SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Safe communication  for activists How to prepare an action safely without leaking information
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Drawbacks of advancing technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audio tapping without inside installed equipment SOURCE : BBC Website
Standby troubles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SOURCE : BBC Website
Evil cell phones ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conversation tapping ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Ardito case <<The government applied for a &quot;roving bug,&quot; that is, the interception of Ardito's conversations at locations that were &quot;not practical&quot; to specify, as authorized by 18 U.S.C. § 2518(11)(a). Judge Jones granted the application, authorizing continued interception at the four restaurants and the installation of a listening device in Ardito's cellular telephone. The device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.>> United States District Court, S.D. New York. UNITED STATES of America, v. John TOMERO, et al., Defendants. No. S2 06 Crim. 0008(LAK). Nov. 27, 2006. MEMORANDUM OPINION LEWIS A. KAPLAN, District Judge.
The Siemens patent  << ... This activates an emergency call routine. The emergency routine comprises the following steps, which are partially optional: 2. In case the mobile is switched off it may activate the mobile. In case or as soon as the mobile is switched on, a module for broadcasting over the emergency network, that may operate on frequencies distinct from those of the cellular communication network, is activated. This activation can be done optionally also regardless of the possibility to establish a connection to a cellular communication network.  ...>> http://www.wipo.int/pctdb/en/wo.jsp?IA=EP2002012292&DISPLAY=DESC
Software ”roving bugs” << Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. &quot;They can be remotely accessed and made to transmit room audio all the time,&quot; he said. &quot;You can do that without having physical access to the phone.&quot; >> http://news.zdnet.com/2100-1035_22-150467.html
Network mapping with cell phones ,[object Object],[object Object],[object Object],[object Object],[object Object]
Your cellphone reveils your location ,[object Object],[object Object],[object Object],[object Object]
DIY-ers : beware of pitfalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cell phone guideluines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE ENCODING PROCESS IS   REVERSIBLE IF SOMEONE KNOWS THE CODE SHE / HE CAN DECRYPT
Symmetric encryption ,[object Object],[object Object],[object Object],SARA TOM THE  EVIL INTERNET
Sara sends an email to Tom with asymmetric encryption ,[object Object],[object Object],SARA TOM THE EVIL INTERNET PUBLIC KEY PRIVATE KEY
Now wait a minute ! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A bit of mathematics  (two slides only – don't run away ... yet) ‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encrypting the message ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PGP : pretty good privacy ,[object Object],[object Object],[object Object],[object Object]
Getting PGP to work on your computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pgp functionality in Thunderbird
Thunderbid after installation plugin ,[object Object],[object Object]
Pgp Preferences
Account settings
Some considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PGP : concluding remarks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use safe passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Easy to remember and difficult to crack passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (10)

Music around us
Music around usMusic around us
Music around us
 
Rio
RioRio
Rio
 
Sulfun miin
Sulfun miinSulfun miin
Sulfun miin
 
motivation-
motivation-motivation-
motivation-
 
Thermal
ThermalThermal
Thermal
 
Sulfun
SulfunSulfun
Sulfun
 
Worklife balance english
Worklife balance englishWorklife balance english
Worklife balance english
 
Optical fibre testing mahendra singh
Optical fibre testing mahendra singhOptical fibre testing mahendra singh
Optical fibre testing mahendra singh
 
PIPESIM PROJECT_2012
PIPESIM PROJECT_2012PIPESIM PROJECT_2012
PIPESIM PROJECT_2012
 
microwave_antenna
microwave_antennamicrowave_antenna
microwave_antenna
 

Ähnlich wie Veilig communiceren power point presentatie

Intercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT HackingIntercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT Hacking📡 Sebastien Dudek
 
2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)Felipe Prado
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Mattia Brunetti
 
2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)Felipe Prado
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
The Pied Piper
The Pied PiperThe Pied Piper
The Pied PiperAodrulez
 
Smart DoorLock System using DTMF
Smart DoorLock System using DTMFSmart DoorLock System using DTMF
Smart DoorLock System using DTMFBirinchi Medhi
 
Smart Door Lock System Using DTMF
Smart Door Lock System Using DTMFSmart Door Lock System Using DTMF
Smart Door Lock System Using DTMFBirinchi Medhi
 
Hack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hackingHack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hacking📡 Sebastien Dudek
 
Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguideMaxis Fibre
 
Viet nam security home_report project
Viet nam security home_report projectViet nam security home_report project
Viet nam security home_report projectktvinh
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Escene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manualEscene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manualEmre Ozcan
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???trendy updates
 
Sagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User GuideSagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User GuideTelephones Online
 

Ähnlich wie Veilig communiceren power point presentatie (20)

Intercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT HackingIntercoms presentation OSSIR - IoT Hacking
Intercoms presentation OSSIR - IoT Hacking
 
2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)2600 v03 n08 (august 1986)
2600 v03 n08 (august 1986)
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!
 
2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
33c3 - 2G and 3G intercom attacks
33c3 - 2G and 3G intercom attacks33c3 - 2G and 3G intercom attacks
33c3 - 2G and 3G intercom attacks
 
The Pied Piper
The Pied PiperThe Pied Piper
The Pied Piper
 
Smart DoorLock System using DTMF
Smart DoorLock System using DTMFSmart DoorLock System using DTMF
Smart DoorLock System using DTMF
 
Smart Door Lock System Using DTMF
Smart Door Lock System Using DTMFSmart Door Lock System Using DTMF
Smart Door Lock System Using DTMF
 
Hack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hackingHack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hacking
 
Fiber internet quick startguide
Fiber internet   quick startguideFiber internet   quick startguide
Fiber internet quick startguide
 
Viet nam security home_report project
Viet nam security home_report projectViet nam security home_report project
Viet nam security home_report project
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Escene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manualEscene es380 pg office ip phone user manual
Escene es380 pg office ip phone user manual
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Sagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User GuideSagemcom D770A Digital Cordless Phone User Guide
Sagemcom D770A Digital Cordless Phone User Guide
 
Clonning
ClonningClonning
Clonning
 

Kürzlich hochgeladen

Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...JeylaisaManabat1
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 

Kürzlich hochgeladen (6)

Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 

Veilig communiceren power point presentatie

  • 1. Safe communication for activists How to prepare an action safely without leaking information
  • 2.
  • 3.
  • 4. Audio tapping without inside installed equipment SOURCE : BBC Website
  • 5.
  • 6.
  • 7.
  • 8. The Ardito case <<The government applied for a &quot;roving bug,&quot; that is, the interception of Ardito's conversations at locations that were &quot;not practical&quot; to specify, as authorized by 18 U.S.C. § 2518(11)(a). Judge Jones granted the application, authorizing continued interception at the four restaurants and the installation of a listening device in Ardito's cellular telephone. The device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.>> United States District Court, S.D. New York. UNITED STATES of America, v. John TOMERO, et al., Defendants. No. S2 06 Crim. 0008(LAK). Nov. 27, 2006. MEMORANDUM OPINION LEWIS A. KAPLAN, District Judge.
  • 9. The Siemens patent << ... This activates an emergency call routine. The emergency routine comprises the following steps, which are partially optional: 2. In case the mobile is switched off it may activate the mobile. In case or as soon as the mobile is switched on, a module for broadcasting over the emergency network, that may operate on frequencies distinct from those of the cellular communication network, is activated. This activation can be done optionally also regardless of the possibility to establish a connection to a cellular communication network. ...>> http://www.wipo.int/pctdb/en/wo.jsp?IA=EP2002012292&DISPLAY=DESC
  • 10. Software ”roving bugs” << Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. &quot;They can be remotely accessed and made to transmit room audio all the time,&quot; he said. &quot;You can do that without having physical access to the phone.&quot; >> http://news.zdnet.com/2100-1035_22-150467.html
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Pgp functionality in Thunderbird
  • 25.
  • 28.
  • 29.
  • 30.
  • 31.