1 / 40

Digital source- protection

Digital source- protection. Fredrik Laurin fl@trojkan.se . The problem?. Everything is digital Contacts per mobil/sms (Knutby) Telephone logs at work (Who owns the telephone account?) E-mail(Who owns the account/server?)

sheryl
Download Presentation

Digital source- protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Digital source-protection Fredrik Laurin fl@trojkan.se

  2. The problem? • Everything is digital • Contacts per mobil/sms (Knutby) • Telephone logs at work (Who owns the telephone account?) • E-mail(Who owns the account/server?) • Manuscripts written in editorial systems (Who owns the server? Bonniers? Who is support?) • Coffe with the source paid with a credit card. • To act analogue has become a rarity

  3. The problem? • The state is not good. • Source-protection is no good in the digital world. • All traffic data is logged according to national laws/EU directive /billing. • Eavesdropping is leaglized. • The Security police is free to bug, film and surveill like never before.

  4. The treaths are real! • Swedish tenants association,HSB, hired private eye to break into reporters office. • Private drug clinic Baggershus ”tricked” Swedish Radios:s webbserver to reveal what was to be aired.

  5. The treaths are real! • Source got fired after calling the journalist private (listed) mobile.

  6. The treaths are real! • Swedish correspondent Nils Horner got his creditcard-bills and telephone records asked for in court by his landlord in a rent-dispute.

  7. The treaths are real! • GCHQ/MI5 cooperated with Swedish police on suspected militant muslims in Sweden. • Agiza/El Zary – not known to the Swedish police – until the US called. • CIA/GCHQ/Swedish FRA– they all have ”Usama Kassir” and ”Mehdi Gehzali” in their search patterns. • Should we be telling them what their families have told us?

  8. The case of Ilze Nagle, ” DeFacto” TV3 Latvia • Secret source – ”Neo” • Taxrecords of high officials • House search, computers, USB sticks etc. • Ilmārs Poikāns was arrested.

  9. The route a mail-tip used to take reach SVT:s ”Updrag granskning” – the investigative show

  10. The treaths are real! • The mugger on the subway! • TV4-boss lost her laptop on the subway. • A prosecutor took another one with a search warrant… • Who else has it happend to?

  11. The treaths are real! • Estonia • Dalai Lama • ”Styxx” – Iranian Siemens equipment

  12. Who owns the problem? • The media bosses? • Bonniers? • The prosecutors?

  13. You own the problem!

  14. Who owns the problem? • Source protection is the responsibility of the JOURNALIST - not the publisher.

  15. Journalists must : • Be able to email anonymously. • Know how to surf without traces. • Be able to encrypt • Sound, video, research

  16. PGP - Pretty Good Privacy • Philip Zimmerman – didnt like to throw stones – created PGP instead. • Was almost put away for it • The rest of the world was about to follow US advice on encryption-bans • One Public and one secret key • Solves an ancient dilemma. • Internet standard = many programs and many users

  17. PGP is uniqe • Open source= can be controlled

  18. PGP can… • Encrypt ONE message • Encrypt ONE file on your harddisk. • Encrypt A virtual harddisk • Encrypt THE WHOLE harddisk.

  19. PGP • Shareware/Freeware - Free for private users. • GNU PGP www.gnupg.org • Commercial – US $ 100 • PGP Corporation – www.pgp.com = support/harddisk encryption

  20. ONE MESSAGE

  21. A FILE

  22. EN FIL

  23. A FILE

  24. A VIRTUAL DISK

  25. Starwars - the movie

  26. Now… • Create your own key • Back up the key • Send it to your friends • Encrypt a message and send it • Encrypt a file and send it – or just save it on your computer

  27. To exchange keys Go to:www.gmail.com Id:pgpcourse@gmail.com Pw:securepassphrase DONT SEND MAIL, ONLY SAVE IN DRAFT!

  28. Extras…

  29. Send the text in a picture

  30. Anonymous telephone and email • Get an anonymous gmail-account • Humlan7345@gmail.com is free • You dont even need to email – just save as draft. • Buy a used mobile – and a cash SIM card. • With cash… • Keep it OFF in your drawer.

  31. Is it safe? • No crypto is safe • But it makes it harder • You keep the initiative • Computer hygiene is the biggest threath • PassPHRASE instead of password. • Dont loose the key • Stop pornsurfing and update your virusprogram.

  32. LINKS • www.gnupg.org • PGP FREEWARE for Mac and XP - plus massor med kunskap • www.pgp.com • PGP desktop - free in basic mode. • Full version ca US $ 100 • NGO in a box – free security package • http://security.ngoinabox.org/ • 4t HIT Mail Privacy program hides text in a picture: www.4t-niagara.com • Safe passwords: • http://en.wikipedia.org/wiki/Password#Designing_a_personal.2C_user-friendly_password • http://wolfram.org/writing/howto/password.html

  33. Handouts • PM Datakunskap för journalister.doc • PM Researchteknik.doc • Programvara • www.trojkan.se/temp - Journalism handouts

More Related