From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
No surprise here. Although we some new codenames:
DISHFIRE: The NSA's program to collect text messages and text-message metadata.
PREFER: The NSA's program to...schneier From Schneier on Security | January 17, 2014 at 06:32 AM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
SIERRAMONTANA
(TS//SI//REL) SIERRAMONTANA provides persistence for DNThere...schneier From Schneier on Security | January 16, 2014 at 03:00 PM
This morning I spent an hour in a closed room with six Members of Congress: Rep. Logfren, Rep. Sensenbrenner, Rep. Scott, Rep. Goodlate, Rep Thompson, and Rep....schneier From Schneier on Security | January 16, 2014 at 01:27 PM
This is interesting:
Adding credence to the theory that Brooklyn landlord Menachem Stark was kidnapped and murdered by professionals, a law enforcement source ...schneier From Schneier on Security | January 16, 2014 at 08:29 AM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
SCHOOLMONTANA
(TS//SI//REL) SCHOOLMONTANA provides persistence for DNThere...schneier From Schneier on Security | January 15, 2014 at 03:56 PM
From Ashkan Soltani's blog post:
The Yale Law Journal Online (YLJO) just published an article that I co-authored with Kevin Bankston (first workshopped at the ...schneier From Schneier on Security | January 15, 2014 at 07:23 AM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
HEADWATER
(TS//SI//REL) HEADWATER is a Persistent Backdoor (PDB) software...schneier From Schneier on Security | January 14, 2014 at 03:10 PM
It's something that we're hearing a lot, both from NSA Director General Keith Alexander and others: the NSA's mass surveillance programs could have stopped 9/11...schneier From Schneier on Security | January 14, 2014 at 08:15 AM
One of the top secret NSA documents published by Der Spiegel is a 50-page catalog of "implants" from the NSA's Tailored Access Group. Because the individual implants...schneier From Schneier on Security | January 13, 2014 at 03:45 PM
Secret NSA eavesdropping is still in the news. Details about once secret programs continue to leak. The Director of National Intelligence has recently declassified...schneier From Schneier on Security | January 13, 2014 at 07:28 AM
Happy squid new year.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | January 10, 2014 at 05:27 PM
Interesting story:
...burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with...schneier From Schneier on Security | January 10, 2014 at 07:45 AM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
JETPLOW
(TS//SI//REL) JETPLOW is a firmware persistence implant for Cisco...schneier From Schneier on Security | January 9, 2014 at 02:02 PM
We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself -- as with the Internet of Things...schneier From Schneier on Security | January 9, 2014 at 07:33 AM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
HALLUXWATER
(TS//SI//REL) The HALLUXWATER Persistence Back Door implant...schneier From Schneier on Security | January 8, 2014 at 02:48 PM
Paper from First Monday: "Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy."
Abstract:...schneier From Schneier on Security | January 8, 2014 at 09:07 AM
Continuing our walk through the NSA's Tailored Access Operations (TAO) group implant catalog:
GOURMETTROUGH
(TS//SI//REL) GOURMETTROUGH is a user configurable...schneier From Schneier on Security | January 7, 2014 at 02:16 PM
Matt Blaze makes a point that I have been saying for a while now:
Don't get me wrong, as a security specialist, the NSA's Tailored Access Operations (TAO) scare...schneier From Schneier on Security | January 7, 2014 at 09:22 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
FEEDTROUGH
(TS//SI//REL) FEEDTROUGH is a persistence technique for two software...schneier From Schneier on Security | January 6, 2014 at 02:28 PM