SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Counter-intelligence techniques to the use of honest people




Jean Marc Manach, Journalist

http://bugbrother.blog.lemonde.fr
http://bigbrotherawards.eu.org
http://internetactu.net




                   Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, back to 1999




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2000




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Echelon, in 2001




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
And then, a little incident occured




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Never Forget 2 Say Anything


                  #Fail,
                  but...




       Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
911, LSI/LSQ



                          All your base
                          are belong to us,
                 'cause crypto is terrorism :
                          All our logs
                          are belong to us.



Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Internet is terrorism
                                                The internet
                                           is full of/for porn,
                                             & netizens are
                                                paedophiles,
                                                           too.




   Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Little CNIL is watching you




      Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Securite-Informatique.gouv.fr=2008




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Information dominance + assurance




          Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
/b/ vs PEBKAC




gov.palin@yahoo.com, aka The Incident




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
mail.icio.us




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Spam spy spies




 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
WTF ?!...




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
ANSSI (+ CDSE) + HFDS (2010)




                           +




        Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Rule n°1: do not use a computer
If, then :
● do not use YOUR computer

● use a blank computer

● encrypt the disk

● datas offshore (@home) & secured

● refuse USB keys and other "gifts"




                                                               "Bon voyage"

Back @home : analyse and wipe the disk

               Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
RTFM




Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Security vs democracy

           They who can give up essential liberty to obtain a little
              temporary safety, deserve neither liberty nor safety.
                                                                 Benjamin Franklin

         “Dans une démocratie, je considère qu’il est nécessaire
                  que subsiste un espace de possibilité de fraude.
      Si l’on n’avait pas pu fabriquer de fausses cartes d’identité
     pendant la guerre, des dizaines de milliers d’hommes et de
       femmes auraient été arrêtés, déportés, sans doute morts.
               J’ai toujours été partisan de préserver de minimum
       d’espace sans lequel il n’y a pas de véritable démocratie.“
         Raymond Forni, considéré comme le “père inspiré de la loi Informatique
          et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,
                poste qu’il quitta pour devenir président de l’Assemblée Nationale.




    Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
From Parents to Transparents


    It's the biggest generation split in decades
"Generation Parent" vs. "Generation Transparent."
       One guards their privacy obsessively,
  while the other barely knows what privacy is.


 La "vie privée", un problème de "vieux cons" ?
                         vs
 "Vie privée" : le point de vue des "petits cons"


               Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
Thanks




       http://internetactu.net
http://bugbrother.blog.lemonde.fr
 http://bigbrotherawards.eu.org
    http://twitter.com/manhack
       Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010

Mais conteúdo relacionado

Destaque

Stratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapesStratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapesMer Joyce
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentationNewMediaActivism
 
Social media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagementSocial media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagementMatthew J. Kushin, Ph.D.
 
Anonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasminAnonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasmincsn2012
 
Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?manhack
 
Gérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privéeGérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privéeCoraia
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Destaque (10)

Stratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapesStratégie Digital Activisme en 11 étapes
Stratégie Digital Activisme en 11 étapes
 
Darknet
DarknetDarknet
Darknet
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentation
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
 
Social media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagementSocial media and social change: Protest, activism, and civic engagement
Social media and social change: Protest, activism, and civic engagement
 
Anonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasminAnonymous et la_révolution_du_jasmin
Anonymous et la_révolution_du_jasmin
 
Gérez sa vie privée et sa sécurité sur internet
Gérez sa vie privée et sa sécurité sur internetGérez sa vie privée et sa sécurité sur internet
Gérez sa vie privée et sa sécurité sur internet
 
Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?Pourquoi contourner la cybersurveillance ?
Pourquoi contourner la cybersurveillance ?
 
Gérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privéeGérer son identité numérique et protéger sa vie privée
Gérer son identité numérique et protéger sa vie privée
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Semelhante a Counterintelligence for the honest people

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
 
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...John Mancini
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)Maelström
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaMediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaDeSmart Agile Software House
 

Semelhante a Counterintelligence for the honest people (20)

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)Zábavní průmysl vás nenávidí (Jan Vlnas)
Zábavní průmysl vás nenávidí (Jan Vlnas)
 
News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
 
AI Trust and Safeguards
AI Trust and SafeguardsAI Trust and Safeguards
AI Trust and Safeguards
 
The Rise of Techplomacy
The Rise of TechplomacyThe Rise of Techplomacy
The Rise of Techplomacy
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart ConventicaMediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
Mediarun Festiwal 2014 Damian Winkowski DeSmart Conventica
 

Último

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Counterintelligence for the honest people

  • 1. Counter-intelligence techniques to the use of honest people Jean Marc Manach, Journalist http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://internetactu.net Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 2. Echelon, back to 1999 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 3. Echelon, in 2000 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 4. Echelon, in 2001 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 5. And then, a little incident occured Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 6. Never Forget 2 Say Anything #Fail, but... Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 7. 911, LSI/LSQ All your base are belong to us, 'cause crypto is terrorism : All our logs are belong to us. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 8. Internet is terrorism The internet is full of/for porn, & netizens are paedophiles, too. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 9. Little CNIL is watching you Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 10. Securite-Informatique.gouv.fr=2008 Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 11. Information dominance + assurance Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 12. /b/ vs PEBKAC gov.palin@yahoo.com, aka The Incident Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 13. mail.icio.us Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 14. Spam spy spies Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 15. WTF ?!... Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 16. ANSSI (+ CDSE) + HFDS (2010) + Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 17. Rule n°1: do not use a computer If, then : ● do not use YOUR computer ● use a blank computer ● encrypt the disk ● datas offshore (@home) & secured ● refuse USB keys and other "gifts" "Bon voyage" Back @home : analyse and wipe the disk Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 18. RTFM Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 19. Security vs democracy They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin “Dans une démocratie, je considère qu’il est nécessaire que subsiste un espace de possibilité de fraude. Si l’on n’avait pas pu fabriquer de fausses cartes d’identité pendant la guerre, des dizaines de milliers d’hommes et de femmes auraient été arrêtés, déportés, sans doute morts. J’ai toujours été partisan de préserver de minimum d’espace sans lequel il n’y a pas de véritable démocratie.“ Raymond Forni, considéré comme le “père inspiré de la loi Informatique et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000, poste qu’il quitta pour devenir président de l’Assemblée Nationale. Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 20. From Parents to Transparents It's the biggest generation split in decades "Generation Parent" vs. "Generation Transparent." One guards their privacy obsessively, while the other barely knows what privacy is. La "vie privée", un problème de "vieux cons" ? vs "Vie privée" : le point de vue des "petits cons" Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
  • 21. Thanks http://internetactu.net http://bugbrother.blog.lemonde.fr http://bigbrotherawards.eu.org http://twitter.com/manhack Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010