This is a review of recently leaked documents that detail state-actors surveillance technologies. In the presentation I provide easy to implement actionable methods to detect state actor surveillance, and steps you can take to defend against them.
(short version)
18. Conclusions
●
Bugs are detectable
Many are based on attacks covered in Hacker cons
●
Hard evidence is better than Hearsay
I want to hear from the first person who finds one!
●
Tin-Foil hats are not stylish
19. Further Reading & Sources
●
Michael Ossmann (ossmann.blogspot.com)
●
Bruce Shneier (www.schneier.com)
●
http://leaksource.files.wordpress.com
●
http://PrivacyTechJournal.com
Harass me on twitter: @iamlei
Editor's Notes
I've been part of the hacker 'scene' for the majority of my life now, I present a lot about security, and care a lot about civil rights, here is where the two intersect
I don't take well to hearsay arguments (e.g.. someone saying “this is how it is!” without evidence)
I really care about government spying, after my experience at a young age with a FBI visit to my house (that was a scare n' care, abusing the patriot act) I care more now, after holding a job where I regularly addressed inquiries (subpoena/warrants) from intelligence agencies.
Appelbaum made a big stink at 30c3. Lots of talk about what they were using, but nothing about what to do... so this is the missing part of that talk.
Released a 'catalog' of tools/bugs intelligence agencies could buy for surveillance needs.
I will cover the 'how to detect', and where possible 'how to defend' against these surveillance bugs.
I will hope I get bugged myself, more than deal with some crazy plot (don-pope-tinefoil-hat)