- published: 21 Oct 2016
- views: 89336
The defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces.
The DEFCON system was developed by the Joint Chiefs of Staff (JCS) and unified and specified combatant commands. It prescribes five graduated levels of readiness (or states of alert) for the U.S. military. It increases in severity from DEFCON 5 (least severe) to DEFCON 1 (most severe) to match varying military situations.
DEFCONs are a subsystem of a series of Alert Conditions, or LERTCONs, which also include Emergency Conditions (EMERGCONs).
http://www.theguardian.com/uk-news/2013/nov/02/nato-war-game-nuclear-disaster
The DEFCON level is controlled primarily by the U.S. President and the U.S. Secretary of Defense through the Chairman of the Joint Chiefs of Staff and the Combatant Commanders, and each DEFCON level defines specific security, activation and response scenarios for the troops in question.
Different branches of the U.S. Armed Forces (i.e. U.S. Army, U.S. Navy, Air Force) and different bases or command groups can be activated at different defense conditions. In general, there is no single DEFCON status for the world or country and it may be set to only include specific geographical areas. According to Air & Space/Smithsonian, as of 2014, the worldwide DEFCON level has never risen higher than DEFCON 3. The DEFCON 2 levels in the Cuban Missile Crisis and 1991 Gulf War were not worldwide.
DEF CON (also written as DEFCON or Defcon) is one of the world's largest annual hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993.
Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be "cracked." The event consists of several tracks of speakers about computer- and cracking-related subjects, as well as social events Wargames and contests in everything from creating the longest Wi-Fi connection and cracking computer systems to who can most effectively cool a beer in the Nevada heat. Other contests, past and present, include lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests. It is a hacking competition where teams of crackers attempt to attack and defend computers and networks using certain software and network structures. CTF has been emulated at other cracking conferences as well as in academic and military contexts.
Cheating at poker James Bond Style - Defcon 24 (2016)
DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline
DEFCON - The Full Documentary
Hackers target 30 voting machines at Defcon
How Tor Users Got Caught - Defcon 22
DEF CON 22 - Zoz - Don't Fuck It Up!
Defcon 21 - Unexpected Stories - From a Hacker Who Made It Inside the Government
DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor
Defcon 18 Pwned By the owner What happens when you steal a hackers computer zoz part
Headed To Caesars Palace And Defcon 2017
Actors: Sally Kirkland (producer), Sally Kirkland (actress), Tom Tangen (producer), Tom Tangen (actor), Tom Tangen (producer), Tom Tangen (miscellaneous crew), George Meyers (actor), Robert Mercado (actor), Sunil Sadarangani (actor), Ray Quiroga (actor), Ray Quiroga (producer), Liz Rodriguez (miscellaneous crew), Loretta Shenosky (actress), Eddy Salazar (actor), Eddy Salazar (producer),
Plot: An alien comes to earth with a botanical virus plot. He's not a bad guy, he's just in it for the paycheck. But a shut-in Arizona widow wins him over with her garden-fresh produce, protects him like a foster mother, and even flies to Omicron to overthrow his scheming government. Not bad for a retired widow from Phoenix.
Genres: Comedy, Family, Sci-Fi,My neighbor’s kid is constantly flying his quad copter outside my windows. I see the copter has a camera and I know the little sexed crazed monster has been snooping around the neighborhood. With all of the hype around geo-fencing and drones, this got me to wondering: Would it be possible to force a commercial quad copter to land by sending a low-level pulse directly to it along the frequencies used by GPS? Of course, radio signal jamming is illegal in the U.S and, frankly, it would disrupt my electronics, too. In this presentation, we’ll look at some of the research and issues we encountered, when we attempted to force land two commercial drones (the new DJI Phantom 3 and the Parrot Bepop Drone) by sending GPS signals directly at the drones (while staying under the threshold for jamming a...
A film about the world's largest hacking convention and its 20th year running. Filmed over the summer of 2012 and containing hundreds of hours of interviews, parties, presentations and spectacle. Over 280 hours of footage was recorded in support of the documentary, and five separate camera crews were in action. Directed by Jason Scott with camerawork by Eddie Codel, Alex Buie, Drew Wallner, Rick Dakan, Steve Fish, Kyle Way and Rachel Lovinger. Produced by Jeff Moss and Russ Rogers.
A group of hackers show how electronic voting machines could be attacked, and how votes can be changed. Subscribe to CNET: http://cnet.co/2heRhep Check out our playlists: http://cnet.co/2g8kcf4 Like us on Facebook: https://www.facebook.com/cnet Follow us on Twitter: https://www.twitter.com/cnet Follow us on Instagram: http://bit.ly/2icCYYm Add us on Snapchat: http://cnet.co/2h4uoK3
4 examples of people who have used Tor for illegal activities and how they were caught. Multiple de-anonymization attacks are shown at the end of the video. Part 2 can be found here https://www.youtube.com/watch?v=TQ2bk9kMneI You can read more about the cases here: http://se.azinstall.net/2015/11/how-tor-users-got-caught.html Case 0: Harvard bomb threat Eldo Kim getting busted by being one of the only users at Harvard on the tor network, and admitting he emailed the bomb threat. Case 1: Hector Xavier Monsegur (Sabu) and Jeremy Hammond LulzSec getting caught for logging on to IRC one time without tor and FBI using correlation. Case 2: Freedom Hosting admin under attack from Anonymous group previously fighting CP might have helped the FBI, later they skip to when a box was compromised and ...
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf Don't Fuck It Up! Zoz ROBOTICS ENGINEER Online antics used to be all about the lulz; now they're all about the pervasive surveillance. Whether you're the director of a TLA just trying to make a booty call or an internet entrepreneur struggling to make your marketplace transactions as smooth as silk, getting up to any kind of mischief involving electronic communications now increasingly means going up against a nation-state adversary. And if even the people who most should know better keep fucking it up, what does that mean for the rest of us? What do the revelations about massive government eavesdropping and data ingestion mean for people who feel they have a right if not a...
Peiter "Mudge" Zatko August 1st--4th, 2013 Rio Hotel & Casino • Las Vegas, Nevada
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Metacortex-Grifter/DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin Metacortex SECURITY RESEARCHER Grifter SECURITY RESEARCHER This is an introduction level talk. The talk itself will cover the basics of Tor, Darknets, Darknet Market places, and Bitcoin. I will start by giving the audience an overview of Tor and how it works. I will cover entry nodes, exit nodes, as well as hidden services. I will then show how you connect to Tor on both Linux/OSX and Windows and demo it off. Once we are connected to Tor, I am going to show how to find Tor hidden services and then demo off browsing around some marketplaces. Once the audien...
Have you seen that girl the other night at the club ? She
was wearing black like the other year
As a bird she came, could'nt forget her name J-U-L-I-A
used to hate cocaine
Then in a bar we could'nt get too far, dead drunk with
happiness, too much to drive my car
Do you have a gun ? Something must be done, six holes and
a bullet would be such fun
It's been half a day since I know she's in grey, it's
been half a day I still wanna play
Now she says she hates me and comes over me
I remember the bar we could'nt get too far, dead drunk