While Jacob Appelbaum grabbed headlines with his NSA revelations
at this year's Chaos Communication Congress
, other presentations provided equally fascinating insight into how the world works. Learn how data mining is bringing perpetrators of genocide to justice
), how an artist uses different concepts of secrecy landscapes
) to keep tabs on clandestine activities, and how India's surveillance state continues to grow
A few additional highlights:
Glenn Greenwald delivered the keynote address
Policing the Romantic Crowd
]. Professor Richard Marggraf Turley and Anne Marggraf-Turley examine the use of surveillance technologies during the Romantic period, and the similarities to their modern counterparts. At last year's CCC, the two gave a talk on Romantic Hackers
Electronic Bank Robberies
]. Security researchers analyze malware which has been infecting ATMs and uncover the business behind how malware is used to steal money from cash machines. They're not the first to jackpot an ATM
, but modern criminals have interesting ways to make sure their mules
don't walk away with their money.
Backdoors, Government Hacking and the Next Crypto Wars
]. ACLU Technologist Christopher Soghoian
discusses the slowly increasing deployment of cryptography, use of hacking software by federal and local law enforcement, and how government requests may move from asking for individual user data to asking for encryption keys used to protect all user data.
To Protect and Infect: The Militarization of the Internet
. Claudio Guarnieri
and Morgan Marquis-Boire
discuss the deployment and capabilities of commercial spying suites such as FinFisher and how they are used by repressive governments to spy on dissidents.
No Neutral Ground in a Burning World
]. Quinn Norton
and Eleanor Saitta
discuss the views and expectations of governments and cultural institutions through the longer lens of history.
Through a PRISM, Darkly
]. Kurt Opsahl
of the EFF provides clarity regarding the history and codenames of the NSA's spying programs, what programs we know are currently being used, as well as insight into how to help stop the spying.
ID Cards in China
). How electronic ID cards carried by Chinese residents contain health information such as HIV status, political affiliations, and more. Talk discusses history of tracking, who has access to this data, and what it means for human rights.
Towards an affordable brain-computer interface
The Year In Crypto
You can find many additional (largely more technical) videos available for download
in several formats (as well as on Youtube