background preloader

Surveillance

Facebook Twitter

Keys Can be Copied From Afar, Jacobs School Computer Scientists Show [Jacobs School of Engineering: News & Events] San Diego, CA, October 30, 2008--UC San Diego computer scientists have built a software program that can perform key duplication without having the key.

Keys Can be Copied From Afar, Jacobs School Computer Scientists Show [Jacobs School of Engineering: News & Events]

Instead, the computer scientists only need a photograph of the key. “We built our key duplication software system to show people that their keys are not inherently secret,” said Stefan Savage, the computer science professor from UC San Diego’s Jacobs School of Engineering who led the student-run project. “Perhaps this was once a reasonable assumption, but advances in digital imaging and optics have made it easy to duplicate someone’s keys from a distance without them even noticing.” Professor Savage presents this work on October 30 at ACM’s Conference on Communications and Computer Security (CCS) 2008, one of the premier academic computer security conferences.

The bumps and valleys on your house or office keys represent a numeric code that completely describes how to open your particular lock. How it works “The program is simple. SIM Card Spy Ear for Nosy Neighbors and Private Eyes. Police Wiretapping Jumps 26 Percent. Spy Phone mobile surveillance, spyphone. Communications Surveillance. Related Content Understanding DRM The explosive growth of the Internet and digital media has created both tremendous opportunities and new threats for content creators.

Communications Surveillance

Advances in digital technology offer new ways of marketing, disseminating, interacting with, and monetizing creative works, giving rise to expanding markets that did not exist just a few years ago. At the same time, however, the technologies have created major challenges for copyright holders seeking to control the distribution of their works and protect against piracy. Browse this Topic: Wiretapping Made Easy - Forbes.com. Hidden Surveillance. By Rob Wipond, February 2012 Not many people know that local police and the RCMP have already begun building a massive public traffic surveillance system.

Hidden Surveillance

And no one knows how they’re going to use it. The A News reporter and Nanaimo constable interwove: “amazing,” “blown away,” “overwhelming.” “This will revolutionize the way we police,” proclaimed Vancouver police in The Province. Both media and police across North America have engaged in such trumpeting about Automatic Licence Plate Recognition (ALPR). Normally, area police manually key in plate numbers to check suspicious cars in the databases of the Canadian Police Information Centre and ICBC. How to DDOS a federal wiretap. IDG News Service - Researchers at the University of Pennsylvania say they've discovered a way to circumvent the networking technology used by law enforcement to tap phone lines in the U.S.

How to DDOS a federal wiretap

The flaws they've found "represent a serious threat to the accuracy and completeness of wiretap records used for both criminal investigation and as evidence in trial," the researchers say in their paper, set to be presented Thursday at a computer security conference in Chicago. Surveillance Video Becomes a Tool for Studying Customer Behavior. Who’s there: Software from Prism Skylabs processes surveillance footage to show how busy a place is without compromising customers’ privacy.

Surveillance Video Becomes a Tool for Studying Customer Behavior

The huge success of online shopping and advertising—led by giants like Amazon and Google—is in no small part thanks to software that logs when you visit Web pages and what you click on. Startup Prism Skylabs offers brick-and-mortar businesses the equivalent—counting, logging, and tracking people in a store, coffee shop, or gym with software that works with video from security cameras. Listening to you at last: EU plans to tap cell phones. Monday, October 19, 2009 A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month.

Listening to you at last: EU plans to tap cell phones

Project INDECT aims to mine data from television, internet traffic, cellphone conversations, p2p file sharing and a range of other sources for crime prevention and threat prediction. Federal Judge Finds N.S.A. Wiretaps Were Illegal. In a 45-page opinion, Judge ruled that the government had violated a 1978 federal statute requiring court approval for domestic surveillance when it intercepted phone calls of Al Haramain, a now-defunct Islamic charity in Oregon, and of two lawyers representing it in 2004.

Federal Judge Finds N.S.A. Wiretaps Were Illegal

Declaring that the plaintiffs had been “subjected to unlawful surveillance,” the judge said the government was liable to pay them damages. The ruling delivered a blow to the Bush administration’s claims that its surveillance program, which Mr. Bush secretly authorized shortly after the terrorist attacks of Sept. 11, 2001, was lawful. Under the program, the National Security Agency monitored Americans’ international e-mail messages and phone calls without court approval, even though the , or FISA, required warrants. Tapping cell phones. Bob Segall/13 Investigates Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment.

Tapping cell phones

If you have a cell phone, it could happen to you. 13 Investigates explains how your cell phone can be secretly hijacked and used against you - and how to protect yourself. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued.