Spies
&
Social Media
Bryan Hill, Information Security Office
Spies
&
Social Media
Bryan Hill, Information Security Office
Story Time
Robin Sage
Robin Sage
Robin Sage
Claimed:
Robin Sage
Robin Sage
Obtained:
Robin Sage
Obtained:
The Real Robin Sage
Current Threats
“The past year’s IRS breaches are especially troubling. Taxpayer data was fraudulently accessed, not through a forcible compromise of the computer systems, but by hackers who correctly answered security questions that should have only been answerable by the actual individual.”
How to Protect Myself?
How to Protect Myself?
Self-Background Check
Self-Background Check
Preparation:
Self-Background Check
Placeholder Info:
John Williams
1212 Main Street
Houston, TX 77089
713-555-1234
Self-Background Check
Search yourself on Google:
Self-Background Check
Search yourself on Google:
Self-Background Check
Search yourself on Google:
Self-Background Check
Search yourself on Google:
Self-Background Check
Search yourself on Google:
Self-Background Check
Search yourself on Google:
Self-Background Check
Search yourself on Google:
Self-Background Check
Self-Background Check
Echosec: https://app.echosec.net/
Anonymous Communication
Mailing Address
Providing Disinformation:
Mailing Address
USPS PO Box
https://www.usps.com/manage/po-boxes.htm
you’ll need an email
(gmail.com)
Gmail (gmail.com)
(33mail.com)
(33mail.com)
Phone
Providing Disinformation:
Phone
(google.com/voice/)
Phone
(google.com/voice/)
Blur
(abine.com)
Social Networks
Social Networks
Databases and
People Search
Databases and People Search
https://inteltechniques.com/hfti.links.html
Chapter Eight: Personal Data Removal
Want More?
Want More?
https://security.utexas.edu/Protect-Your-Privates
Want More?
Want More?
Want More?
Takeaway
Email: security@utexas.edu