Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Pre-teens using metadata found a whistleblower in two hours


  • Please log in to reply
4 replies to this topic

#1 Condobloke

Condobloke

    Outback Aussie @ 54.2101 N, 0.2906 W


  • Members
  • 5,937 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:05:13 PM

Posted 12 December 2016 - 04:29 PM

http://www.abc.net.au/triplej/programs/hack/how-team-of-pre-teens-found-whisteblower-using-metadata/8113668

 

 

 

How pre-teens using metadata found a whistleblower in two hours

 

Yes.....primary School Students...(generally 12 and under)

 

 

Team Sherlock began the scenario with one clue: the leaked documents about fracking chemicals had been sent to anna@minewatch.org.au.

 

With access to the kind of metadata that has been retained and made available to Australian government agencies for the past year, the team of three primary school students were then able to track down the mock corporate whistleblower in two hours.

 

They were part of a 'cyber fox hunt' co-hosted by University of Melbourne to explore how Australia's 2015 metadata laws affect our privacy.

 

In the scenario, twelve teams used software to filter through a database of mobile, internet and location metadata.

 

All but one team tracked down the home address of the whistleblower, and the winning team took just one hour.

 

 

Step One: Search Google for suspicious searches

 

Step Two: Link the IP address with an email address

 

Step Three: Use email address to access address and phone number

 

Step Four: Use phone number to get a recent location

 

Step Five: Find out who else has contacted the journalist

 

 

Gen, the 12-year-old from Team Sherlock, said she had expected it would be harder to find the whistleblower.

 

"It's interesting how easy it is to find small pieces of data, and then linking them you can find out so much about a person."

 

Her brother, Miles, 10, said that it was fun and his team beat half the adults.

 

The Snitch Hunt is co-sponsored by partners ThoughtWorks, CryptoParty Sydney, the Platypus Initiative, Hack for Privacy, Blueprint for Free Speech, Digital Rights Watch and Electronic Frontiers Australia.


Condobloke ...Outback Australian  

 

fed up with Windows antics...??....LINUX IS THE ANSWER....I USE LINUX MINT 18.3  EXCLUSIVELY.

“A man travels the world in search of what he needs and returns home to find it."

It has been said that time heals all wounds. I don't agree. The wounds remain. Time - the mind, protecting its sanity - covers them with some scar tissue and the pain lessens, but it is never gone. Rose Kennedy


BC AdBot (Login to Remove)

 


#2 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:12:13 AM

Posted 12 December 2016 - 04:59 PM

Those little pictures on facebook are not safe either.

 

and seriously, if a bunch of 12 year olds can effectively use metadata, then something is wrong, metadata is in everything, pictures, videos, text files, you name it, there are different way of accessing metadata, most SKids on NTFS OS's use exiftool which isn't very reliable (in windows)


Edited by Viper_Security, 12 December 2016 - 05:04 PM.

    IT Auditor & Security Professional

hQBT2G3.png


#3 shadow_647

shadow_647

  • Banned
  • 1,430 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:13 PM

Posted 12 December 2016 - 05:25 PM

Just one more reason why we should all be trying to protect our self's vs privacy invasion, iv read so much on topics like this i just don't know what to say anymore.

Makes me wonder why anyone is using winspy10 metadata monster or anything that tries to farm your computer for data, are people not getting the picture yet ?



#4 rp88

rp88

  • Members
  • 3,014 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:07:13 AM

Posted 16 December 2016 - 12:07 PM

In this scenario of theirs had the whistleblower used anything to try to protect himself? Tor? encryption of any kind? And in those 5 steps, who were they finding info about? the journalist and then going through everything sent to him until they isolated the whisteblower?
Back on this site, for a while anyway, been so busy the last year.

My systems:2 laptops, intel i3 processors, windows 8.1 installed on the hard-drive and linux mint 17.3 MATE installed to USB

#5 Condobloke

Condobloke

    Outback Aussie @ 54.2101 N, 0.2906 W

  • Topic Starter

  • Members
  • 5,937 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:05:13 PM

Posted 17 December 2016 - 01:03 AM

@ rp88......Snitch Hunt

 

Did you know that service providers have to retain your metadata for two years in Australia?

 

The data that is being collected includes IP addresses, email addresses, phone numbers, and location data.

 

Although these individual datasets already reveal a lot of your online presence, the real deal is data correlation.

 

Once an experienced analyst begins correlating the different datasets, your activities throughout the day can be reconstructed.

Today, you will be in the shoes of a data analyst working for the federal police.

 

You will need to dig into, correlate and pivot on the various metadata sets to catch a whistleblower.

 

 

bigdata.jpg

Read the following carefully! We hid hints and other relevant information that you will need to complete the tasks. Good luck!


Condobloke ...Outback Australian  

 

fed up with Windows antics...??....LINUX IS THE ANSWER....I USE LINUX MINT 18.3  EXCLUSIVELY.

“A man travels the world in search of what he needs and returns home to find it."

It has been said that time heals all wounds. I don't agree. The wounds remain. Time - the mind, protecting its sanity - covers them with some scar tissue and the pain lessens, but it is never gone. Rose Kennedy





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users