Crypto-Gram Security Podcast
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter

Syndication

add to my PodNova

Obligatory Fine Print: The Crypto-Gram Newsletter is created by and Copyright (c) Bruce Schneier. The newsletter is hosted here in audio format with Bruce Schneier's permission. Dan Henage is responsible for creation of the audio version of the newsletter. The official site of the Crypto-Gram Newsletter is here. The Crypto-Gram Newsletter may not be reproduced, duplicated, copied, sold, resold, or otherwise exploited without the express written permission of Bruce Schneier.

Support the web hosting costs for this podcast:

Thank you to all those that have donated in the past years!

Archives:

2014
July
June
May
April
March
February
January

2013
December
November
October
September
August
July
June
May
April
March
February
January

2012
December
November
October
September
August
July
June
May
April
March
February
January

2011
December
November
October
September
August
July
June
May
April
March
February
January

2010
December
November
October
September
August
July
June
May
April
March
February
January

2009
December
November
October
September
August
July
June
May
April
March
February
January

2008
December
November
October
September
August
July
June
May
April
March
February
January

2007
December
November
October
September
August
July
June
May
April
March
February
January

2006
December
November
October
September
August
July
June
May
April
March
February
January

2005
December
November
October
September
August

Thanks to Amplifico for the tunes!

In this issue:

  • GCHQ Catalog of Exploit Tools
  • NSA Spied on Prominent Muslim Americans
  • Web Activity Used in Court to Portray State of Mind
  • NSA Targets the Privacy-Conscious for Surveillance
  • Co3 Systems Is Hiring
  • Could Keith Alexander's Advice Possibly Be Worth $600K a Month?

from the July 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-07.mp3
Category:podcast -- posted at: 1:27 PM

In this issue:

  • Disclosing vs. Hoarding Vulnerabilities
  • The NSA is Not Made of Magic
  • GCHQ Intercept Sites in Oman
  • Chinese Hacking of the US
  • The Human Side of Heartbleed
  • TrueCrypt
  • Security and Human Behavior (SHB 2014)
  • Seventh Movie-Plot Threat Contest Winner

from the June 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-06.mp3
Category:podcast -- posted at: 1:09 PM

In this issue:

  • Internet Subversion
  • New Al Qaeda Encryption Software
  • Seventh Movie-Plot Threat Contest Semifinalists
  • Espionage vs. Surveillance

from the May 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-05.mp3
Category:podcast -- posted at: 12:08 PM

In this issue:

  • Heartbleed
  • Seventh Movie-Plot Threat Contest
  • MYSTIC: The NSA's Telephone Call Collection Program
  • The Continuing Public/Private Surveillance Partnership
  • New Book on Data and Power
  • An Open Letter to IBM's Open Letter
  • Ephemeral Apps
  • Details of the Target Credit Card Breach

from the April 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-04.mp3
Category:podcast -- posted at: 11:09 AM

In this issue:

  • Breaking Up the NSA
  • Computer Network Exploitation vs. Computer Network Attack
  • Metadata = Surveillance
  • Surveillance by Algorithm
  • Who Should Store NSA Surveillance Data
  • The Security of the Fortuna PRNG
  • RCS Spyware and Citizen Lab
  • Choosing Secure Passwords

from the March 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-03.mp3
Category:podcast -- posted at: 10:01 AM

In this issue:

  • Finding People's Locations Based on Their Activities in Cyberspace
  • The Insecurity of Secret IT Systems
  • Last Month I Briefed Congress on the NSA
  • US Privacy and Civil Liberties Oversight Board (PCLOB) Condemns NSA Mass Surveillance
  • NSA/GCHQ Accused of Hacking Belgian Cryptographer
  • CSEC Surveillance Analysis of IP and User Data

from the February 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-02.mp3
Category:podcast -- posted at: 10:05 AM

In this issue:

  • How the NSA Threatens National Security
  • NSA Exploit of the Day
  • Tor User Identified by FBI
  • Security Risks of Embedded Systems
  • Schneier News: I've Joined Co3[“Co-Three”] Systems
  • Twitter Users: Please Make Sure You're Following the Right Feed

from the January 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-01.mp3
Category:podcast -- posted at: 9:12 AM

In this issue:

  • NSA Spying on Online Gaming Worlds
  • NSA Tracks People Using Google Cookies
  • How Antivirus Companies Handle State-Sponsored Malware
  • Surveillance as a Business Model
  • Evading Airport Security
  • The TQP Patent

from the December 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-12.mp3
Category:podcast -- posted at: 8:05 AM

In this issue:

  • NSA Harvesting Contact Lists
  • NSA Eavesdropping on Google and Yahoo Networks
  • Code Names for NSA Exploit Tools
  • Defending Against Crypto Backdoors
  • Why the Government Should Help Leakers
  • The Trajectories of Government and Corporate Surveillance
  • A Fraying of the Public/Private Surveillance Partnership
  • Book Review: "Cyber War Will Not Take Place"
  • Understanding the Threats in Cyberspace
  • SecureDrop
  • Dry Ice Bombs at LAX
  • The Battle for Power on the Internet

from the November 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-11.mp3
Category:podcast -- posted at: 7:08 AM

In this issue:

  • How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
  • Why It's Important to Publish the NSA Programs
  • The NSA's New Risk Analysis
  • Reforming the NSA
  • The Limitations of Intelligence
  • Metadata Equals Surveillance
  • Senator Feinstein Admits the NSA Taps the Internet Backbone
  • NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
  • Air Gaps
  • Will Keccak = SHA-3?
  • Google Knows Every Wi-Fi Password in the World
  • Surreptitiously Tampering with Computer Chips

from the October 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-10.mp3
Category:podcast -- posted at: 5:19 PM