From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Tidbits from the New York Times: The final phase of Mr. Hame's training took place at an Internet cafe in Raqqa, where an Islamic State computer specialist handed...Bruce Schneier From Schneier on Security | March 31, 2016 at 07:10 AM
The FBI's legal battle with Apple is over, but the way it ended may not be good news for anyone. Federal agents had been seeking to compel Apple to break the security...Bruce Schneier From Schneier on Security | March 30, 2016 at 05:54 PM
Research paper: Elizabeth Stoycheff, "Under Surveillance: Examining Facebook's Spiral of Silence Effects in the Wake of NSA Internet Monitoring": Abstract: Since...Bruce Schneier From Schneier on Security | March 29, 2016 at 01:58 PM
Here's a 1,300-page Congressional report on "surveillance technology" from 1976....Bruce Schneier From Schneier on Security | March 28, 2016 at 02:05 PM
Interesting paper: Yochai Benkler, "Degrees of Freedom, Dimensions of Power," Daedelus, winter 2016: Abstract: The original Internet design combined technical,...Bruce Schneier From Schneier on Security | March 28, 2016 at 07:46 AM
A local newspaper recently tested airport security at Memphis Airport: Our crew sat for 30 minutes in the passenger drop-off area Tuesday without a word from anyone...Bruce Schneier From Schneier on Security | March 25, 2016 at 01:26 PM
It was a manipulation of the terminals. The 5 Card Cash game was suspended in November after Connecticut Lottery and state Department of Consumer Protection officials...Bruce Schneier From Schneier on Security | March 25, 2016 at 07:31 AM
On Monday, the FBI asked the court for a two-week delay in a scheduled hearing on the San Bernardino iPhone case, because some "third party" approached it with...Bruce Schneier From Schneier on Security | March 24, 2016 at 01:34 PM
Writing a magazine column is always an exercise in time travel. I'm writing these words in early December. You're reading them in February. This means anything...Bruce Schneier From Schneier on Security | March 24, 2016 at 07:37 AM
The FBI just added two members of the Syrian Electronic Army to its cyber most-wanted list. I had no idea that the FBI had a cyber most-wanted list....Bruce Schneier From Schneier on Security | March 23, 2016 at 02:03 PM
This was newly released under FOIA at my request: Victor C. Williams, Jr., Donn B. Parker, and Charles C. Wood, "Impacts of Federal Policy Options for Nonmilitary...Bruce Schneier From Schneier on Security | March 23, 2016 at 07:20 AM
Interesting analysis from The Grugq: Bottom Line Up Front Intelligence agencies must cooperate more rapidly and proactively to counter ISIS' rapid and haphazard...Bruce Schneier From Schneier on Security | March 22, 2016 at 07:37 AM
Matthew Green and team found and reported a significant iMessage encryption flaw last year. Green suspected there might be a flaw in iMessage last year after he...Bruce Schneier From Schneier on Security | March 21, 2016 at 02:45 PM
The Brennan Center has released a report on EO 12333, the executive order that regulates the NSA's overseas surveillance. Much of what the NSA does here is secret...Bruce Schneier From Schneier on Security | March 21, 2016 at 07:53 AM
Recommended recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 18, 2016 at 05:08 PM
A quote from Data and Goliath is the answer to a Wall Street Journal acrostic. It's not the same as being a New York Times crossword puzzle answer, but it's close...Bruce Schneier From Schneier on Security | March 18, 2016 at 03:39 PM
ZDNet has an article on US government pressure on software companies to hand over copies of their source code. There's no details because no one is talking on the...Bruce Schneier From Schneier on Security | March 18, 2016 at 12:27 PM
NIST has published a draft of their new standard for encryption use: "NIST Special Publication 800-175B, Guideline for Using Cryptographic Standards in the Federal...Bruce Schneier From Schneier on Security | March 17, 2016 at 10:54 AM
The FBI's reply to Apple is more of a character assassination attempt than a legal argument. It's as if it only cares about public opinion at this point. Although...Bruce Schneier From Schneier on Security | March 16, 2016 at 07:12 AM