«
Expand/Collapse
45 items tagged "surveillance"
Related tags:
employee surveillance [+],
employee [+],
cyclope [+],
version 6 [+],
solution 6 [+],
privacy [+],
vulnerability [+],
interaction behaviour [+],
automated [+],
analysis [+],
video [+],
technology [+],
secret love affair [+],
privacy event [+],
middle east [+],
hopalong casualty [+],
dvr [+],
cross site scripting [+],
censorship tools [+],
censorship [+],
atlantic [+],
argus [+],
video surveillance systems [+],
surveillance camera players [+],
sql injection [+],
security [+],
rgine dbatty [+],
police [+],
perry barlow [+],
new orleans [+],
marpet [+],
license plate recognition [+],
joshua marpet [+],
john perry barlow [+],
john [+],
iran [+],
internet [+],
fbi [+],
face recognition software [+],
credit card frauds [+],
credit [+],
court [+],
chaos communication camp [+],
bourbon street [+],
audio [+],
world scenarios [+],
weigh [+],
waterboarding [+],
uses [+],
usa [+],
urban environment [+],
trust [+],
trajectory analysis [+],
tom cross [+],
times [+],
technical weaknesses [+],
tape [+],
sylvia johnigk [+],
surveillance technologies [+],
surveillance tape [+],
surveillance system [+],
surveillance footage [+],
surveillance device [+],
surveillance capabilities [+],
surveillance cam [+],
stuxnet [+],
sql query [+],
spyware [+],
spike [+],
slides [+],
single [+],
siemens [+],
selective disclosure [+],
security related research [+],
school [+],
rulers [+],
pushes [+],
nsa [+],
nokia siemens [+],
nokia [+],
new gadgets [+],
new [+],
mobile phones [+],
met [+],
meps [+],
libya [+],
laptop [+],
internet surveillance systems [+],
intercept [+],
intelligent information system [+],
indect [+],
government surveillance [+],
government [+],
google [+],
german authorities [+],
geeks [+],
fire [+],
fear [+],
exploiting [+],
eld [+],
dubai [+],
device [+],
degree [+],
condemn [+],
caught [+],
cam [+],
boom times [+],
boom [+],
bin [+],
backdoors [+],
assassins [+],
approved [+],
appeals court [+],
chaos communication congress [+]
-
-
21:41
»
SecDocs
Authors:
Ingo Lütkebohle Tags:
biometric Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated analysis of surveillance videos has seen a lot of research in recent years. Face recognition and person tracking are widely available, more sophisticated behaviour analysis is coming. The aim of the current talk is an overview into the methods used for analysis, their current performance and limitations. Automated analysis of videos is a hot research topic currently, mostly fuelled (and funded) by interest in surveillance applications. Some of the work focuses on /identifying/ persons by individual differences in their motion patterns, e.g., the way the walk. Much current work tries to determine human interaction behaviour, e.g. whether two persons are standing and talking or whether they are fighting. A last big area is that of trajectory analysis, e.g. distinguishing persons walking straight across an open place from persons sticking around longer. This talk will give an overview into whats possible currently and then introduce some of the common methods of motion analysis with a focus on real-time capability. It will touch upon motion-history images, model-based tracking, graphical models for time-series and learning methods for classification. Throughout, pointers to toolkits that can be used to implement the methods presented will be provided. Of course, there are still a lot of problems, some of them quite fundamental, e.g. occlusions, crowds, influence of rain and wind, and the like. These problems, and their causes, will be explained under the assumption that the audience will be able to make creative use of this knowledge for playing with the system.
-
3:39
»
SecDocs
Authors:
Ingo Lütkebohle Tags:
biometric Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated analysis of surveillance videos has seen a lot of research in recent years. Face recognition and person tracking are widely available, more sophisticated behaviour analysis is coming. The aim of the current talk is an overview into the methods used for analysis, their current performance and limitations. Automated analysis of videos is a hot research topic currently, mostly fuelled (and funded) by interest in surveillance applications. Some of the work focuses on /identifying/ persons by individual differences in their motion patterns, e.g., the way the walk. Much current work tries to determine human interaction behaviour, e.g. whether two persons are standing and talking or whether they are fighting. A last big area is that of trajectory analysis, e.g. distinguishing persons walking straight across an open place from persons sticking around longer. This talk will give an overview into whats possible currently and then introduce some of the common methods of motion analysis with a focus on real-time capability. It will touch upon motion-history images, model-based tracking, graphical models for time-series and learning methods for classification. Throughout, pointers to toolkits that can be used to implement the methods presented will be provided. Of course, there are still a lot of problems, some of them quite fundamental, e.g. occlusions, crowds, influence of rain and wind, and the like. These problems, and their causes, will be explained under the assumption that the audience will be able to make creative use of this knowledge for playing with the system.
-
3:39
»
SecDocs
Authors:
Ingo Lütkebohle Tags:
biometric Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated analysis of surveillance videos has seen a lot of research in recent years. Face recognition and person tracking are widely available, more sophisticated behaviour analysis is coming. The aim of the current talk is an overview into the methods used for analysis, their current performance and limitations. Automated analysis of videos is a hot research topic currently, mostly fuelled (and funded) by interest in surveillance applications. Some of the work focuses on /identifying/ persons by individual differences in their motion patterns, e.g., the way the walk. Much current work tries to determine human interaction behaviour, e.g. whether two persons are standing and talking or whether they are fighting. A last big area is that of trajectory analysis, e.g. distinguishing persons walking straight across an open place from persons sticking around longer. This talk will give an overview into whats possible currently and then introduce some of the common methods of motion analysis with a focus on real-time capability. It will touch upon motion-history images, model-based tracking, graphical models for time-series and learning methods for classification. Throughout, pointers to toolkits that can be used to implement the methods presented will be provided. Of course, there are still a lot of problems, some of them quite fundamental, e.g. occlusions, crowds, influence of rain and wind, and the like. These problems, and their causes, will be explained under the assumption that the audience will be able to make creative use of this knowledge for playing with the system.
-
3:39
»
SecDocs
Authors:
Ingo Lütkebohle Tags:
biometric Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated analysis of surveillance videos has seen a lot of research in recent years. Face recognition and person tracking are widely available, more sophisticated behaviour analysis is coming. The aim of the current talk is an overview into the methods used for analysis, their current performance and limitations. Automated analysis of videos is a hot research topic currently, mostly fuelled (and funded) by interest in surveillance applications. Some of the work focuses on /identifying/ persons by individual differences in their motion patterns, e.g., the way the walk. Much current work tries to determine human interaction behaviour, e.g. whether two persons are standing and talking or whether they are fighting. A last big area is that of trajectory analysis, e.g. distinguishing persons walking straight across an open place from persons sticking around longer. This talk will give an overview into whats possible currently and then introduce some of the common methods of motion analysis with a focus on real-time capability. It will touch upon motion-history images, model-based tracking, graphical models for time-series and learning methods for classification. Throughout, pointers to toolkits that can be used to implement the methods presented will be provided. Of course, there are still a lot of problems, some of them quite fundamental, e.g. occlusions, crowds, influence of rain and wind, and the like. These problems, and their causes, will be explained under the assumption that the audience will be able to make creative use of this knowledge for playing with the system.
-
17:00
»
SecuriTeam
Cyclope Employee Surveillance Solution is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
-
-
21:45
»
SecDocs
Authors:
Sandro Gaycken Tags:
privacy Event:
Chaos Communication Camp 2007 Abstract: One thing often lacking in discussions around privacy is a clear argument apart from the intuitive “I don’t like to be under surveillance”. This absence fatally leads to the wrong public impression that it is only about a personal taste for privacy against hits on child molesters, credit card fraud and terrorism. My talk thus will give some clear and rock-solid arguments, demonstrating privacy as a protection from injustice and from a new and speculative class society, as the foundation of our abilities to judge independently and ethically, as the breeding ground for personal and societal development, as our impression of freedom and as an important pre-emptive value to prohibit technological infrastructures for dictatorships. One thing often found to be lacking in many discussions on the struggle for privacy is a clear argument in favour of it. Even most activists whom everyone would suppose to have clear reasons mostly argue in strongly subjective terms, stating their personal uneasiness or discomfort with some surveillance problem in terms as “I don’t like to be under surveillance”. And sure enough: who does? But in times where terrorists disguise as civilians, where child molesters and credit card frauds use synonyms and all sorts of electronic communication, also disguised as harmless people, and where surveillance is ubiquitous in the sense that it is disseminated entirely invisible and unpresent – why not feel different? On what grounds can we really charge someone who says: “If surveillance doesn’t really disturb me and if it helps to catch terrorists and child molesters and protect my credit card, I think it’s ok”. In fact, even John Perry Barlow (on the last congress) seemed to be in favour of some sort of intern, panoptical self-surveillance if it does protect his credit card from fraud and his email account from spam. So why bother? Are we only protecting our very own (and probably misplaced) feelings? Of course not. By fighting for privacy, we fight for a most basic, most human need: our space. We need our space and we need it for a whole variety of important reasons: psychological, ethical, political, societal and others. And many scholars have in fact explored and argued in depth for these reasons. They only have to be translated and be made accessible. In my talk, I will thus present these scholarly perspectives in an understandable manner and thus will support the privacy activist with two whole fistfuls of most reasonable and valuable arguments in favour of privacy and in strong opposition to any kind of surveillance. By this, I deeply hope to fill that argumentative gap and clarify the activists intuitions.
-
-
21:39
»
SecDocs
Authors:
Sandro Gaycken Tags:
privacy Event:
Chaos Communication Camp 2007 Abstract: One thing often lacking in discussions around privacy is a clear argument apart from the intuitive “I don’t like to be under surveillance”. This absence fatally leads to the wrong public impression that it is only about a personal taste for privacy against hits on child molesters, credit card fraud and terrorism. My talk thus will give some clear and rock-solid arguments, demonstrating privacy as a protection from injustice and from a new and speculative class society, as the foundation of our abilities to judge independently and ethically, as the breeding ground for personal and societal development, as our impression of freedom and as an important pre-emptive value to prohibit technological infrastructures for dictatorships. One thing often found to be lacking in many discussions on the struggle for privacy is a clear argument in favour of it. Even most activists whom everyone would suppose to have clear reasons mostly argue in strongly subjective terms, stating their personal uneasiness or discomfort with some surveillance problem in terms as “I don’t like to be under surveillance”. And sure enough: who does? But in times where terrorists disguise as civilians, where child molesters and credit card frauds use synonyms and all sorts of electronic communication, also disguised as harmless people, and where surveillance is ubiquitous in the sense that it is disseminated entirely invisible and unpresent – why not feel different? On what grounds can we really charge someone who says: “If surveillance doesn’t really disturb me and if it helps to catch terrorists and child molesters and protect my credit card, I think it’s ok”. In fact, even John Perry Barlow (on the last congress) seemed to be in favour of some sort of intern, panoptical self-surveillance if it does protect his credit card from fraud and his email account from spam. So why bother? Are we only protecting our very own (and probably misplaced) feelings? Of course not. By fighting for privacy, we fight for a most basic, most human need: our space. We need our space and we need it for a whole variety of important reasons: psychological, ethical, political, societal and others. And many scholars have in fact explored and argued in depth for these reasons. They only have to be translated and be made accessible. In my talk, I will thus present these scholarly perspectives in an understandable manner and thus will support the privacy activist with two whole fistfuls of most reasonable and valuable arguments in favour of privacy and in strong opposition to any kind of surveillance. By this, I deeply hope to fill that argumentative gap and clarify the activists intuitions.
-
15:07
»
SecDocs
Authors:
Régine Débatty Tags:
privacy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In 1996, The Surveillance Camera Players started manifesting their opposition to the culture of surveillance by performing silent, specially adapted plays directly in front of CCTV cameras. 10 years after, their work is more relevant than ever. This talk will take you through artists' strategies to raise the debate on privacy, the society of the spectacle, the aftermath of September 11th, face recognition software, panopticism, electronic tagging, etc.
-
15:02
»
SecDocs
Authors:
Régine Débatty Tags:
privacy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: In 1996, The Surveillance Camera Players started manifesting their opposition to the culture of surveillance by performing silent, specially adapted plays directly in front of CCTV cameras. 10 years after, their work is more relevant than ever. This talk will take you through artists' strategies to raise the debate on privacy, the society of the spectacle, the aftermath of September 11th, face recognition software, panopticism, electronic tagging, etc.
-
-
21:37
»
SecDocs
Authors:
Sandro Gaycken Tags:
privacy Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: In many social situations, people start to adjust their behaviour due to surveillance. Inspired by more and more cases of breaches of data protection regulations, an erosion of trust into these regulations and those who forfeit them can be seen. The consequences of this are grim. Either we abolish surveillance technologies or the idea of "informational self-determination".
-
-
21:36
»
SecDocs
Authors:
Sylvia Johnigk Tags:
intelligence Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: The acronym stands for Intelligent Information System Supporting Observation, Searching and Detection for Security of Citizens in Urban Environment. A total of 17 partners in nine member states are developing an infrastructure for linking existing surveillance technologies to form one mighty instrument for controlling the people. They are laying the foundation of a European police state, since INDECT's results serve to increase the effectiveness of police operation on the national and European level. INDECT is funded under the European Commission's Seventh Framework Programme (FP7), the security-related research of which provides € 1.4 billion Euro for more than 60 partly interlaced projects. This Is What the Police Will Work with in the Future: ·Unmanned aerial vehicles/drones with surveillance camera and sensors ·Software (for cameras etc.) to identify supposedly suspicious behavior or hostile intent ·Auto-tracking of mobile objects ·Software (autonomous agents) to monitor virtual spaces such as discussion forums in the Internet or social networks ·Trojan horses which record users’ private computer activity ·Safeguards, such as watermarking, to allow sophisticated controls on recorded images for evidence, and to index, analyse and administer multimedia content (such as video) ·A search engine combining direct search of data from the real and the virtual world
-
-
21:35
»
SecDocs
Tags:
privacy Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: The objective of the session is to provide a critical overview of "privacy research" within computer science. The mechanisms proposed in the last ten year include mechanisms for anonymous communications, censorship resistance, selective disclosure credentials (and their integration in identity management systems), as well as privacy in databases. All of these system are meant to shield the user from different aspects of on-line surveillance either through allowing a user to keep some of her data "confidential" or by allowing her to assert "control" over her data. We will illustrate using concrete examples, why some paradigms came to dominate the field, their advantages, but also their blind spots, and unfulfilled promises given the conditions of our surveillance societies. Since 2000 there has been a renewed interest amongst computer scientists in the field of ”privacy technology”. This includes mechanisms for “anonymous” communications, censorship resistance, selective disclosure credentials, as well as privacy in databases - all of which are meant to shield the user from some aspects of on-line surveillance. Beyond the lab, some of those systems have been deployed and are widely used today. Yet, the type of surveillance against which privacy technologies are supposed to offer protection is often ill-defined, and widely varying between works: from an individual who wishes “to hide an occasional purchase from his spouse”, to “groups coordinating political dissent under totalitarian regimes”. While privacy is seen as the key unifying theme of these works only one aspect of it is systematically represented, namely ”confidentiality”. Privacy as self-definition, informational self-determination or as a public good that needs to be negotiated is often neglected. Further, the increasing omni-presence of surveillance technologies, the informatisation of every day life, as well as active resistance to on-line surveillance are used as justifying departure points for privacy technologies but they have so far not been explored in depth in the privacy research field. In this talk, we explore the development of contemporary privacy technologies, its key results and methodologies. At its heart our argument is that the field of privacy technology was seeded by computer security and cryptography experts that rushed to apply their tools to new problems, yielding mixed results. Additional pressures from different stakeholders to devise technology that will make large IT systems acceptable to the public has led to further confusion about the goals and methods most appropriate to embed privacy friendly values into computer systems. Further, the recent trend has been to replace the confidentiality paradigm with what can be called the "control" paradigm. Using concrete examples, we seek to explain why some paradigms came to dominate the field, their advantages, but also their blind spots, and unfulfilled promises.
-
-
3:21
»
SecDocs
Authors:
Evgeny Morozov Tags:
intelligence Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: While it's old news that authoritarian regimes regularly rely on censorship and surveillance technology supplied to them by Western companies, 2011 was a year (thanks, in part, to the Arab Spring) when it became a hot issue in the public debate. While politicians on both sides of the Atlantic have recently committed to ban the sale of such technologies to dictators, it's not clear whether such measures would prove effective (or merely drive the sale of such technologies underground) or simply stimulate the growth of Chinese, Russian and Indian companies. More disturbingly, there is still very little awareness – at least among the general public – that many of the tools that are currently exported to authoritarian states have been designed to help fight "The Global War On Terror" and are thus inextricably linked to domestic policies of Western states. This keynote talk will provide an overview of companies and technologies involved (with a focus on the Middle East and former Soviet Union), trace the evolution of dictators' strategies, speculate on the future of trade in surveillance and censorship tools, and address the shortcomings in the "containment" strategies put together by the US and EU.
-
-
14:39
»
SecDocs
Authors:
Evgeny Morozov Tags:
intelligence Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: While it's old news that authoritarian regimes regularly rely on censorship and surveillance technology supplied to them by Western companies, 2011 was a year (thanks, in part, to the Arab Spring) when it became a hot issue in the public debate. While politicians on both sides of the Atlantic have recently committed to ban the sale of such technologies to dictators, it's not clear whether such measures would prove effective (or merely drive the sale of such technologies underground) or simply stimulate the growth of Chinese, Russian and Indian companies. More disturbingly, there is still very little awareness – at least among the general public – that many of the tools that are currently exported to authoritarian states have been designed to help fight "The Global War On Terror" and are thus inextricably linked to domestic policies of Western states. This keynote talk will provide an overview of companies and technologies involved (with a focus on the Middle East and former Soviet Union), trace the evolution of dictators' strategies, speculate on the future of trade in surveillance and censorship tools, and address the shortcomings in the "containment" strategies put together by the US and EU.
-
14:32
»
SecDocs
Authors:
Evgeny Morozov Tags:
intelligence Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: While it's old news that authoritarian regimes regularly rely on censorship and surveillance technology supplied to them by Western companies, 2011 was a year (thanks, in part, to the Arab Spring) when it became a hot issue in the public debate. While politicians on both sides of the Atlantic have recently committed to ban the sale of such technologies to dictators, it's not clear whether such measures would prove effective (or merely drive the sale of such technologies underground) or simply stimulate the growth of Chinese, Russian and Indian companies. More disturbingly, there is still very little awareness – at least among the general public – that many of the tools that are currently exported to authoritarian states have been designed to help fight "The Global War On Terror" and are thus inextricably linked to domestic policies of Western states. This keynote talk will provide an overview of companies and technologies involved (with a focus on the Middle East and former Soviet Union), trace the evolution of dictators' strategies, speculate on the future of trade in surveillance and censorship tools, and address the shortcomings in the "containment" strategies put together by the US and EU.
-
-
4:57
»
SecDocs
Authors:
Tom Cross Tags:
sniffer Event:
Black Hat USA 2010 Abstract: For many years people have been debating whether or not surveillance capabilities should be built into the Internet. Cypherpunks see a future of perfect end to end encryption while telecom companies are hard at work building surveillance interfaces into their networks. Do these lawful intercept interfaces create unnecessary security risks? This talk will review published architectures for lawful intercept and explain how a number of different technical weaknesses in their design and implementation could be exploited to gain unauthorized access and spy on communications without leaving a trace. The talk will explain how these systems are deployed in practice and how unauthorized access is likely to be obtained in real world scenarios. The talk will also introduce several architectural changes that would improve their resilience to attack if adopted. Finally, we'll consider what all this means for the future of surveillance in the Internet - what are the possible scenarios and what is actually likely to happen over time.
-
-
4:12
»
SecDocs
Authors:
Joshua Marpet Tags:
physical security Event:
Black Hat DC 2010 Abstract: Video Analytics is a component of many advanced video surveillance systems. It includes such well known features as License Plate Recognition and Facial Recognition. Does it actually work? How well does it work? How can you hack it? How can you access it? Video surveillance is becoming more and more prevalent in our world, with some estimates showing that walking down Bourbon Street in New Orleans gets you photographed or videoed 3 times for every step you take. Are these systems legal? Who can see that video, or publish it? Is there a way to take advantage of the huge amount of video cameras? You'll find out.
-
4:12
»
SecDocs
Authors:
Joshua Marpet Tags:
physical security Event:
Black Hat DC 2010 Abstract: Video Analytics is a component of many advanced video surveillance systems. It includes such well known features as License Plate Recognition and Facial Recognition. Does it actually work? How well does it work? How can you hack it? How can you access it? Video surveillance is becoming more and more prevalent in our world, with some estimates showing that walking down Bourbon Street in New Orleans gets you photographed or videoed 3 times for every step you take. Are these systems legal? Who can see that video, or publish it? Is there a way to take advantage of the huge amount of video cameras? You'll find out.