[liberationtech] Defending Dissidents from Targeted Digital Surveillance

2016-12-07 Thread Yosem Companys
The seminar below shouldbe available on live stream:

https://www.youtube.com/watch?v=ytcsTzfRVqw




> From: Bill Marczak 

 *Title:* Defending Dissidents from Targeted Digital Surveillance
 *Speaker:* William R. Marczak
 *Advisor:* Prof. Vern Paxson

 *Date:* Friday, Dec 09, 2016
 *Time:* 12PM - 1PM
 *Location:* 205 South Hall, UC Berkeley
 *Food:* Light lunch
 *RSVP requested:* https://docs.google.com/forms/
 d/e/1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform

 *Abstract:*

 Computer security research devotes extensive efforts to protecting
 individuals against indiscriminate, large-scale attacks such as those used
 by cybercriminals, and protecting institutions against targeted cyber
 attacks conducted by nation-states (so-called “Advanced Persistent
 Threats'').  Where these two problem domains intersect, however---targeted
 cyber attacks by nation-states against individuals---has received
 considerably less study.

 In this talk, I will first detail my efforts to characterize this
 space, based on analysis of an extensive collection of suspicious files and
 links targeting activists, opposition members, and nongovernmental
 organizations in the Middle East over a period of several years.  I will
 present attack campaigns involving a variety of commercial “lawful
 intercept” and off-the-shelf tools, and explain Internet scanning
 techniques I used to map out the potential broader scope of such activity.
 Based on these first efforts, I will present the results of my IRB-approved
 research study involving in-depth interviews with 30 potential targets of
 abusive surveillance in four countries.  The results give insight into
 potential targets’ perceptions of the risks associated with their online
 activity, and their security posture.  Based on my study results, I will
 propose Himaya, a defensive approach I developed that readily integrates
 with targets’ workflow to provide near real-time scanning of a subject’s
 email messages to check for threats.  I will explain Himaya’s architecture
 and provide preliminary data from its beta deployment.

>>>
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Defending Dissidents from Targeted Digital Surveillance

2016-12-02 Thread Jodi Schneider
Any chance this will be streamed or recorded?

On Thu, Dec 1, 2016 at 5:23 PM, Yosem Companys 
wrote:

> From: Bill Marczak 
>
> *Title:* Defending Dissidents from Targeted Digital Surveillance
> *Speaker:* William R. Marczak
> *Advisor:* Prof. Vern Paxson
>
> *Date:* Friday, Dec 09, 2016
> *Time:* 12PM - 1PM
> *Location:* 205 South Hall, UC Berkeley
> *Food:* Light lunch
> *RSVP requested:* https://docs.google.com/forms/
> d/e/1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform
>
> *Abstract:*
>
> Computer security research devotes extensive efforts to protecting
> individuals against indiscriminate, large-scale attacks such as those used
> by cybercriminals, and protecting institutions against targeted cyber
> attacks conducted by nation-states (so-called “Advanced Persistent
> Threats'').  Where these two problem domains intersect, however---targeted
> cyber attacks by nation-states against individuals---has received
> considerably less study.
>
> In this talk, I will first detail my efforts to characterize this space,
> based on analysis of an extensive collection of suspicious files and links
> targeting activists, opposition members, and nongovernmental organizations
> in the Middle East over a period of several years.  I will present attack
> campaigns involving a variety of commercial “lawful intercept” and
> off-the-shelf tools, and explain Internet scanning techniques I used to map
> out the potential broader scope of such activity.  Based on these first
> efforts, I will present the results of my IRB-approved research study
> involving in-depth interviews with 30 potential targets of abusive
> surveillance in four countries.  The results give insight into potential
> targets’ perceptions of the risks associated with their online activity,
> and their security posture.  Based on my study results, I will propose
> Himaya, a defensive approach I developed that readily integrates with
> targets’ workflow to provide near real-time scanning of a subject’s email
> messages to check for threats.  I will explain Himaya’s architecture and
> provide preliminary data from its beta deployment.
>
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated: https://mailman.stanford.edu/
> mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change
> password by emailing moderator at compa...@stanford.edu.
>
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Defending Dissidents from Targeted Digital Surveillance

2016-12-01 Thread Andrés Pacheco
How about "The Land of the Free?" Why go to the Middle East?

Regards | Saludos,

Andrés Leopoldo Pacheco Sanfuentes


> On Dec 1, 2016, at 2:23 PM, Yosem Companys  wrote:
> 
> From: Bill Marczak 
> 
> Title: Defending Dissidents from Targeted Digital Surveillance
> Speaker: William R. Marczak
> Advisor: Prof. Vern Paxson
> 
> Date: Friday, Dec 09, 2016
> Time: 12PM - 1PM
> Location: 205 South Hall, UC Berkeley
> Food: Light lunch
> RSVP requested: 
> https://docs.google.com/forms/d/e/1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform
> 
> Abstract:
> Computer security research devotes extensive efforts to protecting 
> individuals against indiscriminate, large-scale attacks such as those used by 
> cybercriminals, and protecting institutions against targeted cyber attacks 
> conducted by nation-states (so-called “Advanced Persistent Threats'').  Where 
> these two problem domains intersect, however---targeted cyber attacks by 
> nation-states against individuals---has received considerably less study.
> 
> In this talk, I will first detail my efforts to characterize this space, 
> based on analysis of an extensive collection of suspicious files and links 
> targeting activists, opposition members, and nongovernmental organizations in 
> the Middle East over a period of several years.  I will present attack 
> campaigns involving a variety of commercial “lawful intercept” and 
> off-the-shelf tools, and explain Internet scanning techniques I used to map 
> out the potential broader scope of such activity.  Based on these first 
> efforts, I will present the results of my IRB-approved research study 
> involving in-depth interviews with 30 potential targets of abusive 
> surveillance in four countries.  The results give insight into potential 
> targets’ perceptions of the risks associated with their online activity, and 
> their security posture.  Based on my study results, I will propose Himaya, a 
> defensive approach I developed that readily integrates with targets’ workflow 
> to provide near real-time scanning of a subject’s email messages to check for 
> threats.  I will explain Himaya’s architecture and provide preliminary data 
> from its beta deployment.
> 
> -- 
> Liberationtech is public & archives are searchable on Google. Violations of 
> list guidelines will get you moderated: 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
> change to digest, or change password by emailing moderator at 
> compa...@stanford.edu.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] Defending Dissidents from Targeted Digital Surveillance

2016-12-01 Thread Yosem Companys
From: Bill Marczak 

*Title:* Defending Dissidents from Targeted Digital Surveillance
*Speaker:* William R. Marczak
*Advisor:* Prof. Vern Paxson

*Date:* Friday, Dec 09, 2016
*Time:* 12PM - 1PM
*Location:* 205 South Hall, UC Berkeley
*Food:* Light lunch
*RSVP requested:* https://docs.google.com/forms/d/e/
1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform

*Abstract:*

Computer security research devotes extensive efforts to protecting
individuals against indiscriminate, large-scale attacks such as those used
by cybercriminals, and protecting institutions against targeted cyber
attacks conducted by nation-states (so-called “Advanced Persistent
Threats'').  Where these two problem domains intersect, however---targeted
cyber attacks by nation-states against individuals---has received
considerably less study.

In this talk, I will first detail my efforts to characterize this space,
based on analysis of an extensive collection of suspicious files and links
targeting activists, opposition members, and nongovernmental organizations
in the Middle East over a period of several years.  I will present attack
campaigns involving a variety of commercial “lawful intercept” and
off-the-shelf tools, and explain Internet scanning techniques I used to map
out the potential broader scope of such activity.  Based on these first
efforts, I will present the results of my IRB-approved research study
involving in-depth interviews with 30 potential targets of abusive
surveillance in four countries.  The results give insight into potential
targets’ perceptions of the risks associated with their online activity,
and their security posture.  Based on my study results, I will propose
Himaya, a defensive approach I developed that readily integrates with
targets’ workflow to provide near real-time scanning of a subject’s email
messages to check for threats.  I will explain Himaya’s architecture and
provide preliminary data from its beta deployment.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.