Results 51 to 60 of 1,254 | « previous | next »
- Privacy and security planning instructions : criminal justice information systems / by United States.National Criminal Justice Information and Statistics Service.(CARDINAL)137406;
-
- Subjects: Information storage and retrieval systems; Privacy, Right of;
- Available copies: 1 / Total copies: 1
-
unAPI
- Social insecurity : the crisis in America's social security system and how to plan now for your own financial survival / by Hardy, Dorcas R.,1946-; Hardy, C. Colburn.;
-
- Subjects: Social security;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- Means of control : how the hidden alliance of tech and government is creating a new American surveillance state / by Tau, Byron,author.(CARDINAL)888831;
Includes bibliographical references (pages 315-349) and index."A sweeping exposé of the U.S. government's alliance with data brokers, tech companies, and advertisers, and how their efforts are reshaping surveillance and privacy as we know it. Our modern world is awash in surveillance. Most of us are dimly aware of this-ever get the sense that an ad is "following" you around the internet?-but we don't understand the extent to which the technology embedded in our phones, computers, cars, and homes is part of a vast ecosystem of data collection. Our public spaces are blanketed by cameras put up in the name of security. And pretty much everything that emits a wireless signal of any kind-routers, televisions, Bluetooth devices, chip-enabled credit cards, even the tires of every car manufactured since the mid-2000s-can be and often is covertly monitored. All of this surveillance has produced an extraordinary amount of data about every citizen-and the biggest customer is the U.S. government. Reporter Byron Tau has been digging deep inside the growing alliance between business, tech, and government for years, piecing together a secret story: how the whole of the internet and every digital device in the world have become a mechanism of intelligence, surveillance, and monitoring. Tau traces the unlikely tale of how the government came to view commercial data as a principal asset of national security in the years after 9/11, working with scores of anonymous companies, many scattered across bland Northern Virginia suburbs, to build a foreign and domestic surveillance capacity of such breathtaking scope that it could peer into the lives of nearly everyone on the planet. The result is a cottage industry of data brokers and government bureaucrats with one directive-"get everything you can"-and, as Tau observes, a darkly humorous world in which defense contractors have marketing subsidiaries, and marketing companies have defense contractor subsidiaries. Sobering and revelatory, Means of Control is our era's defining story of the dangerous grand bargain we've made: ubiquitous, often cheap technology, but at what price to our privacy?"--
- Subjects: Electronic surveillance; Electronic surveillance; Security systems; Undercover operations; Social control;
- Available copies: 6 / Total copies: 7
-
unAPI
- Dark wire : the incredible true story of the largest sting operation ever / by Cox, Joseph(Journalist),author.(CARDINAL)888952;
Includes bibliographical references (pages 321-328)."Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld. They watched drug deals and hits being planned in real time, making arrests where they could without blowing their cover. For a period of years, some one hundred thousand criminals worldwide, including members ofSouth American drug cartels, the Calabrian mafia, and the Chinese Triad, did their business in full view of the officers they were trying to evade. It was a sprawling global economy as efficient and interconnected as the legal one. But a surveillance operation like this couldn't last. It was too dangerous, too ethically fraught, too large. And it all ended in spectacular fashion. Dark Wire is more than the story of this enormous sting operation--it shows the fundamental problems of policing in such a vast and high-speed economy. This is a caper for our modern world, where everyone is connected and no one is completely free."--
- Subjects: Informational works.; Undercover operations; Electronic surveillance; Text messaging (Cell phone systems); Organized crime investigation.;
- Available copies: 7 / Total copies: 7
-
unAPI
-
Genealogical Research System (#CD 110) : Social Security death benefit records,
-
- Subjects: Sound recordings.;
- Available copies: 2 / Total copies: 2
-
unAPI
- Exploding the phone : the untold story of the teenagers and outlaws who hacked Ma Bell / by Lapsley, Phil,1965-(CARDINAL)638206;
Includes bibliographical references (pages 339-406) and index.Fine arts 13 -- Birth of a playground -- Cat and canary -- The largest machine in the world -- Blue box -- "Some people collect stamps" -- Headache -- Blue box bookies -- Little Jojo learns to whistle -- Bill Acker learns to play the flute -- The phone freaks of America -- The law of unintended consequences -- Counterculture -- Busted -- Pranks -- The story of a war -- A little bit stupid -- Snitch -- Crunched -- Twilight -- Nightfall.Before smartphones, before the Internet and before the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. Unfortunately for the telephone company, the network has a billion-dollar flaw. And once people discovered it, things would never the be the same. Phil Lapsley's Exploding the Phone tells this story in full for the first time. It traces the birth of long distance communication and the telephone, the rise of AT&T's monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell's Achilles' heel. Lapsley expertly weaves together the clandestine underground of "phone phreaks" who turned the network into the electronic playground, the mobsters who exploited its flaws to avoid the feds, and the counterculture movement that argued you should rip off the phone company to fight against the war in Vietnam...AT&T responded with "Greenstar"...The FBI fought back, too...Phone phreaking exploded into the popular culture, with famous actors, musicians, and investors caught with "blue boxes," many of them built by two young phone phreaks named Steve Jobs and Steve Wozniak...The product of extensive original research, including exclusive interviews and declassified government documents, Exploding the Phone is a captivating, ground-breaking work about an important part of our cultural and technological history -- Publisher's description.Describes how "phone phreaks" learned how to make illicit but technologically innovative free phone calls and shared the technique, and places the process in the development of telecommunications and the behavior of the telephone monopoly.
- Subjects: American Telephone and Telegraph Company; AT & T (Firm); Telecommunication systems; Telephone companies; Telephone systems; Computer engineers; Counterculture; Telecommunication systems; Telephone companies; Telephone systems; Telephone;
- Available copies: 6 / Total copies: 6
-
unAPI
- Winning the peace in the Pacific; a Chinese view of Far Eastern postwar plans and requirements for a stable security system in the Pacific area / by Zhou, Gengsheng,1889-1971.(CARDINAL)171815; Institute of Pacific Relations.(CARDINAL)153598;
-
- Subjects: Reconstruction (1939-1951); Eastern question (Far East);
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- 101 spy gadgets for the evil genius / by Graham, Brad.(CARDINAL)688516; McGowan, Kathy.(CARDINAL)674968;
Getting started -- Desoldering basics -- Spy camera basics -- Invisible light basics -- Infrared light converter -- Simple infrared illuminator -- LED array illuminator -- Pulsed LED illuminator -- Laser night vision -- Camcorder night vision -- Night vision viewer -- Phone number decoder -- Spammer jammer -- Phone voice changer -- GPS data receiver -- GPS tracking device -- Laser spy device -- Basic spy transmitter -- Remote control hijacker -- Camera flash taser -- Portable alarm system -- Camera trigger hack -- Repeating camera timer -- Sound-activated camera -- Motion-activated camera -- Camera zoom extender -- Nikon clap snap."CREATE FIENDISHLY FUN SPY TOOLS AND COUNTERMEASURESFully updated throughout, this wickedly inventive guide is packed with a wide variety of stealthy sleuthing contraptions you can build yourself. 101 Spy Gadgets for the Evil Genius, Second Edition also shows you how to reclaim your privacy by targeting the very mechanisms that invade your space. Find out how to disable several spy devices by hacking easily available appliances into cool tools of your own, and even turn the tables on the snoopers by using gadgetry to collect information on them.Featuring easy-to-find, inexpensive parts, this hands-on guide helps you build your skills in working with electronics components and tools while you create an impressive arsenal of spy gear and countermeasures. The only limit is your imagination!101 Spy Gadgets for the Evil Genius, Second Edition: Contains step-by-step instructions and helpful illustrations Provides tips for customizing the projects Covers the underlying principles behind the projects Removes the frustration factor--all required parts are listed Build these and other devious devices: Spy camera Infrared light converter Night vision viewer Phone number decoder Phone spammer jammer Telephone voice changer GPS tracking device Laser spy device Remote control hijacker Camera flash taser Portable alarm system Camera trigger hack Repeating camera timer Sound- and motion-activated cameras Camera zoom extender "--"This fully updated bestseller will further entice electronic hobbyists to build high-tech devices and counteract some of the spy gadgets available on the market"--
- Subjects: Electronic apparatus and appliances; Electronic security systems; Electronic surveillance;
- Available copies: 5 / Total copies: 5
-
unAPI
- Cyber spying / by Olson, Elsie,author.(CARDINAL)754970;
In this title, readers will learn about the ever-changing world of cyber espionage, hacking, and social engineering. Both historical and modern cyber spying techniques are explored. Readers will also learn how to protect themselves online.--from Amazon.
- Subjects: Instructional and educational works.; Espionage; Spies; Electronic surveillance; Security systems; Computer crimes; Internet in espionage;
- Available copies: 2 / Total copies: 2
-
unAPI
- Firewall [videorecording] by Arkin, Alan.act(CARDINAL)348089; Bernstein, Armyan.prd; Bettany, Paul,1971-act(CARDINAL)357180; Ford, Harrison,1942-act(CARDINAL)740457; Forster, Robert,1942-act(CARDINAL)344922; Forte, Joe,1963-aus; Iwanyk, Basil.prd(CARDINAL)341234; Loncraine, Richard.drt(CARDINAL)845110; Madsen, Virginia,1963-act; Patrick, Robert,1958-act; Rajskub, Mary Lynn.act; Shestack, Jonathan.prd; Beacon Pictures.(CARDINAL)340295; Thunder Road Productions.(CARDINAL)813682; Village Roadshow Pictures.(CARDINAL)340620; Warner Bros. Pictures (1969- );
Director of photography, Marco Pontecorvo ; edited by, Jim Page ; music by, Alexandre Desplat ; costume designer, Shuna Harwood ; production designer, Brian Morris ; visual effects supervisor, Mark Breakspear.Harrison Ford, Paul Bettany, Virginia Madsen, Mary Lynn Rajskub, Robert Patrick, Robert Forster, Alan Arkin.Bank security expert Jack Stanfield specializes in designing infallible theft-proof financial computer systems. But there is a hidden vulnerability in the system he didn't account for - himself. When a ruthless criminal mastermind kidnaps his family, Jack is forced to find a flaw in his system and steal $100 million. With the lives of his wife and children at stake and under constant surveillance, he has only hours to find a loophole in the thief's own impenetrable system of subterfuge and false identities to beat him at his own game.MPAA rating: PG-13; for some intense sequences of violence and some language.DVD, region 1, widescreen (2.40:1) presentation; Dolby Digital 5.1 surround, DVD-9, dual-layer.
- Subjects: Feature films.; Thrillers (Motion pictures, television, etc.); Video recordings for the hearing impaired.; Crime; Suspense films.; Thriller; Criminal behavior; Kidnapping; Security consultants; Security systems; Secuestro; Sistemas de seguridad; Security systems;
- Available copies: 4 / Total copies: 8
-
unAPI
Results 51 to 60 of 1,254 | « previous | next »