Published on Apr 27, 2012
Filmed April 26, 2012, 12pm. Q & A workshop with Jacob Appelbaum, computer security researcher, on mobile phone security, cellphone forensics, state repression and surveillance.
Looking for something? Find it and much more on Amazon.com
1:05 jake appelbaum introduction to the surveillance state.
5:00 metadata, data collection, linkability
10:40 national security letter (nsl)
14:25 2703d metadata notice 18 USC § 2703(d)
16:50 audience poll on cellphones and tracking
17:40 cellphone forensics, cellebrite device
20:30 bill binney nsa, linkability, traffic analysis
25:00 controlling the narrative
25:20 stylometry, anonymouth
28:35 traffic analysis
29:20 question on cellphone tampering
30:30 gov't backdoors, US v. Jones (2012), gps tracking
33:50 question on cellphone malware, defending against passive attacks. threat models beat cop vs. nsa
35:10 nsa electromagnetic tempest attack.
40:10 question on nypd, dhs, fbi, and nsa sigint capabilities
42:00 gnu radio, imsi catcher
44:38 broken window theory, resistance and activism
49:45 question on advocacy, rules, demands. answered with church committee, accountability, ron wyden commission, no secret laws, no warrantless wiretapping, no promotion of insecure systems allowing wiretapping, and story of
51:25 killing the son of anwar al-awlaki, due process vs. judicial process.
56:00 question on basic do's and don'ts, practical tips. rubberhose firesystem, truecrypt, usefulness/practicality of deniability passphrases, transparency.
1:02:20 question of deniability, guilty until proven innocent.
1:04:15 mutually assured information destruction (maid)
1:05:00 getting around crytography, powerline analysis attacks
1:07:10 building alternatives to commercial software and hardware. open software, open hardware, imsi catcher catcher.
1:11:40 calyx privacy-by-design isp.
1:12:55 tor network
1:16:20 tails debian
Part 1/2 highlights the "theoretical" side of things
Part 2/2 emphasizes the practical.