SlideShare ist ein Scribd-Unternehmen logo
1 von 50
FBI Criminal Investigation: Cisco Routers Section Chief Raul Roldan Supervisory Special Agent Inez Miyamoto Intelligence Analyst Tini Leon January 11, 2008 The overall classification of this presentation is UNCLASSIFIED
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FBI Criminal Investigation Cisco Routers
Nationwide Cases Green – DCIS; Red – FBI joint cases; Blue – FBI
Search Warrants Executed Boston Cleveland Boulder Houston Columbus Kansas City Long Beach Dallas Oklahoma City
Counterfeit Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Counterfeit Products Source: <http://www.usedcisco.com/press-my-esm_used_cisco_identifying_fake_chisco.aspx>
Cost Comparison Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cisco Identified Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sub-Contracting Process GSA IT Vendor 1st Sub-Contractor 3rd Sub-Contractor 2nd Sub-Contractor Counterfeit Equipment Distributor Government or Govt. Contractor (drop ships as GSA Vendor) (order placed)
Supply Chain
ShenZhen, PRC
Supply Chain 1 –  Directly from PRC Supplied to Government through “drop ship” U.S. Distributors places orders
Supply Chain 2 –  Through Foreign Country Distributors
Supply Chain 3 – ebay
Supply Chain 4 –  Government Credit Card  Non-GSA Vendor Selling Cisco Equipment Government  Purchase Card
Open Source Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
eGlobe Solutions Inc. Source: <http://www.usdoj.gov/usao/waw/press/2006/nov/song.html> eGlobe Solutions (Authorized Cisco Vendor)
eGlobe Solutions Inc. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Syren Technology Source: <http://http://www.usdoj.gov/usao/txs/releases/January%202008/080104Edman.html> Syren Technology
Syren Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
U.S. Navy Project Source: <http://www.govexec.com/dailyfed/0907/092807j1.htm> Sub-contractor (Won bid for US Navy Project) (Ships counterfeit to U.S. Navy) U.S. Navy (Unauthorized Cisco reseller)
U.S. Navy Project ,[object Object],[object Object],[object Object],[object Object]
MortgageIT:  Non-government Example Source: <http://www.networkworld.com/news/2006/102306counterfeit.html> Unidentified Distributor (Authorized Cisco Vendor) Unidentified Supplier
MortgageIT:   Non-government Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Todd Richard Source: <http://www.cybercrime.gov/richardPlea.pdf>
Todd Richard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Supply Chain 4 –  Government Credit Card  Non-GSA Vendor Selling Cisco Equipment Government  Purchase Card
Critical Infrastructure Threat
Scope of the Problem ,[object Object],[object Object],[object Object],[object Object],Source: KPGM International, “Managing the Risks of Counterfeiting in the Information Technology Industry,” 2006
Scope of the Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Government Procurement Problem
Government Procurement ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why Cisco Routers? ,[object Object]
Government Procurement  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems with Cisco ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems with Cisco ,[object Object],[object Object],[object Object]
Problems with Cisco ,[object Object],[object Object],[object Object],[object Object],[object Object]
FBI Effort to Combat Problem
FBI Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FBI Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FBI Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
US-China Joint Liaison Group ,[object Object],[object Object],[object Object],[object Object],[object Object]
Overseas Coordination ,[object Object],[object Object],[object Object]
Intelligence Gap
Intelligence Gap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SC Raul Roldan [email_address] 202-324-3472 SSA Inez Miyamoto [email_address] 202-324-2455 IA Tini Leon [email_address] 202-324-6310

Weitere ähnliche Inhalte

Andere mochten auch

Prosecuted and convicted – how would you manage a criminal investigation? - E...
Prosecuted and convicted – how would you manage a criminal investigation? - E...Prosecuted and convicted – how would you manage a criminal investigation? - E...
Prosecuted and convicted – how would you manage a criminal investigation? - E...Browne Jacobson LLP
 
Introduction to Geotechnical Engineering SU - Fall 2015
Introduction to Geotechnical Engineering   SU - Fall 2015Introduction to Geotechnical Engineering   SU - Fall 2015
Introduction to Geotechnical Engineering SU - Fall 2015bhaladog
 
General Geotechnical Presentation
General Geotechnical PresentationGeneral Geotechnical Presentation
General Geotechnical Presentationandroid9999
 
How to design your TEDx talk by @orsnemes
How to design your TEDx talk by @orsnemesHow to design your TEDx talk by @orsnemes
How to design your TEDx talk by @orsnemesOrsolya Nemes
 
Geotechnical engineering, civil engineering
Geotechnical engineering, civil engineeringGeotechnical engineering, civil engineering
Geotechnical engineering, civil engineeringSaicharan Vasala
 
Soil mechanics-full-course-notes-and-lectures
Soil mechanics-full-course-notes-and-lecturesSoil mechanics-full-course-notes-and-lectures
Soil mechanics-full-course-notes-and-lecturesvlmvv2
 
Level up your presentation design by @orsnemes
Level up your presentation design by @orsnemesLevel up your presentation design by @orsnemes
Level up your presentation design by @orsnemesOrsolya Nemes
 
Introduction and types of soil mechanics
Introduction and types of soil mechanicsIntroduction and types of soil mechanics
Introduction and types of soil mechanicsSafiullah Khan
 
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in India
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in IndiaCivil Engineering – Oldest Yet A Highly Sought After Career Choice in India
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in IndiaAnkur Tandon
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Andere mochten auch (15)

Prosecuted and convicted – how would you manage a criminal investigation? - E...
Prosecuted and convicted – how would you manage a criminal investigation? - E...Prosecuted and convicted – how would you manage a criminal investigation? - E...
Prosecuted and convicted – how would you manage a criminal investigation? - E...
 
Geotechnical engineering ppt 0719
Geotechnical engineering ppt 0719Geotechnical engineering ppt 0719
Geotechnical engineering ppt 0719
 
1 overview
1 overview1 overview
1 overview
 
Soil mechanics
Soil mechanicsSoil mechanics
Soil mechanics
 
Introduction to Geotechnical Engineering SU - Fall 2015
Introduction to Geotechnical Engineering   SU - Fall 2015Introduction to Geotechnical Engineering   SU - Fall 2015
Introduction to Geotechnical Engineering SU - Fall 2015
 
General Geotechnical Presentation
General Geotechnical PresentationGeneral Geotechnical Presentation
General Geotechnical Presentation
 
Challenges for Geotechnical Engineering Education
Challenges for Geotechnical Engineering EducationChallenges for Geotechnical Engineering Education
Challenges for Geotechnical Engineering Education
 
Geotechnical Engineering
Geotechnical EngineeringGeotechnical Engineering
Geotechnical Engineering
 
How to design your TEDx talk by @orsnemes
How to design your TEDx talk by @orsnemesHow to design your TEDx talk by @orsnemes
How to design your TEDx talk by @orsnemes
 
Geotechnical engineering, civil engineering
Geotechnical engineering, civil engineeringGeotechnical engineering, civil engineering
Geotechnical engineering, civil engineering
 
Soil mechanics-full-course-notes-and-lectures
Soil mechanics-full-course-notes-and-lecturesSoil mechanics-full-course-notes-and-lectures
Soil mechanics-full-course-notes-and-lectures
 
Level up your presentation design by @orsnemes
Level up your presentation design by @orsnemesLevel up your presentation design by @orsnemes
Level up your presentation design by @orsnemes
 
Introduction and types of soil mechanics
Introduction and types of soil mechanicsIntroduction and types of soil mechanics
Introduction and types of soil mechanics
 
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in India
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in IndiaCivil Engineering – Oldest Yet A Highly Sought After Career Choice in India
Civil Engineering – Oldest Yet A Highly Sought After Career Choice in India
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Ähnlich wie Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A

Fbi cisco-om bbriefing2008.01.11 a
Fbi cisco-om bbriefing2008.01.11 aFbi cisco-om bbriefing2008.01.11 a
Fbi cisco-om bbriefing2008.01.11 aJames Atkinson
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-componentsozgurv
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Amazon Web Services
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDPranav Shah
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategyfEngel
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?Yasmin AbdelAziz
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalUlf Mattsson
 

Ähnlich wie Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A (20)

Fbi cisco-om bbriefing2008.01.11 a
Fbi cisco-om bbriefing2008.01.11 aFbi cisco-om bbriefing2008.01.11 a
Fbi cisco-om bbriefing2008.01.11 a
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
 
Grey Logic
Grey LogicGrey Logic
Grey Logic
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beard
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 final
 

Mehr von Carlos Alberto Teixeira

Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"
Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"
Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"Carlos Alberto Teixeira
 
Para pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDAS
Para pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDASPara pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDAS
Para pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDASCarlos Alberto Teixeira
 
INGRESS — Game que mistura real e virtual vicia usuários
INGRESS — Game que mistura real e virtual vicia usuáriosINGRESS — Game que mistura real e virtual vicia usuários
INGRESS — Game que mistura real e virtual vicia usuáriosCarlos Alberto Teixeira
 
Leia a entrevista de Marina Silva na revista Época
Leia a entrevista de Marina Silva na revista ÉpocaLeia a entrevista de Marina Silva na revista Época
Leia a entrevista de Marina Silva na revista ÉpocaCarlos Alberto Teixeira
 
Em busca do próximo bilhão de internautas
Em busca do próximo bilhão de internautasEm busca do próximo bilhão de internautas
Em busca do próximo bilhão de internautasCarlos Alberto Teixeira
 
O globo 2014-05-12 - página 19 - expansão da internet por drones e balões
O globo   2014-05-12 - página 19 - expansão da internet por drones e balõesO globo   2014-05-12 - página 19 - expansão da internet por drones e balões
O globo 2014-05-12 - página 19 - expansão da internet por drones e balõesCarlos Alberto Teixeira
 
Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014
Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014
Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014Carlos Alberto Teixeira
 
Dispositivos computacionais conectados preferidos dos brasileiros
Dispositivos computacionais conectados preferidos dos brasileirosDispositivos computacionais conectados preferidos dos brasileiros
Dispositivos computacionais conectados preferidos dos brasileirosCarlos Alberto Teixeira
 
Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819
Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819
Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819Carlos Alberto Teixeira
 

Mehr von Carlos Alberto Teixeira (15)

Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"
Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"
Apresentação do Prof. Marc Prensky no evento "Educação 360 Tecnologia"
 
Para pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDAS
Para pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDASPara pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDAS
Para pessoas idosas: MANUAL SOBRE COMO EVITAR QUEDAS
 
INGRESS — Game que mistura real e virtual vicia usuários
INGRESS — Game que mistura real e virtual vicia usuáriosINGRESS — Game que mistura real e virtual vicia usuários
INGRESS — Game que mistura real e virtual vicia usuários
 
Leia a entrevista de Marina Silva na revista Época
Leia a entrevista de Marina Silva na revista ÉpocaLeia a entrevista de Marina Silva na revista Época
Leia a entrevista de Marina Silva na revista Época
 
Em busca do próximo bilhão de internautas
Em busca do próximo bilhão de internautasEm busca do próximo bilhão de internautas
Em busca do próximo bilhão de internautas
 
O globo 2014-05-12 - página 19 - expansão da internet por drones e balões
O globo   2014-05-12 - página 19 - expansão da internet por drones e balõesO globo   2014-05-12 - página 19 - expansão da internet por drones e balões
O globo 2014-05-12 - página 19 - expansão da internet por drones e balões
 
Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014
Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014
Intel ISEF 2014, matéria publicada em O GLOBO em 19 de maio de 2014
 
Dispositivos computacionais conectados preferidos dos brasileiros
Dispositivos computacionais conectados preferidos dos brasileirosDispositivos computacionais conectados preferidos dos brasileiros
Dispositivos computacionais conectados preferidos dos brasileiros
 
Apple store do rio guia do visitante
Apple store do rio   guia do visitanteApple store do rio   guia do visitante
Apple store do rio guia do visitante
 
Tabela zoom snt
Tabela zoom sntTabela zoom snt
Tabela zoom snt
 
Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819
Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819
Boletim da sedec cbmerj num 012 data 31-01-2014 folha 819
 
Cell Phones and Brain Cancer
Cell Phones and Brain CancerCell Phones and Brain Cancer
Cell Phones and Brain Cancer
 
Normandia: Ontem e Hoje / Parte1
Normandia: Ontem e Hoje / Parte1Normandia: Ontem e Hoje / Parte1
Normandia: Ontem e Hoje / Parte1
 
All About Taking Photos
All About Taking PhotosAll About Taking Photos
All About Taking Photos
 
Rio de Janeiro visto do céu
Rio de Janeiro visto do céuRio de Janeiro visto do céu
Rio de Janeiro visto do céu
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A