News in the Category “Audio”
Marcus Smith interviewed Bruce Schneier on BYU Radio's "Constant Wonder."
Given the measure by which technology invades every aspect of our lives, the need to have technologists involved in crucial public-interest conversations is growing exponentially.
But that isn’t happening today at any kind of significant scale, and leaders such as Bruce Schneier are trying to change that.
Schneier, a cryptography pioneer, fellow, and lecturer at Harvard’s Kennedy Business School, has taken up the cause of public-interest technology and is trying to bring awareness to the current state of affairs, and how not only security professionals but technologists in all fields can make a difference.
In this episode of the Collective Intelligence Podcast, Schneier discusses how technologists can—and should feel an obligation to—make a difference.
Companies are making it easier than ever for consumers to flood their homes with internet-capable appliances and electronics—maybe too easy. We hear from a security technologist who explains why he believes we need more regulation and more government oversight when it comes to internet security and our future network of smart-equipped items.
"It's not really about our data and our privacy—that's the old world. The old world was somebody hacked my spreadsheet and got my data. The new world is someone hacked my embedded pacemaker and killed me."
— Bruce Schneier
We’re celebrating international Data Privacy Day along with the 100th episode of Firewalls Don’t Stop Dragons! And what a show we have! My guest today is none other than Bruce Schneier: internationally renowned security technologist and author of 14 books, including the best-seller Click Here to Kill Everybody! Bruce and I discuss the current state of data privacy and what it’s going to take to rein in the corporations that are buying and selling our data with abandon.
In the second episode of The NULLCON Podcast, internationally renowned security technologist, Bruce Schneier talked about his latest book Click Here to Kill Everybody, the risk and future of post-quantum cryptography, and his views on governments asking for backdoors.
"I worry about the monopolies that are engaged in surveillance capitalism."—Bruce Schneier, Security Technologist
Matt Ward interviewed Bruce Schneier on the podcast The Disruptors.
Embedded in an increasing number of the devices and objects surrounding us, computers are turning the everyday world into a radically programmable attack surface. This is the subject of computer security & cryptography legend Bruce Schneier's latest book, Click Here To Kill Everybody. In this episode we meet up with Bruce to explore how the profusion of insecure devices, capable of being put to a variety of unpredictable purposes, is radically shifting the balance of power. Via cyberattacks, smaller states get the ability to content with the great powers — and an entirely new class of non-state actors are being granted the power to disrupt nations.
Phenomena like the Mirai Botnet, Bruce argues, are just the beginning: we discuss a host of potential attacks on life and property, from car and thermostat hacking to ransomware against hospitals — and how surveillance capitalism' is one of the most important vectors behind this worrying new paradigm.
A report last week from Bloomberg Businessweek suggested that Chinese spies had embedded tiny little microchips on motherboards that control computers in order to steal information from nearly 30 U.S. companies, including Apple and Amazon. Both of those companies, and Super Micro Computer Inc., the electronics maker that was allegedly infiltrated have categorically denied the report. China issued a statement in response to the report that said in part: "Supply chain safety in cyberspace is an issue of common concern, and China is also a victim." But the story is lingering, in part because it brings up a very scary reality that lots of cybersecurity experts keep talking about.
Bruce Schneier, Chief Technology Officer at IBM Resilient, guests to discuss his new book, Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. We discuss how the Internet of Things (IoT) opens up new possibilities for catastrophes, how social media companies and governments follow a model of surveillance capitalism, and how the Internet can be made more secure moving forward.
Featuring Bruce Schneier, the author of Click Here to Kill Everybody in conversation with Abby Everett Jaques, MIT.
In this week's episode of Hidden Forces, Demetri Kofinas speaks with Bruce Schneier, about cyberattacks, cyberwar, and survival in a hyperconnected world.
Cyberattacks constitute one of the most urgent threats facing collective humanity according to Bruce Schneier. History has proven him right. In the summer of 2017, a weapon of cyberwar was dropped onto a world without borders, where the heavy artillery and nuclear warheads that defined the battlelines of the 20th century have been rendered useless.
Security technologist Bruce Schneier's latest book, Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, argues that it won't be long before everything modern society relies on will be computerized and on the internet. This drastic expansion of the so-called 'internet of things,' Schneier contends, vastly increases the risk of cyberattack. To help figure out just how concerned you should be, Benjamin Wittes sat down with Schneier. They talked about what it would mean to live in a world where everything, including Ben's shirt, was a computer, and how Schneier's latest work adds to his decades of advocacy for principled government regulation and oversight of "smart devices."
Schneier is a security guru. And in his new book, subtitled Security and Survival in a Hyper-Connected World, he explains the real risks in a world where everything is becoming a computer, and networked in a way that he calls "internet plus."
From hacked cars to vulnerable power grids, Schneier paints a detailed picture of just how IT-dependent our modern world is. And how fragile it has become, in the context of what he calls "internet plus."
Nora Young: People often use this term 'Internet of Things'.
We are fully back from our August hiatus, and leading off a series of great interviews, I talk with Bruce Schneier about his new book, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. Bruce is an internationally renowned technologist, privacy and security commentator, and someone I respect a lot more than I agree with. But his latest book opens new common ground between us, and we both foresee a darker future for a world that has digitally connected things that can kill people without figuring out a way to secure them. Breaking with Silicon Valley consensus, we see security regulation in the Valley’s future, despite all the well-known downsides that regulation will bring.
In this week’s podcast (episode #111), sponsored by CyberSN: what happens when the Internet gets physical? Noted author and IBM security guru Bruce Schneier joins us to talk about his new book on Internet of Things risk: Click Here to Kill Everybody. Also: everyone knows that cyber security talent is hard to come by, and even harder to keep. But why does precious cyber talent walk?
Bruce Schneier discusses his new book Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. Computers are connected to everything small and large from home appliances like ovens and thermostats to large industrial sites like chemical plants. Digital attackers can now crash your car, your pacemaker, and the nation’s power grid. Schneier reveals the hidden web of technical, political, and market forces that underpin the pervasive insecurities of today’s connected world.
Bruce Schneier says that everything, basically, is a computer with some extra stuff attached.
When he wrote for New York Magazine, he described it this way:
Your modern refrigerator is a computer that keeps things cold. Your oven, similarly, is a computer that makes things hot. An ATM is a computer with money inside.
Flashpoint Editorial Director Mike Mimoso talks to security expert, cryptography pioneer and author Bruce Schneier about the security and privacy implications of rampant data collection by organizations.
This podcast was recorded at RSA Conference 2018.
Mike and Bruce discuss whether market pressure can impose a change on these practices, or if legislation is the inevitable outcome. Bruce also discusses how privacy has changed in recent years and why younger generations have "different defaults" when it comes to sharing personal information.
Mike Mimoso talks to Bruce Schneier, CTO of IBM Resilient, at RSA 2017 about the early days of the conference, his campaign for IoT regulation, and how the technical community needs to get involved with policy.
On Tuesday, President-elect Donald Trump named cyber expert Tom Bossert as his homeland security adviser.
Bossert is currently a fellow at the Atlantic Council and was a former national security aide to President George W. Bush.
He says cybersecurity will be one a top priority in his new job.
And if the events of 2016 say anything, Bossert will likely have a lot on his plate.
Just before the start of the Democratic National Convention, top-secret emails from the Democratic National Committee were published on whistleblower website Wikileaks, in a major operation the FBI attributed to Russian hackers.
Some U.S. officials have raised subsequent questions: Were the hackers deliberately attempting to influence the election in favor of Donald Trump? Did Trump have any influence?
Bruce Schneier on How IoT Changes Everything in Security
Bruce Schneier, CTO at the security firm Resilient Systems, is busy examining how IoT - the name given to the computerization of everything in our lives - is changing the security world.
From sensors that collect data about our environment to databases in the cloud to analytics that help us make use of data, the Internet of Things is capable of changing our physical world.
"We're building an internet that senses, thinks and acts, but doesn't have a body, and that is the textbook definition of a robot," Schneier says. "What I want to propose is that we're building a world-sized robot, and we don't even realize it.
Adam is joined by Bruce Schneier to talk about current problems facing the TSA, gun control, and how data and security intersect.
One of the topics that resonated deeply with last season's Adam Ruins Everything viewers was Bruce Schneier's take on security and "security theater". So we had to bring Bruce on the podcast. Bruce is a brilliant cryptographer and security expert, who's written countless articles and academic papers and published 13 books, including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.
Bruce Schneier, the well-known cryptographer, author, and security expert, is today's guest on the On the Wire podcast. Dennis Fisher talks with Schneier about the pervasiveness of commercial and government surveillance and tracking, the emerging problem of IoT security, and what can be done to address the technical and policy issues all of this entails. They also discuss the ideas in Schneier's latest book, Data and Goliath, and what might be the theme for Schneier's next one.
Internet security expert, privacy advocate, and author Bruce Schneier speaks with the Technoskeptic about the public-private surveillance partnership that monitors everything we do, and what needs to happen in order to restore our privacy.
The episode in brief:
- Bruce Schneier talks about privacy and security
- His new book Data and Goliath
- The hidden battles to collect your data and control your world
- The nonsense of data vs. metadata
- Why privacy is not a changeable social norm
- The harm ubiquitous mass surveillance does to our society
Astute regular listeners may have observed that Dr. J is becoming more and more intrigued with the related issues of privacy and security. These apply to online and mobile phone technology. Both are thoroughly involved in communicating with your social networks.
“What we learn again and again is that security is less about what you think of, and more about what you didn’t think of.”
- In Data and Goliath, what are the motives of different goliaths?
- Why is the Ashley Madison case a watershed moment in security?
- Do you still feel we should break up the NSA?
- Will Google and Amazon become military contractors?
- How can we defend ourselves from DOS attacks from refrigerators?
- When we put processors in refrigerators, and cars, and thermostats, are we increasing the attack surface, and our vulnerabilities faster than we are improving our utility?
The number of cyber attacks happening every year is on the rise. We speak to Bruce Schneier, chief technology officer at the IT company Resilient Systems and a fellow at Harvard's Berkman Center for the Internet and Society, about why it can take months before a company or organisation even realises it is under attack, and why so many are unprepared. Also, Wil van Gemert, deputy director of operations at Europol, tells us what European law enforcers are doing about it. He says it is now possible to buy "malware," or malicious software meaning that anyone can become a cyber criminal.
Dr Chris Brauer from Goldsmiths, University of London, on how big brands want to sell us things via wearable devices. Bruce Schneier, security and privacy expert and author of the book "Data and Goliath", warns of the threat of companies and governments misusing data about us. Emily Bell, from the Tow Centre for Digital Journalism, on Verizon's buyout of AOL, and Facebook's instant articles. And Zoe Kleinman spends a night alone in a house full of robots.
New America's Peter Singer and Passcode's Sara Sorcher chat with Bruce Schneier, prolific author and chief technology officer at Resilient Systems, about the challenges of publicly blaming countries for cyberattacks—and whose job it should be to defend private companies against sophisticated nation-state attacks. They also hear from Nate Fick, the CEO of Endgame, a venture-backed security intelligence software company, about how he's leveraging cybersecurity solutions once produced just for the government into the private sector.
Wired's Kim Zetter, author of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, joins the panel discussion to talk about how the cyber operation on Iran's nuclear facilities launched a new era of warfare; the vulnerability of US critical infrastructure to Stuxnet-like weapons; and the gender diversity issues bedeviling the cybersecurity industry.
Cris Sheridan welcomes Bruce Schneier, Chief Technology Officer at Resilient Systems and author of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Bruce writes "we are living in the golden age of surveillance" where almost everything we do is now being tracked and used without our knowledge. Bruce speaks with Cris about how much data we produce, the way corporations are using it, the problems associated with ubiquitous surveillance, and why this is a defining issue of our time.
Episode 65 would be ugly if it weren't so much fun. Our guest is Bruce Schneier, cryptographer, computer science and privacy guru, and author of the best-selling Data and Goliath—a book I annotated every few pages of with the words, "Bruce, you can't possibly really believe this." And that's pretty much how the interview goes, as Bruce and I mix it up over hackbacks, whether everyone but government should be allowed to use Big Data tools, Edward Snowden, whether "mass surveillance" has value in fighting terrorism, and whether damaging cyberattacks are really infrequent and hard to attribute. We disagree mightily—and with civility.
Insights from Security Leader at GISEC Event in Dubai
In developing markets such as Asia and the Middle East, how can security practitioners best prepare themselves to tackle the rapidly-changing threat landscape? Resilience is the key, says security leader Bruce Schneier.
The way to think about security is a combination of protection, detection and response, says Schneier, a fellow at the Berkman Center for Internet and Society at the Harvard Law School, USA. While there is a lot of prevention and detection technology, response is the missing piece, he says.
Computer security expert Bruce Schneier says there's a big difference between feeling secure and actually being secure. He explains why we worry about unlikely dangers while ignoring more probable risks.
GUY RAZ, HOST:
It's the TED Radio Hour from NPR. I'm Guy Raz. And on the show today, we're exploring ideas about Maslow's hierarchy of human needs, and ranked at number two, security - the second step on the pyramid.
Just how much of your life is being watched and tracked? Who has access to all this information and what are they doing with it?
Bruce Schneier, fellow at Harvard Law School, author of Data and Goliath, points out the danger is not only from corporations and governments, but also cybercriminals, when these institutions lose your details.
Bruce Schneier spoke with Paul Harris about his new book, Data and Goliath. Topics include:
- Are we giving up too much information voluntarily in exchange for free services?
- What are data brokers gathering about us, who are they selling it to?
- Are private companies doing enough to shield our data from government?
- How companies and law enforcement can use your cell phone to know where you’ll be tomorrow.
- Whether the NSA can process the huge amounts of surveillance info it is gathering on all of us.
- The war on terror as an excuse to get into anyone’s computer, and its chilling effect on free speech and thought.
Last week the proposed data retention bill passed through the House of Representatives, and is expected to pass through the Senate soon. These laws are set to allow warrantless access to phone calls, sms, social media and internet usage, in the name of tightening our national security.
Disputes and amendments to the bill have focused on confidentiality threats for journalists and whistleblowers, but what effect will data retention have on the average person?
Our host Sam Baran spoke to Bruce Schneier, who is a fellow at Harvard University's Berkman Center for Internet and Society and author of the book Data and Goliath about the ways governments and corporations are storing and using data.
MARK COLVIN: The ALP has agreed to support an amended version of the Government's bill to force Internet Service Providers to keep their customers' data for two years.
It'll let government agencies see what we've all been doing on the phone or online.
Bipartisan support means the bill is likely to pass.
The bodies expected to get access range from various police and customs agencies to the Competition watchdog, the ACCC.
How much do you know about what others might know about you, from your use of technology? How do you minimise your online footprint on things you'd rather keep private?
Bruce Schneier is a US technology and security expert, whose latest book is Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, talks to Kathryn Ryan about how much information is being gathered by governments and corporations through our use of phones and computers.
The NSA, Facebook, and Google are constantly mining our personal information for surveillance and advertising purposes, among other goals. Is it possible to keep our data secure in the digital age? Bruce Schneier, a cybersecurity expert and author of Data and Goliath, says, “We need to examine our own fears and decide how much of our privacy we are really willing to sacrifice for convenience.” Read an excerpt from his book here.
Stop feeling guilty about skimming the Terms of Service. Get mad instead.
Reading this right now?
Congratulations. You're winning.
Yes, all of the usual corporate and government entities know you're here.
Almost a year and a half after the Snowden revelations, it’s business as usual for America’s giant global eavesdropping and spying organisation: the NSA, the National Security Agency.
As revelations continue to unfold, legislative attempts to rein in the NSA's powers appear to be stalling. But, Harvard University security analyst Bruce Schneier says the situation is unacceptable.
In the future, argues Schneier, people will look back at the way we ignore privacy today and ask "how could we be that immoral?" He’s put forward his own plan for breaking -up the NSA, and in so doing, bringing its activities under greater civilian control.
Bruce Schneier is the special guest on Episode 11 of the Security Advisor Alliance, on Incident Response.
In G-Force, the 2009 Disney movie, a group of secret agent rodents stops a kitchen gadget robot apocalypse. In the real world, we're in no danger from weaponized blenders, but our toasters just might be used in a denial of service attack.
Rivera Sun and Getch talk with computer security, and privacy specialist, Bruce Schneier. We get the scoop on the latest from the NSA, as well as the security vulnerabilities in the vast internet of things, this week on Occupy Radio.
‘'It's only metadata' is a mischaracterization that plays into goverment hands.'—Bruce Schneier
At the 2014 Source Conference in Boston, I was able to sit down with Bruce Schneier after his keynote to clarify his position on several topics he brought up. The Twitter stream was on fire during his presentation as he described how the power of government and large corporations affects the internet. Where are the boundaries between personal data and corporate/government usage of that data? What is our responsibility in the equation?
News emerged this week that web giant Google is routinely encrypting web searches conducted in China in a move designed to offset the national government's ability to censor the Internet and track what individuals are viewing. The Google move is part of a global expansion of privacy technology to counter surveillance by government intelligence agencies, police and hackers and is seen as a direct consequence of whistleblower, Edward Snowden's release last year of US National Security Agency (NSA) documents exposing the extent of government surveillance of the Internet.
Among the many fears Snowden's leaked revelations have raised is the claim that the NSA and other leading western intelligence agencies are involved in programs to deliberately weaken the Net's security standards to make it easier for them to break in.
Bruce Schneier is a leading US cryptology expert and Chief Technology Officer at CO3 Systems.
The Daily's Kim Williams spoke to him earlier about Google's latest moves to combat alleged privacy intrusions into the Net.
Josh Corman talks to Bruce about his keynote at the 2014 SOURCE Security Conference.
If your car, your thermostat, and your refrigerator are all online and communicating with the world, is enough attention being given to who might be listening—or talking—to your networked things? And what happens if there’s a security flaw in the networking component of, say, your toaster? Security expert Bruce Schneier says that the world is at a crisis point regarding embedded network security, and that an Internet of Things could mean ubiquitous surveillance.
During a podcast on Occupy Radio, the host and a renowned security expert Bruce Schneier get to discuss the NSA practices in terms of treating citizen privacy and other related issues.
- Bruce Schneier is an internationally recognized expert on cryptography and data security. He was dubbed a 'Security Guru' by the Economist magazine. His most recent book is 'Liars and Outliers: Enabling the Trust that Society Needs to Thrive'. Bruce's newsletter, Cryptogram, and his blog Schneier on Security are read by over a quarter of a million people.
Scott and Peter speak with special guest cryptographer and security expert Bruce Schneier about Touch ID, biometrics, and general mobile phone security and privacy issues. Bruce is an outstanding speaker on these topics – you don’t want to miss this.
You signed up for government surveillance when you signed up for your email address. Not knowingly perhaps, (although who actually reads the user agreement?) but NSA spying is only possible with the help of the same private companies you trust with your data in the first place. The individual/government/corporate relationship has never been so exposed and so (hopefully) up for debate. Security technologist Bruce Schneier should be one of the voices you listen to in that debate.
Dennis Fisher talks with cryptographer Bruce Schneier about the revelations of the NSA’s capabilities to subvert and weaken cryptographic algorithms, security products and standards, and what it will take to help defeat these capabilities.
On today's show, we have encryption specialist and author Bruce Schneier here to discuss the latest NSA revelations including the NSA working with tech companies to insert weaknesses into their code.
Privacy PC published the following transcript of the interview.
- All right, joining me now here on the Matthew Filipowicz show is Bruce Schneier. Bruce is a security technologist and encryption specialist. He's written for the Guardian, the Economist, Wired and more.
En entrevista para Grupo Imagen Multimedia con Rodrigo Pacheco, Bruce Schneier, criptógrafo y experto en seguridad, dijo desconocer cuál es la implicación de las empresas en el escándalo de espionaje en Estados Unidos.
Lo cierto, indicó, “es que la industria está coludida a todos los niveles y entonces podríamos ver que ésta pelea porque hay mucha indignación en torno al tema”.
Acerca de los perjuicios que esta situación pudiera generar en los negocios que hacen esas empresas con otros países, manifestó que además de ellos las personas pudieran verse perjudicados, pero además indicó que no hay manera de protegerse por lo que habrá que confiar en los sistemas de protección de información porque “no hay ningún tipo de confianza”.
Agregó que los chinos tienen buenos hackers, pero Estados Unidos y Gran Bretaña tienen un sitio privilegiado porque buena parte del tráfico pasa por esos lugares.
In America today, we find ourselves increasingly living in a new kind of country: where constant surveillance and paramilitary policing are normalized. Bruce Schneier is among the most insightful and important voices speaking out against unchecked government surveillance and the alarming lack of transparency among our democratic institutions.
Revelations of the NSA’s data surveillance efforts have raised serious questions about the ethics and necessity of violating privacy that have been bubbling under the surface for some time. Efforts to monitor communication are nothing new, but electronically mediated communication has increased the amount of information being shared, and the possibilities for eavesdropping are endless. But there's a trade off. People tolerate incursions into privacy for greater security or even convenience: health care, transportation, public safety, or any number of web utilities we use on a daily basis.
Bruce Schneier, author and security guru, talks with EconTalk host Russ Roberts about power and the internet. Schneier argues that the internet enhances the power of the powerless but it also enhances the power of the powerful. He argues that we should be worried about both corporate and government uses of the internet to enhance their power. Recorded before news of the PRISM system and the use of Verizon's customer information by the NSA (National Security Agency), Schneier presciently worries about government surveillance that we are not aware of and explains how governments--democratic and totalitarian--can use the internet to oppress their citizens.
This is a feature cast, an episode of The Command Line Podcast.
The feature this week is an interview with Bruce Schneier. The catalyst for this conversation is a post on his blog that frames out some of the themes he has been considering for his next book. Among other things, we refer to Rebecca Mackinnon’s book and Kevin Kelly’s most recent book in the course of the conversation.
Audio: M-Unition Podcast Series: Bruce Schneier Discusses the Advanced Persistent Threat, Cyberwar and Feudalism
With news outlets flooded with talk of advanced targeted threats and Mandiant's recently released APT1 report, we wanted to know what industry experts thought of the security industry today.
We sat down and spoke with Bruce Schneier about his thoughts on where the security industry is going and to get insight into his new book he is working on. "Cyberwar is based on fear and rhetoric", according to Schneier, "and it is damaging for us to push war rhetoric because it makes us feel helpless." He goes on to say that if we feel a sense of helplessness we naturally can't do anything to protect our systems. It requires a shift in how we view the situation.
Bruce Schneier & Jonathan Zittrain in Conversation
From Bruce Schneier:
What I've Been Thinking About
I have been thinking about the Internet and power: how the Internet affects power, and how power affects the Internet. Increasingly, those in power are using information technology to increase their power. This has many facets, including the following:
1. Ubiquitous surveillance for both government and corporate purposes -- aided by cloud computing, social networking, and Internet-enabled everything -- resulting in a world without any real privacy.
During the podcast, Schneier looks back at his "monitor first" advice from 2001 and discusses its impact today, "We are learning from the recent attacks in the news," said Schneier. "The lesson hasn't changed." On the cusp of an early cyber arms race, Schneier digs into the Mandiant report and shares his concerns on the future of cybersecurity.
Bruce Schneier takes audience questions at the DEF CON 20 hacker convention in Las Vegas.
This week, we’re talking about trust and cooperation, and the implications these social values have for security in the era of global networking. We’re joined by security technologist and author Bruce Schneier, to talk about his book Liars and Outliers: Enabling the Trust Society Needs to Survive. And anthropologist/blogger Greg Laden returns to discuss speculation about cognitive limits on the use of social networks.
On the 74th episode of The Silver Bullet Security Podcast, Gary talks for a second time with Bruce Schneier. They revisit Bruce’s prediction in episode 9 that insight into economics and security would help vendors sell their products more efficiently. In addition, they discuss Bruce’s new book Liars and Outliers: Enabling the Trust that Society Needs to Thrive, how far behind the government is in terms of security, cloud computing, and Uncle Milton’s ant farm.
Society runs on trust. We have no choice but to trust that the random people, institutions, and systems we interact with will cooperate and be trustworthy. Join Ben Merens and his guest Bruce Schneier as they discuss how security can protect us from defectors; and what enables us to trust strangers at the local, national, and global scale.
Bruce Schneier, internationally renowned security expert and author, discusses his new book entitled, “Liars & Outliers: Enabling the Trust That Society Needs To Thrive.” Schneier starts the discussion by looking at society and trust and explains why he thinks the two are necessary for civilization. According to Schneier, two concepts contribute to a trustful society: first, humans are mostly moral; second, informal reputation systems incentivize trustworthy behavior. The discussion turns to technology and trust, and Schneier talks about how the information society yields greater consequences when trust is breached. He then describes how society deals with technology and trust and why he thinks the system is not perfect but working well overall.
Dennis Fisher talks with cryptographer and author Bruce Schneier about his new book, Liars and Outliers, the role of trust in society and security, the ways in which technology helps promote trust and how various groups and actors defect the norm and take advantage of that trust.
Jean Friedman interviewed Bruce Schneier about his talk at RSA 2012.
Bruce Schneier is concerned that without trust, society itself may be impossible
Socrates famously asked if a person could lead a just life in an unjust society. A new book, Liars & Outliers, by Bruce Schneier doesn’t in so many words raise the question, Can a person lead a secure life in an insecure society? but it does answer it. There’s only so much we can do without there being a framework of trust: There have to be moral codes; peer pressures are needed; institutions have to have their own codes of conduct, and so on.
As the 10th anniversary of the Sept. 11 terror attacks nears, many are asking if we're safer now than we were before the attacks. Has heightened security and extra screening at the airport -- including removing your shoes and belt -- made you feel safer?
Host: Mark Trautwein
- Barry Glassner, president of Lewis and Clark College and author of "The Culture of Fear: Why Americans Are Afraid of the Wrong Things"
- Bruce Schneier, security technologist and author of "Beyond Fear: Thinking Sensibly About Security in an Uncertain World"
- Steve Weber, professor of political science at UC Berkeley and author of "The End of Arrogance: America in the Global Competition of Ideas"
Bruce Schneier discusses Joe Lieberman's proposal for an internet "kill switch," why shutting down the internet during a crisis would cause more harm than good, and how controversial websites like WikiLeaks use data redundancy spread out in different countries to prevent being shut down.
In this podcast you'll hear a Q&A with Bruce Schneier of BT Counterpane, as moderated by Risky Business host Patrick Gray at the recent GovCERT Symposium in Rotterdam, Netherlands.
Topics covered include cloud computing, privacy, software manufacturer liability for defects, two factor authentication and more!
Bruce Schneier answered audience questions at the DEFCON hacking conference.
Dennis Fisher talks with security expert Bruce Schneier about the usefulness of cryptography, the psychology of security and fear and the war on the unexpected after 9/11.
Bruce Schneier joined Paul Harris to talk about whether we are in fact safer with current airport procedures than those before 9/11 and whether government and private industry are doing enough to harden security at possible terrorist targets like nuclear and chemical plants. They also talked about technology's role in global security (e.g. whether Google Earth deserved the criticism after investigators found that the terrorists who shot up Mumbai in November had used the imaging information to plan their attack), and about the restrictions on taking liquids onto commercial flights -- the 3.5-ounce rule -- and whether there is any proof that a terrorist could construct a bomb from two liquids they mixed in an airplane lavatory.
Bruce Schneier, cryptographer, computer security specialist, writer, and author, discusses the Justice Department’s bogus prosecutions of barely-terrorists in the JFK, Ft. Dix, Lackawanna, Miami and other cases, the increasing danger to Americans’ liberties due to the large numbers of new Joint Terrorism Task Forces across the country and their temptation to entrap the innocent, the rise of the domestic security industrial complex, the economics of airline security, information as the answer to the problem of consolidated power, the government’s data mining programs and the death of the Real ID.
Bruce Schneier, CTO, BT Counterpane, is an internationally renowned security technologist and author, and a frequent speaker at RSA Conference. His session at RSA Conference 2008 is called Reconceptualizing Security.
Bruce Schneier and Peter Schoof of ebizQ discuss current vulnerabilities, what the future of the security industry will look like, security industry consolidation, encryption, and finally, the time frame for changes in the industry to come about.
First, what threats do you see that companies need to be most concerned with at this point?
The biggest threat right now is crime. About five years ago, criminals discovered the internet in a big way and whether it's identity theft which is fraud or denial of service extortion or other attempts to make money, crime is the primary threat on the net and when we're worried about internet threats, we're worried about crime.
I've read some of your general comments about, essentially, in a perfect world, the security industry would be unneeded.
A recent National Research Council report recognizes that the 9/11 attacks provoked counter-productive security measures that stifle access to fruitful scientific research. Security expert Bruce Schneier talks with Science Progress about the science that makes us smarter and the security that makes us safer.
Earlier this month the National Research Council released a Congressionally-mandated report, 'Science and Security in a Post 9/11 World,' which recognizes that the 9/11 attacks provoked a misallocation of United States security resources and led to counter-productive security measures. The NRC warns that the widespread practice of labeling scientific research as 'sensitive but unclassified' has had grave consequences for our security and our economy.
Bruce Schneier answered questions from the audience at DEF CON 15.
[Dave Birch] This week's podcast turned out to be rather timely. I happened to have a chat with noted security guru Bruce Schneier about e-passports a couple of days before the UK e-passports made the news. The topic of e-passports merits serious discussion and Bruce's perspective is very valuable.
Baron Dave Romm and Brian Westley talk with guest Bruce Schneier. Topics range from terrorism to computer security to molecular gastronomy.
You used to only be able to find surveillance cameras in banks, or 24-hour convenience stores, or communist dictatorships.
But today they're virtually everywhere—from buses in London to restaurants in New Delhi to the Bridges of Madison County in central Iowa.
Security technology expert Bruce Schneier joins reporter Nikki Tundel for a surveillance walking tour of downtown Minneapolis.
How recent disclosures regarding domestic surveillance, the Justice Department's requests for Google search histories, and advances in data mining are challenging conventional notions of privacy.
- Robert O'Harrow, investigative reporter, Washington Post and author of "No Place To Hide"
- Joe Whitley, attorney, Alston and Bird, and former general counsel, Department of Homeland Security
- Bruce Schneier, Chief Security Technology Officer, Counterpane Internet Security
Host Doug Kaye says, "This is the one interview I hope everyone will hear."
In his latest book, Beyond Fear, security guru Bruce Schneier goes beyond cryptography and network security to challenge our post-9/11 national security practices. Here are some teasers:
- "We're seeing so much nonsense after 9/11, and so many people are saying things about security, about terrorism that just makes no sense."
- "Homeland security measures are an enormous waste of money."
- "If the goal of security is to protect against yesterday's attacks, we're really good at it."
- "The system didn't fail in the way the designers expected."
- "Attackers exploit the rarity of failures."
- "More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk."
- "Did you ever wonder why tweezers were confiscated at security checkpoints, but matches and cigarette lighters--actual combustible materials--were not?...If the tweezers lobby had more power, I'm sure they would have been allowed on board as well."
- "When the U.S. Government says that security against terrorism is worth curtailing individual civil liberties, it's because the cost of that decision is not borne by those making it."
- "...people make bad security trade-offs when they're scared."
Read or listen to this terrific interview in which Bruce also says what he thinks of the 9/11 hearings and answers questions from listeners regarding spam and biometrics. This is one of our best.
Bruce Schneier answered audience questions at the DEF CON hacking conference.
Sidebar photo of Bruce Schneier by Joe MacInnis.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.