News in the Category “Recorded Interviews”
Marcus Smith interviewed Bruce Schneier on BYU Radio's "Constant Wonder."
Given the measure by which technology invades every aspect of our lives, the need to have technologists involved in crucial public-interest conversations is growing exponentially.
But that isn’t happening today at any kind of significant scale, and leaders such as Bruce Schneier are trying to change that.
Schneier, a cryptography pioneer, fellow, and lecturer at Harvard’s Kennedy Business School, has taken up the cause of public-interest technology and is trying to bring awareness to the current state of affairs, and how not only security professionals but technologists in all fields can make a difference.
In this episode of the Collective Intelligence Podcast, Schneier discusses how technologists can—and should feel an obligation to—make a difference.
Companies are making it easier than ever for consumers to flood their homes with internet-capable appliances and electronics—maybe too easy. We hear from a security technologist who explains why he believes we need more regulation and more government oversight when it comes to internet security and our future network of smart-equipped items.
We’re celebrating international Data Privacy Day along with the 100th episode of Firewalls Don’t Stop Dragons! And what a show we have! My guest today is none other than Bruce Schneier: internationally renowned security technologist and author of 14 books, including the best-seller Click Here to Kill Everybody! Bruce and I discuss the current state of data privacy and what it’s going to take to rein in the corporations that are buying and selling our data with abandon.
In the second episode of The NULLCON Podcast, internationally renowned security technologist, Bruce Schneier talked about his latest book Click Here to Kill Everybody, the risk and future of post-quantum cryptography, and his views on governments asking for backdoors.
"I worry about the monopolies that are engaged in surveillance capitalism."—Bruce Schneier, Security Technologist
Matt Ward interviewed Bruce Schneier on the podcast The Disruptors.
Embedded in an increasing number of the devices and objects surrounding us, computers are turning the everyday world into a radically programmable attack surface. This is the subject of computer security & cryptography legend Bruce Schneier's latest book, Click Here To Kill Everybody. In this episode we meet up with Bruce to explore how the profusion of insecure devices, capable of being put to a variety of unpredictable purposes, is radically shifting the balance of power. Via cyberattacks, smaller states get the ability to content with the great powers — and an entirely new class of non-state actors are being granted the power to disrupt nations.
Phenomena like the Mirai Botnet, Bruce argues, are just the beginning: we discuss a host of potential attacks on life and property, from car and thermostat hacking to ransomware against hospitals — and how surveillance capitalism' is one of the most important vectors behind this worrying new paradigm.
Bruce Schneier, Chief Technology Officer at IBM Resilient, guests to discuss his new book, Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. We discuss how the Internet of Things (IoT) opens up new possibilities for catastrophes, how social media companies and governments follow a model of surveillance capitalism, and how the Internet can be made more secure moving forward.
Featuring Bruce Schneier, the author of Click Here to Kill Everybody in conversation with Abby Everett Jaques, MIT.
In this week's episode of Hidden Forces, Demetri Kofinas speaks with Bruce Schneier, about cyberattacks, cyberwar, and survival in a hyperconnected world.
Cyberattacks constitute one of the most urgent threats facing collective humanity according to Bruce Schneier. History has proven him right. In the summer of 2017, a weapon of cyberwar was dropped onto a world without borders, where the heavy artillery and nuclear warheads that defined the battlelines of the 20th century have been rendered useless.
Security technologist Bruce Schneier's latest book, Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, argues that it won't be long before everything modern society relies on will be computerized and on the internet. This drastic expansion of the so-called 'internet of things,' Schneier contends, vastly increases the risk of cyberattack. To help figure out just how concerned you should be, Benjamin Wittes sat down with Schneier. They talked about what it would mean to live in a world where everything, including Ben's shirt, was a computer, and how Schneier's latest work adds to his decades of advocacy for principled government regulation and oversight of "smart devices."
The Center on National Security at Fordham Law hosted a discussion on Bruce Schneier's new book, Click Here to Kill Everybody: Security and Survival in a Hyper-connected World.
Schneier is a security guru. And in his new book, subtitled Security and Survival in a Hyper-Connected World, he explains the real risks in a world where everything is becoming a computer, and networked in a way that he calls "internet plus."
From hacked cars to vulnerable power grids, Schneier paints a detailed picture of just how IT-dependent our modern world is. And how fragile it has become, in the context of what he calls "internet plus."
Nora Young: People often use this term 'Internet of Things'.
We are fully back from our August hiatus, and leading off a series of great interviews, I talk with Bruce Schneier about his new book, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. Bruce is an internationally renowned technologist, privacy and security commentator, and someone I respect a lot more than I agree with. But his latest book opens new common ground between us, and we both foresee a darker future for a world that has digitally connected things that can kill people without figuring out a way to secure them. Breaking with Silicon Valley consensus, we see security regulation in the Valley’s future, despite all the well-known downsides that regulation will bring.
In this week’s podcast (episode #111), sponsored by CyberSN: what happens when the Internet gets physical? Noted author and IBM security guru Bruce Schneier joins us to talk about his new book on Internet of Things risk: Click Here to Kill Everybody. Also: everyone knows that cyber security talent is hard to come by, and even harder to keep. But why does precious cyber talent walk?
The Aspen Institute's Cybersecurity & Technology Program hosted the launch of Bruce Schneier's newest book, Click Here to Kill Everybody. In the book, Schneier explores the risks and security implications of our new, hyper-connected era, and lays recommendations for a more resilient Internet of Things and government oversight. Following a one-on-one conversation with Schneier—moderated by the Chair of the Cybersecurity & Technology Program, John Carlin—a panel of experts in the field will respond to Schneier's recommendations and discuss the future of cybersecurity more broadly.
As a preview of the Aspen Institute's 3rd annual Cyber Summit (to be held November 8, 2018, in San Francisco, CA) an expert panel, moderated by Aspen Cyber Chair John Carlin, featuring President and CEO of the Cyber Threat Alliance Michael Daniel and Senior Adviser for CSIS' Homeland Security and International Security Programs Suzanne Spaulding will discuss Schneier's recommendations and address issues that exacerbate the gap between policymakers and technologists.
Bruce Schneier discusses his new book Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. Computers are connected to everything small and large from home appliances like ovens and thermostats to large industrial sites like chemical plants. Digital attackers can now crash your car, your pacemaker, and the nation’s power grid. Schneier reveals the hidden web of technical, political, and market forces that underpin the pervasive insecurities of today’s connected world.
Bruce Schneier says that everything, basically, is a computer with some extra stuff attached.
When he wrote for New York Magazine, he described it this way:
Your modern refrigerator is a computer that keeps things cold. Your oven, similarly, is a computer that makes things hot. An ATM is a computer with money inside.
Flashpoint Editorial Director Mike Mimoso talks to security expert, cryptography pioneer and author Bruce Schneier about the security and privacy implications of rampant data collection by organizations.
This podcast was recorded at RSA Conference 2018.
Mike and Bruce discuss whether market pressure can impose a change on these practices, or if legislation is the inevitable outcome. Bruce also discusses how privacy has changed in recent years and why younger generations have "different defaults" when it comes to sharing personal information.
In today’s episode, together with Bruce Schneier, we are talking about how to start and skyrocket your career in cybersecurity.
Paula: I’m here with Bruce Schneier. The most prominent person in security. Thank you so much for being with me.
Why sensationalized terrorism coverage makes us overreact to risk.
For most Americans, terrorism is only ever experienced through a television screen or front page of a newspaper. Despite generating massive headlines, terrorism kills a shockingly small number of Americans every year, especially when compared to a problem like gun violence. In terms of the public's attention, terrorism takes up a lot more space than its death toll warrants.
But for cable news networks, terrorism coverage is big business.
Security expert Bruce Schneier says we're creating an Internet that senses, thinks, and acts, which is is the classic definition of a robot. "I contend that we're building a world-sized robot without even realizing it," he said recently at the Open Source Leadership Summit (OSLS).
In his talk, Schneier explained this idea of a world-sized robot, created out of the Internet, that has no single consciousness, no single goal, and no single creator. You can think of it, he says, as an Internet that affects the world in a direct physical manner.
WikiLeaks may have exposed the CIA's ability to hack into phones, televisions, cars—pretty much everything, but according to internationally renowned security technologist and author Bruce Schneier, it isn't the intelligence agencies you should be worried about. He's more concerned that these technologies have been around for decades. Bruce is sharing three things to be concerned about with Kristina Guerrero.
At RSA 2017, Bruce Schneier spoke with Network World on the increasing importance of technologists' presence in education and policy-making.
On Tuesday, President-elect Donald Trump named cyber expert Tom Bossert as his homeland security adviser.
Bossert is currently a fellow at the Atlantic Council and was a former national security aide to President George W. Bush.
He says cybersecurity will be one a top priority in his new job.
And if the events of 2016 say anything, Bossert will likely have a lot on his plate.
"American Elections Will Be Hacked." That’s the title of a recent article in The New York Times by our next guest, the leading cybersecurity and privacy researcher Bruce Schneier. Schneier warns, "Our newly computerized voting systems are vulnerable to attack by both individual hackers and government-sponsored cyberwarriors. It is only a matter of time before such an attack happens."
Bruce Schneier joined David Pakman to discuss computer security in relation to politics and election mechanics.
Just before the start of the Democratic National Convention, top-secret emails from the Democratic National Committee were published on whistleblower website Wikileaks, in a major operation the FBI attributed to Russian hackers.
Some U.S. officials have raised subsequent questions: Were the hackers deliberately attempting to influence the election in favor of Donald Trump? Did Trump have any influence?
Linda Gray, General Manager of the RSA Conference, speaks with Bruce Schneier on the topic of his keynote, "Security in the World-Sized Web," at RSA Conference 2016 Singapore.
Bruce Schneier on How IoT Changes Everything in Security
Bruce Schneier, CTO at the security firm Resilient Systems, is busy examining how IoT - the name given to the computerization of everything in our lives - is changing the security world.
From sensors that collect data about our environment to databases in the cloud to analytics that help us make use of data, the Internet of Things is capable of changing our physical world.
"We're building an internet that senses, thinks and acts, but doesn't have a body, and that is the textbook definition of a robot," Schneier says. "What I want to propose is that we're building a world-sized robot, and we don't even realize it.
Adam is joined by Bruce Schneier to talk about current problems facing the TSA, gun control, and how data and security intersect.
One of the topics that resonated deeply with last season's Adam Ruins Everything viewers was Bruce Schneier's take on security and "security theater". So we had to bring Bruce on the podcast. Bruce is a brilliant cryptographer and security expert, who's written countless articles and academic papers and published 13 books, including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.
Bruce Schneier and attorney David O'Brien discuss the new report issued by the Berkman Center for Internet & Society at Harvard University on the issue of “Going Dark,” and the role of law enforcement and privacy rights under scrutiny, revelations of government spying, and analysis of the Apple iPhone Encryption litigation and its progeny unfolding in the Federal Courts.
The Internet of Things (IoT) is ushering in a new age of hyperconnectivity – and new cyber security challenges.
In this video, Resilient CTO Bruce Schneier explains how the Internet of Things raises the stakes in cyber security, and explores how organizations will need to battle these new challenges.
Security expert Bruce Schneier discusses security from the perspectives of both the National Security Agency and the National Institution of Standards and Technology.
Since the 1930s at Bletchley Park, there has been a continuous arms race to both improve and break cryptography. The files leaked by National Security Agency (NSA) contractor Edward Snowden made it clear that governments regularly gather data on average citizens, which makes us wonder if privacy is even possible. Do our carefully designed cryptographic systems protect our information as we expect them to, or are they just thin veils that can easily be pierced by the government? I posed these questions to leading security expert Bruce Schneier.
Threatpost Editor in Chief Mike Mimoso talks to crypto pioneer and security expert Bruce Schneier of Resilient Systems about the early days of the RSA Conference, the integration of privacy and security, and the current FBI-Apple debate over encryption and surveillance.
"Companies go to the cloud not because the security person tells them to. They go to the cloud because the business person tells them to. Because the economics of doing it is so compelling and the security person has to manage," said Bruce Schneier (@schneierblog), CTO, Resilient Systems, in our conversation at the RSA 2016 Conference in San Francisco.
Computing is embedded in everything we do, such as cars and planes, said Schneier.
A shortage of skilled cyber security employees is one of the most significant challenges organizations face today.
In this video, Resilient CTO Bruce Schneier explains the cyber security skills gap, and outlines steps to help organizations overcome it.
Business leaders and IT security professionals don't always see eye to eye—and that creates risk.
In this video, Resilient Systems CTO Bruce Schneier outlines ways for business and security leaders to build trust and create a security-focused organizational culture.
Without proper controls, minor—yet insecure—behaviors can become accepted habits at organizations. And that can lead to major security risks.
In this video, Resilient CTO Bruce Schneier explains how security leaders can spot insecure practices, and stop them from taking hold at their organization.
Organizations are overwhelmed with security alerts—far more than they can reasonably manage. Incident response orchestration and automation can go a long way in helping teams resolve security events faster and more effectively.
Internet security expert, privacy advocate, and author Bruce Schneier speaks with the Technoskeptic about the public-private surveillance partnership that monitors everything we do, and what needs to happen in order to restore our privacy.
Being a CISO is often a tenuous, highly political job—and for security matters, the buck stops with you. In this interview, Bruce Schneier offers strategies for making your mark on your organization.
"Cyber resilience" has emerged as the standard cybersecurity teams are striving for. Resilient Systems CTO and security expert Bruce Schneier explains what's driving cyber resilience, and offers steps and strategies for improving cyberattack preparedness and resilience.
In the wake of the cyberattacks on Sony and Ashley Madison, it's clear that organizational doxing—the act of hacking into a business and releasing private information like executive and employee emails or salary information —is a rising threat for businesses.
Resilient Systems CTO and security expert Bruce Schneier explores the trend and how security teams can prepare for a doxing attack.
Resilient Systems CTO and security expert Bruce Schneier explores how security pros can intelligently leverage automation to empower incident response teams to mitigate cyberattacks faster and more effectively.
The episode in brief:
- Bruce Schneier talks about privacy and security
- His new book Data and Goliath
- The hidden battles to collect your data and control your world
- The nonsense of data vs. metadata
- Why privacy is not a changeable social norm
- The harm ubiquitous mass surveillance does to our society
Astute regular listeners may have observed that Dr. J is becoming more and more intrigued with the related issues of privacy and security. These apply to online and mobile phone technology. Both are thoroughly involved in communicating with your social networks.
“What we learn again and again is that security is less about what you think of, and more about what you didn’t think of.”
- In Data and Goliath, what are the motives of different goliaths?
- Why is the Ashley Madison case a watershed moment in security?
- Do you still feel we should break up the NSA?
- Will Google and Amazon become military contractors?
- How can we defend ourselves from DOS attacks from refrigerators?
- When we put processors in refrigerators, and cars, and thermostats, are we increasing the attack surface, and our vulnerabilities faster than we are improving our utility?
Private Thoughts sat down with Bruce Schneier at the Electronic Frontier Foundation’s 25th anniversary party in July. Schneier is an internationally renowned security technologist and author of 13 books. He discussed the effects of the loss of ephemeral communication and the ease of data collection and storage.
"I like to measure the performance of the team," said Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 Black Hat Conference in Las Vegas. "I like to see metrics about people, about process, about technology. There isn't one metric that works since it's such a complicated and moving target... Right now companies have to use the data that they have to figure out if their teams are effective."
Schneier feels that certain metrics, such as blocked attacks, don't really provide a gauge of how secure you are.
Boom Bust correspondent Bianca Facchinei sits down with Bruce Schneier – chief technology officer at Resilient Systems, Inc. and fellow at the Berkman Center for Internet and Society at Harvard Law School – at the Black Hat conference in Las Vegas. Bruce gives us his take on the infamous 2014 Jeep Cherokee hack and tells us how government surveillance impacts social movements.
The number of cyber attacks happening every year is on the rise. We speak to Bruce Schneier, chief technology officer at the IT company Resilient Systems and a fellow at Harvard's Berkman Center for the Internet and Society, about why it can take months before a company or organisation even realises it is under attack, and why so many are unprepared. Also, Wil van Gemert, deputy director of operations at Europol, tells us what European law enforcers are doing about it. He says it is now possible to buy "malware," or malicious software meaning that anyone can become a cyber criminal.
The "smart bad guys" figure out how to get around TSA, says security technologist and Harvard Law School fellow Bruce Schneier.
Dr Chris Brauer from Goldsmiths, University of London, on how big brands want to sell us things via wearable devices. Bruce Schneier, security and privacy expert and author of the book "Data and Goliath", warns of the threat of companies and governments misusing data about us. Emily Bell, from the Tow Centre for Digital Journalism, on Verizon's buyout of AOL, and Facebook's instant articles. And Zoe Kleinman spends a night alone in a house full of robots.
New America's Peter Singer and Passcode's Sara Sorcher chat with Bruce Schneier, prolific author and chief technology officer at Resilient Systems, about the challenges of publicly blaming countries for cyberattacks—and whose job it should be to defend private companies against sophisticated nation-state attacks. They also hear from Nate Fick, the CEO of Endgame, a venture-backed security intelligence software company, about how he's leveraging cybersecurity solutions once produced just for the government into the private sector.
Wired's Kim Zetter, author of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, joins the panel discussion to talk about how the cyber operation on Iran's nuclear facilities launched a new era of warfare; the vulnerability of US critical infrastructure to Stuxnet-like weapons; and the gender diversity issues bedeviling the cybersecurity industry.
Cris Sheridan welcomes Bruce Schneier, Chief Technology Officer at Resilient Systems and author of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Bruce writes "we are living in the golden age of surveillance" where almost everything we do is now being tracked and used without our knowledge. Bruce speaks with Cris about how much data we produce, the way corporations are using it, the problems associated with ubiquitous surveillance, and why this is a defining issue of our time.
Episode 65 would be ugly if it weren't so much fun. Our guest is Bruce Schneier, cryptographer, computer science and privacy guru, and author of the best-selling Data and Goliath—a book I annotated every few pages of with the words, "Bruce, you can't possibly really believe this." And that's pretty much how the interview goes, as Bruce and I mix it up over hackbacks, whether everyone but government should be allowed to use Big Data tools, Edward Snowden, whether "mass surveillance" has value in fighting terrorism, and whether damaging cyberattacks are really infrequent and hard to attribute. We disagree mightily—and with civility.
Insights from Security Leader at GISEC Event in Dubai
In developing markets such as Asia and the Middle East, how can security practitioners best prepare themselves to tackle the rapidly-changing threat landscape? Resilience is the key, says security leader Bruce Schneier.
The way to think about security is a combination of protection, detection and response, says Schneier, a fellow at the Berkman Center for Internet and Society at the Harvard Law School, USA. While there is a lot of prevention and detection technology, response is the missing piece, he says.
"Last year was being called the 'year of the breach,'" said Bruce Schneier, CTO of Resilient Systems, formerly Co3 Systems. "Now, you and I know every year [has] been the year of the breach. But last year there were a bunch of really high-profile breaches where the companies involved did a terrible job of responding, that they were actually in chaos and it looked that way."
In this interview, recorded at the 2015 RSA Conference, SearchSecurity editorial director Robert Richardson sat down with Schneier to discuss Resilient Systems' contribution to improving enterprise incident response management in the coming year.
"As a business or as an individual you have to make a choice. Should I do this thing—whatever it is—on my computer and on my network or on a cloud computer on a cloud network," asked Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 RSA Conference in San Francisco.
Whatever you choose, you're going to be making a trade-off. Schneier recommends you first look at who your adversaries are.
Computer security expert Bruce Schneier says there's a big difference between feeling secure and actually being secure. He explains why we worry about unlikely dangers while ignoring more probable risks.
GUY RAZ, HOST:
It's the TED Radio Hour from NPR. I'm Guy Raz. And on the show today, we're exploring ideas about Maslow's hierarchy of human needs, and ranked at number two, security - the second step on the pyramid.
Just how much of your life is being watched and tracked? Who has access to all this information and what are they doing with it?
Bruce Schneier, fellow at Harvard Law School, author of Data and Goliath, points out the danger is not only from corporations and governments, but also cybercriminals, when these institutions lose your details.
Erin Ade sits down with Bruce Schneier – security expert, author, and fellow at the Berkman Center for Internet and Society at Harvard Law School. Bruce tells us that a cloud service is safer than running your own data center when you are entrusting your data to a provider who understands security better than you do. And for most people this is definitely the case. Bruce also talks to Erin about state actors weakening security standards and about the security of various open source encryption options.
Bruce Schneier spoke with Paul Harris about his new book, Data and Goliath. Topics include:
- Are we giving up too much information voluntarily in exchange for free services?
- What are data brokers gathering about us, who are they selling it to?
- Are private companies doing enough to shield our data from government?
- How companies and law enforcement can use your cell phone to know where you’ll be tomorrow.
- Whether the NSA can process the huge amounts of surveillance info it is gathering on all of us.
- The war on terror as an excuse to get into anyone’s computer, and its chilling effect on free speech and thought.
Last week the proposed data retention bill passed through the House of Representatives, and is expected to pass through the Senate soon. These laws are set to allow warrantless access to phone calls, sms, social media and internet usage, in the name of tightening our national security.
Disputes and amendments to the bill have focused on confidentiality threats for journalists and whistleblowers, but what effect will data retention have on the average person?
Our host Sam Baran spoke to Bruce Schneier, who is a fellow at Harvard University's Berkman Center for Internet and Society and author of the book Data and Goliath about the ways governments and corporations are storing and using data.
MARK COLVIN: The ALP has agreed to support an amended version of the Government's bill to force Internet Service Providers to keep their customers' data for two years.
It'll let government agencies see what we've all been doing on the phone or online.
Bipartisan support means the bill is likely to pass.
The bodies expected to get access range from various police and customs agencies to the Competition watchdog, the ACCC.
How much do you know about what others might know about you, from your use of technology? How do you minimise your online footprint on things you'd rather keep private?
Bruce Schneier is a US technology and security expert, whose latest book is Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, talks to Kathryn Ryan about how much information is being gathered by governments and corporations through our use of phones and computers.
Part 2 of our discussion with Bruce Schneier about about the golden age of surveillance and his new book, "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World."
AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I'm Amy Goodman, with Juan González. Our guest is Bruce Schneier. He is a leading security technologist.
Leading security and privacy researcher Bruce Schneier talks about about the golden age of surveillance and his new book, "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World." The book chronicles how governments and corporation have built an unprecedented surveillance state. While the leaks of Edward Snowden have shed light on the National Security Agency's surveillance practices, less attention has been paid to other forms of everyday surveillance—license plate readers, facial recognition software, GPS tracking, cellphone metadata and data mining.
JUAN GONZÁLEZ: We turn now to look at what our next guest calls the "golden age of surveillance." The leading security and privacy researcher Bruce Schneier is out with a new book, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. The book chronicles how governments and corporations have build an unprecedented surveillance state.
EMMA ALBERICI, PRESENTER: One of the world's leading experts in online security is Bruce Schneier. He's a fellow at Harvard University's Berkman Center for Internet and Society. His latest book, 'Data and Goliath', is about how governments and corporations are using and controlling our data.
I spoke to Bruce Schneier from Minneapolis.
The NSA, Facebook, and Google are constantly mining our personal information for surveillance and advertising purposes, among other goals. Is it possible to keep our data secure in the digital age? Bruce Schneier, a cybersecurity expert and author of Data and Goliath, says, “We need to examine our own fears and decide how much of our privacy we are really willing to sacrifice for convenience.” Read an excerpt from his book here.
Stop feeling guilty about skimming the Terms of Service. Get mad instead.
Reading this right now?
Congratulations. You're winning.
Yes, all of the usual corporate and government entities know you're here.
Bruce Schneier, noted cryptologist and fellow at the Berman Center for Internet & Society at Harvard Law School, tells us how to protect our Wi-Fi connection in public and prevent ISPs from tracking our mobile internet use.
Erin Ade sits down with Bruce Schneier – noted author, cryptologist, and fellow at the Berkman Center for Internet and Security and Harvard Law School. Bruce gives us his take on President Obama’s recent statement on net neutrality and explains why encryption is vital to personal security and privacy.
Almost a year and a half after the Snowden revelations, it’s business as usual for America’s giant global eavesdropping and spying organisation: the NSA, the National Security Agency.
As revelations continue to unfold, legislative attempts to rein in the NSA's powers appear to be stalling. But, Harvard University security analyst Bruce Schneier says the situation is unacceptable.
In the future, argues Schneier, people will look back at the way we ignore privacy today and ask "how could we be that immoral?" He’s put forward his own plan for breaking -up the NSA, and in so doing, bringing its activities under greater civilian control.
Erin Ade talks to Bruce Schneier about the efforts of government and private companies to track us and our personal information. However, our outrage over this invasion of privacy is overshadowed by the convenience of using technology. This tension has led to our ongoing, intense debate over the tradeoffs between security and surveillance. To help sort out all of these issues Schneier weighs in.
Bruce Schneier is one of the best-known security professionals both within the field and in the larger world of technology policymaking. He's written 12 books, produces the influential "Schneier on Security" blog and is widely quoted in the press. After a multi-year stint at BT Managed Security Solutions, Schneier has moved to a startup: Co3 Systems. The new company, where he serves as Chief Technology Officer, makes a tool that focuses specifically on security incident response management.
Bruce Schneier, cyber-security expert and author of Liars and Outliers: Enabling the Trust Society Needs to Thrive, talks about corporate and governmental data collection and surveillance. Schneier gave a lecture, “Internet, Security, and Power” on May 28, 2014 at the UO in Eugene and at the UO in Portland on May 29, 2014.
Bruce Schneier is the special guest on Episode 11 of the Security Advisor Alliance, on Incident Response.
In G-Force, the 2009 Disney movie, a group of secret agent rodents stops a kitchen gadget robot apocalypse. In the real world, we're in no danger from weaponized blenders, but our toasters just might be used in a denial of service attack.
Rivera Sun and Getch talk with computer security, and privacy specialist, Bruce Schneier. We get the scoop on the latest from the NSA, as well as the security vulnerabilities in the vast internet of things, this week on Occupy Radio.
‘'It's only metadata' is a mischaracterization that plays into goverment hands.'—Bruce Schneier
At the 2014 Source Conference in Boston, I was able to sit down with Bruce Schneier after his keynote to clarify his position on several topics he brought up. The Twitter stream was on fire during his presentation as he described how the power of government and large corporations affects the internet. Where are the boundaries between personal data and corporate/government usage of that data? What is our responsibility in the equation?
News emerged this week that web giant Google is routinely encrypting web searches conducted in China in a move designed to offset the national government's ability to censor the Internet and track what individuals are viewing. The Google move is part of a global expansion of privacy technology to counter surveillance by government intelligence agencies, police and hackers and is seen as a direct consequence of whistleblower, Edward Snowden's release last year of US National Security Agency (NSA) documents exposing the extent of government surveillance of the Internet.
Among the many fears Snowden's leaked revelations have raised is the claim that the NSA and other leading western intelligence agencies are involved in programs to deliberately weaken the Net's security standards to make it easier for them to break in.
Bruce Schneier is a leading US cryptology expert and Chief Technology Officer at CO3 Systems.
The Daily's Kim Williams spoke to him earlier about Google's latest moves to combat alleged privacy intrusions into the Net.
Few figures in the IT security landscape command the respect and admiration of so many people as does Bruce Schneier. The well-regarded expert recently changed jobs, moving from BT to become the CTO of Co3 Systems in January of this year.
In a video interview with eSecurity Planet, Schneier explains why the incident response technology that Co3 Systems builds is an important part of the modern IT security lifecycle. A key part of what Co3 does is to automate the details of incident response, he said.
Josh Corman talks to Bruce about his keynote at the 2014 SOURCE Security Conference.
If your car, your thermostat, and your refrigerator are all online and communicating with the world, is enough attention being given to who might be listening—or talking—to your networked things? And what happens if there’s a security flaw in the networking component of, say, your toaster? Security expert Bruce Schneier says that the world is at a crisis point regarding embedded network security, and that an Internet of Things could mean ubiquitous surveillance.
Think the Edward Snowden-NSA storyline is played out? Think again.
"I think this story is going to keep going for at least a year, probably longer," said Bruce Schneier, chief technology officer with Co3 Systems, who is working with The Intercept's Glenn Greenwald to analyze and report on the NSA documents allegedly stolen and leaked by former contractor Edward Snowden. "There's an enormous pile of documents; they're very technical [and] hard to understand, and as you go through them, you find stories."
In this interview recorded at the 2014 RSA Conference, SearchSecurity Editorial Director Robert Richardson sits down with Schneier to discuss his role in reviewing the Snowden documents.
Bruce Schneier appeared on an episode of Inventing the Future with Robert Tercek about the collision between open society and surveillance.
Bruce Schneier is a legendary figure in the security community, well-known for his expertise in cryptography and more recently for his insight into the surveillance activities of the National Security Agency (NSA). Schneier currently serves as the CTO of incident response management vendor Co3 Systems. In an interview with eWEEK at the RSA conference here, Schneier detailed his views on the NSA's surveillance activities. When it comes to domestic surveillance and metadata collection, Schneier firmly believes that the Federal Bureau of Investigation is the right agency to handle that data. He noted that the FBI already has domestic security capabilities and is responsible for the national fingerprint database.
Security expert and technologist Bruce Schneier has told the BBC that he believes the NSA and GCHQ have "betrayed the trust of the internet".
Mr Schneier said: "We have to trust the infrastructure [of the internet]... The fact that it has been subverted in ways we don't understand... we don't know what to trust.
Renowned security expert Bruce Schneier talks with Eben Moglen about what we can learn from the Snowden documents, the NSA's efforts to weaken global cryptography, and how we can keep our own free software tools from being subverted.
Since Edward Snowden's disclosures about widespread NSA surveillance, Americans and people everywhere have been presented with a digital variation on an old analog threat: the erosion of freedoms and privacy in exchange, presumably, for safety and security.
Bruce Schneier knows the debate well. He's an expert in cryptography and he wrote the book on computer security; Applied Cryptography is one of the field's basic resources, "the book the NSA never wanted to be published," raved Wired in 1994. He knows the evidence well too: lately he's been helping the Guardian and the journalist Glenn Greenwald review the documents they have gathered from Snowden, in order to help explain some of the agency's top secret and highly complex spying programs.
Following the row over claims German chancellor Angela Merkel's phone was hacked by the US, Channel 4 News speaks to security expert Bruce Schneier and asks if the NSA has gone too far.
Rumours of the NSA hacking Angela Merkel’s encrypted phone have got the world wondering how it would even be possible.
Becky Anderson talks to security technologist Bruce Schneier about protecting phones from infiltration by third parties and how the German Chancellor's phone may have been vulnerable.
Maria Xynou interviewed Bruce Schneier on privacy and surveillance. View this interview and gain an insight on why we should all "have something to hide"!
The Centre for Internet and Society (CIS) interviewed Bruce Schneier on the following questions:
Do you think India needs privacy legislation? Why/ Why not?
The majority of India's population lives below the line of poverty and barely has any Internet access. Is surveillance an elitist issue or should it concern the entire population in the country?
Scott and Peter speak with special guest cryptographer and security expert Bruce Schneier about Touch ID, biometrics, and general mobile phone security and privacy issues. Bruce is an outstanding speaker on these topics – you don’t want to miss this.
Trust is an invisible yet essential force in our lives, the great stabilizer of human relations. How do we create it? How do we lose it? Bruce Schneier, author of Liars & Outliers: Enabling the Trust that Society Needs to Thrive, joins Steve Paikin to discuss the essential role of trust in society and the threat the "surveillance state" may pose to it.
Bruce Schneier discusses the latest NSA revelations including the NSA working with tech companies to insert weaknesses into their code.
You signed up for government surveillance when you signed up for your email address. Not knowingly perhaps, (although who actually reads the user agreement?) but NSA spying is only possible with the help of the same private companies you trust with your data in the first place. The individual/government/corporate relationship has never been so exposed and so (hopefully) up for debate. Security technologist Bruce Schneier should be one of the voices you listen to in that debate.
Dennis Fisher talks with cryptographer Bruce Schneier about the revelations of the NSA’s capabilities to subvert and weaken cryptographic algorithms, security products and standards, and what it will take to help defeat these capabilities.
On today's show, we have encryption specialist and author Bruce Schneier here to discuss the latest NSA revelations including the NSA working with tech companies to insert weaknesses into their code.
Privacy PC published the following transcript of the interview.
- All right, joining me now here on the Matthew Filipowicz show is Bruce Schneier. Bruce is a security technologist and encryption specialist. He's written for the Guardian, the Economist, Wired and more.
En entrevista para Grupo Imagen Multimedia con Rodrigo Pacheco, Bruce Schneier, criptógrafo y experto en seguridad, dijo desconocer cuál es la implicación de las empresas en el escándalo de espionaje en Estados Unidos.
Lo cierto, indicó, “es que la industria está coludida a todos los niveles y entonces podríamos ver que ésta pelea porque hay mucha indignación en torno al tema”.
Acerca de los perjuicios que esta situación pudiera generar en los negocios que hacen esas empresas con otros países, manifestó que además de ellos las personas pudieran verse perjudicados, pero además indicó que no hay manera de protegerse por lo que habrá que confiar en los sistemas de protección de información porque “no hay ningún tipo de confianza”.
Agregó que los chinos tienen buenos hackers, pero Estados Unidos y Gran Bretaña tienen un sitio privilegiado porque buena parte del tráfico pasa por esos lugares.
In an effort to undermine cryptographic systems worldwide, the National Security Agency has manipulated global encryption standards, utilized supercomputers to crack encrypted communications, and has persuaded—sometimes coerced—Internet service providers to give it access to protected data. Is there any way to confidentially communicate online? We speak with security technologist and encryption specialist Bruce Schneier, who is a fellow at Harvard's Berkman Center for Internet and Society. He has been working with The Guardian on its recent NSA stories and has read hundreds of top-secret NSA documents provided by Edward Snowden.
In America today, we find ourselves increasingly living in a new kind of country: where constant surveillance and paramilitary policing are normalized. Bruce Schneier is among the most insightful and important voices speaking out against unchecked government surveillance and the alarming lack of transparency among our democratic institutions.
Revelations of the NSA’s data surveillance efforts have raised serious questions about the ethics and necessity of violating privacy that have been bubbling under the surface for some time. Efforts to monitor communication are nothing new, but electronically mediated communication has increased the amount of information being shared, and the possibilities for eavesdropping are endless. But there's a trade off. People tolerate incursions into privacy for greater security or even convenience: health care, transportation, public safety, or any number of web utilities we use on a daily basis.
More than 10 years ago, NSA officials went to Silicon Valley to learn how to build a better data operation. Chris Hayes talks to Bruce Schneier, security expert, and Colleen Taylor, reporter for TechCrunch and TechCrunch TV.
Bruce Schneier, author and security guru, talks with EconTalk host Russ Roberts about power and the internet. Schneier argues that the internet enhances the power of the powerless but it also enhances the power of the powerful. He argues that we should be worried about both corporate and government uses of the internet to enhance their power. Recorded before news of the PRISM system and the use of Verizon's customer information by the NSA (National Security Agency), Schneier presciently worries about government surveillance that we are not aware of and explains how governments--democratic and totalitarian--can use the internet to oppress their citizens.
This is a feature cast, an episode of The Command Line Podcast.
The feature this week is an interview with Bruce Schneier. The catalyst for this conversation is a post on his blog that frames out some of the themes he has been considering for his next book. Among other things, we refer to Rebecca Mackinnon’s book and Kevin Kelly’s most recent book in the course of the conversation.
M-Unition Podcast Series: Bruce Schneier Discusses the Advanced Persistent Threat, Cyberwar and Feudalism
With news outlets flooded with talk of advanced targeted threats and Mandiant's recently released APT1 report, we wanted to know what industry experts thought of the security industry today.
We sat down and spoke with Bruce Schneier about his thoughts on where the security industry is going and to get insight into his new book he is working on. "Cyberwar is based on fear and rhetoric", according to Schneier, "and it is damaging for us to push war rhetoric because it makes us feel helpless." He goes on to say that if we feel a sense of helplessness we naturally can't do anything to protect our systems. It requires a shift in how we view the situation.
Bruce Schneier & Jonathan Zittrain in Conversation
From Bruce Schneier:
What I've Been Thinking About
I have been thinking about the Internet and power: how the Internet affects power, and how power affects the Internet. Increasingly, those in power are using information technology to increase their power. This has many facets, including the following:
1. Ubiquitous surveillance for both government and corporate purposes -- aided by cloud computing, social networking, and Internet-enabled everything -- resulting in a world without any real privacy.
Big data is a phrase that means a lot of things to a variety of people. For marketers, it means being able to target ads at certain segments of the population more accurately than ever before; for security pros, it means detecting and responding to incidents more quickly; and for every user connected to the Internet, big data means personal privacy on the Internet is gone.
In this video interview, recorded at the 2013 RSA Conference, security industry luminary and author Bruce Schneier uses three high-profile examples to explain why there is currently no privacy on the Internet. Among those examples is the Mandiant APT1 report, which he uses to show how easily even the most disciplined of Internet users can slip up and expose their identities to the world.
"We live in a world where we're ceding a lot of our power to other companies," said Bruce Schneier (@schneierblog), security blogger and author of "Liars and Outliers" in our conversation at the 2013 RSA Conference in San Francisco.
Schneier was referring to companies such as Google and Facebook that control our data as well as companies that control our devices, such as Apple.
"These companies are in charge of our security and we have no choice but to trust them and in many cases their interests don't align with ours," said Schneier. "It's not that these companies are evil.
During the podcast, Schneier looks back at his "monitor first" advice from 2001 and discusses its impact today, "We are learning from the recent attacks in the news," said Schneier. "The lesson hasn't changed." On the cusp of an early cyber arms race, Schneier digs into the Mandiant report and shares his concerns on the future of cybersecurity.
Like the rest of the world, the day-to-day function of the Internet relies on trust, according to author and security luminary Bruce Schneier. However, that trust is being frequently and seriously violated by many of companies that dominate the Internet.
In this video interview, Schneier, chief technology security officer with BT Counterpane, discusses the ways in which trust -- and, in turn, data privacy -- is threatened on the Internet, and explains how Google, Apple and others have adopted a feudal model of security, in which their customers have little, if any, recourse to ever reclaim data that rightfully belongs to them.
The digital technologies that so delight us also have a dark side. On this Episode of Inventing the Future with Robert Tercek, the topic of discussion is the future of surveillance technologies. Whether it be the government, big business, organized crime, or even your next door neighbor, chances are you're being tracked and analyzed.
Joining Robert Tercek in asking whether or not privacy is dead are BT Managed Security Solutions' Chief Security Technology Officer, Bruce Schneier and Research Fellow at The Cato Institute, Julian Sanchez.
Paul Muller (@xthestreams), Chief Evangelist, HP Software speaks with two of the HP Protect 2012 keynote speakers about security and risk management.
Paul speaks with Bruce Schneier, Security Technologist - Author of Liars and Outliers - How societies can use security to enable the trust the need to survive. Paul and Bruce discuss:
- How can security technologists get in front of the security risks resulting from new technologies and general evolutions?
- The importance of swift reaction to inevitable breaches and exploitation tactics.
- Thinking about security in the terms of decision cycles to best anticipate and mitigate risk.
Bruce Schneier gives us his views on why morality might well be the key ingredient for better Internet security.
Bruce Schneier takes audience questions at the DEF CON 20 hacker convention in Las Vegas.
This week, we’re talking about trust and cooperation, and the implications these social values have for security in the era of global networking. We’re joined by security technologist and author Bruce Schneier, to talk about his book Liars and Outliers: Enabling the Trust Society Needs to Survive. And anthropologist/blogger Greg Laden returns to discuss speculation about cognitive limits on the use of social networks.
On the 74th episode of The Silver Bullet Security Podcast, Gary talks for a second time with Bruce Schneier. They revisit Bruce’s prediction in episode 9 that insight into economics and security would help vendors sell their products more efficiently. In addition, they discuss Bruce’s new book Liars and Outliers: Enabling the Trust that Society Needs to Thrive, how far behind the government is in terms of security, cloud computing, and Uncle Milton’s ant farm.
Society runs on trust. We have no choice but to trust that the random people, institutions, and systems we interact with will cooperate and be trustworthy. Join Ben Merens and his guest Bruce Schneier as they discuss how security can protect us from defectors; and what enables us to trust strangers at the local, national, and global scale.
Bruce Schneier, internationally renowned security expert and author, discusses his new book entitled, “Liars & Outliers: Enabling the Trust That Society Needs To Thrive.” Schneier starts the discussion by looking at society and trust and explains why he thinks the two are necessary for civilization. According to Schneier, two concepts contribute to a trustful society: first, humans are mostly moral; second, informal reputation systems incentivize trustworthy behavior. The discussion turns to technology and trust, and Schneier talks about how the information society yields greater consequences when trust is breached. He then describes how society deals with technology and trust and why he thinks the system is not perfect but working well overall.
Davi Ottenheimer, President of flyingpenguin, interviews Bruce Schneier on his latest book.
We don't demand a background check on the plumber who shows up to fix the leaky sink. We don't do a chemical analysis on food we eat. In the absence of personal relationships, we have no choice but to substitute confidence for trust, compliance for trustworthiness.
Bruce Schneier discussed his book Liars and Outliers at the RSA Conference 2012.
Bruce Schneier's latest book, Liars and Outliers, is a departure from his previous landmark books on cryptography and information security. In Liars and Outliers, Schneier pulls back from technology and looks at trust and security and how those very human concepts have evolved in concert with the development of cooperative societies to build the trust and security mechanisms we have today.
In this interview conducted at RSA Conference 2012, Schneier explains his interest in the sociology of security and trust and how today's online interactions are changing the trust dynamic. He paints a not-so-bleak picture of why the Internet remains a trustworthy and viable platform for communication and ecommerce, and talks about whether social networking and technical feedback mechanisms comprise the new trust going forward.
Dennis Fisher talks with cryptographer and author Bruce Schneier about his new book, Liars and Outliers, the role of trust in society and security, the ways in which technology helps promote trust and how various groups and actors defect the norm and take advantage of that trust.
Jean Friedman interviewed Bruce Schneier about his talk at RSA 2012.
Bruce Schneier is concerned that without trust, society itself may be impossible
Socrates famously asked if a person could lead a just life in an unjust society. A new book, Liars & Outliers, by Bruce Schneier doesn’t in so many words raise the question, Can a person lead a secure life in an insecure society? but it does answer it. There’s only so much we can do without there being a framework of trust: There have to be moral codes; peer pressures are needed; institutions have to have their own codes of conduct, and so on.
As the 10th anniversary of the Sept. 11 terror attacks nears, many are asking if we're safer now than we were before the attacks. Has heightened security and extra screening at the airport -- including removing your shoes and belt -- made you feel safer?
Host: Mark Trautwein
- Barry Glassner, president of Lewis and Clark College and author of "The Culture of Fear: Why Americans Are Afraid of the Wrong Things"
- Bruce Schneier, security technologist and author of "Beyond Fear: Thinking Sensibly About Security in an Uncertain World"
- Steve Weber, professor of political science at UC Berkeley and author of "The End of Arrogance: America in the Global Competition of Ideas"
Two RSA Conference Europe 2010 Keynote speakers discuss Bruce Schneier's session on Security, Privacy and the Generation Gap.
Bruce Schneier discusses Joe Lieberman's proposal for an internet "kill switch," why shutting down the internet during a crisis would cause more harm than good, and how controversial websites like WikiLeaks use data redundancy spread out in different countries to prevent being shut down.
In part one of this interview with Bruce Schneier, he discusses the impending shift in how security will be delivered. Schneier expects security to be embedded in Web-based services and sold directly to service providers, rather than to enterprises and end users. This is a radical transformation for the security industry that security professionals must prepare for. Schneier also discusses consumerization and how traditional security technologies and services must adjust as more untrusted devices connect to trusted networks.
Author and leading security expert Bruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions of the CNCI.
In this podcast you'll hear a Q&A with Bruce Schneier of BT Counterpane, as moderated by Risky Business host Patrick Gray at the recent GovCERT Symposium in Rotterdam, Netherlands.
Topics covered include cloud computing, privacy, software manufacturer liability for defects, two factor authentication and more!
At 2009's Information Security Decisions conference, security expert Bruce Schneier sat down to answer some of readers' security questions, which range from the trustworthiness of outsourced security services to the usefulness of awareness training in securing new technologies.
Bruce Schneier answered audience questions at the DEFCON hacking conference.
Dennis Fisher talks with security expert Bruce Schneier about the usefulness of cryptography, the psychology of security and fear and the war on the unexpected after 9/11.
Bruce Schneier joined Paul Harris to talk about whether we are in fact safer with current airport procedures than those before 9/11 and whether government and private industry are doing enough to harden security at possible terrorist targets like nuclear and chemical plants. They also talked about technology's role in global security (e.g. whether Google Earth deserved the criticism after investigators found that the terrorists who shot up Mumbai in November had used the imaging information to plan their attack), and about the restrictions on taking liquids onto commercial flights -- the 3.5-ounce rule -- and whether there is any proof that a terrorist could construct a bomb from two liquids they mixed in an airplane lavatory.
But the question is: is everything we go through at checkpoints actually making us safer? Security expert Bruce Schneier says no. He says much of it is just "security theater."
"It's a phrase I coined for security measures that look good, but don't actually do anything," he explained.
Schneier, who has been an adviser to TSA but also its most persistent thorn-in-the-side, says there are too many silly rules.
Bruce Schneier és considerat internacionalment com un gurú de la seguretat informàtica. Va fundar, i actualment dirigeix, la divisió tecnològica de la companyia BT Counterpane, especialitzada en serveis de seguretat informàtica. Citat habitualment als mitjans de comunicació, Schneier ha escrit nombrosos articles a la premsa i ha testificat diverses vegades sobre seguretat al Congrés dels Estats Units.
Note: in this video, the questions are in Spanish but Bruce Schneier's responses are in English.
BT's Bruce Schneier and Ray Stanton talk security with ComputerWeekly.com's security blogger David Lacey at Infosecurity 2008.
Bruce Schneier, cryptographer, computer security specialist, writer, and author, discusses the Justice Department’s bogus prosecutions of barely-terrorists in the JFK, Ft. Dix, Lackawanna, Miami and other cases, the increasing danger to Americans’ liberties due to the large numbers of new Joint Terrorism Task Forces across the country and their temptation to entrap the innocent, the rise of the domestic security industrial complex, the economics of airline security, information as the answer to the problem of consolidated power, the government’s data mining programs and the death of the Real ID.
Bruce Schneier, CTO, BT Counterpane, is an internationally renowned security technologist and author, and a frequent speaker at RSA Conference. His session at RSA Conference 2008 is called Reconceptualizing Security.
Bruce Schneier and Peter Schoof of ebizQ discuss current vulnerabilities, what the future of the security industry will look like, security industry consolidation, encryption, and finally, the time frame for changes in the industry to come about.
First, what threats do you see that companies need to be most concerned with at this point?
The biggest threat right now is crime. About five years ago, criminals discovered the internet in a big way and whether it's identity theft which is fraud or denial of service extortion or other attempts to make money, crime is the primary threat on the net and when we're worried about internet threats, we're worried about crime.
I've read some of your general comments about, essentially, in a perfect world, the security industry would be unneeded.
A recent National Research Council report recognizes that the 9/11 attacks provoked counter-productive security measures that stifle access to fruitful scientific research. Security expert Bruce Schneier talks with Science Progress about the science that makes us smarter and the security that makes us safer.
Earlier this month the National Research Council released a Congressionally-mandated report, 'Science and Security in a Post 9/11 World,' which recognizes that the 9/11 attacks provoked a misallocation of United States security resources and led to counter-productive security measures. The NRC warns that the widespread practice of labeling scientific research as 'sensitive but unclassified' has had grave consequences for our security and our economy.
While the media bombards consumers with frightening stories, discussions about security are thwarted by the failure of language to separate the "feeling" and "reality" of security, says security guru Bruce Schneier.
Schneier, author of Applied Cryptography and his most recent book Beyond Fear, reckons there is a fundamental problem with the way humans think about security. And its roots can be drawn back to a failure of language.
"'Security' is a complicated word," Schneier told ZDnet.com.au at linuxconf08.
"You can feel secure and there's the reality of security -- how secure you are.
Bruce Schneier answered questions from the audience at DEF CON 15.
[Dave Birch] This week's podcast turned out to be rather timely. I happened to have a chat with noted security guru Bruce Schneier about e-passports a couple of days before the UK e-passports made the news. The topic of e-passports merits serious discussion and Bruce's perspective is very valuable.
You used to only be able to find surveillance cameras in banks, or 24-hour convenience stores, or communist dictatorships.
But today they're virtually everywhere—from buses in London to restaurants in New Delhi to the Bridges of Madison County in central Iowa.
Security technology expert Bruce Schneier joins reporter Nikki Tundel for a surveillance walking tour of downtown Minneapolis.
How recent disclosures regarding domestic surveillance, the Justice Department's requests for Google search histories, and advances in data mining are challenging conventional notions of privacy.
- Robert O'Harrow, investigative reporter, Washington Post and author of "No Place To Hide"
- Joe Whitley, attorney, Alston and Bird, and former general counsel, Department of Homeland Security
- Bruce Schneier, Chief Security Technology Officer, Counterpane Internet Security
Host Doug Kaye says, "This is the one interview I hope everyone will hear."
In his latest book, Beyond Fear, security guru Bruce Schneier goes beyond cryptography and network security to challenge our post-9/11 national security practices. Here are some teasers:
- "We're seeing so much nonsense after 9/11, and so many people are saying things about security, about terrorism that just makes no sense."
- "Homeland security measures are an enormous waste of money."
- "If the goal of security is to protect against yesterday's attacks, we're really good at it."
- "The system didn't fail in the way the designers expected."
- "Attackers exploit the rarity of failures."
- "More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk."
- "Did you ever wonder why tweezers were confiscated at security checkpoints, but matches and cigarette lighters--actual combustible materials--were not?...If the tweezers lobby had more power, I'm sure they would have been allowed on board as well."
- "When the U.S. Government says that security against terrorism is worth curtailing individual civil liberties, it's because the cost of that decision is not borne by those making it."
- "...people make bad security trade-offs when they're scared."
Read or listen to this terrific interview in which Bruce also says what he thinks of the 9/11 hearings and answers questions from listeners regarding spam and biometrics. This is one of our best.
Bruce Schneier answered audience questions at the DEF CON hacking conference.
Sidebar photo of Bruce Schneier by Joe MacInnis.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.