article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. Our allies do it.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

The Register reports that the secret structures of GCHQ are part of the surveillance programme codenamed “CIRCUIT” and also refers to an Overseas Processing Centre 1 (OPC-1), while another centre, OPC-2, has been planned, according to documents leaked by Snowden. In the documents, the company is referred to as a “partner” codenamed Gerontic.

Wireless 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)

Architect Security

And when thousands of protesters are out on the street, the opportunity is ripe for law enforcement to not only surveil the scene but to collect personal information that it can then hold on to for a long time. ” The NYPD did not respond to a request for a comment about its data-collection practices during the current protests.

article thumbnail

LLMs and Phishing

Schneier on Security

In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible. This is due not only to AI advances, but to the business model of the internet—surveillance capitalism—which produces troves of data about all of us, available for purchase from data brokers.

Phishing 278
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. Mimecast Email security 2012 Nasdaq: MIME. a16z Investments. Bessemer Venture Partners. Greylock Partners.

article thumbnail

After Section 702 Reauthorization

Schneier on Security

For over a decade, civil libertarians have been fighting government mass surveillance of innocent Americans over the Internet. On January 18, President Trump signed the renewal of Section 702, domestic mass surveillance became effectively a permanent part of US law. We need to look at US surveillance law more generally.