Upload
manhack
View
2.511
Download
1
Tags:
Embed Size (px)
DESCRIPTION
At the end of the last century, the European Parliament discovered that every kind of telecommunications were spied by the NSA. Since 911, security is often seen as terrorist tool, and our politicians forget what they intend to do when they discovered Echelon : we must regain our right to secure our telecommunications, and explain people how to do it.
Citation preview
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Counter-intelligence techniques to the use of honest people
Jean Marc Manach, Journalist
http://bugbrother.blog.lemonde.frhttp://bigbrotherawards.eu.orghttp://internetactu.net
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, back to 1999
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2000
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2001
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
And then, a little incident occured
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Never Forget 2 Say Anything
#Fail,but...
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
911, LSI/LSQ
All your base are belong to us,
'cause crypto is terrorism :All our logs are belong to us.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Internet is terrorism
The internet is full of/for porn,
& netizens are paedophiles,
too.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Little CNIL is watching you
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Securite-Informatique.gouv.fr=2008
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Information dominance + assurance
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
/b/ vs PEBKAC
[email protected], aka The Incident
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
mail.icio.us
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Spam spy spies
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
WTF ?!...
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
ANSSI (+ CDSE) + HFDS (2010)
+
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Rule n°1: do not use a computer
If, then :● do not use YOUR computer● use a blank computer● encrypt the disk● datas offshore (@home) & secured● refuse USB keys and other "gifts"
"Bon voyage"
Back @home : analyse and wipe the disk
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
RTFM
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Security vs democracy
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin
“Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude.
Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de
femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum
d’espace sans lequel il n’y a pas de véritable démocratie.“Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,
poste qu’il quitta pour devenir président de l’Assemblée Nationale.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
From Parents to Transparents
It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent."
One guards their privacy obsessively, while the other barely knows what privacy is.
La "vie privée", un problème de "vieux cons" ? vs
"Vie privée" : le point de vue des "petits cons"
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Thanks
http://internetactu.nethttp://bugbrother.blog.lemonde.fr
http://bigbrotherawards.eu.orghttp://twitter.com/manhack