♫musicjinni

DEF CON 22 - Robert Rowley - Detecting and Defending Against a Surveillance State

video thumbnail
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf

Detecting and Defending Against a Surveillance State
Robert RowleySECURITY RESEARCHER, TRUSTWAVE SPIDERLABS
This talk is based on semi-recent reported leaks that detail how state-actors could be engaging in surveillance against people they deem as 'threats'. I will cover the basics on what was leaked, and focus the talk on how to detect hardware bugs, implanted radio transceivers, firmware injections, cellular network monitoring, etc...

No need to bring your tin-foil hats though, the discussion here is a pragmatical approach to how to detect such threats and identify if you have been targeted. No blind faith approaches, or attempts to sell any privacy snake oil will be found here.

Robert is a Security Researcher for Trustwave Spiderlabs as has been an active member of the Southern California hacking scene for over the last 10+ years. Co-Founding Irvine underground and recently presenting on many topics including Juice Jacking, Web Application Security and more… I am presenting on a personal passion this time, Privacy.

DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems

DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse

DEF CON 22 - Glenn Wilkinson - Practical Aerial Hacking & Surveillance

DEF CON 22 - Panel - DEF CON the Mystery, Myth, and Legend

DEF CON 22 - Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling

DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor

DEF CON 22 - Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0

DEF CON 22 - Chris Littlebury - Home Alone with localhost: Automating Home Defense

DEF CON 22 - Brent White - Corporate Espionage

DEF CON 22 - Zoltán Balázs - Bypass firewalls, application white lists...

DEF CON 22 - Major Malfunction - Old Skewl Hacking - Porn Free!

DEF CON 22 - Keren Elazari - Empowering Hackers to Create a Positive Impact

DEF CON 22 - Jason Healey - Saving the Internet (for the Future)

DEF CON 22 - Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction & Death

DEF CON 22 - Ladar Levison and Stephen Watt - Dark Mail

DEF CON 22 - Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records

DEF CON 22 - Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble

DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems

DEF CON 22 - Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense

DEF CON 22 - Dominic White and Ian de Villiers - Manna from Heaven

DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State

DEF CON 22 - Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car

DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces

DEF CON 22 - Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.

DEF CON 22 - Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks

DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute

DEF CON 22 - Panel- Ephemeral Communications: Why and How?

DEF CON 22 - Brian Gorenc and Matt Molinyawe - Building Your Own SMS/MMS Fuzzer

DEF CON 22 - Eijah - Saving Cyberspace by Reinventing File Sharing

Disclaimer DMCA