article thumbnail

Interview with the Head of the NSA’s Research Directorate

Schneier on Security

MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. NSA views the kind of “vast access and collection” that it talks about internally as both an achievement and its own set of problems.

Big data 276
article thumbnail

AI and Microdirectives

Schneier on Security

In New York, AI systems equipped with facial recognition technology are being used by businesses to identify shoplifters. China is experimenting with even more powerful forms of automated legal enforcement and targeted surveillance. Ubiquitous AI-powered surveillance in society will be necessary to enable such automated enforcement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

While most governments won’t likely do anything nefarious with this information, it does heighten the risk of a data breach. Surveillance gives cybercriminals another potential point of entry to see or steal your data. In some countries, government agencies may monitor your employees’ web activity.

Internet 223
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

The Hacker Mind Podcast: Never Mess With A Hacker

ForAllSecure

Here are some air travel tips from The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick and Robert Vamosi. Sometimes you can use surveillance tools in your favor. This is a short episode to tide everyone over until the new year.

article thumbnail

The Rise of an Overlooked Crime – Cyberstalking

Security Affairs

These evils include hacking, identity theft, online surveillance, and cyberstalking. We all know the dangers associated with hacking, identity theft, and internet surveillance, thanks to Facebook and other social networking platforms. This means that any private data saved on your phone can be seen and taken over by the hacker.