Master AI and Machine Learning: From Neural Networks to Applications
AI Engineer - Learn how to integrate AI into software applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore classic misdirection techniques and social engineering strategies to counter surveillance in this 25-minute conference talk from BSidesLV 2015. Delve into real-world scenarios, threat modeling, and information denial tactics. Learn about deception methods, targeted information leaks, and ECM jamming. Discover how to detect and exploit countermeasures, understand the importance of context, and navigate danger zones. Gain insights on researching adversaries and providing just enough information to maintain an advantage. Engage with practical examples and thought-provoking questions to enhance your understanding of counter-surveillance techniques.
Syllabus
Intro
Warning
Disclaimer
Real World Scenario
Introduction to Archer
Threat Model
Information Denial
Deception
Art Restorer
Google Search
Targeted Information Leaks
ECM Jammer
Detecting
Archer
Exploit countermeasures
Efforts on you up
Context matters
Danger zone
Researching blue
Giving enough information
Questions
Taught by
BSidesLV