Category: Bruce Schneier

New Zealand’s XKEYSCORE Use 0

New Zealand’s XKEYSCORE Use

The Intercept and the New Zealand Herald have reported that New Zealand spied on communications about the World Trade Organization director-general candidates. I’m not sure why this is news; it seems like a perfectly reasonable national intelligence target. More interesting to me is that the Intercept published the XKEYSCORE rules.

Reforming the FISA Court 0

Reforming the FISA Court

The Brennan Center has a long report on what’s wrong with the FISA Court and how to fix it. At the time of its creation, many lawmakers saw constitutional problems in a court that operated in total secrecy and outside the normal “adversarial” process…. But the majority of Congress was reassured by similarities between FISA Court proceedings and the hearings that take place when the government seeks a search warrant in a criminal investigation.

BIOS Hacking 0

BIOS Hacking

We’ve learned a lot about the NSA’s abilities to hack a computer’s BIOS so that the hack survives reinstalling the OS . Now we have a research presentation about it. From Wired : The BIOS boots a computer and helps load the operating system.

New Paper on Digital Intelligence 0

New Paper on Digital Intelligence

David Omand — GCHQ director from 1996-1997, and the UK’s security and intelligence coordinator from 2000-2005 — has just published a new paper : “Understanding Digital Intelligence and the Norms That Might Govern It.” Executive Summary : This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency (NSA) contractor Edward Snowden.

How We Become Habituated to Security Warnings on Computers 0

How We Become Habituated to Security Warnings on Computers

New research: ” How Polymorphic Warnings Reduce Habituation in the Brain ­- Insights from an fMRI Study .” Abstract : Research on security warnings consistently points to habituation as a key reason why users ignore security warnings. However, because habituation as a mental state is difficult to observe, previous research has examined habituation indirectly by observing its influence on security behaviors. This study addresses this gap by using functional magnetic resonance imaging (fMRI) to open the “black box” of the brain to observe habituation as it develops in response to security warnings.