privacy and security: computational journalism week 12

72
Fron%ers of Computa%onal Journalism Columbia Journalism School Week 12: Security December 5, 2014

Upload: jonathan-stray

Post on 17-Jan-2016

7 views

Category:

Documents


0 download

DESCRIPTION

Columbia University, Fall 2014 Syllabus at http://www.compjournalism.com/?p=113

TRANSCRIPT

Page 1: Privacy and Security: Computational Journalism Week 12

Fron%ers  of    Computa%onal  Journalism  

Columbia  Journalism  School    

Week  12:  Security  December  5,  2014  

     

Page 2: Privacy and Security: Computational Journalism Week 12

Global  Network  Censorship  

Open  Network  Ini%a%ve  global  filtering  map  -­‐-­‐  opennet.net  

Page 3: Privacy and Security: Computational Journalism Week 12
Page 4: Privacy and Security: Computational Journalism Week 12
Page 5: Privacy and Security: Computational Journalism Week 12
Page 6: Privacy and Security: Computational Journalism Week 12
Page 7: Privacy and Security: Computational Journalism Week 12

From  Protec'ng  Consumer  Privacy  in  an  Era  of  Rapid  Change,  FTC,  2010  

Page 8: Privacy and Security: Computational Journalism Week 12
Page 9: Privacy and Security: Computational Journalism Week 12

Laptop  falls  into  Syrian  govt.  hands,  sources  forced  to  flee  

Page 10: Privacy and Security: Computational Journalism Week 12

AP  source  busted  through  phone  logs  

.  

.  

.  

Page 11: Privacy and Security: Computational Journalism Week 12

Journalism  Security  Disasters  

•  Hacked  accounts  and  sites  – AP  – Washington  Post,  New  York  Times,    – etc.  

•  Sources  exposed  – Vice  reveals  John  McAfee’s  loca%on  – AP  phone  records  subpoena  – Filmmaker’s  laptop  seized  in  Syria    

Page 12: Privacy and Security: Computational Journalism Week 12

What  Are  We  Protec%ng?  

•  Commitments  to  sources  •  Physical  safety  •  Legal  concerns  •  Our  ability  to  operate  •  Our  reputa%on  

Page 13: Privacy and Security: Computational Journalism Week 12

Two  security  strategies  

•  Basic  security  prac%ce:  simple  things  that  protect  against  many  threats.    

•  Threat  modeling:  discvoer  and  defend  against  specific  threats  

Page 14: Privacy and Security: Computational Journalism Week 12

LinkedIn from June 2012 breach

Gawker from Dec 2010 breach

Page 15: Privacy and Security: Computational Journalism Week 12
Page 16: Privacy and Security: Computational Journalism Week 12

Two-­‐Factor  Authen%ca%on  

• Something  you  know,  plus  something  you  have  

Page 17: Privacy and Security: Computational Journalism Week 12

Good  Password  Prac%ce  

•  If  you  use  the  same  password  for  mul%ple  sites,  your  password  is  only  as  strong  as  the  security  on  the  weakest  site.  

•  Don't  use  a  common  password.  Avoid  words  in  the  dic%onary.  

•  Use  two-­‐factor  authen%ca%on  

•  Consider  passphrases,  and  password  management  tools  like  OnePass  

Page 18: Privacy and Security: Computational Journalism Week 12

Phishing  By  far  the  most  common  a]ack.  Send  a  message  to  user  tricking  them  into  entering  their  password.    Typically  directs  users  to  a  fake  login  page.    Protec%on:  beware  links  that  take  you  to  a  login  page!  Always  read  the  URL  a4er  clicking  a  link  from  a  message.  

Page 19: Privacy and Security: Computational Journalism Week 12
Page 20: Privacy and Security: Computational Journalism Week 12

AP  Twi]er  Hacked  by  Phishing  

Page 21: Privacy and Security: Computational Journalism Week 12

AP  Phishing  Email  

The link didn’t really go to washingtonpost.com!

Page 22: Privacy and Security: Computational Journalism Week 12

Read  the  URL  Before  You  Click!  

Page 23: Privacy and Security: Computational Journalism Week 12
Page 24: Privacy and Security: Computational Journalism Week 12

Spear  Phishing  

Selected  targets,  personalized  messages.  

Page 25: Privacy and Security: Computational Journalism Week 12

Syrian  Facebook  phishing  a]ack      Arabic  text  reads:  "Urgent  and  cri%cal..  video  leaked  by  security  forces  and  thugs..  the  revenge  of  Assad's  thugs  against  the  free  men  and  women  of  Baba  Amr  in  cap%vity  and  taking  turns  raping  one  of  the  women  in  cap%vity  by  Assad's  dogs..  please  spread  this."  

Page 26: Privacy and Security: Computational Journalism Week 12

Defending  Against  Phishing  • Be  suspicious  of  generic  messages    • Read  the  URL  before  you  click    • Always  read  the  URL  before  typing  in  a  password    • Report  suspicious  links  to  IT  security  

Page 27: Privacy and Security: Computational Journalism Week 12

Threat  modeling  What  do  I  want  to  keep  private?  (Messages,  loca%ons,  iden%%es,  networks...)    

Who  wants  to  know?  (story  subject,  governments,  law  enforcement,  corpora%ons...)    

What  can  they  do?  (eavesdrop,  subpoena...  or  exploit  security  lapses  and  accidents!)    

What  happens  if  they  succeed?  (story's  blown,  legal  problems  for  a  source,  someone  gets  killed...)        

Page 28: Privacy and Security: Computational Journalism Week 12

What  Must  Be  Private?  

•  Which  data?  – Emails  and  other  communica%ons  – Photos,  footage,  notes  – Your  address  book,  travel  i%neraries,  etc.  

•  Privacy  vs.  anonymity  – Encryp%on  protects  content  of  an  email  or  IM  – Not  the  iden%ty  of  sender  and  recipient  

Page 29: Privacy and Security: Computational Journalism Week 12

Who  Wants  to  Know?  

• Most  of  the  %me,  the  NSA  is  not  the  problem  • Your  adversary  could  be  the  subject  of  a  story,  a  government,  another  news  organiza%on,  etc.  

Page 30: Privacy and Security: Computational Journalism Week 12

What  Can  the  Adversary  Do?  •  Technical  –  Hacking,  intercep%ng  communica%ons,  code-­‐breaking  

•  Legal  –  Lawsuits,  subpoenas,  deten%on  

•  Social  –  Phishing,  “social  engineering,”  exploi%ng  trust  

•  Opera%onal  –  The  one  %me  you  didn’t  use  a  secure  channel  –  Person  you  shouldn’t  have  told  

•  Physical  –  Theh,  installa%on  of  malware,  network  taps,  torture      

Page 31: Privacy and Security: Computational Journalism Week 12
Page 32: Privacy and Security: Computational Journalism Week 12

NYT  reporter  inves%gated  

Page 33: Privacy and Security: Computational Journalism Week 12

What  Are  You  Risking?  

•  Security  is  never  free  –  It  costs  %me,  money,  and  convenience  

•  “How  much”  security  do  you  need?    –  It  depends  on  the  risk  

•  Blown  story  •  Arrested  source  •  Dead  source  

Page 34: Privacy and Security: Computational Journalism Week 12

Threat  Modeling  Scenario  #1  

You  are  a  photojournalist  in  Syria  with  digital  images  you  want  to  get  out  of  the  country.  Limited  Internet  access  is  available  at  a  café.  Some  of  the  images  may  iden%fy  people  working  with  the  rebels  who  could  be  targeted  by  the  government  if  their  iden%ty  is  revealed.  

Page 35: Privacy and Security: Computational Journalism Week 12

Threat  Modeling  Scenario  #2  

You  are  repor%ng  on  insider  trading  at  a  large  bank  and  talking  secretly  to  two  whistleblowers  who  may  give  you  documents.  If  these  sources  are  iden%fied  before  the  story  comes  out,  at  the  very  least  you  will  lose  your  sources.  

Page 36: Privacy and Security: Computational Journalism Week 12

Threat  Modeling  Scenario  #3  

You  are  repor%ng  a  story  about  local  police  misconduct.  You  have  talked  to  sources  including  police  officers  and  vic%ms.    You  would  prefer  that  the  police  commissioner  not  know  of  your  story  before  it  is  published.  

Page 37: Privacy and Security: Computational Journalism Week 12

Threat  Modeling  Scenario  #4  

You  are  repor%ng  on  drug  cartels  in  Central  America.  Previous  sources  and  journalists  have  been  murdered.  

Page 38: Privacy and Security: Computational Journalism Week 12

Data  at  Rest  /  Data  in  Mo%on  

Page 39: Privacy and Security: Computational Journalism Week 12

Securing  Data  at  Rest  •  How  many  copies  are  there?  –  The  original  file  might  be  on  your  phone,  camera  SD  card,  etc.  

– What  about  backups  and  cloud  syncing?  –  Use  secure  erase  products  

•  Could  "they"  get  a  copy?  –  Hack  into  your  network  or  computer    – Walk  into  your  office  at  lunch  –  Take  your  camera  at  the  border  

•  If  they  had  a  copy,  could  they  read  it?  –  Encrypt  your  whole  disk!  –  Use  TrueCrypt  (Windows),  FileVault  (Mac),  LUKS  (Linux)    

Page 40: Privacy and Security: Computational Journalism Week 12

File  metadata  

Photos,  PDFs,  documents  all  have  hidden  info  in  the  file  

Page 41: Privacy and Security: Computational Journalism Week 12

Legal  Security  

In  the  U.S.,  the  Privacy  Protec%on  Act  prevents  police  from  seizing  journalists’  data  without  a  warrant...  if  you're  the  one  storing  it.    Third  party  doctrine:  if  it’s  in  the  cloud,  no  protec%on!    

Page 42: Privacy and Security: Computational Journalism Week 12

Surveillance  Law:  the  U.S.  situa%on  Do  you  need  a  warrant  to  see  who  I  called?  Nope.  Supreme  court,  Smith  vs.  Maryland,  1979  controls  "metadata."    Do  you  need  a  warrant  to  read  my  email  (or  IM,  etc.)?  Electronic  Communica%ons  Privacy  Act  (1986):  Not  if  it's  older  than  180  days  Department  of  Jus%ce  manual  :  no,  if  it  has  been  "opened"  U.S.  v.  Warshak,  sixth  circuit  (2010):  yes    Do  you  need  a  warrant  to  track  someone  through  their  phone?  ACLU  FOIA  of  200  police  departments:  some  say  yes,  some  say  no  U.S.  v.  Jones  (2012),  Supreme  Court:  can't  put  a  GPS  on  someone  without  a  warrant.  But  doesn't  men%on  the  GPS  in  our  phones.    Do  you  need  a  warrant  to  look  at  the  data  on  my  phone  a4er  an  arrest?  In  some  states,  but  not  others.  Supreme  court  has  been  asked  to  rule.  

Page 43: Privacy and Security: Computational Journalism Week 12

"In  the  first  public  accoun%ng  of  its  kind,  cellphone  carriers  reported  that  they  responded  to  a  startling  1.3  million  demands  for  subscriber  informa%on  last  year  from  law  enforcement  agencies  seeking  text  messages,  caller  loca%ons  and  other  informa%on  in  the  course  of  inves%ga%ons."    

 -­‐  Wireless  Firms  Are  Flooded  by  Requests  to  Aid  Surveillance,  New  York  Times,  July  8  2012  

Page 44: Privacy and Security: Computational Journalism Week 12

Google  Transparency  Report  

Twi]er,  Facebook  have  similar.  But  what  about  Snapchat?  Sina?    

Page 45: Privacy and Security: Computational Journalism Week 12

Securing  Data  in  Mo%on  

•  Where  does  your  data  physically  go  between  source  and  des%na%on?  

•  Which  links  are  encrypted?  •  Tools  you  should  know  – PGP  —  Secure  email  – OTR  —  Off-­‐the-­‐record  messaging  protocol  – CryptoCat  —  Easy  OTR  through  your  browser  – Tor  —  Anonymity  – SecureDrop  —  Anonymous  submission  

Page 46: Privacy and Security: Computational Journalism Week 12
Page 47: Privacy and Security: Computational Journalism Week 12

SSL  

Aka,  HTTPS.    Depends  on  a  system  of  root  cer%ficate  authori%es  (CAs)  that  generate  cer%ficates  (cryptographically  sign  keys)  for  sites  that  use  HTTPS.    Browsers  have  CA  keys  built  in,  so  they  can  verify  that  a  site  has  a  valid  signed  key.    Works  great,  except  that  cer%ficate  authori%es  can  be  hacked,  and  we  must  expect  that  most  states  can  easily  sign  a  cer%ficate  through  a  proxy.  

Page 48: Privacy and Security: Computational Journalism Week 12

Real  MITM  a]acks  

Page 49: Privacy and Security: Computational Journalism Week 12

OTR  

•  Not  an  app  – A  protocol  for  encrypted  communica%on,  supported  by  several  apps.  

•  Does  not  hide  your  iden%ty!  •  Many  chat  programs  can  speak  OTR  •  Confusing  and  important  – Google  Chat  and  AIM's  “off  the  record”  op%on  do  not  use  OTR  

– Google/AOL  can  read  your  messages  

Page 50: Privacy and Security: Computational Journalism Week 12

Star%ng  OTR  in  Pidgin  

Page 51: Privacy and Security: Computational Journalism Week 12

Star%ng  OTR  in  Adium  

Page 52: Privacy and Security: Computational Journalism Week 12

Crypto.cat  —  Easy  OTR  

Page 53: Privacy and Security: Computational Journalism Week 12

Am  I  Really  Talking  to  You?  

• “Man-­‐in-­‐the-­‐middle”  pretends  to  be  someone  else    

Page 54: Privacy and Security: Computational Journalism Week 12

Solu%on:  Fingerprints  

• Contact  your  source  over  a  different  channel;  verify  he/she  sees  the  same  fingerprint  you  see  

Page 55: Privacy and Security: Computational Journalism Week 12

Encryp%on  vs.  Anonymity  

Encrypted message is like a sealed envelope. Anyone can still read the address (metadata)

Page 56: Privacy and Security: Computational Journalism Week 12

Torproject.org  

Page 57: Privacy and Security: Computational Journalism Week 12

Tor  Browser  Bundle  

Page 58: Privacy and Security: Computational Journalism Week 12
Page 59: Privacy and Security: Computational Journalism Week 12

Mobile  Security  

•  Your  phone  –  Is  a  loca%on  tracking  device  – Contains  all  your  contacts  –  Is  used  for  every  form  of  communica%on  – Stores  a  lot  of  informa%on  

Page 60: Privacy and Security: Computational Journalism Week 12

Tell-­‐All  Telephone  (zeit.de)  

Page 61: Privacy and Security: Computational Journalism Week 12

The  Guardian  Project  

Page 62: Privacy and Security: Computational Journalism Week 12

Silent  Circle  

•  Commercial  service  – Secure  mobile  calls,  video,  texts  – Can  hand  prepaid  cards  to  sources  

Page 63: Privacy and Security: Computational Journalism Week 12

Securing  your  computer  

Really  only  two  choices:  

•  Buy  a  new  computer,  never  put  it  on  any  network  

•  Use  a  secure  opera%ng  system  like  TAILS    Both  approaches  assume  no  one  has  tampered  with  the  hardware  (perhaps  installing  a  hardware  key  logger?)  

 

Page 64: Privacy and Security: Computational Journalism Week 12

Security  =  Model  +  Tools  +  Habits  There  is  no  tool  in  the  world  that  will  protect  you  from:    

•  not  protec%ng  against  the  right  threats  •  bad  passwords  •  gullibility  (phishing  scams,  social  engineering)  •  misunderstanding  the  security  model  that  your  prac%ce  depends  on.  

•  not  doing  the  secure  thing  every  'me.  

•  offline  security  breaches  /  physical  coercion  

Page 65: Privacy and Security: Computational Journalism Week 12

From  Allen  Dulles'  73  Rules  of  SpycraE  

Page 66: Privacy and Security: Computational Journalism Week 12

Case  study:  leaked  Cables  

Julian  Assange  gave  a  password  and  a  temporary  URL  to  Guardian  reporter  David  Leigh.      Leigh  downloaded  the  file  in  encrypted  form  from  the  temporary  URL.    Leigh  decrypted  the  file  and  reported  on  the  contents.    ...but  later,  all  the  cables  were  available  publicly,  which  is  not  what  either  Assange  or  Leigh  intended.  

Page 67: Privacy and Security: Computational Journalism Week 12

The  Plan  

M   E  password  URL  

password  E  

E   M  

Assange   Leigh  

Page 68: Privacy and Security: Computational Journalism Week 12

What  Assange  was  thinking  

E   ???  

M   E  password  URL  

password  E  

E   M  

Assange   Leigh  

Page 69: Privacy and Security: Computational Journalism Week 12

What  Leigh  was  thinking  

???  

M   E  password  URL  

password  E  

E   M  

Assange   Leigh  

Page 70: Privacy and Security: Computational Journalism Week 12

What  actually  happened  

!!!  

M   E  password  URL  

password  E  

E   M  

Assange   Leigh  

password  WL  Archive  

E  

M  

Page 71: Privacy and Security: Computational Journalism Week 12

Basic  security  prac%ce,  in  short  Use  real  passwords  

 Understand  and  be  alert  for  phishing  

 Know  where  your  data  is  and  where  it  goes  

 Keep  your  sohware  up  to  date  

 Understand  technical,  legal,  social,  physical  threats  

 Have  a  plan,  make  security  a  prac%ce  

Page 72: Privacy and Security: Computational Journalism Week 12

Resources  Threat  modeling  for  journalists  h]ps://source.opennews.org/en-­‐US/learning/security-­‐journalists-­‐part-­‐two-­‐threat-­‐modeling/  

 Commi]ee  to  Protect  Journalists  informa%on  security  guide  h]p://www.cpj.org/reports/2012/04/informa%on-­‐security.php  

 Encryp%on  and  Opera%onal  Security  for  Journalists  Hacks/Hackers  presenta%on  h]ps://gist.github.com/vaguity/6594731  h]p://www.cjr.org/behind_the_news/hacks_hackers_security_for_jou.php?page=all