Notes for Secure Communications Post-Snowden By Scott Granneman & Jans Carton Find the presentation at http://www.granneman.com/presentations/ ## Slide 3 http://www.granneman.com ## Slide 5 https://www.schneier.com/crypto-gram/archives/2005/0815.html#13 ## Slide 6 http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html ## Slide 7 http://mashable.com/2011/04/20/iphone-location-history/ ## Slide 8 https://www.apple.com/pr/library/2011/04/27Apple-Q-A-on-Location-Data.html ## Slide 9 https://www.apple.com/pr/library/2011/04/27Apple-Q-A-on-Location-Data.html ## Slide 10 https://openpaths.cc ## Slide 14 CC from Flickr: Bella ragazza (zenera) ## Slide 15 CC from Flickr: In the evenings we rest (gomagoti) ## Slide 16 CC from Flickr: The need for speed (marinacvinhal [Amnemona]) ## Slide 17 CC from Flickr: Cricket (Caleb Keiter) ## Slide 18 CC from Flickr: Sniff Sniff (sleepyneko) ## Slide 19 CC from Flickr: Sniff, Sniff … what did you say your name was? (stovak [Tom Stovall]) ## Slide 36 Firesheep results, captured 2010-11-02 ## Slide 37 Firesheep results, captured 2010-11-02 ## Slide 38 Firesheep results, captured 2010-11-02 ## Slide 39 Firesheep results, captured 2010-11-02 ## Slide 42 National Security Agency’s new regional operations center in Hawaii, 2013-01-16 https://cryptome.org/2014-info/nsa-oahu/nsa-oahu.htm https://en.wikipedia.org/wiki/Edward_Snowden ## Slide 43 https://en.wikipedia.org/wiki/Edward_Snowden ## Slide 44 Journalists Laura Poitras & Glenn Greenwald http://www.northcountrypublicradio.org/news/npr/303002434/pulitzer-prizes-are-out-washington-post-the-guardian-win-for-nsa-stories https://en.wikipedia.org/wiki/Edward_Snowden ## Slide 45 Department of Justice building (smaller) in Washington, DC - Wikimedia https://en.wikipedia.org/wiki/Edward_Snowden ## Slide 46 Terminal F at Sheremetyevo Airport at the time of the arrival of Edward Snowden https://en.wikipedia.org/wiki/File:Edward_Joseph_Snowden_-_Arrival_at_Sheremetyevo_International_Airport_04.jpg https://en.wikipedia.org/wiki/Edward_Snowden ## Slide 47 Moscow from space, taken by Japanese astronaut Soichi Noguchi, 2010-05-07 http://www.fresher.ru/2010/05/31/luchshie-kosmicheskie-fotografii-za-maj/?replytocom=6338 https://en.wikipedia.org/wiki/Edward_Snowden ## Slide 49 Hillary Clinton, 1st Democratic Debate, Oct. 13, 2015 Image: Reuters/Lucy Nicholson - 2016-10-13, http://www.slate.com/articles/news_and_politics/war_stories/2015/10/hillary_clinton_won_the_foreign_policy_debate_the_former_secretary_of_state.html ## Slide 50 Pilkington, Ed. “Edward Snowden: US would have buried NSA warnings forever”. *The Guardian* (17 October 2013). http://www.theguardian.com/world/2013/oct/18/edward-snowden-us-would-have-buried-nsa-warnings-forever. ## Slide 53 Poitras, Laura and Glenn Greenwald. “NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’ – video”. *The Guardian* (9 June 2013). http://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video ## Slide 54 Risen, James. “Snowden Says He Took No Secret Files to Russia”. *The New York Times* (17 October 2013). http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-to-russia.html. ## Slide 55 Savage, Charlie. “Judge Questions Legality of N.S.A. Phone Records”. *The New York Times* (16 December 2013). http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone-data-program.html. ## Slide 57 Hillary Clinton, 1st Democratic Debate, Oct. 13, 2015 Image: Reuters/Lucy Nicholson - 2016-10-13, http://www.slate.com/articles/news_and_politics/war_stories/2015/10/ ## Slide 58 http://www.politifact.com/truth-o-meter/statements/2015/oct/14/hillary-clinton/clinton-says-nsa-leaker-snowden-failed-use-whistle/ http://www.ibtimes.com/loopholes-exclude-intelligence-contractors-snowden-whistleblower-protections-1301913 http://www.newyorker.com/news/john-cassidy/hillary-clinton-is-wrong-about-edward-snowden ## Slide 59 Jake Tapper on Thursday, January 2nd, 2014 in a broadcast of CNN's "The Lead with Jake Tapper" http://www.politifact.com/punditfact/statements/2014/jan/10/jake-tapper/cnns-tapper-obama-has-used-espionage-act-more-all-/ https://www.aclu.org/blog/leak-prosecutions-obama-takes-it-11-or-should-we-say-526 ## Slide 60 Jake Tapper on Thursday, January 2nd, 2014 in a broadcast of CNN's "The Lead with Jake Tapper" http://www.politifact.com/punditfact/statements/2014/jan/10/jake-tapper/cnns-tapper-obama-has-used-espionage-act-more-all-/ https://www.aclu.org/blog/leak-prosecutions-obama-takes-it-11-or-should-we-say-526 ## Slide 61 http://www.politifact.com/truth-o-meter/statements/2015/oct/14/hillary-clinton/clinton-says-nsa-leaker-snowden-failed-use-whistle/ ## Slide 62 https://freedom.press/blog/2013/12/if-snowden-returned-us-trial-all-whistleblower-evidence-would-likely-be-inadmissible ## Slide 63 https://en.wikipedia.org/wiki/Thomas_Andrews_Drake http://www.politifact.com/punditfact/statements/2014/jan/07/glenn-greenwald/greenwald-nsa-leaker-snowden-has-no-whistleblower-/ Image: https://shadowproof.com/2015/08/21/how-one-film-gave-voice-to-three-whistleblowers-the-us-government-tried-to-silence/ ## Slide 64 https://en.wikipedia.org/wiki/Thomas_Andrews_Drake http://www.politifact.com/punditfact/statements/2014/jan/07/glenn-greenwald/greenwald-nsa-leaker-snowden-has-no-whistleblower-/ http://www.dailykos.com/story/2011/10/04/1022669/-Constitutionally-Questionable-Silent-Witness-Rule-Approved-For-Espionage-Act-Prosecution Image: https://shadowproof.com/2015/08/21/how-one-film-gave-voice-to-three-whistleblowers-the-us-government-tried-to-silence/ ## Slide 65 https://en.wikipedia.org/wiki/Thomas_Andrews_Drake http://www.politifact.com/punditfact/statements/2014/jan/07/glenn-greenwald/greenwald-nsa-leaker-snowden-has-no-whistleblower-/ https://freedom.press/blog/2013/12/if-snowden-returned-us-trial-all-whistleblower-evidence-would-likely-be-inadmissible http://www.dailykos.com/story/2011/10/04/1022669/-Constitutionally-Questionable-Silent-Witness-Rule-Approved-For-Espionage-Act-Prosecution Image: https://shadowproof.com/2015/08/21/how-one-film-gave-voice-to-three-whistleblowers-the-us-government-tried-to-silence/ ## Slide 66 https://en.wikipedia.org/wiki/Thomas_Andrews_Drake http://www.politifact.com/punditfact/statements/2014/jan/07/glenn-greenwald/greenwald-nsa-leaker-snowden-has-no-whistleblower-/ http://www.dailykos.com/story/2011/10/04/1022669/-Constitutionally-Questionable-Silent-Witness-Rule-Approved-For-Espionage-Act-Prosecution http://www.dailykos.com/story/2011/06/11/984192/--Too-Classified-to-Try-Myth-in-Failed-Drake-Prosecution Image: https://shadowproof.com/2015/08/21/how-one-film-gave-voice-to-three-whistleblowers-the-us-government-tried-to-silence/ “The first two Espionage counts involved information that was published on NSA's intranet and seen by thousands of people.  Count 1 was specifically marked UNCLASSIFIED.  Count 2 was DECLASSIFIED shortly after Drake was indicted, though the prosecution didn't tell that to the defense team for ten months.  The evidence underlying Counts 3, 4 and 5 consisted of information found in Drake's basement related to the Department of Defense Inspector General investigation of NSA, for which he served as the primary material witness and which ultimately validated the concerns of four other whistleblowers about NSA's gross waste, mismanagement and illegality regarding secret domestic spying programs.” http://www.dailykos.com/story/2011/06/11/984192/--Too-Classified-to-Try-Myth-in-Failed-Drake-Prosecution ## Slide 67 https://en.wikipedia.org/wiki/Thomas_Andrews_Drake http://www.politifact.com/punditfact/statements/2014/jan/07/glenn-greenwald/greenwald-nsa-leaker-snowden-has-no-whistleblower-/ http://www.dailykos.com/story/2011/10/04/1022669/-Constitutionally-Questionable-Silent-Witness-Rule-Approved-For-Espionage-Act-Prosecution http://www.dailykos.com/story/2011/06/11/984192/--Too-Classified-to-Try-Myth-in-Failed-Drake-Prosecution http://blog.constitutioncenter.org/2014/03/how-three-former-employees-became-nsa-critics/ Image: https://shadowproof.com/2015/08/21/how-one-film-gave-voice-to-three-whistleblowers-the-us-government-tried-to-silence/ “The first two Espionage counts involved information that was published on NSA's intranet and seen by thousands of people.  Count 1 was specifically marked UNCLASSIFIED.  Count 2 was DECLASSIFIED shortly after Drake was indicted, though the prosecution didn't tell that to the defense team for ten months.  The evidence underlying Counts 3, 4 and 5 consisted of information found in Drake's basement related to the Department of Defense Inspector General investigation of NSA, for which he served as the primary material witness and which ultimately validated the concerns of four other whistleblowers about NSA's gross waste, mismanagement and illegality regarding secret domestic spying programs.” http://www.dailykos.com/story/2011/06/11/984192/--Too-Classified-to-Try-Myth-in-Failed-Drake-Prosecution ## Slide 68 https://en.wikipedia.org/wiki/Thomas_Andrews_Drake http://www.politifact.com/punditfact/statements/2014/jan/07/glenn-greenwald/greenwald-nsa-leaker-snowden-has-no-whistleblower-/ Image: https://shadowproof.com/2015/08/21/how-one-film-gave-voice-to-three-whistleblowers-the-us-government-tried-to-silence/ ## Slide 69 Gen. David Petreus, 2011-10-31 - Wikipedia - US Navy Petty Officer 1st Class Chad J. McNeeley - Public Domain https://commons.wikimedia.org/wiki/File:Defense.gov_photo_essay_110831-N-TT977-168.jpg ## Slide 70 http://www.theguardian.com/us-news/2015/mar/16/whistleblowers-double-standard-obama-david-petraeus-chelsea-manning https://en.wikipedia.org/wiki/File:Leon_Panetta,_official_DoD_photo_portrait,_2011.jpg ## Slide 71 http://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://upload.wikimedia.org/wikipedia/commons/2/2f/John_Brennan_CIA_official_portrait.jpg ## Slide 73 2009 memo from Technical Director of NSA’s Mission Operations re: collection site in Misawa, Japan ## Slide 74 Presented to 2011 annual conference of Five Eyes alliance ## Slide 76 http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data ## Slide 77 Network server room, licensed from Shutterstock, #87108880 ## Slide 87 2011 report: Molecule & communication network background, licensed from Shutterstock, #130694135 ## Slide 89 Hop 1: a suspect’s contacts → Hop 2: hop 1’s contacts → Hop 3: hop 2’s contacts ## Slide 90 Hop 1: a suspect’s contacts → Hop 2: hop 1’s contacts → Hop 3: hop 2’s contacts ## Slide 91 Hop 1: a suspect’s contacts → Hop 2: hop 1’s contacts → Hop 3: hop 2’s contacts ## Slide 92 Hop 1: a suspect’s contacts → Hop 2: hop 1’s contacts → Hop 3: hop 2’s contacts ## Slide 93 Hop 1: a suspect’s contacts → Hop 2: hop 1’s contacts → Hop 3: hop 2’s contacts ## Slide 97 http://www.nsa.gov/sigint/ ## Slide 98 From “MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) AND THE ISRAELI SIGINT NATIONAL UNIT (ISNU) PERTAINING TO THE PROTECTION OF U.S. PERSONS”, dated 2009-03 http://www.theguardian.com/world/interactive/2013/sep/11/nsa-israel-intelligence-memorandum-understanding-document ## Slide 99 From “MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) AND THE ISRAELI SIGINT NATIONAL UNIT (ISNU) PERTAINING TO THE PROTECTION OF U.S. PERSONS”, dated 2009-03 http://www.theguardian.com/world/interactive/2013/sep/11/nsa-israel-intelligence-memorandum-understanding-document ## Slide 100 From “MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) AND THE ISRAELI SIGINT NATIONAL UNIT (ISNU) PERTAINING TO THE PROTECTION OF U.S. PERSONS”, dated 2009-03 http://www.theguardian.com/world/interactive/2013/sep/11/nsa-israel-intelligence-memorandum-understanding-document ## Slide 101 http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents ## Slide 102 http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents ## Slide 103 http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html ## Slide 104 http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html ## Slide 106 http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html ## Slide 107 http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life ## Slide 108 http://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden ## Slide 109 http://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden ## Slide 110 http://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden ## Slide 111 http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf ## Slide 112 http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf ## Slide 114 https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/ ## Slide 115 https://firstlook.org/theintercept/2015/02/19/great-sim-heist/ ## Slide 116 http://www.usatoday.com/story/news/2015/04/07/dea-bulk-telephone-surveillance-operation/70808616/ ## Slide 117 http://arstechnica.com/tech-policy/2014/08/nsa-built-google-like-interface-to-scan-850-billion-metadata-records/ ## Slide 118 http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html?_r=0 ## Slide 119 https://firstlook.org/theintercept/2014/03/12/nsa-plans-infect-millions-computers-malware/ ## Slide 120 http://mashable.com/2014/02/27/gchq-webcam-yahoo-images/ ## Slide 121 http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep ## Slide 123 http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html ## Slide 124 http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html ## Slide 125 http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html ## Slide 126 https://en.wikipedia.org/wiki/2013_mass_surveillance_scandal ## Slide 127 https://edwardsnowden.com/revelations/ ## Slide 140 http://stockarch.com/images/objects/padlocks-2993 ## Slide 142 https://en.wikipedia.org/wiki/Encryption ## Slide 144 https://www.schneier.com/crypto-gram/archives/1999/0915.html ## Slide 145 https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle https://en.wikipedia.org/wiki/Auguste_Kerckhoffs ## Slide 147 2048 bit DSS key ## Slide 151 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message Images licensed from Can Stock Photo & Pixabay ## Slide 152 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message What if Mallory gets a copy of the shared key? Images licensed from Can Stock Photo & Pixabay ## Slide 154 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message Images licensed from Can Stock Photo & Pixabay ## Slide 155 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message Images licensed from Can Stock Photo & Pixabay ## Slide 156 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message Images licensed from Can Stock Photo & Pixabay ## Slide 157 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message Images licensed from Can Stock Photo & Pixabay ## Slide 159 http://www.whatsapp.com/faq/en/general/21864047, 2015-05-01 ## Slide 160 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message Images licensed from Can Stock Photo & Pixabay ## Slide 161 Alice encrypts message with shared key & sends to Bob Bob uses shared key to decrypt message Images licensed from Can Stock Photo & Pixabay ## Slide 162 https://whispersystems.org, 2015-05-01 ## Slide 163 Source: Eddy, Max. “Snowden to SXSW: Here's How To Keep The NSA Out Of Your Stuff”. *PC Magazine* (11 March 2014). . Accessed 1 May 2015. ## Slide 166 Zombie stretching his hand, licensed from Shutterstock, #115919677 ## Slide 167 Licensed from http://www.shutterstock.com/pic-115174897/stock-photo-internet-theft-a-gloved-hand-reaching-through-a-laptop-screen-to-steal-a-wallet-from-a-man.html ## Slide 177 http://www.strongvpn.com ## Slide 178 https://www.vpntunnel.com ## Slide 179 http://whatismyipaddress.com ## Slide 182 Posted by blue_beetle on Metafilter, August 26, 2010: http://www.metafilter.com/95152/Userdriven-discontent#3256046 ## Slide 184 http://tctechcrunch2011.files.wordpress.com/2013/02/limit-ad-tracking.jpg ## Slide 186 https://duckduckgo.com ## Slide 187 https://duckduckgo.com/?q=missouri+scholars+academy ## Slide 188 https://duckduckgo.com/?q=sluug&t=osx ## Slide 189 https://duckduckgo.com/privacy ## Slide 190 https://duckduckgo.com/bang ## Slide 191 https://duckduckgo.com/bang ## Slide 193 Beacon: track user behavior Widget: page function (comments, Like buttons, etc.) Privacy: discloses data practices ## Slide 196 http://www.pcworld.com ## Slide 197 http://www.pcworld.com ## Slide 198 http://www.pcworld.com ## Slide 199 https://www.ghostery.com/en/apps/doubleclick ## Slide 200 https://www.ghostery.com/en/apps/doubleclick ## Slide 201 https://www.ghostery.com/en/download ## Slide 203 Source: Eddy, Max. “Snowden to SXSW: Here's How To Keep The NSA Out Of Your Stuff”. *PC Magazine* (11 March 2014). . Accessed 1 May 2015. ## Slide 206 Cloud computing, licensed from Shutterstock, #87192808 ## Slide 209 http://www.droboworks.com/Transporter.asp ## Slide 216 https://owncloud.org ## Slide 217 Image from OwnCloud Press kit, https://owncloud.org/press/ ## Slide 218 http://lifehacker.com/5993596/how-to-set-up-your-own-private-cloud-storage-service-in-five-minutes-with-owncloud ## Slide 229 http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html ## Slide 231 http://xkcd.com/538/ ## Slide 235 http://www.whatsapp.com ## Slide 236 Not end-to-end! http://www.whatsapp.com/faq/en/general/21864047 ## Slide 237 https://blog.whatsapp.com/10000618/end-to-end-encryption ## Slide 238 https://jitsi.org ## Slide 242 https://telegram.org ## Slide 244 https://telegram.org/faq#security ## Slide 245 https://news.ycombinator.com/item?id=6916860 ## Slide 247 https://www.schneier.com/crypto-gram/archives/1998/1015.html#cipherdesign https://www.schneier.com/blog/archives/2011/04/schneiers_law.html https://en.wikipedia.org/wiki/Snake_oil_(cryptography) ## Slide 249 https://telegram.org/faq#security ## Slide 250 https://telegram.org/faq#secret-chats ## Slide 251 https://telegram.org/faq#q-why-not-just-make-all-chats-secret ## Slide 253 https://telegram.org/faq#security ## Slide 254 https://telegram.org/faq#q-why-not-just-make-all-chats-secret ## Slide 255 https://crypto.cat ## Slide 256 https://whispersystems.org, 2015-05-01 ## Slide 257 https://whispersystems.org, 2015-05-01 ## Slide 258 https://whispersystems.org, 2015-05-01 ## Slide 259 https://itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8, 2015-05-01 ## Slide 260 https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms, 2015-05-01 ## Slide 261 https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone, 2015-05-01 ## Slide 262 https://whispersystems.org/blog/signal/ ## Slide 264 Source: Eddy, Max. “Snowden to SXSW: Here's How To Keep The NSA Out Of Your Stuff”. *PC Magazine* (11 March 2014). . Accessed 1 May 2015. ## Slide 265 https://twitter.com/Snowden/status/661313394906161152 ## Slide 266 https://en.wikipedia.org/wiki/ZRTP & https://en.wikipedia.org/wiki/Open_Whisper_Systems ## Slide 267 Slide from “Technology Trending Challenges & Approaches”, from the June, 2012 NSA SIGDEV Conference. http://www.spiegel.de/media/media-35535.pdf. ## Slide 268 https://silentcircle.com ## Slide 269 https://silentcircle.com/services, 2015-05-01 ## Slide 270 https://www.silentcircle.com/technology, 2015-05-01 ## Slide 271 https://silentcircle.com/services, 2015-05-01 ## Slide 272 https://silentcircle.com/services, 2015-05-01 ## Slide 273 https://silentcircle.com/services, 2015-05-01 ## Slide 274 https://chatsecure.org, 2015-05-01 ## Slide 277 https://www.apple.com/apples-commitment-to-customer-privacy/ ## Slide 278 https://www.apple.com/apples-commitment-to-customer-privacy/ ## Slide 279 https://www.apple.com/business/docs/iOS_Security_Guide.pdf ## Slide 281 2 of the 3 boogeymen: pedophiles & terrorists (drug dealers were used in other speeches) http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.html ## Slide 282 https://www.surespot.me ## Slide 283 https://www.wickr.com, 2015-07-08 ## Slide 284 https://www.wickr.com, 2015-05-01 ## Slide 285 “Wickr: Top Secret, End-to-End Encrypted, Anonymous and Private Messenger”, November 23, 2014. https://www.wickr.com/wp-content/uploads/2014/12/Wickr_Security_Technology_Part-1_ver-0.9-1.pdf. ## Slide 286 Nico Sell, Wickr co-founder ## Slide 287 https://www.wickr.com/wickr-and-the-right-to-private-communications/, December 10, 2014 ## Slide 288 https://www.wickr.com/wp-content/uploads/2015/07/Wickr_LEG.pdf ## Slide 289 https://www.wickr.com/wp-content/uploads/2015/07/Wickr_LEG.pdf ## Slide 291 ChatSecure can securely communicate with other apps using OTR (Off the Record), e.g., OS X with Adium, Linux with Jitsi, Windows with Pidgin ## Slide 296 https://www.torproject.org/about/overview.html.en ## Slide 297 https://www.torproject.org/about/overview.html.en ## Slide 298 https://www.torproject.org/about/overview.html.en ## Slide 301 http://securitywatch.pcmag.com/security/321511-snowden-to-sxsw-here-s-how-to-keep-the-nsa-out-of-your-stuff, March 11, 2014 ## Slide 303 https://emailselfdefense.fsf.org ## Slide 305 http://www.wired.com/2013/09/black-budget-what-exactly-are-the-nsas-cryptanalytic-capabilities/ ## Slide 308 https://tails.boum.org, 2015-05-01 ## Slide 316 http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance ## Slide 318 Dog Education by alkir, licensed from Can Stock Photo, http://www.canstockphoto.com/dog-education-19161190.html ## Slide 320 http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html ## Slide 321 http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html ## Slide 322 http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html ## Slide 323 https://en.wikipedia.org/wiki/2013_mass_surveillance_scandal ## Slide 324 https://edwardsnowden.com/revelations/ ## Slide 326 http://glenngreenwald.net ## Slide 327 https://www.eff.org ## Slide 328 https://prism-break.org/en/ ## Slide 331 http://www.nybooks.com/articles/archives/2013/nov/21/snowden-leaks-and-public/?pagination=false&printpage=true ## Slide 335 Source: http://www.nytimes.com/imagepages/2006/08/08/business/09aol-graphic.html ## Slide 343 Presented to 2011 annual conference of Five Eyes alliance ## Slide 347 http://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance