Edward Snowden as a Telepresence Robot at the March 2014 TED Talk
in Vancouver, BC, Canada via Secure Internet Connection

 

Presentation for Northshore Chapter of ASIS: The Edward Snowden NSA Data Breach of 2013: How it happened, and its consequences and implications for the U.S. and the IT Industry - August 13, 2014

Presentation: The 2013 Edward Snowden Data Breach - by William Favre Slater III at Forensecure 2014
at the Illinois Institute of Technology

 

 

Anecdotal Advice to Prevent an Edward Snowden Event in your Organization:

1) Learn about vetting your people with background checks.

2) Learn about monitoring your people's work and behaviors

3) Never hire a high school drop-out.

4) Learn about and train your system administrators on a Code of Ethics:
http://1drv.ms/QjMcjw  

5) Learn about and train your entire staff about what Social Engineering is, how it works, and how to protect against it.

6) Read this paper about Hacking Humans:
http://www.billslater.com/writing/Hacking_Humans_from_W_F_Slater_v1_2013_0219_.pdf 

 


 

Edward Snowden Interviewed by Brian Williams

Broadcast on Wednesday, May 28, 2014 at 9:00 PM Central Time / 10:00 PM Eastern Time

 

Follow Edward Snowden on Twitter:  #snowden   #edwardsnowden

Writing

Cyberwarfare

eBook 1

Bio

Interview

Career

Resume

Secrets

 

Presentation: Bitcoin  - by William Favre Slater III at Forensecure 2014

 

Forensecure 2014 - Cybersecurity Conference sponsored by IIT

 

 

billslater.com

 

References

 

ACLU. (2014). President Obama: Grant Edward Snowden Immunity Now. Retrieved from https://www.aclu.org/secure/grant_snowden_immunity  on March 18, 2014.

ANI. (2014). White House cyber security chief says damage done by Edward Snowden will take decades to repair. Retrieved from http://www.dnaindia.com/world/report-white-house-cyber-security-chief-says-damage-done-by-edward-snowden-will-take-decades-to-repair-1973325  on April 5, 2014

Anonymous, (2104). Edward Snowden, A Truth Unveiled (Documentary). Retrieved from http://www.youtube.com/watch?v=dSXlKdWF5HE  on March 20, 2014.

Batley, M. (2014). Clapper: Snowden Took Advantage of 'Perfect Storm' of Security Lapses. Retrieved from http://www.newsmax.com/US/Edward-Snowden-James-Clapper-NSA-intelligence/2014/02/12/id/552327  on February 12, 2014.

Campbell, B. (2014). The story of Edward Snowden is so unbelievable, sometimes you forget it's nonfiction Retrieved from http://www.pri.org/stories/2014-02-14/story-edward-snowden-so-unbelievable-sometimes-you-forget-its-nonfiction  on February 15, 2014.

Cohen, T. Military spy chief: Have to assume Russia knows U.S. secrets. Retrieved from http://www.cnn.com/2014/03/07/politics/snowden-leaks-russia/index.html  on March 9, 2014.

Coleman, G. (2014). The Latest Snowden Revelation Is Dangerous for Anonymous — And for All of Us. Retrieved from http://www.wired.com/opinion/2014/02/comes-around-goes-around-latest-snowden-revelation-isnt-just-dangerous-anonymous-us/  on February 4, 2014.

Decrypted Matrix. (2014). An NSA Coworker Remembers The Real Edward Snowden: ‘A Genius Among Geniuses’. Retrieved from https://decryptedmatrix.com/live/an-nsa-coworker-remembers-the-real-edward-snowden-a-genius-among-geniuses/  on March 31, 2014.

Farrell, H. (2014). The political science of cybersecurity IV: How Edward Snowden helps U.S. deterrence. Retrieved from http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/03/12/the-political-science-of-cybersecurity-iv-how-edward-snowden-helps-u-s-deterrence/  on March 12, 2014.

Forrest, H. (2014). Monday, March 10: Edward Snowden to Speak at SXSW Interactive Via Videoconference. Retrieved from http://sxsw.com/interactive/news/2014/monday-march-10-edward-snowden-speak-sxsw-interactive-videoconference  on March 10, 2014.

Free Man’s Perspective. (2014). YES, YOU ARE BEING MANIPULATED BY YOUR GOVERNMENT. Retrieved from http://www.freemansperspective.com/governments-manipulate/  on March 20, 2014.

Gallagher, R. and Greenwald, G. (2104). How the NSA Plans to Infect ‘Millions’ of Computers with Malware. Retrieved from https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/  on March 12, 2014.

Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Metropolitan Books.

Gurnow, M. (2014). The Edward Snowden Affair: Exposing the Politics and Media Behind the NSA Scandal. Blue River Press, Inc.

Harding, L. (2014). The Snowden Files: The Inside Story of the World's Most Wanted Man. Random House, LLC.

Huffington Post. (2014). Bill Gates: Edward Snowden Is No Hero. Retrieved from http://live.huffingtonpost.com/r/archive/segment/bill-gates-edward-snowden-is-no-hero/5323697e78c90a1ede00033b  on March 16, 2014.

Lucas, E. (2014). The Snowden Operation: Inside the West's Greatest Intelligence Disaster. Amazon Digital Services.

Maass, P. (2013). How Laura Poitras Helped Snowden Spill His Secrets. Retrieved from http://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html  on April 3, 2014.

Meyer, D. (2014). Edward Snowden tells European Parliament how local spies aid NSA surveillance. Retrieved from http://gigaom.com/2014/03/07/edward-snowden-gives-testimony-to-european-parliament-surveillance-inquiry/  on March 7, 2014.

Moyers, B. (2014). Anatomy of the Deep State. http://billmoyers.com/2014/02/21/anatomy-of-the-deep-state/  on March 31, 2014.

Newsmax. (2013). NSA, Military Beef-Up Cybersecurity Measures in Wake of Leaks. Retrieved from http://www.newsmax.com/US/NSA-Military-cybersecurity-leaks/2013/07/19/id/515984  on July 19, 2013.

Reuters. (2014). Edward Snowden, Glenn Greenwald urge caution of wider government monitoring at Amnesty event. Retrieved from http://www.dnaindia.com/world/report-edward-snowden-glenn-greenwald-urge-caution-of-wider-government-monitoring-at-amnesty-event-1975659  on April 6, 2014.

Rodriguez, S. (2014). NSA posed as Facebook to infect computers with malware, report says. Retrieved from http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malware-20140312,0,3491724.story#ixzz2yGiHhZJa  on March 12, 2014.

RT. (2014). Spooking the spooks: US surveillance system to muzzle rogue agents and leakers. Retrieved from http://rt.com/usa/us-government-internal-monitoring-870/  on March 10, 2014.

Sanger, D. and Schmidtt, E. (2014). Spy Chief Says Snowden Took Advantage of ‘Perfect Storm’ of Security Lapses. Retrieved from http://www.nytimes.com/2014/02/12/us/politics/spy-chief-says-snowden-took-advantage-of-perfect-storm-of-security-lapses.html  on February 12, 2014.

Sardesai, N. (2014). NSA is Working on an Encryption-Cracking Quantum Computer. Retrieved from http://www.cryptocoinsnews.com/2014/01/03/nsa-working-encryption-cracking-quantum-computer/  on March 1, 2014.

Schneier, B. (2013). Snowden's Cryptographer on the NSA & Defending the Internet. Retrieved from https://www.youtube.com/watch?feature=player_embedded&v=kWNk9irv1e8  on March 10, 2014.

Snowden, E. (2014. Edward Snowden’s Testimony to the European Union Parliament. Retrieved from http://www.europarl.europa.eu/document/activities/cont/201403/20140307ATT80674/20140307ATT80674EN.pdf  on March 7, 2014.

Snowden, E. (2104). TED Talk: Here’s how we take back the Internet. Retrieved from http://www.youtube.com/watch?v=EomroTpkaYI  on March 20, 2014.

 


 

billslater.com


 

Visitor Information

AmazingCounters.com





Locations of Site Visitors


Copyright 1996 - 2014 by William F. Slater, III,
Chicago, IL, USA
All Rights Reserved, Nationally and Internationally.


Last Updated: Wednesday, August 13, 2014