Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA?
By Billy Rios
Every day, millions of people go through airport security. While it is an inconvenience that could take a while, most are willing to follow the necessary procedures if it can guarantee their safety. Modern airport security checkpoints use sophisticated technology to help the security screeners identify potential threats and suspicious baggage. Have you ever wondered how these devices work? Have you ever wondered why an airport security checkpoint was set up in a particular configuration? Join us as we present the details on how a variety of airport security systems actually work, and reveal their weaknesses. We’ll present what we have learned about modern airport security procedures, dive deep into the devices used to detect threats, and we’ll present some the bugs we discovered along the way.
Видео Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA? канала Black Hat
Every day, millions of people go through airport security. While it is an inconvenience that could take a while, most are willing to follow the necessary procedures if it can guarantee their safety. Modern airport security checkpoints use sophisticated technology to help the security screeners identify potential threats and suspicious baggage. Have you ever wondered how these devices work? Have you ever wondered why an airport security checkpoint was set up in a particular configuration? Join us as we present the details on how a variety of airport security systems actually work, and reveal their weaknesses. We’ll present what we have learned about modern airport security procedures, dive deep into the devices used to detect threats, and we’ll present some the bugs we discovered along the way.
Видео Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA? канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
The Search for the Perfect Door - Deviant OllamBlack Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood HackerHow Smartcard Payment Systems FailDefcon 21 - Stalking a City for Fun and FrivolitySirenJack: Cracking a 'Secure' Emergency Warning Siren SystemThe Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege EscalationI'll Let Myself In: Tactics of Physical Pen TestersRadio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016Cheating at poker James Bond Style - Defcon 24 (2016)Defcon 21 - Social Engineering: The Gentleman ThiefCracking the Lens: Targeting HTTP's Hidden Attack-SurfaceDEFCON 17: Stealing Profits from Spammers or: How I learned to Stop Worrying and Love the SpamOchko123 - How the Feds Caught Russian Mega-Carder Roman SeleznevBroadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi ChipsetsBreaking the x86 Instruction SetAirBnBeware: Short Term Rentals Long Term PwnageAttacking and Defending the Microsoft Cloud (Office 365 & Azure AD)Ghidra - Journey from Classified NSA Tool to Open SourceBlack Hat 2013 - OPSEC Failures of Spies