Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010 Counter-intelligence techniques to the use of honest people Jean Marc Manach, Journalist http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://internetactu.net
At the end of the last century, the European Parliament discovered that every kind of telecommunications were spied by the NSA. Since 911, security is often seen as terrorist tool, and our politicians forget what they intend to do when they discovered Echelon : we must regain our right to secure our telecommunications, and explain people how to do it.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Counter-intelligence techniques to the use of honest people
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
mail.icio.us
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Spam spy spies
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
WTF ?!...
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
ANSSI (+ CDSE) + HFDS (2010)
+
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Rule n°1: do not use a computer
If, then :● do not use YOUR computer● use a blank computer● encrypt the disk● datas offshore (@home) & secured● refuse USB keys and other "gifts"
"Bon voyage"
Back @home : analyse and wipe the disk
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
RTFM
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Security vs democracy
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin
“Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude.
Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de
femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum
d’espace sans lequel il n’y a pas de véritable démocratie.“Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,
poste qu’il quitta pour devenir président de l’Assemblée Nationale.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
From Parents to Transparents
It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent."
One guards their privacy obsessively, while the other barely knows what privacy is.
La "vie privée", un problème de "vieux cons" ? vs
"Vie privée" : le point de vue des "petits cons"
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010