Antiforensics:
Tools & Practices that
Thwart Interlopers and Investigators
Why do organizations protect data and email with
stenography, full device encryption, and plausible
deniability? More importantly, why should you!
|
Ellery Davies |
Kick
your corporate meeting or conference up a notch. Book a speaker who is
passionate about privacy, articulate about trends that affect your
organization, and who can motivate a staff to protect assets. Someone
who can help you protect your data, money and secrets. Someone who is
leery of the law and who demonstrates how to make every conversation
private and every save-to-disk secure and encrypted.
Forensics labs despise this guy. The empowerment he spreads obsoletes
their tools and nullifies their methods. (Check out the LinkedIN
community, “Information
Security”). He puts personal and corporate privacy above the dictums
of subpoenas and court orders. He believes that a conversation in your
boardroom or even between continents is entitled to the same privacy as
a conversation in your bedroom. He explains how government programs sift
through your savings, marriage, medical files and even your
idiosyncrasies. They mine for data without probable cause. They are out
of control. You have the power to render their tools ineffective.
Their ability to tap into your PC, cell phone, email or even the logs of
your ISP and phone company can be annulled.
Interests of law enforcement should
rarely
trump the privacy
of personal storage and
communication, even during investigation. |
|
In
the aftermath of catastrophic events like 9/11 or a high profile kidnapping,
public sentiment swings from privacy to public safety and a desire to
catch perpetrators. That's understandable. But the two are not mutually
exlusive. We needn't surrender basic rights to deal with an emergency.
In the heat of urgency, a directed serach and seizure can be authorized
by a court or even a single judge contacted at home. Our system of
checks and balances vests the courts with the power to weigh urgency and
probable cause against individual rights. Are police empowered to act without judiciary authority?
What if they are in the midst of a kidnapping or getaway. Yes, but only
in pursuit, with just cause, and imminent danger. But as risk recedes, the public assumes
that private communication and data is immune from interception. Not
even close! Big brother's penchant for data collection, sifting, and
preemptive analysis is growing at an alarming pace. There are covert
bureaus establishing a massive collection and data mining hegemony
directed at you. They rifle through your personal data without any cause
or authority. Do you accept the argument that poking into dental records
and analyzing your social contacts helps prevent a homeland attack? If
so, then you won't seek out a specialist in antiforensics. But if you
want to know who is peeking into your bedrom and your boardroom, and how
to prevent it, read on...
The interests of law enforcement should rarely
trump the privacy of yuor personal storage and communications, even during a
crime
investigation. We must establish ground rules that don't shift with egregious events
and without opening the flood gates for politically inspired
interlopers, fashionable interests, religiously inspired or puritanical
whims of the era.
As CEO Vanquish Labs, a leading email security vendor and winner of PC
Magazine Editors' Choice, Ellery Davies knows firsthand how investigators and
law enforcement agents coerce personal data from carriers. Agents can
break through a perimeter and seize files, just as they collect blood
samples and dust for prints. They can question vendors, impound records
and often overstep their authority when building a case. But a growing
number of your peers believes data in your PC or phone (or in the logs
of your ISP or phone company) should be off limits. Data that was
personally recorded or privately transmitted are an extension of the
human mind worthy of even more protection than the prohibition against
compelling spousal testimony. Personally recorded data reflects personal
thought and should be subject to the same very high bar for invasion
that we would be required for coercive, military-style interrogation.
Poking through a disk, cell
phone or personal emails
should be no more frequent than strapping someone to
a table and drugging them—or torturing loved ones to
get at urgent information about an imminent disaster. |
|
|
|
You expect privacy in person ...
Why not online? It's even easier! |
Are their exceptions? Of course! But they should be few and far between.
Poking through someone's disk drive or personal emails should be no more
frequent than strapping someone to a table and drugging them—or
torturing loved ones to get at urgent information about an imminent
disaster.
No one wants to facilitate a bombing or kidnap. But short of
imminent calamity, governments should respect individual freedom and
personal privacy. Since they have trouble doing so, Davies educates
organizations about tools that protect privacy. He makes them simple and
transparent and, ultimately, ubiquitous. This is how private thought
will be protected in the future.
You may not be able to stop eavesdropping and the seizing of media or
communications logs, but you do have the power to render them useless to
anyone but the original parties. Mr. Davies supports the wide
distribution of tools and practices that thwart forensic investigators.
He wants you to have access to transparent, secure obfuscation, no
matter what is your secret, political thought, interests, or income. The
basis is simple. In the past you expected privacy when talking with a
friend in a sealed room. With the proper tools (and good practices), it
is possible to achieve the same privacy when talking with someone in
another country. And certainly, your personal archived thoughts should
enjoy even better protection from invasion. With tools that are
abundant, transparent and simple to use, the so called "rules of
evidence" become moot. Search away, Mr. Cheney. There is nothing to
discover. Of course, there are ways to enhance secure encryption. For example, steganography (the
hiding of data
hiding in plain sight) and nested encrypted containers
(the provide plausible deniability).
With knowledge comes empowerment. Some say that individual empowerment interferes with law enforcement
and helps the bad guys. But too often the definition of a "bad guy" is
at the whim of current fashion. Davies points to the recent past and
It's is not pretty! Governments tend to suppress anything that seems
like a threat or challenges their system of beliefs. He starts with America: Consider the criminalization of
homosexuals, of interracial marriage during our
lifetime, of being Jewish in Nazi Germany (the
center of art, science, culture and philosophy). The mixing
of church and state, the overreach of the LA police in the 90s or
customs agents in the 2000s, the swinging pendulum on the right of a
woman to do as she chooses with her body. No matter your opinion on each
of the venues, it's hard to escape the fact that governments do not
always stand on moral and ethical high ground. Certainly not at all
times.
Can Ellery Davies electrify your event? Check out
his speaking history
–
or feedback from
the INBox Event in San Jose:
“Ellery blows away other public speakers. He gets listeners on their toes
and enthralls crowds.
Stack him against anyone in the industry: Rivest, Dyson, Diffie, Chaum,
Schneier, Zimmermann.
The pioneers have academic credentials and some are nuts & bolts coders.
But Davies has
the business savvy to know why it matters and how it affects you...He
doesn't just talk the talk,
he walks the walk with feet-on-the-ground street cred.”
The Fine Print:
-
If travel
itinerary requires a visit of more than 36 hrs, additional fee may apply
-
Engagement may be postponed up to 6mo without penalty (provide 1 wk notice)
-
Buyer pays round trip air from Boston
and arranges local transportation
-
Presentation: 90 minutes nominal--can be adjusted from 45min~2½
hrs
-
Speaker offers
to attend social event at no add'l cost, if itinerary
accommodates
|
Make Ellery Davies your next public speaker
Low stipend–Big results!
Click here
for quote |
|
|
|