Category: Bruce Schneier

The 2016 National Threat Assessment 0

The 2016 National Threat Assessment

It’s National Threat Assessment Day. Published annually by the Director of National Intelligence, the ” Worldwide Threat Assessment of the US Intelligence Community ” is the US intelligence community’s one time to publicly talk about the threats in general

Large-Scale FBI Hacking 0

Large-Scale FBI Hacking

As part of a child pornography investigation, the FBI hacked into over 1,300 computers. But after Playpen was seized, it wasn’t immediately closed down, unlike previous dark web sites that have been shuttered” by law enforcement. Instead, the FBI ran Playpen from its own servers in Newington, Virginia, from February 20 to March 4, reads a complaint filed against a defendant in Utah

Data and Goliath Published in Paperback 0

Data and Goliath Published in Paperback

Today, Data and Goliath is being published in paperback. Everyone tells me that the paperback version sells better than the hardcover, even though it’s a year later. I can’t really imagine that there are tens of thousands of people who wouldn’t spend $28 on a hardcover but are happy to spend $18 on the paperback, but we’ll see

NSA Reorganizing 0

NSA Reorganizing

The NSA is undergoing a major reorganization , combining its attack and defense sides into a single organization: In place of the Signals Intelligence and Information Assurance directorates ­ the organizations that historically have spied on foreign targets and defended classified networks against spying, respectively ­ the NSA is creating a Directorate of Operations that combines the operational elements of each. It’s going to be difficult, since their missions and culture are so different. The Information Assurance Directorate (IAD) seeks to build relationships with private-sector companies and help find vulnerabilities in software ­ most of which officials say wind up being disclosed

Tracking Anonymous Web Users 0

Tracking Anonymous Web Users

This research shows how to track e-commerce users better across multiple sessions, even when they do not provide unique identifiers such as user IDs or cookies. Abstract : Targeting individual consumers has become a hallmark of direct and digital marketing, particularly as it has become easier to identify customers as they interact repeatedly with a company

Security vs. Surveillance 0

Security vs. Surveillance

Both the “going dark” metaphor of FBI Director James Comey and the contrasting “golden age of surveillance” metaphor of privacy law professor Peter Swire focus on the value of data to law enforcement. As framed in the media, encryption debates are about whether law enforcement should have surreptitious access to data, or whether companies should be allowed to provide strong encryption to their customers. It’s a myopic framing that focuses only on one threat — criminals, including domestic terrorists — and the demands of law enforcement and national intelligence.