SlideShare a Scribd company logo
Safe communication  for activists How to prepare an action safely without leaking information
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Drawbacks of advancing technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audio tapping without inside installed equipment SOURCE : BBC Website
Standby troubles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SOURCE : BBC Website
Evil cell phones ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conversation tapping ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Ardito case <<The government applied for a &quot;roving bug,&quot; that is, the interception of Ardito's conversations at locations that were &quot;not practical&quot; to specify, as authorized by 18 U.S.C. § 2518(11)(a). Judge Jones granted the application, authorizing continued interception at the four restaurants and the installation of a listening device in Ardito's cellular telephone. The device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.>> United States District Court, S.D. New York. UNITED STATES of America, v. John TOMERO, et al., Defendants. No. S2 06 Crim. 0008(LAK). Nov. 27, 2006. MEMORANDUM OPINION LEWIS A. KAPLAN, District Judge.
The Siemens patent  << ... This activates an emergency call routine. The emergency routine comprises the following steps, which are partially optional: 2. In case the mobile is switched off it may activate the mobile. In case or as soon as the mobile is switched on, a module for broadcasting over the emergency network, that may operate on frequencies distinct from those of the cellular communication network, is activated. This activation can be done optionally also regardless of the possibility to establish a connection to a cellular communication network.  ...>> http://www.wipo.int/pctdb/en/wo.jsp?IA=EP2002012292&DISPLAY=DESC
Software ”roving bugs” << Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. &quot;They can be remotely accessed and made to transmit room audio all the time,&quot; he said. &quot;You can do that without having physical access to the phone.&quot; >> http://news.zdnet.com/2100-1035_22-150467.html
Network mapping with cell phones ,[object Object],[object Object],[object Object],[object Object],[object Object]
Your cellphone reveils your location ,[object Object],[object Object],[object Object],[object Object]
DIY-ers : beware of pitfalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cell phone guideluines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE ENCODING PROCESS IS   REVERSIBLE IF SOMEONE KNOWS THE CODE SHE / HE CAN DECRYPT
Symmetric encryption ,[object Object],[object Object],[object Object],SARA TOM THE  EVIL INTERNET
Sara sends an email to Tom with asymmetric encryption ,[object Object],[object Object],SARA TOM THE EVIL INTERNET PUBLIC KEY PRIVATE KEY
Now wait a minute ! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A bit of mathematics  (two slides only – don't run away ... yet) ‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encrypting the message ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PGP : pretty good privacy ,[object Object],[object Object],[object Object],[object Object]
Getting PGP to work on your computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pgp functionality in Thunderbird
Thunderbid after installation plugin ,[object Object],[object Object]
Pgp Preferences
Account settings
Some considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PGP : concluding remarks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use safe passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Easy to remember and difficult to crack passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Viewers also liked (10)

Music around us
Music around usMusic around us
Music around us
 
Rio
RioRio
Rio
 
Sulfun miin
Sulfun miinSulfun miin
Sulfun miin
 
motivation-
motivation-motivation-
motivation-
 
Thermal
ThermalThermal
Thermal
 
Sulfun
SulfunSulfun
Sulfun
 
Worklife balance english
Worklife balance englishWorklife balance english
Worklife balance english
 
Optical fibre testing mahendra singh
Optical fibre testing mahendra singhOptical fibre testing mahendra singh
Optical fibre testing mahendra singh
 
PIPESIM PROJECT_2012
PIPESIM PROJECT_2012PIPESIM PROJECT_2012
PIPESIM PROJECT_2012
 
microwave_antenna
microwave_antennamicrowave_antenna
microwave_antenna
 

Similar to Veilig communiceren power point presentatie

Intercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT HackingIntercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT Hacking📡 Sebastien Dudek
 
2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)Felipe Prado
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Mattia Brunetti
 
2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)Felipe Prado
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
The Pied Piper
The Pied PiperThe Pied Piper
The Pied PiperAodrulez
 
Smart DoorLock System using DTMF
Smart DoorLock System using DTMFSmart DoorLock System using DTMF
Smart DoorLock System using DTMFBirinchi Medhi
 
Smart Door Lock System Using DTMF
Smart Door Lock System Using DTMFSmart Door Lock System Using DTMF
Smart Door Lock System Using DTMFBirinchi Medhi
 
Hack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hackingHack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hacking📡 Sebastien Dudek
 
Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguideMaxis Fibre
 
Viet nam security home_report project
Viet nam security home_report projectViet nam security home_report project
Viet nam security home_report projectktvinh
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Escene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manualEscene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manualEmre Ozcan
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???trendy updates
 
Sagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User GuideSagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User GuideTelephones Online
 

Similar to Veilig communiceren power point presentatie (20)

Intercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT HackingIntercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT Hacking
 
2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!
 
2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
33c3 - 2G and 3G intercom attacks
33c3 - 2G and 3G intercom attacks33c3 - 2G and 3G intercom attacks
33c3 - 2G and 3G intercom attacks
 
The Pied Piper
The Pied PiperThe Pied Piper
The Pied Piper
 
Smart DoorLock System using DTMF
Smart DoorLock System using DTMFSmart DoorLock System using DTMF
Smart DoorLock System using DTMF
 
Smart Door Lock System Using DTMF
Smart Door Lock System Using DTMFSmart Door Lock System Using DTMF
Smart Door Lock System Using DTMF
 
Hack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hackingHack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hacking
 
Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguide
 
Viet nam security home_report project
Viet nam security home_report projectViet nam security home_report project
Viet nam security home_report project
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Escene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manualEscene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manual
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Sagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User GuideSagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User Guide
 
Clonning
ClonningClonning
Clonning
 

Recently uploaded

UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureChandrakantDivate1
 
Youth Empowerment - Supporting the Next Generation of Changemakers.pdf
Youth Empowerment - Supporting the Next Generation of Changemakers.pdfYouth Empowerment - Supporting the Next Generation of Changemakers.pdf
Youth Empowerment - Supporting the Next Generation of Changemakers.pdfThe Mohua Show
 
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...Abhinav Gaur Kaptaan
 
Welcomer Meeting to achieve the target ..
Welcomer Meeting to achieve the target ..Welcomer Meeting to achieve the target ..
Welcomer Meeting to achieve the target ..dinnadina496
 
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTssuser8d5e2d1
 
What Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxWhat Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxLloyd Dobson Artist
 

Recently uploaded (6)

UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
 
Youth Empowerment - Supporting the Next Generation of Changemakers.pdf
Youth Empowerment - Supporting the Next Generation of Changemakers.pdfYouth Empowerment - Supporting the Next Generation of Changemakers.pdf
Youth Empowerment - Supporting the Next Generation of Changemakers.pdf
 
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
 
Welcomer Meeting to achieve the target ..
Welcomer Meeting to achieve the target ..Welcomer Meeting to achieve the target ..
Welcomer Meeting to achieve the target ..
 
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
 
What Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxWhat Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptx
 

Veilig communiceren power point presentatie

  • 1. Safe communication for activists How to prepare an action safely without leaking information
  • 2.
  • 3.
  • 4. Audio tapping without inside installed equipment SOURCE : BBC Website
  • 5.
  • 6.
  • 7.
  • 8. The Ardito case <<The government applied for a &quot;roving bug,&quot; that is, the interception of Ardito's conversations at locations that were &quot;not practical&quot; to specify, as authorized by 18 U.S.C. § 2518(11)(a). Judge Jones granted the application, authorizing continued interception at the four restaurants and the installation of a listening device in Ardito's cellular telephone. The device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.>> United States District Court, S.D. New York. UNITED STATES of America, v. John TOMERO, et al., Defendants. No. S2 06 Crim. 0008(LAK). Nov. 27, 2006. MEMORANDUM OPINION LEWIS A. KAPLAN, District Judge.
  • 9. The Siemens patent << ... This activates an emergency call routine. The emergency routine comprises the following steps, which are partially optional: 2. In case the mobile is switched off it may activate the mobile. In case or as soon as the mobile is switched on, a module for broadcasting over the emergency network, that may operate on frequencies distinct from those of the cellular communication network, is activated. This activation can be done optionally also regardless of the possibility to establish a connection to a cellular communication network. ...>> http://www.wipo.int/pctdb/en/wo.jsp?IA=EP2002012292&DISPLAY=DESC
  • 10. Software ”roving bugs” << Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. &quot;They can be remotely accessed and made to transmit room audio all the time,&quot; he said. &quot;You can do that without having physical access to the phone.&quot; >> http://news.zdnet.com/2100-1035_22-150467.html
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Pgp functionality in Thunderbird
  • 25.
  • 28.
  • 29.
  • 30.
  • 31.