Remove 2012 Remove Internet Remove Risk Remove Surveillance
article thumbnail

Identifying People Using Cell Phone Location Data

Schneier on Security

But way back in 2012, the Canadian CSEC—that’s their NSA—did some top-secret work on this kind of thing. He is based in a rural area, so he can’t risk making his ransom calls from that area. There’s a whole lot of surveillance you can do if you can follow everyone, everywhere, all the time.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

There is definitely a national security risk in buying computer infrastructure from a country you don't trust. The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. This is a complicated topic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. This was before David Miranda, Greenwald’s partner, was detained at Heathrow airport by the UK authorities; but even without that, I knew there was a risk. Very probably. Definitely.

article thumbnail

Cybersecurity Report: June 29, 2015

SiteLock

LOT stated that no ongoing flights or other airport computer systems were affected and the flights already in the air to scheduled to land at Warsaw were at no risk. These files were said to derive from directly targeted NSA surveillance of the communications of multiple French leaders.

article thumbnail

AI and Trust

Schneier on Security

I wrote about this in 2012 in a book called Liars and Outliers. We are both under constant surveillance and are competing for star rankings. A lot has been written about AIs as existential risk. Surveillance is the business model of the Internet. Manipulation is the other business model of the Internet.

article thumbnail

LLMs and Phishing

Schneier on Security

But while it’s an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible. Today’s human-run scams aren’t limited by the number of people who respond to the initial email contact.

Phishing 288
article thumbnail

CISSPs from Around the Globe: An Interview with James Wright

CyberSecurity Insiders

The mission of the service is to provide our risk management program with a robust dataset for policy-making and incident handling. I also work with my team on leading risk assessments, authoring position papers, security architecture evaluations, and associated risk discovery activities. As a Unitarian Universalist or U.U.,