now you [don’t] see me - university of oxford · selected bibliography hribar g, podbregar i,...
TRANSCRIPT
-
H o w h a v e o p e n - s o u r c e i n v e s t i g a t i o n s i n t h e U Kb e e n a f f e c t e d b y t h e G e n e r a l D a t a P r o t e c t i o n R e g u l a t i o n ?
Now You [Don’t] See Me:
-
Contents
1.
Background
2.
Methods
3.
Findings
4.
Discussion
5.
Conclusions
-
Background • OSINT aggregates information from multiple databases for comprehensive profiling
• Around 80-90% of data processed by
intelligence services is based on public
material
• GDPR was implemented in May 2018 to
standardise data protection legislation
across the EU
-
Methods
1. PRISMA literature review
2. Anonymous online questionnaire with 18 items
3. 16 participants from diverse backgrounds
4. Qualitative answers coded by consolidating
recurring themes
-
FindingsHas the implementation of GDPR affected
your ability to effectively conduct OSINT professionally?
Have you perceived an increase in privacy-enhancing behaviours among the British
public since the implementation of GDPR in 2018?
Have you perceived any change in public attitudes towards the UK state’s surveillance capabilities & use since GDPR’s introduction?
Have you changed the amount or availability of your information discoverable through
OSINT as a result of increased regulation?
-
Discussion
-
Conclusions
• Room for further research:• Social media platform restrictions• Efficacy of the ‘Objective Territoriality
Principle’
• My DPhil: • Emerging technologies + Confusing
legislation/protections A return to physical and social vulnerabilities?
-
a n j u l i . s h e r e @ c y b e r s e c u r i t y . o x . a c . u k
Thank you for listening!
Are there any questions?
-
Selected bibliographyHribar G, Podbregar I, Ivanuša T. OSINT: A “Grey Zone”? International Journal of Intelligence and CounterIntelligence. 2014 Sep 1;27(3):529–49.
Edwards L, Urquhart L. Privacy in public spaces: what expectations of privacy do we have in social media intelligence? Int J Law Inf Technol. 2016 Sep 1;24(3):279–310.
Swinford S. Leveson could have "chilling effect" on journalism, Information Commissioner warns. The Telegraph [Internet]. 7 January 2013. https://www.telegraph.co.uk/news/uknews/leveson-
inquiry/9786404/Leveson-could-have-chilling-effect-on-journalism-Information-Commissioner-warns.html [Accessed 28 August 2019].
Rowland, D. Information Technology Law. (5th ed.): Routledge; 2011.
Davis, R. Thank You to Michael Bazzell With Inteltechniques. New Hope Investigations. Weblog. [Online]. https://newhopeinvestigations.com/ [Accessed 25 June 2019].
Shu, C. Changes to Facebook Graph Search Leaves Online Investigators in a Lurch. [Online]. https://techcrunch.com/ [Accessed 25 June 2019]; Cox, J. Facebook Quietly Changes Search Tool Used by
Investigators, Abused By Companies. [Online]. https://www.vice.com/en_us [Accessed 25 June 2019].
Wachter, S. Data Protection in the Age of Big Data. Nature Electronics. 2019;2(6-7).
Poulsen, K. India Bullies Twitter Into Banning Accounts of American, British Students Thousands of Miles Away. Daily Beast. Weblog. [Online] https://www.thedailybeast.com/ [Accessed 25 June 2019].
Mayhew, F. Youtube downs Bellingcat channel for four hours without warning. PressGazette. Weblog. [Online]. https://www.pressgazette.co.uk/ [Accessed 25 June 2019].
Pavur, J. & Knerr, C. GDPArrrrr: Using Privacy Laws to Steal Identities. Blackhat USA 2019. Whitepaper [Online]. https://i.blackhat.com/USA-19/Thursday/us-19-Pavur-GDPArrrrr-Using-Privacy-Laws-To-Steal-
Identities-wp.pdf. [Accessed 28 August 2019].
Solon, O. & Farivar, C. Mark Zuckerberg leveraged Facebook user data to fight rivals and help friends, leaked documents show. NBC News. [Online]. https://www.nbcnews.com/tech/social-media/mark-
zuckerberg-leveraged-facebook-user-data-fight-rivals-help-friends-n994706. [Accessed 28 August 2019].
Garside, J. Twitter puts trillions of tweets up for sale to data miners. The Guardian. [Online]. https://www.theguardian.com/technology/2015/mar/18/twitter-puts-trillions-tweets-for-sale-data-miners. [Accessed 28
August 2019].
Slide1ContentsBackgroundMethodsFindingsDiscussionConclusionsSlide8Selected bibliography