background preloader

Software that tracks people on social media created by defence firm

Software that tracks people on social media created by defence firm
A multinational security firm has secretly developed software capable of tracking people's movements and predicting future behaviour by mining data from social networking websites. A video obtained by the Guardian reveals how an "extreme-scale analytics" system created by Raytheon, the world's fifth largest defence contractor, can gather vast amounts of information about people from websites including Facebook, Twitter and Foursquare. Raytheon says it has not sold the software – named Riot, or Rapid Information Overlay Technology – to any clients. But the Massachusetts-based company has acknowledged the technology was shared with US government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analysing "trillions of entities" from cyberspace. Using Riot it is possible to gain an entire snapshot of a person's life – their friends, the places they visit charted on a map – in little more than a few clicks of a button.

Learn TCP/IP -: IP Spoofing :- The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system. For Check Your IP Address.. for see another IP address Why it works ? How it works ? Internet Protocol (IP) : It is a network protocol operating at layer 3 (network) of the OSI model. Your Browser and Server use TCP/IP Browsers and servers use TCP/IP to connect to the Internet. A browser uses TCP/IP to access a server. Your E-Mail uses TCP/IP Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails. Your Internet Address is TCP/IP Your Internet address "192.168.10.14" is a part of the standard TCP/IP protocol (and so is your domain name). What is TCP/IP? TCP/IP is the communication protocol for communication between computers on the Internet.

Main Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks. If you are impatient and want to know how to get started, jump to the Getting Started Tutorial. Aircrack-ng is the next generation of aircrack with lots of new features: More cards/drivers supported More OS and platforms supported WEP dictionary attack Fragmentation attack WPA Migration mode Improved cracking speed Capture with multiple cards Optimizations, other improvements and bug fixing … Note: Check trac for planned and requested features More news... Current version Latest version: 1.2 Beta 3 Zaurus (1.0-dev r830; older than beta2) Changelog Finally properly fixed the buffer overflow. Virtual Machine

Related: