At the end of the last century, the European Parliament discovered that every kind of telecommunications were spied by the NSA. Since 911, security is often seen as terrorist tool, and our politicians forget what they intend to do when they discovered Echelon : we must regain our right to secure our telecommunications, and explain people how to do it.
1. Counter-intelligence techniques to the use of honest people
Jean Marc Manach, Journalist
http://bugbrother.blog.lemonde.fr
http://bigbrotherawards.eu.org
http://internetactu.net
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
2. Echelon, back to 1999
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
3. Echelon, in 2000
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
4. Echelon, in 2001
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
5. And then, a little incident occured
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
6. Never Forget 2 Say Anything
#Fail,
but...
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
7. 911, LSI/LSQ
All your base
are belong to us,
'cause crypto is terrorism :
All our logs
are belong to us.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
8. Internet is terrorism
The internet
is full of/for porn,
& netizens are
paedophiles,
too.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
9. Little CNIL is watching you
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
16. ANSSI (+ CDSE) + HFDS (2010)
+
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
17. Rule n°1: do not use a computer
If, then :
● do not use YOUR computer
● use a blank computer
● encrypt the disk
● datas offshore (@home) & secured
● refuse USB keys and other "gifts"
"Bon voyage"
Back @home : analyse and wipe the disk
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
19. Security vs democracy
They who can give up essential liberty to obtain a little
temporary safety, deserve neither liberty nor safety.
Benjamin Franklin
“Dans une démocratie, je considère qu’il est nécessaire
que subsiste un espace de possibilité de fraude.
Si l’on n’avait pas pu fabriquer de fausses cartes d’identité
pendant la guerre, des dizaines de milliers d’hommes et de
femmes auraient été arrêtés, déportés, sans doute morts.
J’ai toujours été partisan de préserver de minimum
d’espace sans lequel il n’y a pas de véritable démocratie.“
Raymond Forni, considéré comme le “père inspiré de la loi Informatique
et libertés“, trois fois vice-président de la CNIL entre 1981 et l’an 2000,
poste qu’il quitta pour devenir président de l’Assemblée Nationale.
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
20. From Parents to Transparents
It's the biggest generation split in decades
"Generation Parent" vs. "Generation Transparent."
One guards their privacy obsessively,
while the other barely knows what privacy is.
La "vie privée", un problème de "vieux cons" ?
vs
"Vie privée" : le point de vue des "petits cons"
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010
21. Thanks
http://internetactu.net
http://bugbrother.blog.lemonde.fr
http://bigbrotherawards.eu.org
http://twitter.com/manhack
Counter-intelligence techniques to the use of honest people - JMManach IAWACS 2010