Remove 2012 Remove Risk Remove Surveillance
article thumbnail

Identifying People Using Cell Phone Location Data

Schneier on Security

But way back in 2012, the Canadian CSEC—that’s their NSA—did some top-secret work on this kind of thing. He is based in a rural area, so he can’t risk making his ransom calls from that area. There’s a whole lot of surveillance you can do if you can follow everyone, everywhere, all the time.

article thumbnail

Faulty DoD Cybersecurity Leaves U.S. At Risk of Missile Attacks

Adam Levin

exposed to greater risks unless actions are taken to improve security and reduce the. weapons systems developed between 2012 and 2017 are vulnerable to cyberattacks, despite regular warnings from government watchdogs. . At Risk of Missile Attacks appeared first on Adam Levin. The post Faulty DoD Cybersecurity Leaves U.S.

Risk 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

There is definitely a national security risk in buying computer infrastructure from a country you don't trust. The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. This is a complicated topic.

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. All systems fall short of optimality and have some residual risk of vulnerability a point which the tech community acknowledges when they propose that law enforcement can satisfy its requirements by exploiting vulnerabilities in their products.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. All systems fall short of optimality and have some residual risk of vulnerability -- a point which the tech community acknowledges when they propose that law enforcement can satisfy its requirements by exploiting vulnerabilities in their products.

article thumbnail

LLMs and Phishing

Schneier on Security

But while it’s an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible. Today’s human-run scams aren’t limited by the number of people who respond to the initial email contact.

Phishing 342
article thumbnail

AI and Trust

Schneier on Security

I wrote about this in 2012 in a book called Liars and Outliers. We are both under constant surveillance and are competing for star rankings. A lot has been written about AIs as existential risk. Surveillance is the business model of the Internet. And the incentives of surveillance capitalism are just too much to resist.