asteroza + law   49

Unfortunately, the map isn't accurate. The actual definition of the "100 mile zo... | Hacker News
Hrm, but CBP treats international airports in the center of the US as a border crossing, an frequently uses that definition to expand a 100 mile bubble around said airports. If the 100 mile rule only applies to external borders, then how are interior international airport checkpoints and the surrounding area supposed to be handled then?
100  mile  border  zone  CBP  law  enforcement  legal  checkpoint 
february 2019 by asteroza
Map showing high population regulated areas, where drones are prohibited.
japan  high  population  map  UAV  drone  law  rule  Delicious 
march 2016 by asteroza
Microsoft: No Botnet Is Indestructible - Slashdot
Interesting reference for pseudo-forensic data gathering. Naturally, running this means evidence tampering on the computer though unless it's a virgin clone...
windows  tracking  network  awareness  NCSI  police  law  enforcement  forensics  tools  utilities  software  COFEE  command  line  tips  tricks  glag  switch  information  reference  Delicious 
july 2011 by asteroza
Harris Corporation Introduces USB Thumb Drive Designed for U.S. Government Cyber Security Missions
I'm curious as to how this operates. Is this using some kind of device driver hole to extend it's claws into the host OS? Or is this like the BlackDog, a USB parasite computer that used a virtual CD and a virtual ethernet adapter to get onboard the host OS? If it claims no footprint, then it either has to boot the host into a special forensic LiveCD OS (with associated issues), or use some other trick...
Harris  BlackJack  USB  hardware  electronics  devices  automated  PC  file  search  data  information  extraction  surveillance  intelligence  counterintelligence  theft  law  enforcement  security  Delicious 
october 2010 by asteroza
Authentication of forensic DNA samples
While the researchers show a potential solution to detecting faked DNA evidence (un-methylated DNA due to whole genome amplification production technique), this puts a fair bit of current DNA evidence under doubt. Lawyers will have a field day, because so much is made of DNA evidence having the image of being infallible.
police  forensic  science  DNA  evidence  fake  fabrication  research  israel  biology  test  forensics  law  enforcement  misdirection  Delicious 
august 2009 by asteroza
Guidance Software, Inc. - Guidance Software Opens Up Exciting New Possibilities in Data Acquisition with Groundbreaking EnCase(R) Portable Solution
Allowing untrained law enforcement to easily perform forensic computer investigations? All from the convenience of a portable USB stick? I don't want some county mountie fishing through my computer thank you very much...
EnCase  portable  USB  memory  storage  liveCD  boot  forensic  investigation  LE  law  enforcement  Delicious 
july 2009 by asteroza
SS8 > Communications Interception - Lawful Interception Solutions
These are the guys that made the Blackberry communications interceptor software the UAE Blackberry carrier forced on its users.
SS8  cellphone  mobile  phone  software  SMS  telephone  call  interception  security  law  enforcement  LE  enterprise  network  Delicious 
july 2009 by asteroza
So You Think You Have a Power Law — Well Isn't That Special?
Seems everyone assuming the internet was a scale free topology obeying power laws was wrong. Choice quote "Abusing linear regression makes the baby Gauss cry."
internet  network  networks  research  statistics  mathematics  power  law  analysis  critique  longtail  science  Delicious 
april 2009 by asteroza
staple / unstaple
A tool that forces people to commit a crime if they want to prove an archive contains stolen content. Turning the DMCA against those who try to use it. Cute in a contrarian activist sort of way.
staple  encryption  software  linux  antiDMCA  DMCA  cryptography  opensource  activism  piracy  law  legal  Delicious 
april 2009 by asteroza
Updated: Google Says It Is Still Examining Korea's Real-Name Verification Law
Seems korean netizens are caught between a rock and a hard place. The government wants to suppress via fear of legal retribution both mob mentality and political dissent. One is the noble goal of government to protect the people from themselves, the other is the self protecting ego of what would functionally be a police state. As always, the road to hell is paved with good intentions...
google  korea  real  name  verification  law  censorship  dissent  suppression  privacy  anonymity  internet  Delicious 
april 2009 by asteroza
FAQ: Computer Online Forensic Evidence Extractor (COFEE)
Plug in an autorun USB stick
Take data
I wonder how long before an ISO hits the PirateBay...
online  software  security  windows  framework  USB  microsoft  privacy  computer  hacking  law  government  forensics  forensic  suite  evidence  extractor  enforcement  COFEE  Delicious 
february 2009 by asteroza

related tags

activism  advice  airplane  airspace  alert  alienation  amplification  analog  analysis  anonymity  ant  antiDMCA  antivirus  archive  area  array  ASBO  attack  augmentation  automated  aware  awareness  bacon  ban  bill  biology  biomimicry  BlackJack  body  book  boot  border  brain  business  CALEA  call  camera  capital  car  card  CBP  cellphone  censorship  change  check  checkpoint  children  citation  ClamAV  COFEE  cognitive  collector  command  communications  compliance  computer  concept  congress  constitution  consumer  contract  control  controller  copyright  cortica  counterintelligence  cracking  crime  critique  crowdfunding  cryptography  culture  cyber  cyberattack  cyberwarfare  data  declaration  defense  Delicious  design  devices  DFA  digital  dissent  distributed  DIY  DMCA  DNA  doctrine  downloading  driving  drone  dynamics  EEZ  EFG  electronics  email  employee  employment  EnCase  encryption  enduser  enforcement  engineering  enterprise  entrepreneur  entrepreneurship  ethics  EU  europe  evidence  extraction  extractor  fabrication  fake  fight  file  finance  Fish  flash  flight  floor  Flying  forensic  forensics  Fortinet  framework  FTC  funding  gateway  genetic  geothermal  glag  google  government  green  group  guidance  guide  hacking  hacktivismo  hactivist  hardware  Harris  HECTOR  helicopter  hexapod  high  housing  howto  human  humor  hydrothermal  indiegogo  information  intelligence  interception  international  internet  invalid  investigation  investigator  investment  IP  israel  issues  japan  japanese  javascript  justice  justified  keychain  kickstarter  knowledge  korea  labor  law  lawyer  LE  LEA  legal  liberty  light  limit  limitation  line  link  linux  list  live  liveCD  lobbying  lock  locomotion  london  longtail  loop  mac  MacLockPick  magna  management  manual  map  mapping  marine  mathematics  memory  MIAU  Micro  microsoft  mile  military  MIMO  mind  misdirection  mobile  modification  money  monitoring  movement  multicopter  murphy  mutual  name  NATO  NCSI  network  networks  news  noise  ocean  offense  offensive  offshore  online  OpenCALEA  opensource  operations  organization  OSX  OTEC  page  password  patent  PC  personal  philosophy  phone  piracy  pirate  police  politics  population  portable  posthuman  power  privacy  prosthetic  psychogeoraphy  quotes  radio  RC  real  red  reference  refusal  regulation  removal  request  research  resource  restricted  restriction  rights  robot  robotics  RoE  rule  rules  safety  scam  scanning  scatterchat  science  seaplane  search  secure  security  SEGFAULT  segway  service  Shannon  SIM  SMS  social  software  source  space  spying  SS8  staple  startup  statistics  storage  suite  suppression  surveillance  sustainability  swarm  swarming  switch  Switzerland  sysadmin  system  Tallinn  tap  tapping  teenager  telephone  terms  test  testbed  theft  ticket  tidal  tips  tools  tor  torpark  tower  tracking  traffic  transhuman  transparency  transportation  treaty  trend  TrendMicro  tricks  tutorial  UAV  UK  US  USA  USB  users  utilities  V  V-mask  vehicle  venture  verification  version  video  virus  visualization  VoIP  walking  warfare  wave  web  webpage  windows  wiretap  zone 

Copy this bookmark: