Detecting & Defending Against State-Actor Surveillance
2
Intro
3
Breakdown
4
Surveillance Skymall leaks
5
Retro Reflectors
6
RF Bug Prevention
7
RF Bug Detection
8
Data Exfiltration
9
Detecting Persistent Compromise Devices
10
Software Exploits
11
BIOS/Firmware/CF Card Hacked?
12
Wifi Devices
13
Cell Phone Bugs
14
Conclusions
15
Further Reading & Sources
Description:
Explore techniques for detecting and defending against state-sponsored surveillance in this 18-minute OWASP Foundation conference talk. Analyze recently leaked secret documents revealing technological spying methods employed by well-funded state actors. Learn about alleged surveillance bugs, their potential workings, and compile effective defense and detection strategies. Discover methods for preventing and detecting RF bugs, identifying data exfiltration attempts, and recognizing persistent compromise devices. Examine software exploits, BIOS/firmware/CF card hacks, WiFi device vulnerabilities, and cell phone bugs. Gain insights into critical thinking approaches for addressing targeted surveillance by state-sponsored spy agencies, and access further reading materials and sources for continued learning.
Detecting and Defending Against State-Actor Surveillance