Counterintelligence for the honest people

21
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010 Counter-intelligence techniques to the use of honest people Jean Marc Manach, Journalist http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://internetactu.net

description

At the end of the last century, the European Parliament discovered that every kind of telecommunications were spied by the NSA. Since 911, security is often seen as terrorist tool, and our politicians forget what they intend to do when they discovered Echelon : we must regain our right to secure our telecommunications, and explain people how to do it.

Transcript of Counterintelligence for the honest people

Page 1: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Counter-intelligence techniques to the use of honest people

Jean Marc Manach, Journalist

http://bugbrother.blog.lemonde.frhttp://bigbrotherawards.eu.orghttp://internetactu.net

Page 2: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Echelon, back to 1999

Page 3: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Echelon, in 2000

Page 4: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Echelon, in 2001

Page 5: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

And then, a little incident occured

Page 6: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Never Forget 2 Say Anything

#Fail,but...

Page 7: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

911, LSI/LSQ

All your base are belong to us,

'cause crypto is terrorism :All our logs are belong to us.

Page 8: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Internet is terrorism

The internet is full of/for porn,

& netizens are paedophiles,

too.

Page 9: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Little CNIL is watching you

Page 10: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Securite-Informatique.gouv.fr=2008

Page 11: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Information dominance + assurance

Page 12: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

/b/ vs PEBKAC

[email protected], aka The Incident

Page 13: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

mail.icio.us

Page 14: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Spam spy spies

Page 15: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

WTF ?!...

Page 16: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

ANSSI (+ CDSE) + HFDS (2010)

+

Page 17: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Rule n°1: do not use a computer

If, then :● do not use YOUR computer● use a blank computer● encrypt the disk● datas offshore (@home) & secured● refuse USB keys and other "gifts"

"Bon voyage"

Back @home : analyse and wipe the disk

Page 18: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

RTFM

Page 19: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Security vs democracy

They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.

Benjamin Franklin

“Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude.

Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de

femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum

d’espace sans lequel il n’y a pas de véritable démocratie.“Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,

poste qu’il quitta pour devenir président de l’Assemblée Nationale.

Page 20: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

From Parents to Transparents

It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent."

One guards their privacy obsessively, while the other barely knows what privacy is.

La "vie privée", un problème de "vieux cons" ? vs

"Vie privée" : le point de vue des "petits cons"

Page 21: Counterintelligence for the honest people

Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Thanks

http://internetactu.nethttp://bugbrother.blog.lemonde.fr

http://bigbrotherawards.eu.orghttp://twitter.com/manhack