News in the Category "Text"
Page 19 of 64
Bruce Schneier: David Cameron's Proposed Encryption Ban Would 'Destroy the Internet'
A highly respected cryptographer and security expert is warning that David Cameron’s proposed ban on strong encryption threatens to "destroy the internet."
Last week, the British Prime Minister told Parliament that he wants to "ensure that terrorists do not have a safe space in which to communicate."
Strong encryption refers to the act of scrambling data in such a way that it cannot be understood by anyone without the correct key or password—even law enforcement with a warrant, or the software manufacturer itself. It’s used in some of the most popular tech products in the world, including the iPhone, WhatsApp messenger, and Facebook…
What’s to Be Done about Data? Q&A with Bruce Schneier
Bruce Schneier has been called a “security guru” by the Economist. He has written 13 books and hundreds of articles, and his influential newsletter Crypto-Gram and his blog Schneier on Security have over 250,000 readers. He has testified before the U.S. Congress, is a frequent guest on television and radio, and has served on several U.S. government committees. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a board member of the Electronic Frontier Foundation, and the Chief Technology Officer at Resilient Systems…
I Read “Data and Goliath” Because of Barbara Fister
I’m interested how we choose the books we read. Here is my request to you. Please keep track of, and share with our IHE community, how you select your books.
For one of the recent books that I read I can definitely share my book selection process. I chose to buy and read (two very different actions) Data and Goliath because of Barbara Fister. Barbara reviewed the book—A Scare-Your-Socks-Off Thriller: Data and Goliath. I bought the book.
If you have not secured your copy of Data and Goliath, or you have an unread copy, I encourage you to make time this summer for the book…
This Security Expert Reckons Mass Surveillance Doesn't Stop Terror Attacks
This interview originally appeared in French on VICE France.
Today’s terrorist attack in the Rhône-Alpes region of France, involving the decapitation of a man, has been met with widespread horror and condemnation. So have those in Tunisia, killing 28, and another in Kuwait killing 25. These horrific events are sure to fuel discussion about how to stop this kind of atrocity happening again.
Following January’s Charlie Hebdo attacks in Paris, the French government decided to expedite a new surveillance law. Two days ago, on Wednesday 24th of June, French officials at the National Assembly gave the green light to that new law. France’s new surveillance law has already been compared to the late American Patriot Act—an American anti-terrorism act passed after 9/11 which was …
Terrifying Action Movie Plots About… Encryption
Imagine this: It’s the morning of Election Day, 2020. Americans across the country cast secure, encrypted votes from their smartphones and laptops, electronically choosing their president for the first time in history. Turnout reaches record highs. Live results online show that it’s a close race between the two leading candidates. But by early afternoon, an independent candidate—a sketchy figure with ties to multiple terrorist organizations and no public support whatsoever—mysteriously takes the lead. At 4 p.m., he officially wins the election. The American people rise up in protest: Clearly, hacking, bribery, or other nefarious activity has taken place. However, because the voting software is designed with end-to-end encryption to ensure anonymity, no audit or recount is possible…
Library Journal Review of Data & Goliath
Starred Review
Schneier, a fellow at Harvard’s Berkman Center for Internet and Society, has written an exceptionally readable yet thoroughly chilling book about the dangers of the ubiquitous mass surveillance we face thanks to modern life. While the author focuses on the United States, the rest of the world is largely capable of nearly the same levels of surveillance thanks to the openness of the Internet and the availability of cell phones. Schneier describes the types of data being collected about us, stemming from our interactions, activities, purchases, and where we go. As he competently explains, this “metadata” provides those collecting it with the entire framework of our existence: who we converse with and the duration of the conversation, the things we read (especially electronically), and what we buy. Corporations use this data to deliver targeted advertising and sell our information to other corporations at a large profit. Governments employ the data to map our interactions and otherwise infiltrate our privacy. As Schneier helps us understand the issues, he makes the case that “Ubiquitous mass surveillance is the enemy of democracy, liberty, freedom, and progress.” Though there are few signs of change in corporate and government surveillance practices, Schneier devotes a chapter to practical solutions we can use to limit how we are tracked, information about how other countries approach privacy, and a set of potential principles we could adopt. …
20 Top Security Influencers
Excerpt
With so much going on in the enterprise security space, it can be hard to keep up with the flow of information and to know where to turn for actionable advice. This list of security experts, selected by eSecurityPlanet, is a good place to start.
All are active bloggers and even more active as Twitter users. These thought leaders have a variety of backgrounds, numerous years of experience and unique viewpoints. The list contains founders, CEOs, CTOs and more. Companies these individuals are, or have been, associated with include Kaspersky Labs, BT, WhiteHat Security, Juniper Networks and Cisco…
Review: Data and Goliath by Bruce Schneier
Bruce Schneier, Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World. New York, NY: W.W. Norton., 2015. Pp. 400. £ 17.99, ISBN: 978-0-393-24481-6.
If you’re not familiar with the Information Security community in the IT industry, it’s worth knowing that Bruce Schneier has earned the reputation of a prophet, sage and action hero combined. As a renowned cryptologist and technologist, Schneier has been a leading critic of the US government’s attempts to limit the global spread of encryption and recently of the NSA’s ‘bulk collection’ program of communication records of US citizens, following the disclosures by Edward Snowden in 2013. …
Surveillance, Bulk Data Collection and Intelligence: an Interview with Bruce Schneier
Bruce Schneier is an internationally renowned security technologist and the author of 13 books—including ‘Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World’—as well as hundreds of articles, essays, and academic papers. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation’s Open Technology Institute, a board member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief Technology Officer at …
We Stand on the Brink of Global Cyber War, Warns Encryption Guru
Schneier: Sony hack "high skill, high focused"
We are in the early years of a cyber war arms race, security guru Bruce Schneier warned delegates at the Infosecurity Europe exhibition on Wednesday.
Schneier, CTO of Resilient Systems, said the much publicised Stuxnet attacks on Iran by the US and Israel in 2010, Iran’s attack on Saudi Aramco, China’s apparent role in hacking GitHub, and the North Korean assault on Sony Pictures last year are all examples of the phenomenon.
“These nations are building up for cyber war and now we’re all in the blast radius,” he warned, while speaking in London…
Sidebar photo of Bruce Schneier by Joe MacInnis.