Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Macro dragnets: Why trawl the river when you can do the whole ocean

URL
http://ftp.ccc.de/congress/28C3/mp3-audio-only/28c3-4813-en-macro_dragnets.mp3
File name
28c3-4813-en-macro_dragnets.mp3
File size
27.5 MB
MD5
e4a71c07b655cbfae9ad9ef91b9be15d
SHA1
7c4286c35dde680865d7df6eb7dd408438ff94f3

As governments increase their data collection capabilities software developers are stepping up to both utilize and augment surveillance capabilities. DNA databases, facial recognition, behavioral patterning, and geographic profiling are all in use today. Police are crowdsourcing identification of suspects and citizens are willingly participating. This talk will cover real technologies in place today as well as educated speculation of what is coming next. Conspiracy theorists have been questioning the degree to which anyone truly has privacy for quite some time. State ID & fingerprints have given way to electronic passports & DNA analysis. With the increasing number of DIY BIO groups it isn't outside the realm of speculation to see clandestine collection & generation of genomic information by a state actor. Police agencies are engaging in genomic data collection of suspects, witnesses, and victims with no guarantee of the information safety of those individuals. The current scope of laws in the United States limits "genetic discrimination" to "health insurance and employment decisions" with no limitations on the implication of guilt or agency in a crime at the federal level. Similarly companies are collecting photographs of individuals from online services and using them as the corpus for facial recognition techniques which are then leased to government actors. The goal of this talk is to: Address the current vectors for public identification Discuss potential countermeasures for identification dragnets Analyze the role of genomic screening Review case studies of individuals trying to avoid "the system" and crowdsourced attempts to identify the individuals Imagine one was "erased" from these databases. How can one re-establish positive identification (and would they want to)?

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !