counterintelligence for the honest people
Post on 27-Jun-2015
2.511 Views
Preview:
DESCRIPTION
TRANSCRIPT
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Counter-intelligence techniques to the use of honest people
Jean Marc Manach, Journalist
http://bugbrother.blog.lemonde.frhttp://bigbrotherawards.eu.orghttp://internetactu.net
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, back to 1999
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2000
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2001
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
And then, a little incident occured
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Never Forget 2 Say Anything
#Fail,but...
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
911, LSI/LSQ
All your base are belong to us,
'cause crypto is terrorism :All our logs are belong to us.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Internet is terrorism
The internet is full of/for porn,
& netizens are paedophiles,
too.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Little CNIL is watching you
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Securite-Informatique.gouv.fr=2008
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Information dominance + assurance
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
/b/ vs PEBKAC
gov.palin@yahoo.com, aka The Incident
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
mail.icio.us
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Spam spy spies
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
WTF ?!...
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
ANSSI (+ CDSE) + HFDS (2010)
+
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Rule n°1: do not use a computer
If, then :● do not use YOUR computer● use a blank computer● encrypt the disk● datas offshore (@home) & secured● refuse USB keys and other "gifts"
"Bon voyage"
Back @home : analyse and wipe the disk
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
RTFM
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Security vs democracy
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin
“Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude.
Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de
femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum
d’espace sans lequel il n’y a pas de véritable démocratie.“Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,
poste qu’il quitta pour devenir président de l’Assemblée Nationale.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
From Parents to Transparents
It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent."
One guards their privacy obsessively, while the other barely knows what privacy is.
La "vie privée", un problème de "vieux cons" ? vs
"Vie privée" : le point de vue des "petits cons"
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Thanks
http://internetactu.nethttp://bugbrother.blog.lemonde.fr
http://bigbrotherawards.eu.orghttp://twitter.com/manhack
top related