Your Source for Leaks Around the World!

To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3

In 30c3, ANT, Archive, Malware, NSA, NSA Files, Surveillance, TAO, Technology on December 30, 2013 at 6:33 PM

12/29/2013

2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as light was shed on the widespread use of dragnet surveillance by the NSA and intelligence agencies globally. With the uprisings of the Arab Spring where people raided the offices of their regimes to bring evidence to light, we’ve seen a tremendous phenomenon: a large numbers of whistleblowers have taken action to inform the public about important details. The WikiLeaks SpyFiles series also shows us important details to corroborate these claims. There is ample evidence about the use and abuses of a multi-billion dollar industry that have now come to light. This evidence includes increasing use of targeted attacks to establish even more invasive control over corporate, government or other so-called legitimate targets.

Everything transiting our network connections is under surveillance to some degree. It’s also common for law enforcement and intelligence agencies to use exploits and malware to infect and monitor computers, mobile devices and to spy on networks. They’re able to bug our rooms with our own telephones, read encrypted emails, log keystrokes – they invade the most personal spaces in the very core of a person’s life with minimal economic impact to their budget.

In this talk Claudio Guarnieri and Morgan Marquis-Boire discuss the nature of targeted and untargeted surveillance, exploitation and intelligence gathering. This active surveillance is produced and operated not only by governments but by corporations and mercenaries that provide their intrusion services to the highest bidders who often have the lowest respect for human rights.

We’ll introduce you to the players in the business of active, passive, tactical and strategic surveillance and the products they provide. We’ll also discuss examples of specific attacks on journalists and human rights activists worldwide in the last couple of years. Surprises won’t be missing.

Related Links:

WikiLeaks Spy Files

Eyes Wide Open: Privacy International Special Report on the Five Eyes Alliance

Telecomix Blue Cabinet Wiki

12/30/2013

Security researcher Jacob Appelbaum revealed what he calls “wrist-slitting depressing” details about the National Security Agency’s spy programs at a computer conference in Germany on Monday where he presented previously unpublished NSA files.

Appelbaum is among the small group of experts, activists and journalists who have seen classified United States intelligence documents taken earlier this year by former contractor Edward Snowden, and previously he represented transparency group WikiLeaks at an American hacker conference in 2010. Those conditions alone should suffice in proving to most anybody that Appelbaum has been around more than his fair share of sensitive information, and during his presentation at the thirtieth annual Chaos Communication Congress in Hamburg on Monday he spilled his guts about some of the shadiest spy tactics seen yet through leaked documents.

Presenting in-tandem with the publishing of an article in Germany’s Der Spiegel magazine, Appelbaum explained to the audience of his hour-long “To Protect and Infect” address early Monday that the NSA has secretly sabotaged US businesses by covertly — and perhaps sometimes with the cooperation of the tech industry — coming up with ways to exploit vulnerabilities in the products sold by major American companies, including Dell and Apple, among others.

That was only the main theme of many covered throughout the presentation, during which Appelbaum repeatedly revealed previously unpublished top-secret NSA documents detailing the tactics and techniques used by the NSA to intercept the communications of seemingly anyone on Earth.

Related Link: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware

Slide Presentation via Cryptome

  1. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  2. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  3. […] 32-year-old, who has recently collaborated with Intercept co-founder Laura Poitras to report revelations about National Security Agency surveillance for German news magazine Der Spiegel, said he plans to remain in Germany “in exile, rather than […]

    Like

  4. […] example, Jacob Applebaum at the 30C3 [30 Chaos Computer Congress] I think it was– gave a list they went through and showed a slide […]

    Like

  5. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir…Surveillance Dealerships: ISS World, Milipol, […]

    Like

  6. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  7. […] See: To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  8. […] Related: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  9. […] Related: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  10. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  11. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boir… […]

    Like

  12. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-… (leaksource.wordpress.com) […]

    Like

  13. […] To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-… 30 December 2013 at […]

    Like

  14. […] LeakSource 0 likesLeaks30c3AppelbaumClaudioGuarnieriInfectInternetJacobMarquisBoireMilitarizationMorganprotect […]

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: