ShmooCon 2014: Inside NSA Capabilities & How to Protect Against Them π
Discover the latest NSA capabilities and effective countermeasures presented at ShmooCon 2014. Watch the full session and learn how to safeguard your systems. More info: http://bit.ly/shmooc14

Christiaan008
25.3K views β’ Apr 23, 2014

About this video
For more information visit: http://bit.ly/shmooc14
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speaker: Bruce Schneier
Edward Snowden has given us an unprecedented window into the NSA's surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not the politics of their actions. This includes how it conducts Internet surveillance on the backbone, but is primarily focused on their offensive capabilities: packet injection attacks from the Internet backbone, exploits against endpoint computers and implants to exfiltrate information, fingerprinting computers through cookies and other means, and so on.
I will then talk about what sorts of countermeasures are likely to frustrate the NSA. Basically, these are techniques to raise the cost of wholesale surveillance in favor of targeted surveillance: encryption, target hardening, dispersal, and so on.
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speaker: Bruce Schneier
Edward Snowden has given us an unprecedented window into the NSA's surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not the politics of their actions. This includes how it conducts Internet surveillance on the backbone, but is primarily focused on their offensive capabilities: packet injection attacks from the Internet backbone, exploits against endpoint computers and implants to exfiltrate information, fingerprinting computers through cookies and other means, and so on.
I will then talk about what sorts of countermeasures are likely to frustrate the NSA. Basically, these are techniques to raise the cost of wholesale surveillance in favor of targeted surveillance: encryption, target hardening, dispersal, and so on.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
25.3K
Likes
304
Duration
52:37
Published
Apr 23, 2014
User Reviews
4.4
(5) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now