|
CCCAMP 2015 - Mainstreet Policing Meets Military-Grade Surveillance |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
CCCAMP 2015 - Mainstreet Policing Meets Military-Grade SurveillancePar SecurityTube.NetLe [2015-08-31] à 07:12:28 Présentation : Mainstreet Policing Meets Military-Grade Surveillance In the United States, people increasingly understand that local police departments often possess high-tech military grade weapons and equipment designed for the battlefield. But what people don t realize is that the same police departments often also possess very sophisticated surveillance technology that can be used to monitor, track and record the population as we all go about our everyday activities. The talk will explore the kinds of surveillance technologies now in the possession of ordinary police departments far from any crime or terrorism hotspots. In the United States, particularly after protests in Ferguson in the wake of the police killing of Michael Brown, people increasingly understand that local police departments often possess high-tech military grade weapons and equipment designed for the battlefield. But what people don t realize is that the same police departments often also possess very sophisticated surveillance technology that can be used to monitor, track and record the population as we all go about our everyday activities. From stingrays to aerial surveillance to license plate readers and cell phone tracking, police now possess the ability to track people that the intelligence services could only have dreamed of decades ago. The talk will explore the kinds of surveillance technologies now in the possession of ordinary police departments far from any crime or terrorism hotspots. It will focus particularly on technologies of mass surveillance--ones that, like license plate readers, allow law enforcement agencies to monitor and record the movements or other activities of large numbers of people. It will discuss the origins of these technologies, and what is known about their use. Although the talk will focus on the U.S., similar technologies are present throughout Europe and audience members will be invited to talk about what's going on in their own communities. For More Information Please Visit - https www.ccc.de Les mots clés de la revue de presse pour cet article : surveillance Les videos sur SecuObs pour les mots clés : surveillance Les derniers articles du site "SecurityTube.Net" :- TROOPERSCON - Crypto code the 9 circles of testing- TROOPERSCON - Towards a LangSec Aware SDLC- TROOPERSCON - Deep dive into SAP archive file formats- TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable- TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account- TROOPERSCON - One Tool To Rule Them All- TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics- TROOPERSCON - The Chimaera Processor- TROOPERSCON - Lets Play Hide and Seek in the Cloud- TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|