«
Expand/Collapse
81 items tagged "government"
Related tags:
security [+],
hackers [+],
vulnerability [+],
u.s. [+],
read [+],
military [+],
hacks [+],
hacker [+],
china [+],
use [+],
uk government [+],
sql [+],
sites [+],
pujiang [+],
policy [+],
opposition mp [+],
military intelligence [+],
malaysian government [+],
intelligence [+],
information [+],
health care education [+],
government sites [+],
government doesn [+],
google [+],
cyber [+],
anonymous [+],
andreas krennmair [+],
websites [+],
website [+],
wants [+],
usa [+],
u.s. secret [+],
the netherlands [+],
rsa [+],
research [+],
nicholas merrill [+],
news [+],
new york city [+],
malaysia government [+],
malaysia [+],
legal [+],
john doe [+],
james bond [+],
internet [+],
indian government [+],
indian [+],
gary mckinnon [+],
fears [+],
egyptian government [+],
egyptian [+],
drone [+],
data requests [+],
data [+],
darknet [+],
chinese government [+],
british government [+],
british [+],
america [+],
weapons [+],
water plant [+],
warns [+],
wa government agencies [+],
voting [+],
vietnamese government [+],
vietnamese [+],
veto power [+],
veto [+],
urges [+],
urged [+],
unmanned aerial vehicles [+],
uav [+],
twitter [+],
tv film [+],
turkish government [+],
tunisia [+],
trashed [+],
top [+],
tjx [+],
tinfoil hat [+],
thepiratebay [+],
terror attacks [+],
tapping [+],
system [+],
surveillance [+],
stops [+],
stolen [+],
stays [+],
spy [+],
spread [+],
spike [+],
speech [+],
south korean government [+],
south korea government [+],
south korea [+],
south east [+],
south [+],
sniffer [+],
slow [+],
slides [+],
slack [+],
shuts [+],
shortage [+],
shielding [+],
shanghai [+],
sees [+],
security authors [+],
security advice [+],
security 2001 [+],
secure [+],
sebastian alegria [+],
search engine php [+],
search [+],
sabotage [+],
rise [+],
rfid implementation [+],
rfid [+],
refuses [+],
queensland australia [+],
queen [+],
pwns [+],
promise [+],
privacy event [+],
popular [+],
pirate bay [+],
permanent service [+],
paul wouters [+],
password row [+],
passports [+],
pakistani government [+],
pakistani [+],
outlines [+],
officials [+],
nuclear network [+],
new zealand government [+],
new zealand [+],
nabs [+],
mum [+],
ms browser [+],
miss [+],
military weapons [+],
metal lathes [+],
medical test [+],
medical [+],
lukas grunwald [+],
leaks [+],
leadership [+],
lawful interception [+],
korean [+],
kim dotcom [+],
jaya baloo [+],
japan [+],
james bond spy [+],
james bond job [+],
isp [+],
iranian government [+],
iranian [+],
intervene [+],
internet security threats [+],
interception [+],
infiltrate [+],
inclusion [+],
implications [+],
ignores [+],
ico [+],
home [+],
headcount [+],
hashing algorithm [+],
hacking [+],
hacker threat [+],
hacker attacks [+],
government websites [+],
government website [+],
government web [+],
government systems [+],
government surveillance [+],
government security [+],
government search engine [+],
government savings [+],
government rules [+],
government officials [+],
government leadership [+],
government id [+],
government data [+],
government conspiracy theories [+],
government commissions [+],
government business [+],
germany [+],
fresh [+],
found [+],
federal grand jury [+],
fail [+],
facebook [+],
evidence [+],
employs [+],
electronic voting system [+],
electronic id [+],
edgephp [+],
east asian country [+],
earthquake alarm [+],
earthquake [+],
drones [+],
down [+],
domain suffixes [+],
dna profiles [+],
disrupt [+],
devastation [+],
denies [+],
data thieves [+],
cyber threats [+],
cyber security [+],
cyber attacks [+],
cryptography [+],
crooks [+],
crack [+],
country [+],
counterfeit [+],
cookie [+],
contract renegotiations [+],
considers [+],
confirms [+],
civil servants [+],
christopher soghoian [+],
chomping at the bit [+],
chinese [+],
chile [+],
children [+],
certificate [+],
cert [+],
centralaustralia [+],
caught [+],
case [+],
canberra [+],
business [+],
breathes [+],
breaks [+],
breach [+],
boeng [+],
black hat [+],
bit [+],
best friends [+],
ban [+],
baloo [+],
authors [+],
australian government [+],
australian [+],
australia canberra [+],
australia [+],
aurora [+],
audio [+],
attacked [+],
asia [+],
arduino [+],
antics [+],
andreas lehner [+],
amazon [+],
alleged [+],
alegria [+],
albert gonzalez claims [+],
albert gonzalez [+],
albert [+],
alarm [+],
al qaeda [+],
advice [+],
adoption [+],
abu dhabi [+],
Issues [+],
Hackerspaces [+],
General [+],
Community [+],
100 square meters [+],
chaos communication congress [+]
-
-
21:47
»
SecDocs
Authors:
Andreas Lehner Paul Wouters Tags:
sniffer Event:
Chaos Communication Congress 18th (18C3) 2001 Abstract: Meant by its designers to be a public specification, the Transport of Intercepted IP Traffic is a "secret" document describing the interception and handover of a user's internet data from suspect to government. We'll examine what happens at the sniffer box(S1), the collector box (S2) and the government receivers (T1 and T2), and the encryption used. We'll discuss how the government will tunnel this data to themselves, or what data can't possible be tapped with the current specification. Finally, we'll describe what we know about the digital tapping room, and what a possible target can do to make things really hard for the ISP's and the government.
-
-
8:00
»
Hack a Day
Every other year the Australian Research Center for Aerospace Automation, the government of Queensland, Australia and other government and research institutions hold a contest to develop technology for unmanned aerial vehicles for the wastes of central Australia. Canberra UAV – a group of autonomous drone enthusiasts from the Make, Hack, Void hackerspace – took part in this UAV challenge [...]
-
-
21:55
»
SecDocs
Authors:
Andreas Krennmair Tags:
intelligence Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Since 9/11, the US government is especially picky about which information is to be published. This lecture shows how you can still get some very interesting and "sensitive" geographical information. Since 9/11, the US governments is picky about publishing potentially sensitive information. In this lecture, I will show what the US government doesn't want you to know and how you can still retrieve that information by only using free tools in a very lame but efficient way.
-
21:55
»
SecDocs
Authors:
Andreas Krennmair Tags:
intelligence Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Since 9/11, the US government is especially picky about which information is to be published. This lecture shows how you can still get some very interesting and "sensitive" geographical information. Since 9/11, the US governments is picky about publishing potentially sensitive information. In this lecture, I will show what the US government doesn't want you to know and how you can still retrieve that information by only using free tools in a very lame but efficient way.
-
13:45
»
SecDocs
Authors:
Andreas Krennmair Tags:
intelligence Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Since 9/11, the US government is especially picky about which information is to be published. This lecture shows how you can still get some very interesting and "sensitive" geographical information. Since 9/11, the US governments is picky about publishing potentially sensitive information. In this lecture, I will show what the US government doesn't want you to know and how you can still retrieve that information by only using free tools in a very lame but efficient way.
-
-
9:01
»
Hack a Day
The world is buzzing about drones right now. Even we’re joining in the fun with some antics of our own. Right now, it is basically a legal free-for all since no one is enforcing regulation, but is that about to change? Should it? Lets start off by establishing the definition of a “drone”. For this [...]
-
-
13:49
»
SecDocs
Authors:
Arjen Kamphuis Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: On January 1st, 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP's to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate. On December 12th we achieved a stunning victory, the Dutch public sector will move to standardize on Open Documents Format and use opensource where comparable functionality is available in all new procurements as of 2008. Use of ODF as a public sector document standard will be mandatory in 2009. My talk will tell the tale of why we did it but mostly how we did it and how others can do it too in other countries around the world. How to get access to the power-that-be, how to get non-technical people interested in the subject. How to align your policy proposals with existing policies. While I'll do a short lead-in with some of the political reasons for wanting open standards and opensource in government IT I'll focus mainly on how to get results. From having no policy at all in 2002 the Dutch government has recently decided to mandate the use of open standards for all government institutions, health care, education, libraries and any other tax-funded organizations. Opensource software will receive preferential treatment.
-
13:46
»
SecDocs
Authors:
Arjen Kamphuis Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: On January 1st, 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP's to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate. On December 12th we achieved a stunning victory, the Dutch public sector will move to standardize on Open Documents Format and use opensource where comparable functionality is available in all new procurements as of 2008. Use of ODF as a public sector document standard will be mandatory in 2009. My talk will tell the tale of why we did it but mostly how we did it and how others can do it too in other countries around the world. How to get access to the power-that-be, how to get non-technical people interested in the subject. How to align your policy proposals with existing policies. While I'll do a short lead-in with some of the political reasons for wanting open standards and opensource in government IT I'll focus mainly on how to get results. From having no policy at all in 2002 the Dutch government has recently decided to mandate the use of open standards for all government institutions, health care, education, libraries and any other tax-funded organizations. Opensource software will receive preferential treatment.
-
13:45
»
SecDocs
Authors:
Arjen Kamphuis Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: On January 1st, 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP's to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate. On December 12th we achieved a stunning victory, the Dutch public sector will move to standardize on Open Documents Format and use opensource where comparable functionality is available in all new procurements as of 2008. Use of ODF as a public sector document standard will be mandatory in 2009. My talk will tell the tale of why we did it but mostly how we did it and how others can do it too in other countries around the world. How to get access to the power-that-be, how to get non-technical people interested in the subject. How to align your policy proposals with existing policies. While I'll do a short lead-in with some of the political reasons for wanting open standards and opensource in government IT I'll focus mainly on how to get results. From having no policy at all in 2002 the Dutch government has recently decided to mandate the use of open standards for all government institutions, health care, education, libraries and any other tax-funded organizations. Opensource software will receive preferential treatment.
-
-
21:28
»
SecDocs
Authors:
Rop Gonggrijp Tags:
election Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: 2007 has been yet another a turbulent year in The Netherlands with regard to electronic voting. If you remember the presentation at 23c3, 2006 saw the emergence of a campaign against the use of non-auditable voting systems. As a result, two government commissions were appointed, the OSCE monitored a national election and one Windows-based touch screen system with a GPRS-wireless card lost its approval. 2007 saw the re-approval and de-approval of this same system, on grounds that have little to do with the main problems of non-auditability and presumed insecurity. We also got the reports from the OSCE as well as from the two government commissions. For a long time, the dutch government tried desperately to keep the Nedap systems around until something new could be built. We fought back, both in the political arena and in court. This past september, government gave up, and announced decertification of the last remaining electonic voting systems made by Nedap. This is true victory worth celebrating. But dutch people abroad can still vote over the Internet and we need to watch the new electronic voting system the dutch government seems to want to develop. And we need to make sure e-voting doesn't return as a pan-European project.
-
-
21:39
»
SecDocs
Authors:
Nicholas Merrill Tags:
privacy Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: My name is Nicholas Merrill and I was the plaintiff in a legal case in the US court system where I challenged the FBI’s policy of using a feature of the so-called USA PATRIOT act - what are called “National Security Letters” - to bypass the American Constitution's system of checks and balances and in violation of the United Nations Universal Declaration of Human Rights - in order to obtain protected personal information and to unmask anonymous Internet users. I spent over 6 years not able to speak to anyone (other than my lawyers) about my case - forced to lie to those closest to me due to an FBI gag order that carried a possible 10 year prison sentence for violating it. However the lawsuit resulted in the establishment of two key legal precedents and made changes that affect every Internet worker and Telephone worker in America. I would like to speak to the 27C3 audience in order to tell about my experience and to challenge (and offer my support and assistance to) those individuals who are in a position to challenge government surveillance requests to follow their consciences and do so. People who work at Internet Service Providers and Telephone companies as well as IT workers at Universities and private businesses are increasingly likely to encounter government attempts at surveillance. I would like to speak to the CCC regarding my experiences in resisting a National Security Letter and also a “Grand Jury Subpoena” as well as my experience of being gagged by the FBI for nearly 7 years - unable to speak on the subject or identify myself as the plaintiff in the NSL lawsuit. Nicholas Merrill founded Calyx Internet Access Corporation in 1995. Calyx Internet Access was one of the first commercial Internet service providers operating in New York City. Calyx pursued relationships with and worked with many activist groups on a pro bono or low-cost basis, including the New York Civil Liberties Union, the Independent Media Center (Indymedia.org) and the Drug Policy Foundation. In 2004, after a receiving a “National Security Letter” from the Federal Bureau of Investigation, and a subsequent request from the U.S. Secret Service, Calyx became involved with the ACLU and in using the legal system and the media to resist illegal government requests for information on Internet users. For six and a half years, Merrill and the ACLU tirelessly challenged the orders contained in the letter, resulting in the establishment of two key legal precedents overturning aspects of the national security letter program. Along the way he encountered court proceedings where he could not even be present - where he could not be referred to by name, but instead was referred to in all court documents as "John Doe". He also encountered heavy handed government censorship of court documents under the guise of "National Security" and secret evidence presented to the judge by the FBI that his attorneys were not allowed to see. The merging of Merrill's long interest in advocacy and free speech combined with his experience with the U.S. government inspired him to form a non-govermental organization (NGO) to deal specifically with this issue without being distracted or compromised by the requirements of a for-profit business.
-
21:39
»
SecDocs
Authors:
Nicholas Merrill Tags:
privacy Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: My name is Nicholas Merrill and I was the plaintiff in a legal case in the US court system where I challenged the FBI’s policy of using a feature of the so-called USA PATRIOT act - what are called “National Security Letters” - to bypass the American Constitution's system of checks and balances and in violation of the United Nations Universal Declaration of Human Rights - in order to obtain protected personal information and to unmask anonymous Internet users. I spent over 6 years not able to speak to anyone (other than my lawyers) about my case - forced to lie to those closest to me due to an FBI gag order that carried a possible 10 year prison sentence for violating it. However the lawsuit resulted in the establishment of two key legal precedents and made changes that affect every Internet worker and Telephone worker in America. I would like to speak to the 27C3 audience in order to tell about my experience and to challenge (and offer my support and assistance to) those individuals who are in a position to challenge government surveillance requests to follow their consciences and do so. People who work at Internet Service Providers and Telephone companies as well as IT workers at Universities and private businesses are increasingly likely to encounter government attempts at surveillance. I would like to speak to the CCC regarding my experiences in resisting a National Security Letter and also a “Grand Jury Subpoena” as well as my experience of being gagged by the FBI for nearly 7 years - unable to speak on the subject or identify myself as the plaintiff in the NSL lawsuit. Nicholas Merrill founded Calyx Internet Access Corporation in 1995. Calyx Internet Access was one of the first commercial Internet service providers operating in New York City. Calyx pursued relationships with and worked with many activist groups on a pro bono or low-cost basis, including the New York Civil Liberties Union, the Independent Media Center (Indymedia.org) and the Drug Policy Foundation. In 2004, after a receiving a “National Security Letter” from the Federal Bureau of Investigation, and a subsequent request from the U.S. Secret Service, Calyx became involved with the ACLU and in using the legal system and the media to resist illegal government requests for information on Internet users. For six and a half years, Merrill and the ACLU tirelessly challenged the orders contained in the letter, resulting in the establishment of two key legal precedents overturning aspects of the national security letter program. Along the way he encountered court proceedings where he could not even be present - where he could not be referred to by name, but instead was referred to in all court documents as "John Doe". He also encountered heavy handed government censorship of court documents under the guise of "National Security" and secret evidence presented to the judge by the FBI that his attorneys were not allowed to see. The merging of Merrill's long interest in advocacy and free speech combined with his experience with the U.S. government inspired him to form a non-govermental organization (NGO) to deal specifically with this issue without being distracted or compromised by the requirements of a for-profit business.
-
-
9:01
»
Hack a Day
There is no shortage of government and entertainment-related agencies chomping at the bit to shut down the Pirate Bay for good. While the group has not suffered a permanent service ending raid like [Kim Dotcom] and the Megaupload crew, they are always thinking up novel ways to ensure that the site can endure whatever law [...]
-
-
12:01
»
Hack a Day
Government leadership in Shanghai wants to build 100 community hackerspaces funded by the Chinese government. Each space will be at least 100 square meters, open 200 days a year, and come equipped with wood and metal lathes, saws, drills, grinders, mills, and more electronics than we can imagine. The official government statement (translated here) says [...]
-
14:01
»
Hack a Day
Boeng and the US military found some systems on new P-8 Posiedons to be defective. The culprit: counterfeit electronics. These are scrap parts from 80s-90s electronics that have been re-branded and sold to the government as new. Many of the parts have been linked to dealers in China, but the Chinese government feels no need [...]
-
-
14:06
»
Hack a Day
When an earthquake is about to strike in Chile, who do you think is first to sound the alarm? You might be surprised that it’s not the government, but rather a 14 year old boy. After living through an earthquake in 2010 and seeing the devastation this spring in Japan, Chilean teenager [Sebastian Alegria] decided [...]
-
-
1:30
»
Sophos security news
UK civil servants indicate that headcount reduction is not the answer as they look to shared services and contract renegotiations to reduce IT overheads
-
-
13:23
»
SecDocs
Authors:
Lukas Grunwald Tags:
RFID Event:
Black Hat Abu Dhabi 2010 Abstract: This presentation is showing some risk of the use of "Insecure" RFID implementation on Passports and Government ID Documents for Automatic Immigration (E-Gates) as well how easy a identity could be stolen. A overview of already existing electronic ID will be given, as well new work of the new German eID with Multi-Usage for Government, Legal as well private use for Parking-Meters, home Banking as well e-commerce.