SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
#CITIZENFOUR 
Why should you care about 
Government surveillance?
#CITIZENFOUR 
On his first day as Director of GCHQ, 
Robert Hannigan wrote in the Financial 
Times that GCHQ should have more rights 
to access your communications and 
information.* 
*People do not want social media platforms to facilitate murder 
http://www.ft.com/cms/s/2/c89b6c58-6342-11e4-8a63-00144feabdc0.html#axzz3IDW6gOsK
#CITIZENFOUR 
In the same article, the newspaper ran 
a poll asking “Should online privacy be 
sacrificed to combat terrorism?” 
Yes 32.11% No 67.89%
#CITIZENFOUR 
But we’re not even aware of all the ways 
government currently monitors our 
online activities.
#CITIZENFOUR 
The information released by 
whistle-blower Edward Snowden 
exposed an unprecedented level of 
government surveillance.
#CITIZENFOUR 
The new film CITIZENFOUR highlights 
just how significant this information is, 
and the lengths journalists went to in 
order to make it public.
#CITIZENFOUR 
Here are some examples of just how 
government monitors your online 
activities - all of which were brought to 
light by Snowden’s revelations.
#CITIZENFOUR 
OPTIC NERVE 
GCHQ programe that collects still images 
of Yahoo webchats. In a 6-month period 
it collected 1.8 million images. It saves 1 
photo every 5 minutes, 3% - 11% of which 
contains “undesirable nudity”. 
* http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
#CITIZENFOUR 
Edgehill 
GCHQ programme used to gain access to 
Gmail servers and unencrypt information. 
By 2015, GCHQ hoped to have cracked 
the codes used by 15 major internet 
companies and 300 VPNs. 
*http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
#CITIZENFOUR 
World of Warcraft spying 
GCHQ use World of Warcraft to spy on 
gamers, who according to their 
documents, amount to over 10 million 
users. 
* https://www.eff.org/files/2013/12/09/20131209-nyt-nsa_games.pdf
#CITIZENFOUR 
Squeaky Dolphin 
Programme owned by GCHQ used to 
monitor and collect content from 
Facebook, Twitter and YouTube in 
real-time. It can collect addresses from 
videos watched and other user 
information on a daily basis. 
*http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-13.html
#CITIZENFOUR 
Dishfire 
Global text message collection database 
operated by the NSA and GCHQ. Collects 
200 million text messages from across the 
world on a daily basis. 
* http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
#CITIZENFOUR 
Series of programmes used to exploit 
smartphone apps 
Nosey Smurf: Turns a phone’s mic on 
Tracker Smurf: High-precision geolocation 
Dreamy Smurf: Power management 
Paranoid Smurf: Hides presence of spyware 
* http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-13.htm
#CITIZENFOUR 
It’s enough to turn you off the internet 
forever.
#CITIZENFOUR 
But there are ways to protect yourself 
online.
#CITIZENFOUR 
Freedome is a super-simple security and 
online privacy solution. Freedome creates 
a secure, encrypted connection from you 
and your device. Safe browsing. Invisible. 
One button for all.
#CITIZENFOUR 
Get your hands on Freedome to taste true 
online freedom. Download Freedome from 
Google Play or the App Store. 
Open the app, go to Menu > Subscription 
> Have a code > enter cnt5nze8 to get 3 
months free.
#CITIZENFOUR 
So protect yourself and if you want to 
learn more, go watch CITIZENFOUR in a 
cinema near you 
citizenfourfilm.com/screenings

Mais conteúdo relacionado

Semelhante a Why should you care about government surveillance?

How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 

Semelhante a Why should you care about government surveillance? (20)

How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
The Investigatory Powers Bill and journalism
The Investigatory Powers Bill and journalismThe Investigatory Powers Bill and journalism
The Investigatory Powers Bill and journalism
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Berkley Law Writing Competition
Berkley Law Writing CompetitionBerkley Law Writing Competition
Berkley Law Writing Competition
 
10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Cyber war
Cyber warCyber war
Cyber war
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 

Mais de F-Secure Corporation

Mais de F-Secure Corporation (20)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 
Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Why should you care about government surveillance?

  • 1. #CITIZENFOUR Why should you care about Government surveillance?
  • 2. #CITIZENFOUR On his first day as Director of GCHQ, Robert Hannigan wrote in the Financial Times that GCHQ should have more rights to access your communications and information.* *People do not want social media platforms to facilitate murder http://www.ft.com/cms/s/2/c89b6c58-6342-11e4-8a63-00144feabdc0.html#axzz3IDW6gOsK
  • 3. #CITIZENFOUR In the same article, the newspaper ran a poll asking “Should online privacy be sacrificed to combat terrorism?” Yes 32.11% No 67.89%
  • 4. #CITIZENFOUR But we’re not even aware of all the ways government currently monitors our online activities.
  • 5. #CITIZENFOUR The information released by whistle-blower Edward Snowden exposed an unprecedented level of government surveillance.
  • 6. #CITIZENFOUR The new film CITIZENFOUR highlights just how significant this information is, and the lengths journalists went to in order to make it public.
  • 7. #CITIZENFOUR Here are some examples of just how government monitors your online activities - all of which were brought to light by Snowden’s revelations.
  • 8. #CITIZENFOUR OPTIC NERVE GCHQ programe that collects still images of Yahoo webchats. In a 6-month period it collected 1.8 million images. It saves 1 photo every 5 minutes, 3% - 11% of which contains “undesirable nudity”. * http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
  • 9. #CITIZENFOUR Edgehill GCHQ programme used to gain access to Gmail servers and unencrypt information. By 2015, GCHQ hoped to have cracked the codes used by 15 major internet companies and 300 VPNs. *http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
  • 10. #CITIZENFOUR World of Warcraft spying GCHQ use World of Warcraft to spy on gamers, who according to their documents, amount to over 10 million users. * https://www.eff.org/files/2013/12/09/20131209-nyt-nsa_games.pdf
  • 11. #CITIZENFOUR Squeaky Dolphin Programme owned by GCHQ used to monitor and collect content from Facebook, Twitter and YouTube in real-time. It can collect addresses from videos watched and other user information on a daily basis. *http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-13.html
  • 12. #CITIZENFOUR Dishfire Global text message collection database operated by the NSA and GCHQ. Collects 200 million text messages from across the world on a daily basis. * http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
  • 13. #CITIZENFOUR Series of programmes used to exploit smartphone apps Nosey Smurf: Turns a phone’s mic on Tracker Smurf: High-precision geolocation Dreamy Smurf: Power management Paranoid Smurf: Hides presence of spyware * http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339-13.htm
  • 14. #CITIZENFOUR It’s enough to turn you off the internet forever.
  • 15. #CITIZENFOUR But there are ways to protect yourself online.
  • 16. #CITIZENFOUR Freedome is a super-simple security and online privacy solution. Freedome creates a secure, encrypted connection from you and your device. Safe browsing. Invisible. One button for all.
  • 17. #CITIZENFOUR Get your hands on Freedome to taste true online freedom. Download Freedome from Google Play or the App Store. Open the app, go to Menu > Subscription > Have a code > enter cnt5nze8 to get 3 months free.
  • 18. #CITIZENFOUR So protect yourself and if you want to learn more, go watch CITIZENFOUR in a cinema near you citizenfourfilm.com/screenings