[liberationtech] Defending Dissidents from Targeted Digital Surveillance
The seminar below shouldbe available on live stream: https://www.youtube.com/watch?v=ytcsTzfRVqw > From: Bill Marczak*Title:* Defending Dissidents from Targeted Digital Surveillance *Speaker:* William R. Marczak *Advisor:* Prof. Vern Paxson *Date:* Friday, Dec 09, 2016 *Time:* 12PM - 1PM *Location:* 205 South Hall, UC Berkeley *Food:* Light lunch *RSVP requested:* https://docs.google.com/forms/ d/e/1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform *Abstract:* Computer security research devotes extensive efforts to protecting individuals against indiscriminate, large-scale attacks such as those used by cybercriminals, and protecting institutions against targeted cyber attacks conducted by nation-states (so-called “Advanced Persistent Threats''). Where these two problem domains intersect, however---targeted cyber attacks by nation-states against individuals---has received considerably less study. In this talk, I will first detail my efforts to characterize this space, based on analysis of an extensive collection of suspicious files and links targeting activists, opposition members, and nongovernmental organizations in the Middle East over a period of several years. I will present attack campaigns involving a variety of commercial “lawful intercept” and off-the-shelf tools, and explain Internet scanning techniques I used to map out the potential broader scope of such activity. Based on these first efforts, I will present the results of my IRB-approved research study involving in-depth interviews with 30 potential targets of abusive surveillance in four countries. The results give insight into potential targets’ perceptions of the risks associated with their online activity, and their security posture. Based on my study results, I will propose Himaya, a defensive approach I developed that readily integrates with targets’ workflow to provide near real-time scanning of a subject’s email messages to check for threats. I will explain Himaya’s architecture and provide preliminary data from its beta deployment. >>> -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Defending Dissidents from Targeted Digital Surveillance
Any chance this will be streamed or recorded? On Thu, Dec 1, 2016 at 5:23 PM, Yosem Companyswrote: > From: Bill Marczak > > *Title:* Defending Dissidents from Targeted Digital Surveillance > *Speaker:* William R. Marczak > *Advisor:* Prof. Vern Paxson > > *Date:* Friday, Dec 09, 2016 > *Time:* 12PM - 1PM > *Location:* 205 South Hall, UC Berkeley > *Food:* Light lunch > *RSVP requested:* https://docs.google.com/forms/ > d/e/1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform > > *Abstract:* > > Computer security research devotes extensive efforts to protecting > individuals against indiscriminate, large-scale attacks such as those used > by cybercriminals, and protecting institutions against targeted cyber > attacks conducted by nation-states (so-called “Advanced Persistent > Threats''). Where these two problem domains intersect, however---targeted > cyber attacks by nation-states against individuals---has received > considerably less study. > > In this talk, I will first detail my efforts to characterize this space, > based on analysis of an extensive collection of suspicious files and links > targeting activists, opposition members, and nongovernmental organizations > in the Middle East over a period of several years. I will present attack > campaigns involving a variety of commercial “lawful intercept” and > off-the-shelf tools, and explain Internet scanning techniques I used to map > out the potential broader scope of such activity. Based on these first > efforts, I will present the results of my IRB-approved research study > involving in-depth interviews with 30 potential targets of abusive > surveillance in four countries. The results give insight into potential > targets’ perceptions of the risks associated with their online activity, > and their security posture. Based on my study results, I will propose > Himaya, a defensive approach I developed that readily integrates with > targets’ workflow to provide near real-time scanning of a subject’s email > messages to check for threats. I will explain Himaya’s architecture and > provide preliminary data from its beta deployment. > > -- > Liberationtech is public & archives are searchable on Google. Violations > of list guidelines will get you moderated: https://mailman.stanford.edu/ > mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change > password by emailing moderator at compa...@stanford.edu. > -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Defending Dissidents from Targeted Digital Surveillance
How about "The Land of the Free?" Why go to the Middle East? Regards | Saludos, Andrés Leopoldo Pacheco Sanfuentes> On Dec 1, 2016, at 2:23 PM, Yosem Companys wrote: > > From: Bill Marczak > > Title: Defending Dissidents from Targeted Digital Surveillance > Speaker: William R. Marczak > Advisor: Prof. Vern Paxson > > Date: Friday, Dec 09, 2016 > Time: 12PM - 1PM > Location: 205 South Hall, UC Berkeley > Food: Light lunch > RSVP requested: > https://docs.google.com/forms/d/e/1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform > > Abstract: > Computer security research devotes extensive efforts to protecting > individuals against indiscriminate, large-scale attacks such as those used by > cybercriminals, and protecting institutions against targeted cyber attacks > conducted by nation-states (so-called “Advanced Persistent Threats''). Where > these two problem domains intersect, however---targeted cyber attacks by > nation-states against individuals---has received considerably less study. > > In this talk, I will first detail my efforts to characterize this space, > based on analysis of an extensive collection of suspicious files and links > targeting activists, opposition members, and nongovernmental organizations in > the Middle East over a period of several years. I will present attack > campaigns involving a variety of commercial “lawful intercept” and > off-the-shelf tools, and explain Internet scanning techniques I used to map > out the potential broader scope of such activity. Based on these first > efforts, I will present the results of my IRB-approved research study > involving in-depth interviews with 30 potential targets of abusive > surveillance in four countries. The results give insight into potential > targets’ perceptions of the risks associated with their online activity, and > their security posture. Based on my study results, I will propose Himaya, a > defensive approach I developed that readily integrates with targets’ workflow > to provide near real-time scanning of a subject’s email messages to check for > threats. I will explain Himaya’s architecture and provide preliminary data > from its beta deployment. > > -- > Liberationtech is public & archives are searchable on Google. Violations of > list guidelines will get you moderated: > https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, > change to digest, or change password by emailing moderator at > compa...@stanford.edu. -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
[liberationtech] Defending Dissidents from Targeted Digital Surveillance
From: Bill Marczak*Title:* Defending Dissidents from Targeted Digital Surveillance *Speaker:* William R. Marczak *Advisor:* Prof. Vern Paxson *Date:* Friday, Dec 09, 2016 *Time:* 12PM - 1PM *Location:* 205 South Hall, UC Berkeley *Food:* Light lunch *RSVP requested:* https://docs.google.com/forms/d/e/ 1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform *Abstract:* Computer security research devotes extensive efforts to protecting individuals against indiscriminate, large-scale attacks such as those used by cybercriminals, and protecting institutions against targeted cyber attacks conducted by nation-states (so-called “Advanced Persistent Threats''). Where these two problem domains intersect, however---targeted cyber attacks by nation-states against individuals---has received considerably less study. In this talk, I will first detail my efforts to characterize this space, based on analysis of an extensive collection of suspicious files and links targeting activists, opposition members, and nongovernmental organizations in the Middle East over a period of several years. I will present attack campaigns involving a variety of commercial “lawful intercept” and off-the-shelf tools, and explain Internet scanning techniques I used to map out the potential broader scope of such activity. Based on these first efforts, I will present the results of my IRB-approved research study involving in-depth interviews with 30 potential targets of abusive surveillance in four countries. The results give insight into potential targets’ perceptions of the risks associated with their online activity, and their security posture. Based on my study results, I will propose Himaya, a defensive approach I developed that readily integrates with targets’ workflow to provide near real-time scanning of a subject’s email messages to check for threats. I will explain Himaya’s architecture and provide preliminary data from its beta deployment. -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.