How to Respond to Cops Who Want Your Passwords
Offered By: BSidesLV via YouTube
Course Description
Overview
Learn how to protect your digital privacy rights when law enforcement requests access to your passwords in this informative conference talk from BSidesLV 2017. Explore various threat models, understand your rights at border crossings, and discover best practices for handling encounters with authorities. Gain insights into the Fifth Amendment privilege, data retention policies, and practical strategies for safeguarding your personal information. Examine real-world examples and consider important factors when deciding how to respond to law enforcement requests. Equip yourself with knowledge on using burner phones, interpreting warrants, and exercising your right to remain silent in potentially challenging situations.
Syllabus
Introduction
Do I Have To
Threat Model
Examples
What To Consider
Your Threat Model
Decision Time
Threat Models
Rights At The Border
All Devices Must Be Fully Charged
Can I Bring A Burner Phone
Burner Phones
If the agent is savvy
Best practices
Look at the warrant
Stay silent
Fifth Amendment privilege
Questions
Data Retention
Taught by
BSidesLV
Related Courses
Early Detection through DeceptionYouTube Hack for Show, Report for Dough - Brian King
YouTube Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube Windows Event Logs - Zero to Hero
YouTube Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube