Information Exposed: Opting Out & Managing the World of Connected Devices – Cynthia Hetherington & Amber Schroader

COVID-19 conspiracists, defund the police, and anti-government militia groups are increasingly organizing for a 21st Century Civil War on Telegram. Advocates of this worldview would sooner see law-abiding citizens, corporate leaders, and government personnel suffer than be subjected to another day of Western idealism, American justice, and democracy. Once the line of civil disobedience crosses over into crime, we are all at risk. Frontline first responders, security professionals, and intelligence officers support and recognize the right to assembly but choose to keep their families and homes off the grid and out of the hands of potentially dangerous actors. These antagonists would sooner show up on your doorstep and threaten your children, because you are a police officer or wealthy one percenter. Opting out of online personal data aggregates and managing the technology devices inside your home can reduce your and your clients’ risks.

As investigators, we need to understand the dark side of information sharing and the potential risks it brings to our clients. Employees and businesses are at greater risk now more than ever because fraudulent predators are taking advantage of those unfamiliar with working from home. Hacking, phishing, and scamming are on the rise, and the threats are expected to increase. Helping clients protect their personally identifiable information is a priority during these uncertain times. This session is meant to help facilitate your understanding of the dark side of information sharing and how to protect your and your clients’ personal privacy in a very open online world. There is no one solution, no one vendor, that has all the answers. Knowledge from this session will enable you to begin to remove, obstruct, or obscure the open source information that leaves you, your family, and your clients vulnerable online.

Learning Objectives:

  • Understand the dark side of information sharing.
  • Identify private lives and public information available through websites, social networks, and “Invisible Web” sources.
  • Discover ways to protect your privacy by implementing basic security practices online, at home, and on social media.

Return to Topics