counterintelligence for the honest people

Post on 27-Jun-2015

2.511 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

At the end of the last century, the European Parliament discovered that every kind of telecommunications were spied by the NSA. Since 911, security is often seen as terrorist tool, and our politicians forget what they intend to do when they discovered Echelon : we must regain our right to secure our telecommunications, and explain people how to do it.

TRANSCRIPT

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Counter-intelligence techniques to the use of honest people

Jean Marc Manach, Journalist

http://bugbrother.blog.lemonde.frhttp://bigbrotherawards.eu.orghttp://internetactu.net

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Echelon, back to 1999

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Echelon, in 2000

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Echelon, in 2001

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

And then, a little incident occured

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Never Forget 2 Say Anything

#Fail,but...

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

911, LSI/LSQ

All your base are belong to us,

'cause crypto is terrorism :All our logs are belong to us.

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Internet is terrorism

The internet is full of/for porn,

& netizens are paedophiles,

too.

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Little CNIL is watching you

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Securite-Informatique.gouv.fr=2008

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Information dominance + assurance

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

/b/ vs PEBKAC

gov.palin@yahoo.com, aka The Incident

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

mail.icio.us

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Spam spy spies

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

WTF ?!...

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

ANSSI (+ CDSE) + HFDS (2010)

+

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Rule n°1: do not use a computer

If, then :● do not use YOUR computer● use a blank computer● encrypt the disk● datas offshore (@home) & secured● refuse USB keys and other "gifts"

"Bon voyage"

Back @home : analyse and wipe the disk

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

RTFM

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Security vs democracy

They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.

Benjamin Franklin

“Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude.

Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de

femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum

d’espace sans lequel il n’y a pas de véritable démocratie.“Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,

poste qu’il quitta pour devenir président de l’Assemblée Nationale.

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

From Parents to Transparents

It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent."

One guards their privacy obsessively, while the other barely knows what privacy is.

La "vie privée", un problème de "vieux cons" ? vs

"Vie privée" : le point de vue des "petits cons"

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Thanks

http://internetactu.nethttp://bugbrother.blog.lemonde.fr

http://bigbrotherawards.eu.orghttp://twitter.com/manhack

top related