Computer surveillance

Results: 1478



#Item
791Law enforcement / National security / Security / Computer law / Crime prevention / Electronic Privacy Information Center / Federal Bureau of Investigation / IMSI-catcher / Robert Hanssen / Technology / Espionage / Surveillance

http://www.slate.com/blogs/future_tense[removed]stingray_ims

Add to Reading List

Source URL: epic.org

Language: English - Date: 2014-01-17 16:42:37
792Computer law / Electronic Privacy Information Center / Human rights / Internet ethics / Marc Rotenberg / Internet privacy / P3P / Surveillance / Information privacy / Privacy / Ethics / Law

å spotlight on surveillance epic annual report 2004–2005

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2007-09-27 15:12:43
793Law / Electronic Privacy Information Center / Marc Rotenberg / Internet privacy / P3P / Legal aspects of computing / Freedom of Information Act / Surveillance / Information privacy law / Ethics / Privacy / Computer law

E L E C T R O N I C P R I V A C Y I N F O R M A T I O N

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2007-09-27 15:12:45
794Cyberwarfare / Computer network security / National security / Security guard / Surveillance / Computer security / Vulnerability / Circuit City Stores / Security / Crime prevention / Public safety

http://www.siliconstrat.com/ July 29, 2008 Breaking Security Sometimes the only way to win

Add to Reading List

Source URL: www.securitymentor.com

Language: English - Date: 2010-03-31 20:30:32
795Security / Computer networking / Network performance / Privacy / Proxy server / Law enforcement / Surveillance / Tor / Contraflow lane reversal / Internet privacy / Computing / Internet

Pervasive surveillance of the Internet presents two classes of risk related to information disclosure: an increase in the risk that individual flows’ content may be revealed to the surveillor and a risk that cross-corr

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
796Computer network security / Network architecture / Computer networking / Network performance / Proxy servers / SOCKS / Tor / Internet security / Firewall / Internet privacy / Computing / Internet

Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
797Computer security / Data security / Crime prevention / United States Department of Homeland Security / Information security / Security controls / Community Oriented Policing Services / Surveillance / United States Department of Justice / Security / Public safety / National security

U.S. Department of Justice Office of Community Oriented Policing Services Law Enforcement TECH GUIDE FOR Information

Add to Reading List

Source URL: www.search.org

Language: English - Date: 2014-10-29 10:45:52
798Law / Crime prevention / Computer law / Electronic Privacy Information Center / Measuring instruments / Marc Rotenberg / Full body scanner / Internet privacy / Surveillance / Ethics / Privacy / Security

in the news epic TSA Aimed to Put Body Scanners

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-01-05 13:44:51
799Computer network security / Crime prevention / National security / Antivirus software / Application security / Threat model / Malware / Vulnerability / Network security / Cyberwarfare / Computer security / Security

It’s Time for Application-Centric Security Position paper by Irdeto Jan 20, 2014 Abstract Existing security models are inadequate to address emerging web threat models, such as massive surveillance and ever

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
800Computer security / Computing / Mass surveillance / National Security Agency / United States government secrecy / Bell System Practices / Information security management system / Information security / United States Agency for International Development / Security / Data security / National security

Title of Panel: Progress of the Best Security Practices Subcommittee Panel Chair James P. Craft, CISSP Information Systems Security Officer (ISSO) United States Agency for International Development (USAID[removed]Pennsylva

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE