Slide 1

Slide 1 text

SUBTITLE TEXT By Nickelodeon [All Rights Reserved], via Encyclopedia SpongeBob

Slide 2

Slide 2 text

SUBTITLE TEXT TOM PAULUS ENCRYPTION & BACKDOORS By National Security Agency [Public domain], via Wikimedia Commons

Slide 3

Slide 3 text

WHAT IS ENCRYPTION? By Unknown or not provided (U.S. National Archives and Records Administration) [Public domain], via Wikimedia Commons First 29 Navajo U.S. Marine Corps code-talker recruits being sworn in at Fort Wingate, NM.

Slide 4

Slide 4 text

By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedia Commons Simple Encryption :: The Caesar Cipher

Slide 5

Slide 5 text

By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedia Commons Simple Encryption :: The Caesar Cipher One tablespoon listening

Slide 6

Slide 6 text

By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedia Commons Simple Encryption :: The Caesar Cipher Bar gnoyrfcbba yvfgravat One tablespoon listening

Slide 7

Slide 7 text

THE PROBLEM: By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons Major Tech Companies are encrypting more and more customer data, but government agencies are requesting massive amounts of user data.

Slide 8

Slide 8 text

By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons “We have no idea what he said because those messages were encrypted. And to this day, I can’t tell you what those messages said with that terrorist 109 times the morning of that attack. That’s a big problem, and we have to grapple with it.” FBI Director James Comey speaking about a Terrorist attack in Garland, Texas at a Senate Judiciary Committee Meeting

Slide 9

Slide 9 text

THE CAUSE: By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons An increasing amount of communication takes place via Computer-mediated communication, much of which is secured by the service.

Slide 10

Slide 10 text

THE SOLUTION: By VGrigas (WMF) (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons Personally Protect your information and let your lawmakers know how you feel!

Slide 11

Slide 11 text

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 This is my signed message to you! -----BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.53 Comment: https://keybase.io/crypto wsFcBAABCgAGBQJXCW1oAAoJEF+LBtSPgDJaCFcP/jaew0OB7sa5vKTea7mXMAzA OoHHbzm775acWAOnxl/N9CvmGnNxCSak+xYhJVVxW1jTYqWyj9Ag+W6TOwBYZbvy YAHqh9ojudoNffPzSm2rHxb28U9DHNh7OJgiSY5sb9tmETvmFVXJwIhkmwZR1/j7 3mV2/ITyJP56z+lijo29wkUmvp7J8UTQFuKJKkYNe0mkyHOK26RT+iDl9MsiO89h arj5miMADSeNVzqVkH/umXRmXHsyyVpB/xTrht/6kjeIRlxh7DThgnw1LINOOtpv KGM1Q8uAush6b9PchZJNHJNAhPlo23qLDvLu9TJyr+AIv6AhOk6hXoFPfO0uV1IJ HSwjjmUHvjZV/QvsDOxhiIYREfGmEW81iu1eRNJ4jZc36t+MYcxom66RBuVXc/sD 6mkzKFYbaKtM8emXyiG163OZ4wYUCv2wkZP4LGYpIARFJt48RYszIY/2PpLPhHr7 TlaBwRabE6NJmihKVUfaCgEb6nlGczS3sgRm/2gkpNHlWdqUiz/odalGB1PuZJnr uVYIy6t4NYNgZWntBVlJm5YaQTMlSoVa23nr7t7ZM6cCcA9axl5RT+pgMjL9a4A2 vjRo9azLHV2ZQjMCrrESJjvB4ZPf9xFckUvdasG545QelcuYkBj2ju6794Trmyjm PXBvPTbOwuwBsXKa3gaL =EPyf -----END PGP SIGNATURE-----

Slide 12

Slide 12 text

By Paulo Barcellos Jr. [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons THANK YOU! Got Questions?
 Feel free to email me: [email protected]