Counter-intelligence techniques to the use of honest people




Jean Marc Manach, Journalist

http://bugbrother.blog.lemonde.fr
http://bigbrotherawards.eu.org
http://internetactu.net




                   Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, back to 1999




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2000




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2001




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
And then, a little incident occured




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Never Forget 2 Say Anything


                  #Fail,
                  but...




       Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
911, LSI/LSQ



                          All your base
                          are belong to us,
                 'cause crypto is terrorism :
                          All our logs
                          are belong to us.



Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Internet is terrorism
                                                The internet
                                           is full of/for porn,
                                             & netizens are
                                                paedophiles,
                                                           too.




   Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Little CNIL is watching you




      Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Securite-Informatique.gouv.fr=2008




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Information dominance + assurance




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
/b/ vs PEBKAC




gov.palin@yahoo.com, aka The Incident




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
mail.icio.us




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Spam spy spies




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
WTF ?!...




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
ANSSI (+ CDSE) + HFDS (2010)




                           +




        Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Rule n°1: do not use a computer
If, then :
● do not use YOUR computer

● use a blank computer

● encrypt the disk

● datas offshore (@home) & secured

● refuse USB keys and other "gifts"




                                                               "Bon voyage"

Back @home : analyse and wipe the disk

               Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
RTFM




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Security vs democracy

           They who can give up essential liberty to obtain a little
              temporary safety, deserve neither liberty nor safety.
                                                                 Benjamin Franklin

         “Dans une démocratie, je considère qu’il est nécessaire
                  que subsiste un espace de possibilité de fraude.
      Si l’on n’avait pas pu fabriquer de fausses cartes d’identité
     pendant la guerre, des dizaines de milliers d’hommes et de
       femmes auraient été arrêtés, déportés, sans doute morts.
               J’ai toujours été partisan de préserver de minimum
       d’espace sans lequel il n’y a pas de véritable démocratie.“
         Raymond Forni, considéré comme le “père inspiré de la loi Informatique
          et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,
                poste qu’il quitta pour devenir président de l’Assemblée Nationale.




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
From Parents to Transparents


    It's the biggest generation split in decades
"Generation Parent" vs. "Generation Transparent."
       One guards their privacy obsessively,
  while the other barely knows what privacy is.


 La "vie privée", un problème de "vieux cons" ?
                         vs
 "Vie privée" : le point de vue des "petits cons"


               Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Thanks




       http://internetactu.net
http://bugbrother.blog.lemonde.fr
 http://bigbrotherawards.eu.org
    http://twitter.com/manhack
       Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Counterintelligence for the honest people

  • 1.
    Counter-intelligence techniques tothe use of honest people Jean Marc Manach, Journalist http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://internetactu.net Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 2.
    Echelon, back to1999 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 3.
    Echelon, in 2000 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 4.
    Echelon, in 2001 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 5.
    And then, alittle incident occured Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 6.
    Never Forget 2Say Anything #Fail, but... Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 7.
    911, LSI/LSQ All your base are belong to us, 'cause crypto is terrorism : All our logs are belong to us. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 8.
    Internet is terrorism The internet is full of/for porn, & netizens are paedophiles, too. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 9.
    Little CNIL iswatching you Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 10.
    Securite-Informatique.gouv.fr=2008 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 11.
    Information dominance +assurance Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 12.
    /b/ vs PEBKAC gov.palin@yahoo.com,aka The Incident Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 13.
    mail.icio.us Counter-intelligence techniques tothe use of honest people - JMManach IAWACS 2010
  • 14.
    Spam spy spies Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 15.
    WTF ?!... Counter-intelligence techniquesto the use of honest people - JMManach IAWACS 2010
  • 16.
    ANSSI (+ CDSE)+ HFDS (2010) + Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 17.
    Rule n°1: donot use a computer If, then : ● do not use YOUR computer ● use a blank computer ● encrypt the disk ● datas offshore (@home) & secured ● refuse USB keys and other "gifts" "Bon voyage" Back @home : analyse and wipe the disk Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 18.
    RTFM Counter-intelligence techniques tothe use of honest people - JMManach IAWACS 2010
  • 19.
    Security vs democracy They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin “Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude. Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum d’espace sans lequel il n’y a pas de véritable démocratie.“ Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000, poste qu’il quitta pour devenir président de l’Assemblée Nationale. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 20.
    From Parents toTransparents It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent." One guards their privacy obsessively, while the other barely knows what privacy is. La "vie privée", un problème de "vieux cons" ? vs "Vie privée" : le point de vue des "petits cons" Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 21.
    Thanks http://internetactu.net http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://twitter.com/manhack Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010