Counter-intelligence techniques to the use of honest people




Jean Marc Manach, Journalist

http://bugbrother.blog.lemon...
Echelon, back to 1999




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2000




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2001




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
And then, a little incident occured




          Counter-intelligence techniques to the use of honest people - JMManach I...
Never Forget 2 Say Anything


                  #Fail,
                  but...




       Counter-intelligence techniques...
911, LSI/LSQ



                          All your base
                          are belong to us,
                 'caus...
Internet is terrorism
                                                The internet
                                       ...
Little CNIL is watching you




      Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Securite-Informatique.gouv.fr=2008




          Counter-intelligence techniques to the use of honest people - JMManach IA...
Information dominance + assurance




          Counter-intelligence techniques to the use of honest people - JMManach IAW...
/b/ vs PEBKAC




gov.palin@yahoo.com, aka The Incident




    Counter-intelligence techniques to the use of honest peopl...
mail.icio.us




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Spam spy spies




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
WTF ?!...




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
ANSSI (+ CDSE) + HFDS (2010)




                           +




        Counter-intelligence techniques to the use of ho...
Rule n°1: do not use a computer
If, then :
● do not use YOUR computer

● use a blank computer

● encrypt the disk

● datas...
RTFM




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Security vs democracy

           They who can give up essential liberty to obtain a little
              temporary safety...
From Parents to Transparents


    It's the biggest generation split in decades
"Generation Parent" vs. "Generation Transp...
Thanks




       http://internetactu.net
http://bugbrother.blog.lemonde.fr
 http://bigbrotherawards.eu.org
    http://twi...
Upcoming SlideShare
Loading in...5
×

Counterintelligence for the honest people

2,501

Published on

At the end of the last century, the European Parliament discovered that every kind of telecommunications were spied by the NSA. Since 911, security is often seen as terrorist tool, and our politicians forget what they intend to do when they discovered Echelon : we must regain our right to secure our telecommunications, and explain people how to do it.

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Psychic Counterintelligence Agent Going Public:
    Cointelpro linked with organized crime

    It was at MIT, they set me up with a job and a dorm room for the summer in 1971. I never found out who arranged this, but they obviously wanted a murder solved. Karen and I are telepathic, and she had me get in the habit of riding my bike around the esplanade, starting at the stairs leading down from the Boston University bridge. On a Saturday night around midnight in early June, I met some people at the stairs, they were also investigating the murder; they said someone had a gun and I should go find a cop. That took me fifteen minutes, and he wouldn't investigate. I decided to forget the whole thing and went home. The next morning at six I found the body, she was sitting up with a stocking tied around her neck to a bench. I called the police, and told them I didn't want to be involved any further. The cop said he thought I was much more involved.

    That summer I had been sent to the Russian recruiter to see if I could become a KGB agent. He asked about my political affiliation to the international democracy movement, and said I couldn't. Then I was sent to meet the FBI by two organized crime linked professors, at two on July 27. It was about if I had been raped and was resisting hypnosis. They used scopolamine and a polygraph to break down my resistance, and I and all my girlfriends got raped and knew it. I’m demanding damages. I think these cointelpro agents were liquidated for treason by military intelligence. And they had me investigate the communists. In 1977, the communists at MIT and Harvard did what they called the split brain experiment on me; my boss pushed a pressure point on my spinal column, which lowered my resistance to their hypnosis. I thought they'd get caught doing this. By February 1979, I completely lost control of my mind and spent the next 24 years living on the street. And finally, in 1985, I was reading the Boston Globe about a murderer who had gotten out of prison for a murder in 1971 at the Boston University boat house. See www.masscases.com/cases/sjc/385/385mass497.html

    In 1969 I had been recruited to be a shadow telepathic agent of the NSA. To read about these people see www.acsa.net/paranormal_agents_at_the_nsa_by.htm; my web site on this is www.agentcounterspy.com. They sent me on a mission to MIT to solve this case. The news article said that the body had been found with a lot of blood under the Boston University boat house, and that the “murderer” had been caught on an anonymous tip leading to a bloody diner jacket found in a church. I think this “murderer” was the guy who told me to go find a cop. The body I found was probably an investigator for the murder. Lark Elaine Turner might have been there also, investigating. As I understand it, decades later, the motive was to blow the cover of the counterintelligence agents to the criminals taking over the government by mass hypnosis, after the Kennedy assassination. But this played into our strong suit, who are they anyhow if they're blowing the cover of counterintelligence; they'de have to be the spies.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
2,501
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
24
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Counterintelligence for the honest people

  1. 1. Counter-intelligence techniques to the use of honest people Jean Marc Manach, Journalist http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://internetactu.net Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  2. 2. Echelon, back to 1999 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  3. 3. Echelon, in 2000 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  4. 4. Echelon, in 2001 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  5. 5. And then, a little incident occured Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  6. 6. Never Forget 2 Say Anything #Fail, but... Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  7. 7. 911, LSI/LSQ All your base are belong to us, 'cause crypto is terrorism : All our logs are belong to us. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  8. 8. Internet is terrorism The internet is full of/for porn, & netizens are paedophiles, too. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  9. 9. Little CNIL is watching you Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  10. 10. Securite-Informatique.gouv.fr=2008 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  11. 11. Information dominance + assurance Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  12. 12. /b/ vs PEBKAC gov.palin@yahoo.com, aka The Incident Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  13. 13. mail.icio.us Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  14. 14. Spam spy spies Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  15. 15. WTF ?!... Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  16. 16. ANSSI (+ CDSE) + HFDS (2010) + Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  17. 17. Rule n°1: do not use a computer If, then : ● do not use YOUR computer ● use a blank computer ● encrypt the disk ● datas offshore (@home) & secured ● refuse USB keys and other "gifts" "Bon voyage" Back @home : analyse and wipe the disk Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  18. 18. RTFM Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  19. 19. Security vs democracy They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin “Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude. Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum d’espace sans lequel il n’y a pas de véritable démocratie.“ Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000, poste qu’il quitta pour devenir président de l’Assemblée Nationale. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  20. 20. From Parents to Transparents It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent." One guards their privacy obsessively, while the other barely knows what privacy is. La "vie privée", un problème de "vieux cons" ? vs "Vie privée" : le point de vue des "petits cons" Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  21. 21. Thanks http://internetactu.net http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://twitter.com/manhack Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×