Skip to main content

Home/ Groups/ Math 1111: Cryptography
saraatsai

National Institute of Justice Research Report: Chapter 2-Video Surveillance: Video Came... - 0 views

  •  
    "Signage can be an important legal component in the use of video cameras in schools. As mentioned in the previous section, it is important that the presence of video cameras not lead a person to believe he or she will be rescued if attacked."
j_olsen

Murder Suspect Has Witness - A MetroCard - NYTimes.com - 0 views

  •  
    This article details how MetroCard tracking is used in solving crimes, which is somewhat similar to the FastPass tracking in Little Brother.
kims46

State To Require Cameras In Special Ed Classrooms - 0 views

  •  
    A new law in Texas might require schools to install video cameras upon request in classrooms where students have disabilities.
saraatsai

Video surveillance in public schools - 2 views

shared by saraatsai on 21 Oct 15 - No Cached
  •  
    Discusses the growth and legal rights of video surveillance in schools. This article contains multiple instances where court cases ruled that there was not a reasonable expectation of privacy.
  •  
    by Christy Hickman, staff counsel Members often ask whether a school district violates their right to privacy by using video camera surveillance or video recordings of evaluative observations. It is easy to understand the growth of video surveillance in schools, especially with the onslaught of on-campus criminal behavior and the horrendous episodes of violence that we hear of all too frequently.
estrutt

Walk the Walk: Gait Recognition Technology Could Identify Humans at a Distance - 1 views

  •  
    Interesting how this article talks about the gait analysis being used for catching terrorists, while in Little Brother, it was used to keep track of the high school students. The technology is not quite ready to be used, but seems to be much more reliable than the gait trackers in the book.
  •  
    Georgia Tech Research Institute is making gait recognition technology a reality. "The ultimate goal is to detect, classify and identify humans at distances up to 500 feet away under day or night, all-weather conditions. Such capabilities will enhance the protection of U.S. forces and facilities from terrorist attacks."
colleengill

Gait Recognition - 1 views

  •  
    Study discussing the function and practicality of gait recognition software. The results seem to follow what Doctorow states about the function of the software in his novel
Abbey Roberts

arphid / Boing Boing - 0 views

  •  
    Cory Doctorow's blog posts concerning RFID tags and arphid technology; especially several posts on its usage in schools
masonagrow

General School Security Measures - 0 views

  •  
    Basic list of school security measures taken from NCES government website
Abbey Roberts

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
Derek Bruff

cryptocat - 1 views

  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
Derek Bruff

What's in a Boarding Pass Barcode? A Lot - Krebs on Security - 0 views

  •  
    "More worrisome, Cory now had the ability to view all future flights tied to that frequent flyer account, change seats for the ticketed passengers, and even cancel any future flights."
  •  
    "More worrisome, Cory now had the ability to view all future flights tied to that frequent flyer account, change seats for the ticketed passengers, and even cancel any future flights."
Derek Bruff

Threat-Assessment Teams Face Complex Task of Judging Risk - The Chronicle of Higher Edu... - 0 views

  •  
    No mention of data mining in this piece from 2012, but still a useful follow-up to the Michael Morris essay on keeping college campuses safe.
saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
colleengill

How NSA and GCHQ spied on the Cold War world - BBC News - 0 views

  •  
    This article describes how, during the Cold War, the major distributor of cryptography machines (Crypto AG) worked with the NSA. This professional relationship provided the NSA with shortcuts on how to break ciphers created from the different machines. Also, Crypto AG was revealed as not having given the most up to date models to all countries, probably through deception. This raises the question of morality involving basic warfare. How is it moral for this supposedly trusted third party company to have special allegiances with the United States?Would the United States have the same opinion on this actions morality if they were the ones being sold out of date equipment? Or if one of their opponents had shortcuts?
masonagrow

NSA Methodology for Adversary Obstruction - 0 views

  •  
    I really just wonder what kind of decision-making went into creating this document--what they decided to add and take out, etc. This source also has outside sources on the final pages.
eiyanrc

WW II Codes and Ciphers - 2 views

  •  
    This is a website introducing codes and ciphers in WW II by Tony Sale. Given this specific war context, is there really a guideline of what an action is ethical and what is not in terms of cryptoanalysis? Would an action be ethical whenever the majority's well-being is satisfied, or there's a line that should not be crossed?
« First ‹ Previous 461 - 480 of 793 Next › Last »
Showing 20 items per page