SlideShare a Scribd company logo
Counter-intelligence techniques to the use of honest people




Jean Marc Manach, Journalist

http://bugbrother.blog.lemonde.fr
http://bigbrotherawards.eu.org
http://internetactu.net




                   Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, back to 1999




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2000




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2001




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
And then, a little incident occured




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Never Forget 2 Say Anything


                  #Fail,
                  but...




       Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
911, LSI/LSQ



                          All your base
                          are belong to us,
                 'cause crypto is terrorism :
                          All our logs
                          are belong to us.



Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Internet is terrorism
                                                The internet
                                           is full of/for porn,
                                             & netizens are
                                                paedophiles,
                                                           too.




   Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Little CNIL is watching you




      Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Securite-Informatique.gouv.fr=2008




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Information dominance + assurance




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
/b/ vs PEBKAC




gov.palin@yahoo.com, aka The Incident




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
mail.icio.us




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Spam spy spies




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
WTF ?!...




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
ANSSI (+ CDSE) + HFDS (2010)




                           +




        Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Rule n°1: do not use a computer
If, then :
● do not use YOUR computer

● use a blank computer

● encrypt the disk

● datas offshore (@home) & secured

● refuse USB keys and other "gifts"




                                                               "Bon voyage"

Back @home : analyse and wipe the disk

               Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
RTFM




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Security vs democracy

           They who can give up essential liberty to obtain a little
              temporary safety, deserve neither liberty nor safety.
                                                                 Benjamin Franklin

         “Dans une démocratie, je considère qu’il est nécessaire
                  que subsiste un espace de possibilité de fraude.
      Si l’on n’avait pas pu fabriquer de fausses cartes d’identité
     pendant la guerre, des dizaines de milliers d’hommes et de
       femmes auraient été arrêtés, déportés, sans doute morts.
               J’ai toujours été partisan de préserver de minimum
       d’espace sans lequel il n’y a pas de véritable démocratie.“
         Raymond Forni, considéré comme le “père inspiré de la loi Informatique
          et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,
                poste qu’il quitta pour devenir président de l’Assemblée Nationale.




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
From Parents to Transparents


    It's the biggest generation split in decades
"Generation Parent" vs. "Generation Transparent."
       One guards their privacy obsessively,
  while the other barely knows what privacy is.


 La "vie privée", un problème de "vieux cons" ?
                         vs
 "Vie privée" : le point de vue des "petits cons"


               Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Thanks




       http://internetactu.net
http://bugbrother.blog.lemonde.fr
 http://bigbrotherawards.eu.org
    http://twitter.com/manhack
       Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

More Related Content

Viewers also liked

Stratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapesStratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapesMer Joyce
 
Darknet
DarknetDarknet
Darknet
tchou21
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentation
NewMediaActivism
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
Welmoed Verhagen
 
Social media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagementSocial media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagement
Matthew J. Kushin, Ph.D.
 
Anonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasminAnonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasmincsn2012
 
Gérez sa vie privée et sa sécurité sur internet
Gérez sa vie privée et sa sécurité sur internetGérez sa vie privée et sa sécurité sur internet
Gérez sa vie privée et sa sécurité sur internet
MEMOIRE PATRIMOINE CLOHARS CARNOET
 
Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?
manhack
 
Gérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privéeGérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privée
Coraia
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
SlideShare
 

Viewers also liked (10)

Stratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapesStratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapes
 
Darknet
DarknetDarknet
Darknet
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentation
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
 
Social media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagementSocial media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagement
 
Anonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasminAnonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasmin
 
Gérez sa vie privée et sa sécurité sur internet
Gérez sa vie privée et sa sécurité sur internetGérez sa vie privée et sa sécurité sur internet
Gérez sa vie privée et sa sécurité sur internet
 
Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?
 
Gérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privéeGérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privée
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Counterintelligence for the honest people

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
n|u - The Open Security Community
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
Hackito Ergo Sum
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
meritnorthwest
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
University of Hertfordshire
 
Cyber Crime
Cyber CrimeCyber Crime
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
John Mancini
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Tejasvi Bhatia
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
null - The Open Security Community
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)
Maelström
 
News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
n|u - The Open Security Community
 
AI Trust and Safeguards
AI Trust and SafeguardsAI Trust and Safeguards
AI Trust and Safeguards
University of Hertfordshire
 
The Rise of Techplomacy
The Rise of TechplomacyThe Rise of Techplomacy
The Rise of Techplomacy
Dominique Mangiatordi
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
Murray Security Services
 
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaMediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
DeSmart Agile Software House
 

Similar to Counterintelligence for the honest people (20)

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)
 
News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
 
AI Trust and Safeguards
AI Trust and SafeguardsAI Trust and Safeguards
AI Trust and Safeguards
 
The Rise of Techplomacy
The Rise of TechplomacyThe Rise of Techplomacy
The Rise of Techplomacy
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaMediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
 

Recently uploaded

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

Counterintelligence for the honest people

  • 1. Counter-intelligence techniques to the use of honest people Jean Marc Manach, Journalist http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://internetactu.net Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 2. Echelon, back to 1999 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 3. Echelon, in 2000 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 4. Echelon, in 2001 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 5. And then, a little incident occured Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 6. Never Forget 2 Say Anything #Fail, but... Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 7. 911, LSI/LSQ All your base are belong to us, 'cause crypto is terrorism : All our logs are belong to us. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 8. Internet is terrorism The internet is full of/for porn, & netizens are paedophiles, too. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 9. Little CNIL is watching you Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 10. Securite-Informatique.gouv.fr=2008 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 11. Information dominance + assurance Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 12. /b/ vs PEBKAC gov.palin@yahoo.com, aka The Incident Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 13. mail.icio.us Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 14. Spam spy spies Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 15. WTF ?!... Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 16. ANSSI (+ CDSE) + HFDS (2010) + Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 17. Rule n°1: do not use a computer If, then : ● do not use YOUR computer ● use a blank computer ● encrypt the disk ● datas offshore (@home) & secured ● refuse USB keys and other "gifts" "Bon voyage" Back @home : analyse and wipe the disk Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 18. RTFM Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 19. Security vs democracy They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin “Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude. Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum d’espace sans lequel il n’y a pas de véritable démocratie.“ Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000, poste qu’il quitta pour devenir président de l’Assemblée Nationale. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 20. From Parents to Transparents It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent." One guards their privacy obsessively, while the other barely knows what privacy is. La "vie privée", un problème de "vieux cons" ? vs "Vie privée" : le point de vue des "petits cons" Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 21. Thanks http://internetactu.net http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://twitter.com/manhack Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010