Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Defending Dissidents from Targeted Digital Surveillance

Yosem Companys companys at tmp.ucsb.edu
Wed Dec 7 19:40:33 PST 2016


The seminar below shouldbe available on live stream:

https://www.youtube.com/watch?v=ytcsTzfRVqw




> From: Bill Marczak <wrm at cs.berkeley.edu>
>>>>
>>>> *Title:* Defending Dissidents from Targeted Digital Surveillance
>>>> *Speaker:* William R. Marczak
>>>> *Advisor:* Prof. Vern Paxson
>>>>
>>>> *Date:* Friday, Dec 09, 2016
>>>> *Time:* 12PM - 1PM
>>>> *Location:* 205 South Hall, UC Berkeley
>>>> *Food:* Light lunch
>>>> *RSVP requested:* https://docs.google.com/forms/
>>>> d/e/1FAIpQLSfSeROEo6bOTvNzZw6KTf--Lgr5-yP5TFcpT0qY66x9foyHtg/viewform
>>>>
>>>> *Abstract:*
>>>>
>>>> Computer security research devotes extensive efforts to protecting
>>>> individuals against indiscriminate, large-scale attacks such as those used
>>>> by cybercriminals, and protecting institutions against targeted cyber
>>>> attacks conducted by nation-states (so-called “Advanced Persistent
>>>> Threats'').  Where these two problem domains intersect, however---targeted
>>>> cyber attacks by nation-states against individuals---has received
>>>> considerably less study.
>>>>
>>>> In this talk, I will first detail my efforts to characterize this
>>>> space, based on analysis of an extensive collection of suspicious files and
>>>> links targeting activists, opposition members, and nongovernmental
>>>> organizations in the Middle East over a period of several years.  I will
>>>> present attack campaigns involving a variety of commercial “lawful
>>>> intercept” and off-the-shelf tools, and explain Internet scanning
>>>> techniques I used to map out the potential broader scope of such activity.
>>>> Based on these first efforts, I will present the results of my IRB-approved
>>>> research study involving in-depth interviews with 30 potential targets of
>>>> abusive surveillance in four countries.  The results give insight into
>>>> potential targets’ perceptions of the risks associated with their online
>>>> activity, and their security posture.  Based on my study results, I will
>>>> propose Himaya, a defensive approach I developed that readily integrates
>>>> with targets’ workflow to provide near real-time scanning of a subject’s
>>>> email messages to check for threats.  I will explain Himaya’s architecture
>>>> and provide preliminary data from its beta deployment.
>>>>
>>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20161207/485da686/attachment.html>


More information about the liberationtech mailing list