SlideShare uma empresa Scribd logo
1 de 66
Hacker's Corner: Be Leaker
   In depth leaking by GlobaLeaks
Who are we?

Nerds + Security Experts ?

Human in the world ?

Internet enthusiasts ?

NO!

We are all Random GlobaLeaks Contributors
What we want to do

•  Develop a platform for interaction between leakers, editors
   and node maintainers

•  Easy setup and maintenance
   –  Allows a diversification of leak sites based on geography and areas
      of expertise

•  Build a knowledge base on setup, maintenance and
   promotion of the local leak sites for the node maintainer

•  Knowledge base for leaker support
What we will do here
•  Within HackersCorner we want to:

  –  Provide in-depth analysis of the leaking phenomena

  –  Analyze risks and duties of all subjects involved in various leaking approach

  –  Describe post wikileaks era leak site models

  –  Finally show how GlobaLeaks methodology works
Agenda
•    Practically how leaking works
•    Leaking as a political tool
•    The Leaker
•    The Leak Site
•    The Leak Site Reviewer
•    The Media Editors
•    Information Transparency, Resiliency, Anonymity
•    Existing leak sites and other leak initiatives
•    OpenLeaks (maybe?)‫‏‬
•    GlobaLeaks
How Leaking works
A conceptual introduction on leaking
How leaking works

Someone (the leaker) has a secret data he would like to share

The leaker analyzes the available methods and entry points

The leak site receives the data

The data is evaluated

The target is contacted by the leak site

The target puts the data into context producing valuable
information

breaking news!!
Leaking as a political tool

To enforce transparency in governments
Leaking as a political tool

•  Leaking is a good practice to enforce transparency
in governments

•  People with leaking capabilities are people
with democratic power

•  Leaking is a key system to spot corruption
and malpractice in governments

•  Leaking diffusion is required to force Governments
to implement true transparency via Government 2.0
Government 2.0
Obama’s Transparency and Open Government principles stated
  Government should be transparent
  Government should be participatory
  Government should be collaborative

Foundation goals from the Open Gov Directive … stated
   Publish Government Information Online
   Improve the Quality of Government Information
   Create and Institutionalize a Culture of Open Government
   Create an Enabling Policy Framework for Open Government

Now getting implemented in UK, Australia, Canada, USA, Indonesia
and within 2015 targets of European countries
Government 2.0
Government 2.0
OpenData Program

•  OpenData programs means “Opening Governments”

•  OpenData means providing raw access to Governments databases
and information

•  OpenData means creating value from Governments data

•  In a perfectly transparent society Leaks are not needed!
Leaking & Government 2.0

•  WikiLeaks Motto?
          We Open Governments…
          Same goals as Government 2.0!

•  The environment of Leaking is close to the environment of
Government 2.0 programs

•  When governments doesn’t implement transparency, the civic
transparency movements will do trough leaking!

•  Gov 2.0: Is WikiLeaks Open Government?
http://gov20.govfresh.com/is-wikileaks-open-government/
The Leaker
Let's talk about sources of leaks
Leaker, who are you?
who should be a leaker

Anybody!
… who:
o  Has access to some special undisclosed information

o  Knows that he/she will make a difference

o  Is someone who can trust an anonymous identity because
hopes to achieve results through leaking, a greater good :)‫‏‬

o  Someone who views secrecy not as an asset, but as a
useless seclusion
Leaker, Risks?
Leaker, Risks?

•  Having access to some undisclosed (secret? unpublished?)
information will be a matter of trust

•  A leaker has to break this trust, in fact.

•  The leaked data may be lost due to a bad policy (reselling of
used computers without cleaning, trashing of CD and papers).

•  If a leaker is a hacker he has the knowledge and skills to
protect himself and minimize risk.

•  If the data is not shared amongst many people, the risk is
higher (i.e. the leaker is the author)‫‏‬
Leaker, how to become a leaker ? 3/4


•  It’s not important to become a leaker but to remain a leaker ;)‫‏‬

•  Leaking services must allow a smart leaker to stay safe

•  The leaker must evaluate all the available leak sites and
choose the most trusted/professional

•  Security has to be a feature that is usable and easy to
comprehend
Leaker, who are you?

A leakers drive may be:
   o  personal strategy and motivation
   o  political awareness
   o  Information pollution (this is a threat)‫‏‬
   o  market, political, social awareness
   o  self suggestion and personal troubles (this may lead to a lot of
      unneeded overhead)‫‏‬
   o  hate & anger (this will probably make him a sacrificial victim).

Is he a techno martyr?

High risk.
Leaker self protection

The leaker must be protected in 3 phases:

- The acquisition of the leak
- The submission of the leak
- Post leak submission
Leaker self protection:
the leak acquisition

If the data is accessible only by a limited amount of people the
risk is higher.

Internal security policies must be evaluated by the leaker.

He must consider:
•  Technical tracking, logs of internal access
•  Personal tracking, when few people have an access to a data
then personal behavior will acquire relevance
•  Knowledge coherence (disk forensic, wiretapping)‫‏‬
•  The detail of information an investigator may be able to
acquire
Leaker self protection
from the leak site

The selection of an appropriate leak site is mandatory

Criteria for selection must be:
- Level of trust the leak site has inside the network
- How professional it is
- What kind of technology it provides the leaker to protect
himself

It is possible (and inevitable) that there will be rogue leak site,
controlled for example by intelligence agencies.
It must therefore be:
- Trusted
- Wiretap resistant
The Leak site
The Leak Site:
Different kind of Leak Sites
Different kind of Leak Sites

•  Editing & publishing leak site

•  Raw data publishing (mirroring) leak sites

•  Leak amplification leak sites

Different leak sites have different risk levels
The Leak Site
Avoiding takedowns

A leak site may contain some data dangerous that is a threat if
disclosed, one must suppose that a lot of resources are
dedicated to stopping the disclosure.

If distributed in different nations different laws and state
interrelationships can slow down seizing.

Censor resistant methodology (Tor hidden service, darknets,
redundancy)‫‏‬

Avoid traceability?
(trust/security tradeoff)‫‏‬
The Leak Site
How to establish credibility

The primary goal for a leak site is to obtain trustworthiness in
order to receive more interesting leaks

Trustworthiness will be built based on:
•  Transparency
•  Reliability
•  Leak evaluation and context quality
… and the leaks Impact

Any leak site will not be trusted until first leaks serious impact in
local society
The Leak Site
Knowledge base and Safety Tips

Will provide knowledge base and tips to educate leakers

Information specific to laws in the leak sites country, if any (will
be distributed amongst leak site, git)‫‏‬

Knowledge useful for the leak node maintainer will also be
provided

A package of material for publicity campaigns is included
The Leak Site
Understand leak impact and plan properly

Different information has different impact potential.


The leak impact in most cases will be restricted to a specific
area of interest and location.

Global impact is very rare and often the effectiveness of global
impact can be less than local impact. (i.e. policy changes).
   Act locally think globally

It is important to identify the context in which the information
must be distributed to achieve maximum impact and
effectiveness
The Leak Site
Rogue leak sites

In a decentralized and distributed network a big risk is that of
attackers impersonating legitimate nodes

This risk is inevitable and can only be mitigated

A network of trust is more difficult to infiltrate

The leaker must not disclose his identity to the leak site
The Leak Site Reviewer
The Leak Site Reviewers
Who will be a reviewer?
-  A person who believes in the leaking process

-  someone with the ability to recognize fake data

-  someone known in a network of trust between the hacktivist
movement

-  more or less like a wikipedia contributor: a skilled anonymous
for the social progress

someone pretending all the previous points, but doesn't know
the truth about him :)
The Leak Site Reviewer

How a source review works

Who will be a source reviewer

Internal rules of reviewing

Possible checks that should be performed by the reviewers

Reviews possible Outputs
Review of the leaking

Obtain trustworthiness

Be objective/super partes

Be reserved and private

Be multiple: in a distribuited process the community is the asset
The Media Editors
The Media Editors

A media editor is a trained professional (or motivated and
skilled people) that will give context to the leak.

They also serve as a second filter to avoid publication of fake or
useless documents.

They are doing the real hard work (WL say 90% of leaks are
garbage).

The output to media editors should be reduced by leak
reviewers (ideally they should not have to deal with a lot of fake
or useless information)‫‏‬
The Media Editors

To get the attention of trusted and skillful media editors, it is
important for a leak site to have credibility.

The context given by the media editor will then be submitted to
appropriate media.

They can also be inside media themselves.
Information
Transparency, Anonimity and
         resiliency
Information transparency
How much you need to check trust


The data has to become information
   
 Interpretation and contextualization

"When correction fail - The persistence of political
  misperceptions"
Information transparency


from the "raw data" to the information for the masses
   –  it require contextual analysis (for people to understand the leak)‫‏‬
   –  it require source verifications (for people to trust the leak)‫‏‬

the data will be stripped of the metadata

the metadata will be used for evaluation of trust, and eventually
reported
Information transparency
Transparency/leaker protection tradeoff

-  Metadata can be useful for two purposes
   -  Verify the leaks authenticity
   -  Identify the leaker

-  A process to clean the metadata without breaking the leak is
   important

-  Probably this is possible only with intervention from the
   leaker

-  It might be useful for the target to have feedback from the
   leaker to give it more context
   -  This puts the leaker into great danger and it must be a contemplated
      choice
Information Resiliency

Available over the time

Available from all countries

Methodology used in the last years (mirrors, p2p, bittorrent, tor
free hidden service hosting, etc)‫‏‬

The leak must be spread with various methods

Streisand effect
Information Resiliency

If the information is worth something, and it gains a lot of
attention, it will be mirrored. (see wikileaks mirrors)‫‏‬

Once the information is out in "raw" form instructions on how to
mirror it, should be given.

Free file sharing systems (megaupload, rapidshare, dropbox,
etc.) can be useful to encourage non-technical people to
spread the data.
Information Resiliency

Tor hidden services can be a great tool for hosting sensitive
information.

- It must be easy to setup a tor hidden service even for a non
technical person

- Guides like the ones Anonymous give on how to spread the
data (step by step)‫‏‬
Information anonymity

Anonymity as a feature

Safe anonymity (community supported technology vs private
services)‫‏‬

Applicability to every layer of leaking flow

Tor Anonymous Hidden Services

tor2web
Existing leak sites and other leak initiatives


      Leak sites similar to WikiLeaks and
                supporting sites
Various leak sites
BalkanLeaks
  https://www.balkanleaks.eu/
IndoLeaks
  http://www.indoleaks.org/
ThaiLeaks
  http://thaileaks.info/
WikiLeaks Croatia
  http://wikileaks.hr/

Al Jazeera Leak Site
   http://www.ajtransparency.com/how-submit

Pronistica il Ricercatore
   http://pronosticailricercatore.blogspot.com
Al Jazeera has released a website acting like an
"anonymous dropbox”:
   •  They suggest to encrypt Leaks
   •  They suggest to use TOR
   •  The suggest to remove metadata
However…
“We recognize that - despite the best technology - our readers and
viewers are taking a risk by submitting materials, particularly those
living in countries where such disclosures are not protected by law. Our
journalists will ensure that the identities of our sources are protected,
and that submissions are scrubbed of sensitive information - like the
"metadata" that contains authoring information - before those
submissions are released to the public.”
Leak Support Sites

CrowdLeaks:

  –  Born from Anonymous Operation LeakSpin
  –  Crowd editing and publishing web site

WL Central            WikiLeaks News, Analysis, Opinion
http://wlcentral.org/

                    Anonymous HBGary Leak Mirrors
                    http://hbgary.anonleaks.ch/
OpenLeaks

ASK DBerg to make it (15minutes)‫‏‬
GlobaLeaks

… shortly how it works!
GlobaLeaks: Disclaimer

•  We do not receive leaks and we do not publish leaks

•  We are developing a software and designing a leaking
   methodology

•  PLEASE DO NOT SEND US YOUR LEAKS!
leaker protection        reduced
                                             risks and
                       leak filtering         resources
                       (ham/spam)


                     leak management                                             •The organization takes
                                                                                 responsibility
Wiki Leaks workflow




                             leak validation         the organization            •Can be easily taken down by
                                                          assumes                authorities (or censored)
                                                      responsibility of
                                                     what is published           •Does not scale up to a regional
                               information              and how it is            level
                                                         organized
                             rationalization

                                         responsibility for the
                     leak publishing       publishing of the
                                               content

                                                            requires costly IT
                                 leak resilience           infrastructure and
                                                                resources


                                                            requires human
                              media coordination               resources
resources are


GlobaLeaks
                 leak acquisition        provided by
                                          volunteers
                  leak filtering
                  (ham/spam)

                                                                               •Democratic tool for democracy
                                         by sending
                leak amplification        the leak to
                                                                               •Secure bridge between leaker
                                           targets
                                                                               and target
                                                                               •Does not take responsibility
                                                                               •Scale up to regional leak level
                                                                               •Takedown resistant
                                  leak validation
                                                           qualified and
                                                        professional targets

                                    information
                                                         will work together                   NGO
                                                          to classify and
crowdsourcing




                                  rationalization         organize leaks                    Journalists
                                                                                             Activists
                                                                                             Bloggers
                leak publishing      will be handled by the interested media

                                                        based on the leak
                                                      importance/type the
                         regional or interest
                                                      interested target will
                          specific coverage                be contacted
GlobaLeaks: goals

•  Develop a platform for interaction between leakers, editors
   and node maintainers

•  Easy setup and maintenance
   –  Allows a diversification of leak sites based on geography and areas
      of expertise

•  Knowledgebase on setup maintenance and promotion of the
   local leak site

•  Knowledgebase on leaker support
GlobaLeaks: information flow

                                                                                 media
                       leak Submission
    !"#$"%




                                                                                      leak Pubblication
                                                                                                     !"#$
                                                                                            %&'           $




                                                                 leak download

        !"#$%
      &'()*'()$+
                                         leak node                                   !"#$%&'
    • the node                                               leak notification    • the target is a
     maintainer                                                                  journalist, NGO
    select a list of                     •    A Leank is                            or Blogger
        targets                               created                            • he reviews the
                                         • Targets are                           leak content and
                                          notified via mail                          analyses it
GlobaLeaks: The Leaker

•  Leaker education

•  If the leaker is smart he will be given all the information and
   technologies to stay safe

•  Ideally a leaker will connect via a tor client
   –  Or simply with tor2web
GlobaLeaks: The Leak Node

•  Easy Setup even
   for a non-technical
   crowd

•  No payment, or
   domain names

•  Running as Tor
   Hidden service

•  A web interface
GlobaLeaks: The Leak Node

•  Knowledgebase for the leaker

•  Leaks are tagged

•  Each leak node, contains a target list with associated tags

•  Based on the tags that are selected by leaker, the node will
   notify the required targets

•  The targets are notified with a leank
GlobaLeaks: Node maintainer

•  Customize leak site presentation (graphical appearance and
   some content)‫‏‬

•  Selects the target list based on the leak nodes interests and
   crowd

•  He can also be in the list of the targets

•  He will also carry on publicity campaigns to promote his leak
   site
GlobaLeaks: Leanks

•  Leak Link

•  The method through witch a target perceives a leak

•  A bit.ly style URL unique for each target

•  They are dispatched via email (in a future possibly with other
   methods)‫‏‬
   –  Random delay between each dispatch

•  They expire after a fixed or customizable amount of clicks
   and amount of time
   –  To avoid leak link sharing
   –  Once expired a blank page is returned
GlobaLeaks: Leanks

•  A target can add a password to his leank page, but this is
   disabled by default

•  Two types of leak pages, one containing the actual material
   the other containing a status page

•  The status pages is:
   –  used to monitor the impact of the leak
   –  useful for a leaker, who can see how many people have downloaded
      the leank (the risk is higher)‫‏‬

•  The actual leak (can be multiple files) is distributed in a
   packaged format (.zip)‫‏‬
GlobaLeaks: Leanks
GlobaLeaks: Leanks

•  It also provides a channel through witch targets can
   communicate
   –  Integrated comment functionality
   –  A leaker can also visit the status page and ,knowing the risks he will
      face by doing so, talk with the target and give more details on the
      leak
   –  Discussion channel for leak targets
GlobaLeaks: Organisation

•  Being part of the leak process will bring some sort of
   problems

•  By splitting responsibility we demotivate attackers to plan an
   attack strategy

•  There are no specific roles (we are all Random GlobaLeaks
   contributors)‫‏‬
   –  Spokespeople are randomly rotated
   –  Code produced is Free Software
   –  All encryption and security technology are community produced
      and tested free software
Conclusions

Mais conteúdo relacionado

Mais procurados

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019bodaceacat
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 

Mais procurados (19)

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Osint
OsintOsint
Osint
 
OSINT
OSINTOSINT
OSINT
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 

Destaque

Risultati osservatorio imageware sui blog italiani 2013
Risultati osservatorio imageware sui blog italiani 2013Risultati osservatorio imageware sui blog italiani 2013
Risultati osservatorio imageware sui blog italiani 2013Vittorio Pasteris
 
Astra ricerche ordine_giornalisti_set2008
Astra ricerche ordine_giornalisti_set2008Astra ricerche ordine_giornalisti_set2008
Astra ricerche ordine_giornalisti_set2008Vittorio Pasteris
 
Il piano di E-government 2012 parte prima
Il piano di E-government 2012 parte primaIl piano di E-government 2012 parte prima
Il piano di E-government 2012 parte primaVittorio Pasteris
 
Presentazione corso scidecom 2013
Presentazione corso  scidecom 2013Presentazione corso  scidecom 2013
Presentazione corso scidecom 2013Vittorio Pasteris
 
Osservatorio IAB Italia - Accenture
Osservatorio IAB Italia - AccentureOsservatorio IAB Italia - Accenture
Osservatorio IAB Italia - AccentureVittorio Pasteris
 
World Press Freedom Index 2013 Reporters Sans Frontieres
World Press Freedom Index 2013 Reporters Sans FrontieresWorld Press Freedom Index 2013 Reporters Sans Frontieres
World Press Freedom Index 2013 Reporters Sans FrontieresVittorio Pasteris
 
Editoria, la disfatta delle sette sorelle
Editoria, la disfatta delle sette sorelleEditoria, la disfatta delle sette sorelle
Editoria, la disfatta delle sette sorelleVittorio Pasteris
 
Scrivere, fare, vendere, promuovere Ebook
Scrivere, fare, vendere, promuovere EbookScrivere, fare, vendere, promuovere Ebook
Scrivere, fare, vendere, promuovere EbookVittorio Pasteris
 
L'economia dei giornali secondo Hal Varian e Google
L'economia dei giornali secondo Hal Varian e GoogleL'economia dei giornali secondo Hal Varian e Google
L'economia dei giornali secondo Hal Varian e GoogleVittorio Pasteris
 
La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione
 La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione  La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione
La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione Vittorio Pasteris
 
Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale?
Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale? Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale?
Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale? Vittorio Pasteris
 
Il piano di E-government 2012 la sintesi
Il piano di E-government 2012 la sintesiIl piano di E-government 2012 la sintesi
Il piano di E-government 2012 la sintesiVittorio Pasteris
 

Destaque (19)

Risultati osservatorio imageware sui blog italiani 2013
Risultati osservatorio imageware sui blog italiani 2013Risultati osservatorio imageware sui blog italiani 2013
Risultati osservatorio imageware sui blog italiani 2013
 
Astra ricerche ordine_giornalisti_set2008
Astra ricerche ordine_giornalisti_set2008Astra ricerche ordine_giornalisti_set2008
Astra ricerche ordine_giornalisti_set2008
 
Il piano di E-government 2012 parte prima
Il piano di E-government 2012 parte primaIl piano di E-government 2012 parte prima
Il piano di E-government 2012 parte prima
 
Presentazione corso scidecom 2013
Presentazione corso  scidecom 2013Presentazione corso  scidecom 2013
Presentazione corso scidecom 2013
 
Google e Microsoft
Google e MicrosoftGoogle e Microsoft
Google e Microsoft
 
Osservatorio IAB Italia - Accenture
Osservatorio IAB Italia - AccentureOsservatorio IAB Italia - Accenture
Osservatorio IAB Italia - Accenture
 
World Press Freedom Index 2013 Reporters Sans Frontieres
World Press Freedom Index 2013 Reporters Sans FrontieresWorld Press Freedom Index 2013 Reporters Sans Frontieres
World Press Freedom Index 2013 Reporters Sans Frontieres
 
Il lato oscuro di Google
Il lato oscuro di GoogleIl lato oscuro di Google
Il lato oscuro di Google
 
Editoria, la disfatta delle sette sorelle
Editoria, la disfatta delle sette sorelleEditoria, la disfatta delle sette sorelle
Editoria, la disfatta delle sette sorelle
 
Scrivere, fare, vendere, promuovere Ebook
Scrivere, fare, vendere, promuovere EbookScrivere, fare, vendere, promuovere Ebook
Scrivere, fare, vendere, promuovere Ebook
 
L'economia dei giornali secondo Hal Varian e Google
L'economia dei giornali secondo Hal Varian e GoogleL'economia dei giornali secondo Hal Varian e Google
L'economia dei giornali secondo Hal Varian e Google
 
La Fabbrica dei Giornalisti
La Fabbrica dei GiornalistiLa Fabbrica dei Giornalisti
La Fabbrica dei Giornalisti
 
Inpgi gestione separata
Inpgi gestione separataInpgi gestione separata
Inpgi gestione separata
 
Journalism 2.0
Journalism 2.0Journalism 2.0
Journalism 2.0
 
La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione
 La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione  La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione
La proposta di riforma dell'Ordine dei Giornalisti di Liberiamo l'informazione
 
Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale?
Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale? Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale?
Giornalisti e blogger (e editori) in sinergia o in competizione nel glocale?
 
Il piano di E-government 2012 la sintesi
Il piano di E-government 2012 la sintesiIl piano di E-government 2012 la sintesi
Il piano di E-government 2012 la sintesi
 
Guida turistica a Prato
Guida turistica a PratoGuida turistica a Prato
Guida turistica a Prato
 
Introduzione a Moodle
Introduzione a MoodleIntroduzione a Moodle
Introduzione a Moodle
 

Semelhante a Introducing Globaleaks

Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsMiriam Fernandez
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance  Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance Andrew_McStay
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsJack Whitsitt
 
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapitolTechU
 
Sma for national_security
Sma for national_securitySma for national_security
Sma for national_securitypromediakw
 
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securityDr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securitypromediakw
 
Filth and lies: analysing social media
Filth and lies: analysing social mediaFilth and lies: analysing social media
Filth and lies: analysing social mediaDiana Maynard
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019Priyanka Aash
 
lessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside outlessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside outPatrick McCormick
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 

Semelhante a Introducing Globaleaks (20)

Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future Directions
 
deep web.pdf
deep web.pdfdeep web.pdf
deep web.pdf
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance  Transparency, Veillance and emotiveillance
Transparency, Veillance and emotiveillance
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication Skills
 
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptxCapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
CapTech Talks--OSINT- Dr. Kellup Charles 10--6-22.pptx
 
Sma for national_security
Sma for national_securitySma for national_security
Sma for national_security
 
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securityDr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
 
Filth and lies: analysing social media
Filth and lies: analysing social mediaFilth and lies: analysing social media
Filth and lies: analysing social media
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
lessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside outlessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside out
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 

Mais de Vittorio Pasteris

Global Principles on Artificial Intelligence (AI)
Global Principles on Artificial Intelligence (AI)Global Principles on Artificial Intelligence (AI)
Global Principles on Artificial Intelligence (AI)Vittorio Pasteris
 
Osservatorio 2023 sul Giornalismo Digitale
Osservatorio 2023 sul Giornalismo DigitaleOsservatorio 2023 sul Giornalismo Digitale
Osservatorio 2023 sul Giornalismo DigitaleVittorio Pasteris
 
Manuale d'uso voto telematico Ordine Giornalisti
Manuale d'uso voto telematico Ordine GiornalistiManuale d'uso voto telematico Ordine Giornalisti
Manuale d'uso voto telematico Ordine GiornalistiVittorio Pasteris
 
Vademecum elezioni Ordine Gionalisti 2021
Vademecum elezioni Ordine Gionalisti 2021Vademecum elezioni Ordine Gionalisti 2021
Vademecum elezioni Ordine Gionalisti 2021Vittorio Pasteris
 
Villareggia 9 giugno Intervento Capac
Villareggia 9 giugno Intervento CapacVillareggia 9 giugno Intervento Capac
Villareggia 9 giugno Intervento CapacVittorio Pasteris
 
Biometano villareggia: pro e contro
Biometano villareggia: pro e controBiometano villareggia: pro e contro
Biometano villareggia: pro e controVittorio Pasteris
 
Progetto impianto per la produzione di biometano a Villareggia
Progetto impianto per la produzione di biometano a VillareggiaProgetto impianto per la produzione di biometano a Villareggia
Progetto impianto per la produzione di biometano a VillareggiaVittorio Pasteris
 
Facebook & Instagram Safety Guide
Facebook & Instagram Safety GuideFacebook & Instagram Safety Guide
Facebook & Instagram Safety GuideVittorio Pasteris
 
Osservatorio sul Giornalismo ai tempi del Covid 19
Osservatorio sul Giornalismo ai tempi del Covid 19Osservatorio sul Giornalismo ai tempi del Covid 19
Osservatorio sul Giornalismo ai tempi del Covid 19Vittorio Pasteris
 
In memoria di don Ubaldo Gianetto
In memoria di don Ubaldo GianettoIn memoria di don Ubaldo Gianetto
In memoria di don Ubaldo GianettoVittorio Pasteris
 
Monitoring media pluralism in the digital era : application of the Media Plur...
Monitoring media pluralism in the digital era : application of the Media Plur...Monitoring media pluralism in the digital era : application of the Media Plur...
Monitoring media pluralism in the digital era : application of the Media Plur...Vittorio Pasteris
 
I nuovi percorsi della notizia
I nuovi percorsi della notiziaI nuovi percorsi della notizia
I nuovi percorsi della notiziaVittorio Pasteris
 
New powers, new responsibilities the journalism ai report
New powers, new responsibilities   the journalism ai reportNew powers, new responsibilities   the journalism ai report
New powers, new responsibilities the journalism ai reportVittorio Pasteris
 
Osservatorio testate online 2018
Osservatorio testate online 2018Osservatorio testate online 2018
Osservatorio testate online 2018Vittorio Pasteris
 
Emscher Park. Parco del paesaggio
Emscher Park. Parco del paesaggioEmscher Park. Parco del paesaggio
Emscher Park. Parco del paesaggioVittorio Pasteris
 

Mais de Vittorio Pasteris (20)

Global Principles on Artificial Intelligence (AI)
Global Principles on Artificial Intelligence (AI)Global Principles on Artificial Intelligence (AI)
Global Principles on Artificial Intelligence (AI)
 
Digital News Report 2023
Digital News Report 2023Digital News Report 2023
Digital News Report 2023
 
Osservatorio 2023 sul Giornalismo Digitale
Osservatorio 2023 sul Giornalismo DigitaleOsservatorio 2023 sul Giornalismo Digitale
Osservatorio 2023 sul Giornalismo Digitale
 
Manuale d'uso voto telematico Ordine Giornalisti
Manuale d'uso voto telematico Ordine GiornalistiManuale d'uso voto telematico Ordine Giornalisti
Manuale d'uso voto telematico Ordine Giornalisti
 
Vademecum elezioni Ordine Gionalisti 2021
Vademecum elezioni Ordine Gionalisti 2021Vademecum elezioni Ordine Gionalisti 2021
Vademecum elezioni Ordine Gionalisti 2021
 
Villareggia 9 giugno Intervento Capac
Villareggia 9 giugno Intervento CapacVillareggia 9 giugno Intervento Capac
Villareggia 9 giugno Intervento Capac
 
il dilemma del futuro
il dilemma del futuroil dilemma del futuro
il dilemma del futuro
 
Biometano villareggia: pro e contro
Biometano villareggia: pro e controBiometano villareggia: pro e contro
Biometano villareggia: pro e contro
 
Progetto impianto per la produzione di biometano a Villareggia
Progetto impianto per la produzione di biometano a VillareggiaProgetto impianto per la produzione di biometano a Villareggia
Progetto impianto per la produzione di biometano a Villareggia
 
Facebook & Instagram Safety Guide
Facebook & Instagram Safety GuideFacebook & Instagram Safety Guide
Facebook & Instagram Safety Guide
 
Osservatorio sul Giornalismo ai tempi del Covid 19
Osservatorio sul Giornalismo ai tempi del Covid 19Osservatorio sul Giornalismo ai tempi del Covid 19
Osservatorio sul Giornalismo ai tempi del Covid 19
 
Next Generation Italia
Next Generation ItaliaNext Generation Italia
Next Generation Italia
 
In memoria di don Ubaldo Gianetto
In memoria di don Ubaldo GianettoIn memoria di don Ubaldo Gianetto
In memoria di don Ubaldo Gianetto
 
Monitoring media pluralism in the digital era : application of the Media Plur...
Monitoring media pluralism in the digital era : application of the Media Plur...Monitoring media pluralism in the digital era : application of the Media Plur...
Monitoring media pluralism in the digital era : application of the Media Plur...
 
I nuovi percorsi della notizia
I nuovi percorsi della notiziaI nuovi percorsi della notizia
I nuovi percorsi della notizia
 
Sos inpgi
Sos inpgiSos inpgi
Sos inpgi
 
RIFORMA INPGI 2020
RIFORMA INPGI 2020RIFORMA INPGI 2020
RIFORMA INPGI 2020
 
New powers, new responsibilities the journalism ai report
New powers, new responsibilities   the journalism ai reportNew powers, new responsibilities   the journalism ai report
New powers, new responsibilities the journalism ai report
 
Osservatorio testate online 2018
Osservatorio testate online 2018Osservatorio testate online 2018
Osservatorio testate online 2018
 
Emscher Park. Parco del paesaggio
Emscher Park. Parco del paesaggioEmscher Park. Parco del paesaggio
Emscher Park. Parco del paesaggio
 

Último

AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsPooja Nehwal
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfFahimUddin61
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Último (20)

AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf
 

Introducing Globaleaks

  • 1. Hacker's Corner: Be Leaker In depth leaking by GlobaLeaks
  • 2. Who are we? Nerds + Security Experts ? Human in the world ? Internet enthusiasts ? NO! We are all Random GlobaLeaks Contributors
  • 3. What we want to do •  Develop a platform for interaction between leakers, editors and node maintainers •  Easy setup and maintenance –  Allows a diversification of leak sites based on geography and areas of expertise •  Build a knowledge base on setup, maintenance and promotion of the local leak sites for the node maintainer •  Knowledge base for leaker support
  • 4. What we will do here •  Within HackersCorner we want to: –  Provide in-depth analysis of the leaking phenomena –  Analyze risks and duties of all subjects involved in various leaking approach –  Describe post wikileaks era leak site models –  Finally show how GlobaLeaks methodology works
  • 5. Agenda •  Practically how leaking works •  Leaking as a political tool •  The Leaker •  The Leak Site •  The Leak Site Reviewer •  The Media Editors •  Information Transparency, Resiliency, Anonymity •  Existing leak sites and other leak initiatives •  OpenLeaks (maybe?)‫‏‬ •  GlobaLeaks
  • 6. How Leaking works A conceptual introduction on leaking
  • 7. How leaking works Someone (the leaker) has a secret data he would like to share The leaker analyzes the available methods and entry points The leak site receives the data The data is evaluated The target is contacted by the leak site The target puts the data into context producing valuable information breaking news!!
  • 8. Leaking as a political tool To enforce transparency in governments
  • 9. Leaking as a political tool •  Leaking is a good practice to enforce transparency in governments •  People with leaking capabilities are people with democratic power •  Leaking is a key system to spot corruption and malpractice in governments •  Leaking diffusion is required to force Governments to implement true transparency via Government 2.0
  • 10. Government 2.0 Obama’s Transparency and Open Government principles stated Government should be transparent Government should be participatory Government should be collaborative Foundation goals from the Open Gov Directive … stated Publish Government Information Online Improve the Quality of Government Information Create and Institutionalize a Culture of Open Government Create an Enabling Policy Framework for Open Government Now getting implemented in UK, Australia, Canada, USA, Indonesia and within 2015 targets of European countries
  • 13. OpenData Program •  OpenData programs means “Opening Governments” •  OpenData means providing raw access to Governments databases and information •  OpenData means creating value from Governments data •  In a perfectly transparent society Leaks are not needed!
  • 14. Leaking & Government 2.0 •  WikiLeaks Motto? We Open Governments… Same goals as Government 2.0! •  The environment of Leaking is close to the environment of Government 2.0 programs •  When governments doesn’t implement transparency, the civic transparency movements will do trough leaking! •  Gov 2.0: Is WikiLeaks Open Government? http://gov20.govfresh.com/is-wikileaks-open-government/
  • 15. The Leaker Let's talk about sources of leaks
  • 16. Leaker, who are you? who should be a leaker Anybody! … who: o  Has access to some special undisclosed information o  Knows that he/she will make a difference o  Is someone who can trust an anonymous identity because hopes to achieve results through leaking, a greater good :)‫‏‬ o  Someone who views secrecy not as an asset, but as a useless seclusion
  • 18. Leaker, Risks? •  Having access to some undisclosed (secret? unpublished?) information will be a matter of trust •  A leaker has to break this trust, in fact. •  The leaked data may be lost due to a bad policy (reselling of used computers without cleaning, trashing of CD and papers). •  If a leaker is a hacker he has the knowledge and skills to protect himself and minimize risk. •  If the data is not shared amongst many people, the risk is higher (i.e. the leaker is the author)‫‏‬
  • 19. Leaker, how to become a leaker ? 3/4 •  It’s not important to become a leaker but to remain a leaker ;)‫‏‬ •  Leaking services must allow a smart leaker to stay safe •  The leaker must evaluate all the available leak sites and choose the most trusted/professional •  Security has to be a feature that is usable and easy to comprehend
  • 20. Leaker, who are you? A leakers drive may be: o  personal strategy and motivation o  political awareness o  Information pollution (this is a threat)‫‏‬ o  market, political, social awareness o  self suggestion and personal troubles (this may lead to a lot of unneeded overhead)‫‏‬ o  hate & anger (this will probably make him a sacrificial victim). Is he a techno martyr? High risk.
  • 21. Leaker self protection The leaker must be protected in 3 phases: - The acquisition of the leak - The submission of the leak - Post leak submission
  • 22. Leaker self protection: the leak acquisition If the data is accessible only by a limited amount of people the risk is higher. Internal security policies must be evaluated by the leaker. He must consider: •  Technical tracking, logs of internal access •  Personal tracking, when few people have an access to a data then personal behavior will acquire relevance •  Knowledge coherence (disk forensic, wiretapping)‫‏‬ •  The detail of information an investigator may be able to acquire
  • 23. Leaker self protection from the leak site The selection of an appropriate leak site is mandatory Criteria for selection must be: - Level of trust the leak site has inside the network - How professional it is - What kind of technology it provides the leaker to protect himself It is possible (and inevitable) that there will be rogue leak site, controlled for example by intelligence agencies. It must therefore be: - Trusted - Wiretap resistant
  • 25. The Leak Site: Different kind of Leak Sites Different kind of Leak Sites •  Editing & publishing leak site •  Raw data publishing (mirroring) leak sites •  Leak amplification leak sites Different leak sites have different risk levels
  • 26. The Leak Site Avoiding takedowns A leak site may contain some data dangerous that is a threat if disclosed, one must suppose that a lot of resources are dedicated to stopping the disclosure. If distributed in different nations different laws and state interrelationships can slow down seizing. Censor resistant methodology (Tor hidden service, darknets, redundancy)‫‏‬ Avoid traceability? (trust/security tradeoff)‫‏‬
  • 27. The Leak Site How to establish credibility The primary goal for a leak site is to obtain trustworthiness in order to receive more interesting leaks Trustworthiness will be built based on: •  Transparency •  Reliability •  Leak evaluation and context quality … and the leaks Impact Any leak site will not be trusted until first leaks serious impact in local society
  • 28. The Leak Site Knowledge base and Safety Tips Will provide knowledge base and tips to educate leakers Information specific to laws in the leak sites country, if any (will be distributed amongst leak site, git)‫‏‬ Knowledge useful for the leak node maintainer will also be provided A package of material for publicity campaigns is included
  • 29. The Leak Site Understand leak impact and plan properly Different information has different impact potential. The leak impact in most cases will be restricted to a specific area of interest and location. Global impact is very rare and often the effectiveness of global impact can be less than local impact. (i.e. policy changes). Act locally think globally It is important to identify the context in which the information must be distributed to achieve maximum impact and effectiveness
  • 30. The Leak Site Rogue leak sites In a decentralized and distributed network a big risk is that of attackers impersonating legitimate nodes This risk is inevitable and can only be mitigated A network of trust is more difficult to infiltrate The leaker must not disclose his identity to the leak site
  • 31. The Leak Site Reviewer
  • 32. The Leak Site Reviewers Who will be a reviewer? -  A person who believes in the leaking process -  someone with the ability to recognize fake data -  someone known in a network of trust between the hacktivist movement -  more or less like a wikipedia contributor: a skilled anonymous for the social progress someone pretending all the previous points, but doesn't know the truth about him :)
  • 33. The Leak Site Reviewer How a source review works Who will be a source reviewer Internal rules of reviewing Possible checks that should be performed by the reviewers Reviews possible Outputs
  • 34. Review of the leaking Obtain trustworthiness Be objective/super partes Be reserved and private Be multiple: in a distribuited process the community is the asset
  • 36. The Media Editors A media editor is a trained professional (or motivated and skilled people) that will give context to the leak. They also serve as a second filter to avoid publication of fake or useless documents. They are doing the real hard work (WL say 90% of leaks are garbage). The output to media editors should be reduced by leak reviewers (ideally they should not have to deal with a lot of fake or useless information)‫‏‬
  • 37. The Media Editors To get the attention of trusted and skillful media editors, it is important for a leak site to have credibility. The context given by the media editor will then be submitted to appropriate media. They can also be inside media themselves.
  • 39. Information transparency How much you need to check trust The data has to become information   Interpretation and contextualization "When correction fail - The persistence of political misperceptions"
  • 40. Information transparency from the "raw data" to the information for the masses –  it require contextual analysis (for people to understand the leak)‫‏‬ –  it require source verifications (for people to trust the leak)‫‏‬ the data will be stripped of the metadata the metadata will be used for evaluation of trust, and eventually reported
  • 41. Information transparency Transparency/leaker protection tradeoff -  Metadata can be useful for two purposes -  Verify the leaks authenticity -  Identify the leaker -  A process to clean the metadata without breaking the leak is important -  Probably this is possible only with intervention from the leaker -  It might be useful for the target to have feedback from the leaker to give it more context -  This puts the leaker into great danger and it must be a contemplated choice
  • 42. Information Resiliency Available over the time Available from all countries Methodology used in the last years (mirrors, p2p, bittorrent, tor free hidden service hosting, etc)‫‏‬ The leak must be spread with various methods Streisand effect
  • 43. Information Resiliency If the information is worth something, and it gains a lot of attention, it will be mirrored. (see wikileaks mirrors)‫‏‬ Once the information is out in "raw" form instructions on how to mirror it, should be given. Free file sharing systems (megaupload, rapidshare, dropbox, etc.) can be useful to encourage non-technical people to spread the data.
  • 44. Information Resiliency Tor hidden services can be a great tool for hosting sensitive information. - It must be easy to setup a tor hidden service even for a non technical person - Guides like the ones Anonymous give on how to spread the data (step by step)‫‏‬
  • 45. Information anonymity Anonymity as a feature Safe anonymity (community supported technology vs private services)‫‏‬ Applicability to every layer of leaking flow Tor Anonymous Hidden Services tor2web
  • 46. Existing leak sites and other leak initiatives Leak sites similar to WikiLeaks and supporting sites
  • 47. Various leak sites BalkanLeaks https://www.balkanleaks.eu/ IndoLeaks http://www.indoleaks.org/ ThaiLeaks http://thaileaks.info/ WikiLeaks Croatia http://wikileaks.hr/ Al Jazeera Leak Site http://www.ajtransparency.com/how-submit Pronistica il Ricercatore http://pronosticailricercatore.blogspot.com
  • 48. Al Jazeera has released a website acting like an "anonymous dropbox”: •  They suggest to encrypt Leaks •  They suggest to use TOR •  The suggest to remove metadata However… “We recognize that - despite the best technology - our readers and viewers are taking a risk by submitting materials, particularly those living in countries where such disclosures are not protected by law. Our journalists will ensure that the identities of our sources are protected, and that submissions are scrubbed of sensitive information - like the "metadata" that contains authoring information - before those submissions are released to the public.”
  • 49. Leak Support Sites CrowdLeaks: –  Born from Anonymous Operation LeakSpin –  Crowd editing and publishing web site WL Central WikiLeaks News, Analysis, Opinion http://wlcentral.org/ Anonymous HBGary Leak Mirrors http://hbgary.anonleaks.ch/
  • 50. OpenLeaks ASK DBerg to make it (15minutes)‫‏‬
  • 52. GlobaLeaks: Disclaimer •  We do not receive leaks and we do not publish leaks •  We are developing a software and designing a leaking methodology •  PLEASE DO NOT SEND US YOUR LEAKS!
  • 53. leaker protection reduced risks and leak filtering resources (ham/spam) leak management •The organization takes responsibility Wiki Leaks workflow leak validation the organization •Can be easily taken down by assumes authorities (or censored) responsibility of what is published •Does not scale up to a regional information and how it is level organized rationalization responsibility for the leak publishing publishing of the content requires costly IT leak resilience infrastructure and resources requires human media coordination resources
  • 54. resources are GlobaLeaks leak acquisition provided by volunteers leak filtering (ham/spam) •Democratic tool for democracy by sending leak amplification the leak to •Secure bridge between leaker targets and target •Does not take responsibility •Scale up to regional leak level •Takedown resistant leak validation qualified and professional targets information will work together NGO to classify and crowdsourcing rationalization organize leaks Journalists Activists Bloggers leak publishing will be handled by the interested media based on the leak importance/type the regional or interest interested target will specific coverage be contacted
  • 55. GlobaLeaks: goals •  Develop a platform for interaction between leakers, editors and node maintainers •  Easy setup and maintenance –  Allows a diversification of leak sites based on geography and areas of expertise •  Knowledgebase on setup maintenance and promotion of the local leak site •  Knowledgebase on leaker support
  • 56. GlobaLeaks: information flow media leak Submission !"#$"% leak Pubblication !"#$ %&' $ leak download !"#$% &'()*'()$+ leak node !"#$%&' • the node leak notification • the target is a maintainer journalist, NGO select a list of • A Leank is or Blogger targets created • he reviews the • Targets are leak content and notified via mail analyses it
  • 57. GlobaLeaks: The Leaker •  Leaker education •  If the leaker is smart he will be given all the information and technologies to stay safe •  Ideally a leaker will connect via a tor client –  Or simply with tor2web
  • 58. GlobaLeaks: The Leak Node •  Easy Setup even for a non-technical crowd •  No payment, or domain names •  Running as Tor Hidden service •  A web interface
  • 59. GlobaLeaks: The Leak Node •  Knowledgebase for the leaker •  Leaks are tagged •  Each leak node, contains a target list with associated tags •  Based on the tags that are selected by leaker, the node will notify the required targets •  The targets are notified with a leank
  • 60. GlobaLeaks: Node maintainer •  Customize leak site presentation (graphical appearance and some content)‫‏‬ •  Selects the target list based on the leak nodes interests and crowd •  He can also be in the list of the targets •  He will also carry on publicity campaigns to promote his leak site
  • 61. GlobaLeaks: Leanks •  Leak Link •  The method through witch a target perceives a leak •  A bit.ly style URL unique for each target •  They are dispatched via email (in a future possibly with other methods)‫‏‬ –  Random delay between each dispatch •  They expire after a fixed or customizable amount of clicks and amount of time –  To avoid leak link sharing –  Once expired a blank page is returned
  • 62. GlobaLeaks: Leanks •  A target can add a password to his leank page, but this is disabled by default •  Two types of leak pages, one containing the actual material the other containing a status page •  The status pages is: –  used to monitor the impact of the leak –  useful for a leaker, who can see how many people have downloaded the leank (the risk is higher)‫‏‬ •  The actual leak (can be multiple files) is distributed in a packaged format (.zip)‫‏‬
  • 64. GlobaLeaks: Leanks •  It also provides a channel through witch targets can communicate –  Integrated comment functionality –  A leaker can also visit the status page and ,knowing the risks he will face by doing so, talk with the target and give more details on the leak –  Discussion channel for leak targets
  • 65. GlobaLeaks: Organisation •  Being part of the leak process will bring some sort of problems •  By splitting responsibility we demotivate attackers to plan an attack strategy •  There are no specific roles (we are all Random GlobaLeaks contributors)‫‏‬ –  Spokespeople are randomly rotated –  Code produced is Free Software –  All encryption and security technology are community produced and tested free software