacy and Security. Computational Journalism week 12

Security=Model+Tools+HabitsThereisnotoolintheworldthatwillsaveyoufrom:

• notprotectingagainsttherightthreats• badpasswords• gullibility(phishingscams,socialengineering)• misunderstandingthesecuritymodelthatyourpracticedependson.• notdoingthesecurethingeverytime.

• offlinesecuritybreaches/physicalcoercion

Page 64: Privacy and Security. Computational Journalism week 12

FromAllenDulles'73RulesofSpycraft

Page 65: Privacy and Security. Computational Journalism week 12

Casestudy:leakedCables

JulianAssange gaveapasswordandatemporaryURLtoGuardianreporterDavidLeigh.

LeighdownloadedthefileinencryptedformfromthetemporaryURL.

Leighdecryptedthefileandreportedonthecontents.

...butlater,allthecableswereavailablepublicly,whichisnotwhateitherAssange orLeighintended.

Page 66: Privacy and Security. Computational Journalism week 12

ThePlan

M Epassword URL

passwordE

E M

Assange Leigh

Page 67: Privacy and Security. Computational Journalism week 12

WhatAssange wasthinking

E ???

M Epassword URL

passwordE

E M

Assange Leigh

Page 68: Privacy and Security. Computational Journalism week 12

WhatLeighwasthinking

???

M Epassword URL

passwordE

E M

Assange Leigh

Page 69: Privacy and Security. Computational Journalism week 12

Whatactuallyhappened

!!!

M Epassword URL

passwordE

E M

Assange Leigh

passwordWLArchive

E

M

Page 70: Privacy and Security. Computational Journalism week 12

Basicsecuritypractice,inshortUserealpasswords

Understandandbealertforphishing

Knowwhereyourdataisandwhereitgoes

Keepyoursoftwareup todate

Understandtechnical,legal,social,physicalthreats

Haveaplan,makesecurityapractice

Page 71: Privacy and Security. Computational Journalism week 12

Resources

Threatmodelingforjournalistshttps://source.opennews.org/en-US/learning/security-journalists-part-two-threat-modeling/

Digitalsecuritytrainingbestpractices,suggestedcurriculumhttps://www.level-up.cc/about

CommitteetoProtectJournalistsinformationsecurityguidehttp://www.cpj.org/reports/2012/04/information-security.php

EncryptionandOperationalSecurityforJournalistsHacks/Hackerspresentationhttps://gist.github.com/vaguity/6594731http://www.cjr.org/behind_the_news/hacks_hackers_security_for_jou.php?page=all