We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Law Enforcement Are Hacking the Planet

00:00

Formal Metadata

Title
Law Enforcement Are Hacking the Planet
Subtitle
How the FBI and local cops are hacking computers outside of their jurisdiction.
Title of Series
Number of Parts
147
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
In early 2015, the Federal Bureau of Investigation hacked computers in Austria, Denmark, Chile, Colombia, Greece, and likely the United Kingdom and Turkey too. In all, the agency used a Tor Browser exploit to target over 4000 computers spread across the world based on a single, arguably illegal warrant.
Keywords
Local ringMotherboardTwitterInformation securityDigitizingAvatar (2009 film)QuicksortLecture/Conference
Computer virusLecture/Conference
Structural loadBuildingMalwareTrailNeuroinformatikFlow separationComputer animationLecture/Conference
NeuroinformatikPhysical lawMotherboardLocal ringNormal (geometry)MalwareMereologyQuicksortOperator (mathematics)Server (computing)Multiplication signTouch typingExploit (computer security)CASE <Informatik>Forcing (mathematics)Moment (mathematics)MaizeSource codeWhiteboardLecture/Conference
Computer wormMereologyOperator (mathematics)Web 2.0Exploit (computer security)Computer animationLecture/Conference
Military operationComputer wormServer (computing)Web 2.0Uniform resource locatorIP addressService (economics)Arithmetic meanSoftwareReal numberWebsiteComputer animationLecture/Conference
Military operationServer (computing)Web 2.0WebsiteAverageComputer animationLecture/ConferenceXMLProgram flowchart
Channel capacityQuicksortGame controllerDressing (medical)Intelligent NetworkSystem administratorData centerPoint (geometry)Server (computing)Address spaceWebsiteReal numberService (economics)IP addressLecture/Conference
InternetworkingReal numberIP addressGame controllerHacker (term)Intelligent NetworkLecture/Conference
WebsiteUniform resource locatorComputerWeb 2.0Operations researchGame controllerVideoconferencingNeuroinformatikWebsiteMalwareSheaf (mathematics)SoftwareServer (computing)Flow separationComputer animationLecture/Conference
Latent heatInternet forumWeb browserVulnerability (computing)CodeShared memoryComputer animationLecture/Conference
Computer wormStructural loadHorizonServer (computing)Virtual machineCASE <Informatik>CodeAddress spaceNormal (geometry)SoftwareIP addressArmReal numberVulnerability (computing)
Address spaceUniqueness quantificationSeries (mathematics)NumberComputerUniqueness quantificationIP addressWebsiteMultiplication signWeb pageInheritance (object-oriented programming)CodeSheaf (mathematics)Address spaceComputer animation
Computer networkAddress spaceInternet service providerContent (media)Common Language InfrastructureIPWebsiteMalwareSheaf (mathematics)Thread (computing)IP addressMultiplication signBit rateLecture/ConferenceComputer animation
Address spaceComputerUniqueness quantificationCodeVirtual machineCorrelation and dependenceConvex hullDialectWebsiteLink (knot theory)ForceMilitary operationExpert systemState of matterSystem identificationService (economics)Video trackingSystem administratorOperations researchContent (media)Personal digital assistantCASE <Informatik>IP addressWebsiteFile formatOperator (mathematics)Greatest elementPresentation of a groupProbability density functionComplete metric spaceLecture/Conference
Server (computing)Menu (computing)Group actionMereologyIP addressNeuroinformatikOperator (mathematics)Personal area networkLocal ringPresentation of a groupTraffic reportingHypermedia
VolumeOperations researchSample (statistics)NeuroinformatikOperator (mathematics)MereologyTelecommunicationInformationResultantLecture/ConferenceJSONUML
Rule of inferenceInformationSatelliteInternet service providerNeuroinformatikMereologyHacker (term)BitLecture/ConferenceComputer animation
Rule of inference40 (number)Remote procedure callHacker (term)TrailCASE <Informatik>State of matterException handlingLecture/Conference
CASE <Informatik>Computer wormComputerComputerInformationComputer networkMessage passingNeuroinformatikSign (mathematics)Cartesian coordinate systemComputer animation
MathematicsComputerFluid staticsAreaCartesian coordinate systemHacker (term)Dependent and independent variablesNeuroinformatikState of matterWordOffice suiteLecture/Conference
Computer wormComputerComputerInformationComputer networkMessage passingCASE <Informatik>Turtle graphicsFigurate numberBitConnectivity (graph theory)40 (number)Decision theoryOffice suiteRow (database)CASE <Informatik>Operator (mathematics)Rule of inferenceAuthorizationIP addressClient (computing)Computer animation
Computer wormSimilarity (geometry)Hacker (term)Moment (mathematics)QuicksortOperator (mathematics)IP addressComputer animation
StrutRule of inferenceHacker (term)Hill differential equationSound effectAngleRule of inferenceComputer-assisted translationMathematicsArithmetic meanLecture/Conference
Address spaceMilitary operationOperator (mathematics)Proxy serverRule of inferenceMathematicsTime zoneVirtuelles privates NetzwerkDependent and independent variablesWeb 2.0Parameter (computer programming)MereologyMultiplication signRow (database)40 (number)NeuroinformatikPhysical lawLecture/Conference
Military operationFormal languageWebsiteComputer wormService (economics)WebsiteNeuroinformatikOperator (mathematics)CASE <Informatik>Internet service providerFormal languageMalwareSheaf (mathematics)Multiplication signCartesian coordinate systemQuicksortDifferent (Kate Ryan album)Office suiteGoogolTerm (mathematics)Computer animation
ComputerMalwareFormal languageAuthorizationNeuroinformatik40 (number)Task (computing)Forcing (mathematics)Local ringExploit (computer security)Hacker (term)Quicksort1 (number)WebsiteSystem administratorActive contour modelWeb 2.0Operator (mathematics)Statement (computer science)Military baseDifferent (Kate Ryan album)IP addressLecture/Conference
Motion captureWebsiteComputer fileWordLink (knot theory)Virtual machineReal numberSound effectVideoconferencingInformationEmailWeb browserIP addressException handlingNeuroinformatikService (economics)Hacker (term)Computer animation
WebsiteVideoconferencingComputer wormService (economics)Uniform resource locatorRaw image formatSystem identificationSource codeInternet forumInterface (computing)Scalable Coherent InterfaceAddress spaceSystem administratorPasswordHacker (term)QuicksortRule of inferenceWeb 2.0MathematicsType theoryWebsiteSheaf (mathematics)Lecture/ConferenceComputer animation
ComputerHacker (term)Sheaf (mathematics)WebsiteMaizeMereologySoftwareMalwareIP addressCausalityQuicksortUniverse (mathematics)Lecture/Conference
Computer wormSource codeInternet forumUniform resource locatorSystem identificationWebsitePasswordService (economics)Database transactionInterface (computing)Address spaceScalable Coherent InterfaceInternet forumSystem administratorContext awarenessMalwareSheaf (mathematics)Web 2.0Form (programming)Phase transitionLatent heatWebsiteComputer animation
Sheaf (mathematics)Computer iconMalwareCartesian closed categoryEmailTwitterWebsiteWeb 2.0Latent heatInformationMalwareQueue (abstract data type)Lecture/Conference
Cartesian closed categoryEmailTwitterGroup actionWebsiteSheaf (mathematics)Forcing (mathematics)Arithmetic meanLecture/Conference
Moment (mathematics)Web browserExploit (computer security)Hacker (term)ExplosionCovering spaceArithmetic meanInheritance (object-oriented programming)Lecture/Conference
Cartesian closed categoryEmailTwitterMaxima and minimaPhysical lawPoint (geometry)QuicksortView (database)Exploit (computer security)Disk read-and-write headCodeSelf-organizationNeuroinformatikLecture/Conference
MalwareIP addressDisk read-and-write headNumberDressing (medical)NeuroinformatikLecture/Conference
Cartesian closed categoryEmailTwitterWebsitePhysical lawNumberProcess (computing)Profil (magazine)Standard deviationOrder (biology)IP addressIntercept theoremService (economics)Cross-correlationRule of inferenceMathematical analysisLimit (category theory)Single-precision floating-point formatTraffic reportingMassQuicksortWeb 2.0Computer configurationExtreme programmingOffice suiteBlock (periodic table)Queue (abstract data type)Intelligent NetworkLecture/ConferenceComputer animation
Maxima and minimaMathematical analysisWebsiteMultiplication signNumberProcess (computing)Lecture/Conference
Exterior algebraPhysical lawMassMathematicsQuicksortHacker (term)Limit (category theory)Rule of inferenceMereology40 (number)Arithmetic meanLecture/Conference
Cartesian closed categoryEmailTwitterMultilaterationRamificationPlanningLocal ringIP addressComputer animation
MedianHypermediaCartesian closed categoryIntegrated development environmentLecture/ConferenceJSON
Transcript: English(auto-generated)