Edward Snowden as a Telepresence
Robot at the March 2014 TED Talk
in Vancouver, BC, Canada via Secure Internet Connection
Anecdotal Advice to
Prevent an Edward Snowden Event in your Organization:
1) Learn about vetting your people with background checks.
2) Learn about monitoring your people's work and behaviors
3) Never hire a high school drop-out.
4) Learn about and train your system administrators on a Code of Ethics:
http://1drv.ms/QjMcjw
5) Learn about and train your entire staff about what Social Engineering is, how
it works, and how to protect against it.
6) Read this paper about Hacking Humans:
http://www.billslater.com/writing/Hacking_Humans_from_W_F_Slater_v1_2013_0219_.pdf
Edward Snowden Interviewed by Brian Williams
Broadcast on Wednesday, May 28, 2014 at 9:00 PM Central Time / 10:00 PM Eastern Time
Follow Edward Snowden on Twitter: #snowden #edwardsnowden
Presentation: Bitcoin - by William Favre Slater III at Forensecure 2014
Forensecure 2014 - Cybersecurity Conference sponsored by IIT
References
ACLU. (2014). President Obama: Grant Edward Snowden Immunity Now. Retrieved from https://www.aclu.org/secure/grant_snowden_immunity on March 18, 2014.
ANI. (2014). White House cyber security chief says damage done by Edward Snowden will take decades to repair. Retrieved from http://www.dnaindia.com/world/report-white-house-cyber-security-chief-says-damage-done-by-edward-snowden-will-take-decades-to-repair-1973325 on April 5, 2014
Anonymous, (2104). Edward Snowden, A Truth Unveiled (Documentary). Retrieved from http://www.youtube.com/watch?v=dSXlKdWF5HE on March 20, 2014.
Batley, M. (2014). Clapper: Snowden Took Advantage of 'Perfect Storm' of Security Lapses. Retrieved from http://www.newsmax.com/US/Edward-Snowden-James-Clapper-NSA-intelligence/2014/02/12/id/552327 on February 12, 2014.
Campbell, B. (2014). The story of Edward Snowden is so unbelievable, sometimes you forget it's nonfiction Retrieved from http://www.pri.org/stories/2014-02-14/story-edward-snowden-so-unbelievable-sometimes-you-forget-its-nonfiction on February 15, 2014.
Cohen, T. Military spy chief: Have to assume Russia knows U.S. secrets. Retrieved from http://www.cnn.com/2014/03/07/politics/snowden-leaks-russia/index.html on March 9, 2014.
Coleman, G. (2014). The Latest Snowden Revelation Is Dangerous for Anonymous — And for All of Us. Retrieved from http://www.wired.com/opinion/2014/02/comes-around-goes-around-latest-snowden-revelation-isnt-just-dangerous-anonymous-us/ on February 4, 2014.
Decrypted Matrix. (2014). An NSA Coworker Remembers The Real Edward Snowden: ‘A Genius Among Geniuses’. Retrieved from https://decryptedmatrix.com/live/an-nsa-coworker-remembers-the-real-edward-snowden-a-genius-among-geniuses/ on March 31, 2014.
Farrell, H. (2014). The political science of cybersecurity IV: How Edward Snowden helps U.S. deterrence. Retrieved from http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/03/12/the-political-science-of-cybersecurity-iv-how-edward-snowden-helps-u-s-deterrence/ on March 12, 2014.
Forrest, H. (2014). Monday, March 10: Edward Snowden to Speak at SXSW Interactive Via Videoconference. Retrieved from http://sxsw.com/interactive/news/2014/monday-march-10-edward-snowden-speak-sxsw-interactive-videoconference on March 10, 2014.
Free Man’s Perspective. (2014). YES, YOU ARE BEING MANIPULATED BY YOUR GOVERNMENT. Retrieved from http://www.freemansperspective.com/governments-manipulate/ on March 20, 2014.
Gallagher, R. and Greenwald, G. (2104). How the NSA Plans to Infect ‘Millions’ of Computers with Malware. Retrieved from https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/ on March 12, 2014.
Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Metropolitan Books.
Gurnow, M. (2014). The Edward Snowden Affair: Exposing the Politics and Media Behind the NSA Scandal. Blue River Press, Inc.
Harding, L. (2014). The Snowden Files: The Inside Story of the World's Most Wanted Man. Random House, LLC.
Huffington Post. (2014). Bill Gates: Edward Snowden Is No Hero. Retrieved from http://live.huffingtonpost.com/r/archive/segment/bill-gates-edward-snowden-is-no-hero/5323697e78c90a1ede00033b on March 16, 2014.
Lucas, E. (2014). The Snowden Operation: Inside the West's Greatest Intelligence Disaster. Amazon Digital Services.
Maass, P. (2013). How Laura Poitras Helped Snowden Spill His Secrets. Retrieved from http://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html on April 3, 2014.
Meyer, D. (2014). Edward Snowden tells European Parliament how local spies aid NSA surveillance. Retrieved from http://gigaom.com/2014/03/07/edward-snowden-gives-testimony-to-european-parliament-surveillance-inquiry/ on March 7, 2014.
Moyers, B. (2014). Anatomy of the Deep State. http://billmoyers.com/2014/02/21/anatomy-of-the-deep-state/ on March 31, 2014.
Newsmax. (2013). NSA, Military Beef-Up Cybersecurity Measures in Wake of Leaks. Retrieved from http://www.newsmax.com/US/NSA-Military-cybersecurity-leaks/2013/07/19/id/515984 on July 19, 2013.
Reuters. (2014). Edward Snowden, Glenn Greenwald urge caution of wider government monitoring at Amnesty event. Retrieved from http://www.dnaindia.com/world/report-edward-snowden-glenn-greenwald-urge-caution-of-wider-government-monitoring-at-amnesty-event-1975659 on April 6, 2014.
Rodriguez, S. (2014). NSA posed as Facebook to infect computers with malware, report says. Retrieved from http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malware-20140312,0,3491724.story#ixzz2yGiHhZJa on March 12, 2014.
RT. (2014). Spooking the spooks: US surveillance system to muzzle rogue agents and leakers. Retrieved from http://rt.com/usa/us-government-internal-monitoring-870/ on March 10, 2014.
Sanger, D. and Schmidtt, E. (2014). Spy Chief Says Snowden Took Advantage of ‘Perfect Storm’ of Security Lapses. Retrieved from http://www.nytimes.com/2014/02/12/us/politics/spy-chief-says-snowden-took-advantage-of-perfect-storm-of-security-lapses.html on February 12, 2014.
Sardesai, N. (2014). NSA is Working on an Encryption-Cracking Quantum Computer. Retrieved from http://www.cryptocoinsnews.com/2014/01/03/nsa-working-encryption-cracking-quantum-computer/ on March 1, 2014.
Schneier, B. (2013). Snowden's Cryptographer on the NSA & Defending the Internet. Retrieved from https://www.youtube.com/watch?feature=player_embedded&v=kWNk9irv1e8 on March 10, 2014.
Snowden, E. (2014. Edward Snowden’s Testimony to the European Union Parliament. Retrieved from http://www.europarl.europa.eu/document/activities/cont/201403/20140307ATT80674/20140307ATT80674EN.pdf on March 7, 2014.
Snowden, E. (2104). TED Talk: Here’s how we take back the Internet. Retrieved from http://www.youtube.com/watch?v=EomroTpkaYI on March 20, 2014.
Visitor Information
Copyright 1996 - 2014 by
William F. Slater, III,
Chicago, IL, USA
All Rights Reserved, Nationally and Internationally.
|