Crypto-Gram: 2013 Archives
December 15, 2013
In this issue:
November 15, 2013
In this issue:
- NSA Harvesting Contact Lists
- NSA Eavesdropping on Google and Yahoo Networks
- Code Names for NSA Exploit Tools
- Defending Against Crypto Backdoors
- Why the Government Should Help Leakers
- NSA/Snowden News
- The Trajectories of Government and Corporate Surveillance
- A Fraying of the Public/Private Surveillance Partnership
- Book Review: “Cyber War Will Not Take Place”
- Understanding the Threats in Cyberspace
- News
- SecureDrop
- Dry Ice Bombs at LAX
- Schneier News
- The Battle for Power on the Internet
October 15, 2013
In this issue:
- How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
- Why It’s Important to Publish the NSA Programs
- The NSA’s New Risk Analysis
- Reforming the NSA
- NSA/Snowden News
- The Limitations of Intelligence
- Metadata Equals Surveillance
- Senator Feinstein Admits the NSA Taps the Internet Backbone
- NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
- News
- Air Gaps
- Will Keccak = SHA-3?
- Schneier News
- Google Knows Every Wi-Fi Password in the World
- Surreptitiously Tampering with Computer Chips
September 15, 2013
In this issue:
- Take Back the Internet
- More on the NSA Commandeering the Internet
- Detaining David Miranda
- Government Secrecy and the Generation Gap
- Conspiracy Theories and the NSA
- The NSA’s Cryptographic Capabilities
- How to Remain Secure Against the NSA
- Protecting Against Leakers
- NSA/Snowden News
- Our Newfound Fear of Risk
- Human-Machine Trust Failures
- Excess Automobile Deaths as a Result of 9/11
- News
- iPhone Fingerprint Authentication
- Hacking Consumer Devices
- Syrian Electronic Army Cyberattacks
- Schneier News
- The Cryptopocalypse
- Measuring Entropy and its Applications to Encryption
August 15, 2013
In this issue:
July 15, 2013
In this issue:
- Blowback from the NSA Surveillance
- Evidence that the NSA Is Storing Voice Content, Not Just Metadata
- NSA Secrecy and Personal Privacy
- Petition the NSA to Subject its Surveillance Program to Public Comment
- New Details on Skype Eavesdropping
- Pre-9/11 NSA Thinking
- How the NSA Eavesdrops on Americans
- NSA E-Mail Eavesdropping
- News
- US Offensive Cyberwar Policy
- Finding Sociopaths on Facebook
- Schneier News
- My Fellowship at the Berkman Center
- Protecting E-Mail from Eavesdropping
- Is Cryptography Engineering or Science?
- Sixth Movie-Plot Threat Contest Winner
June 15, 2013
In this issue:
- Government Secrets and the Need for Whistleblowers
- Prosecuting Snowden
- Trading Privacy for Convenience
- More Links on the Snowden Documents
- Essays Related to NSA Spying Documents
- The Politics of Security in a Democracy
- News
- More on Feudal Security
- Surveillance and the Internet of Things
- The Problems with CALEA-II
- Schneier News
- Sixth Annual Movie-Plot Threat Semifinalists
- A Really Good Article on How Easy it Is to Crack Passwords
- Bluetooth-Controlled Door Lock
- Security and Human Behavior (SHB 2013)
- The Cost of Terrorism in Pakistan
May 15, 2013
In this issue:
- Refuse to be Terrorized
- Intelligence Analysis and the Connect-the-Dots Metaphor
- Transparency and Accountability
- Me on the Boston Terrorist Attacks
- The Boston Marathon Bomber Manhunt
- More Links on the Boston Terrorist Attack
- News
- The Public/Private Surveillance Partnership
- Schneier News
- Michael Chertoff on Google Glass
March 15, 2013
In this issue:
- Nationalism on the Internet
- Automobile Data Surveillance and the Future of Black Boxes
- The Court of Public Opinion
- News
- More on Chinese Cyberattacks
- Technologies of Surveillance
- Phishing Has Gotten *Very* Good
- Schneier News
- Hacking the Papal Election
- Getting Security Incentives Right
- All Those Companies that Can’t Afford Dedicated Security
February 15, 2013
In this issue:
- Power and the Internet
- Who Does Skype Let Spy?
- Our New Regimes of Trust
- News
- TSA Removing Rapiscan Full-Body Scanners from U.S. Airports
- Dangerous Security Theater: Scrambling Fighter Jets
- Massive Police Shootout in Cleveland Despite Lack of Criminals
- “New York Times” Hacked by China
- Schneier News
- Jared Diamond on Common Risks
- Man-in-the-Middle Attacks Against Browser Encryption
- “People, Process, and Technology”
Sidebar photo of Bruce Schneier by Joe MacInnis.