1 00:00:02,170 --> 00:00:07,750 In the past getting information was complicated time consuming and expensive. 2 00:00:09,710 --> 00:00:16,830 Today all sorts of information is available about almost anybody and accessing it doesn't require money. 3 00:00:17,940 --> 00:00:24,780 All it takes is to create an account on any given social networking site AMANOR Internet only friends 4 00:00:24,790 --> 00:00:27,970 there could be people who only pretend to be normal users 5 00:00:33,220 --> 00:00:36,160 creating a false identity is really easy in the Internet. 6 00:00:39,330 --> 00:00:40,870 Why would anyone want to do it. 7 00:00:43,280 --> 00:00:45,560 To gain our trust and to get to know us better. 8 00:00:46,880 --> 00:00:53,090 Which makes an attack on our computer system stand a better chance of succeeding. 9 00:00:53,100 --> 00:00:55,700 I'm talking about a socio technical attack here. 10 00:00:58,460 --> 00:01:02,030 Let's see the amount of information that you can find yourself on the web. 11 00:01:05,920 --> 00:01:16,440 To do this other than look at public Web sites and services attackers also use specialized tools that 12 00:01:16,440 --> 00:01:22,200 demand for information is so huge that there are special paid information research services dedicated 13 00:01:22,200 --> 00:01:25,240 to finding information. 14 00:01:25,240 --> 00:01:31,840 Let's start with a site called Iken stuck you in the slide you can see how the service looked when it 15 00:01:31,840 --> 00:01:32,700 was active. 16 00:01:34,040 --> 00:01:39,210 It was shut down after a year we'll visited later and we'll see why it was closed. 17 00:01:42,880 --> 00:01:47,950 The site was geared towards raising awareness that posting a picture on social media pages revealed 18 00:01:47,950 --> 00:01:53,670 not only the image itself but also disclosed information on when and where it was taken. 19 00:01:56,010 --> 00:02:00,960 All current smartphones and many professional cameras automatically add geolocation data to pictures 20 00:02:04,830 --> 00:02:09,720 and their applications and tools on the Internet that let you view the information embedded in images. 21 00:02:11,690 --> 00:02:16,520 I can stalk you tracked the information from pictures published on social media pages for a year. 22 00:02:19,050 --> 00:02:25,530 As you can see tons of confidential information on people was disclosed every minute. 23 00:02:25,550 --> 00:02:29,930 This is a relatively harmless feature in some cases but can be really risky and others 24 00:02:33,080 --> 00:02:34,040 as it turns out. 25 00:02:34,070 --> 00:02:36,680 This poses a great risk for some groups of people 26 00:02:39,930 --> 00:02:43,510 American soldiers who were stationed in Iraq for example. 27 00:02:43,530 --> 00:02:51,190 Take pictures of themselves standing next to a new chopper and uploaded to a social networking service. 28 00:02:51,210 --> 00:02:55,890 The pictures were seen by terrorists who would use the embedded coordinates to identify the location 29 00:02:55,890 --> 00:02:58,460 of the base and where the choppers flew. 30 00:03:00,030 --> 00:03:02,460 This ended in the destruction of four choppers. 31 00:03:05,790 --> 00:03:09,410 This is why you need to think before you post personal information on the Web. 32 00:03:11,460 --> 00:03:13,720 We'll come back to I can talk you in a moment.