Crypto-Gram Security Podcast
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter

Syndication

add to my PodNova

Obligatory Fine Print: The Crypto-Gram Newsletter is created by and Copyright (c) Bruce Schneier. The newsletter is hosted here in audio format with Bruce Schneier's permission. Dan Henage is responsible for creation of the audio version of the newsletter. The official site of the Crypto-Gram Newsletter is here. The Crypto-Gram Newsletter may not be reproduced, duplicated, copied, sold, resold, or otherwise exploited without the express written permission of Bruce Schneier.

Support the web hosting costs for this podcast:

Thank you to all those that have donated in the past years!

Archives:

2018
November
October
September
August
July
June
May
April
February
January

2017
December
November
October
August
July
June
May
April
March
February
January

2016
December
November
October
September
August
July
June
May
April
March
February
January

2015
December
November
October
September
August
July
June
May
April
March
February
January

2014
December
November
October
September
August
July
June
May
April
March
February
January

2013
December
November
October
September
August
July
June
May
April
March
February
January

2012
December
November
October
September
August
July
June
May
April
March
February
January

2011
December
November
October
September
August
July
June
May
April
March
February
January

2010
December
November
October
September
August
July
June
May
April
March
February
January

2009
December
November
October
September
August
July
June
May
April
March
February
January

2008
December
November
October
September
August
July
June
May
April
March
February
January

2007
December
November
October
September
August
July
June
May
April
March
February
January

2006
December
November
October
September
August
July
June
May
April
March
February
January

2005
December
November
October
September
August

Thanks to Amplifico for the tunes!

In this issue:

  • Cell Phone Security and Heads of State
  • New IoT Security Regulations
  • Oracle and "Responsible Disclosure"

from the November 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-11.mp3
Category:podcast -- posted at: 11:20am MST

In this issue:

  • Security in a World of Physically Capable Computers

from the October 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-10.mp3
Category:podcast -- posted at: 10:30am MST

In this issue:

  • Five-Eyes Intelligence Services Choose Surveillance Over Security
  • Security Risks of Government Hacking
  • Quantum Computing and Cryptography

from the September 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-09.mp3
Category:podcast -- posted at: 9:28am MST

In this issue:

  • New Book Announcement: Click Here to Kill Everybody
  • Reasonably Clever Extortion E-mail Based on Password Theft
  • Defeating the iPhone Restricted Mode
  • 1Password's Travel Mode
  • SpiderOak's Warrant Canary Died
  • Don't Fear the TSA Cutting Airport Security. Be Glad That They're Talking about It.
  • Google Tracks its Users Even if They Opt-Out of Tracking

from the August 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-08.mp3
Category:podcast -- posted at: 8:31am MST

In this issue:

  • Ridiculously Insecure Smart Lock
  • Are Free Societies at a Disadvantage in National Cybersecurity
  • Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill
  • The Effects of Iran's Telegram Ban
  • Bypassing Passcodes in iOS
  • Manipulative Social Media Practices
  • Conservation of Threat
  • California Passes New Privacy Law

from the July 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-07.mp3
Category:podcast -- posted at: 8:07am MST

In this issue:

  • Router Vulnerability and the VPNFilter Botnet
  • E-Mail Vulnerabilities and Disclosure
  • Russian Censorship of Telegram
  • Another Spectre-Like CPU Vulnerability
  • An Example of Deterrence in Cyberspace
  • New Data Privacy Regulations

from the June 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-06.mp3
Category:podcast -- posted at: 7:12am MST

In this issue:

  • Securing Elections
  • Details on a New PGP Vulnerability
  • Two NSA Algorithms Rejected by the ISO
  • Ray Ozzie's Encryption Backdoor
  • Supply-Chain Security

from the May 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-05.mp3
Category:podcast -- posted at: 5:27am MST

In this issue:

  • Facebook and Cambridge Analytica
  • Israeli Security Company Attacks AMD by Publishing Zero-Day Exploits
  • Obscure E-Mail Vulnerability
  • The Digital Security Exchange Is Live

from the April 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-04.mp3
Category:podcast -- posted at: 5:02am MST

In this issue:

  • Artificial Intelligence and the Attack/Defense Balance
  • Can Consumers' Online Data Be Protected?

from the March 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-03.mp3
Category:podcast -- posted at: 1:02am MST

In this issue:

  • The Effects of the Spectre and Meltdown Vulnerabilities
  • After Section 702 Reauthorization
  • Cabinet of Secret Documents from Australia

from the February 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-02.mp3
Category:podcast -- posted at: 3:01am MST

In this issue:

  • Spectre and Meltdown Attacks Against Microprocessors
  • Susan Landau's New Book: "Listening In"
  • New Book Coming in September: "Click Here to Kill Everybody"
  • Daniel Miessler on My Writings about IoT Security

from the January 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-01.mp3
Category:podcast -- posted at: 1:21am MST

In this issue:

  • Warrant Protections against Police Searches of Our Data
  • Uber Data Hack
  • NSA "Red Disk" Data Leak
  • New White House Announcement on the Vulnerability Equities Process

from the December 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-12.mp3
Category:podcast -- posted at: 12:28am MST

In this issue:

  • Me on the Equifax Breach
  • Daphne Caruana Galizia's Murder and the Security of WhatsApp
  • New KRACK Attack Against Wi-Fi Encryption
  • Fraud Detection in Pokemon Go
  • IoT Cybersecurity: What's Plan B?

from the November 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-11.mp3
Category:podcast -- posted at: 12:10am MST

In this issue:

  • Yet Another Russian Hack of the NSA -- This Time with Kaspersky's Help
  • Changes in Password Best Practices
  • HP Shared ArcSight Source Code with Russians
  • My Writing
  • Department of Homeland Security to Collect Social Media of Immigrants and Citizens

from the October 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-10.mp3
Category:podcast -- posted at: 12:32pm MST

In this issue:

  • On the Equifax Data Breach
  • iPhone Changes to Frustrate the Police

from the September 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-09.mp3
Category:podcast -- posted at: 10:48pm MST

In this issue:

  • Ethereum Hack
  • Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers
  • Measuring Vulnerability Rediscovery

from the August 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-08.mp3
Category:podcast -- posted at: 9:02am MST

In this issue:

  • Book Review: "Twitter and Tear Gas," by Zeynep Tufekci
  • Amazon Patents Measures to Prevent In-Store Comparison Shopping
  • Separating the Paranoid from the Hacked

from the July 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-07.mp3
Category:podcast -- posted at: 7:29am MST

In this issue:

  • The Future of Ransomware
  • WannaCry and Vulnerabilities
  • NSA Brute-Force Keysearch Machine
  • NSA Abandons "About" Searches
  • Extending the Airplane Laptop Ban
  • Security and Human Behavior (SHB 2017)
  • Passwords at the Border
  • NSA Document Outlining Russian Attempts to Hack Voter Rolls
  • Who Are the Shadow Brokers?

from the June 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-06.mp3
Category:podcast -- posted at: 7:03am MST

In this issue:

  • Who is Publishing NSA and CIA Secrets, and Why?
  • The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway"
  • Securing Elections
  • Surveillance and our Insecure Infrastructure

from the May 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-05.mp3
Category:podcast -- posted at: 7:47am MST

In this issue:

  • The TSA's Selective Laptop Ban
  • WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies
  • Shadow Brokers Releases the Rest of Their NSA Hacking Tools
  • Congress Removes FCC Privacy Protections on Your Internet Usage
  • Incident Response as "Hand-to-Hand Combat"
  • Fourth WikiLeaks CIA Attack Tool Dump
  • Security Orchestration and Incident Response
  • Commenting Policy for My Blog

from the April 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-04.mp3
Category:podcast -- posted at: 4:19am MST

In this issue:

  • WikiLeaks Releases CIA Hacking Tools
  • Botnets
  • Defense Against Doxing
  • Buzzword Watch: Prosilience
  • The CIA's "Development Tradecraft DOs and DON'Ts"

from the March 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-03.mp3
Category:podcast -- posted at: 3:22am MST

In this issue:

  • Security and the Internet of Things
  • Security and Privacy Guidelines for the Internet of Things

from the February 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-02.mp3
Category:podcast -- posted at: 2:25am MST

Crypto-Gram 15 January 2017

In this issue:

  • Attributing the DNC Hacks to Russia
  • Are We Becoming More Moral Faster Than We're Becoming More Dangerous?
  • Security Risks of TSA PreCheck
  • Law Enforcement Access to IoT Data
  • Class Breaks
  • A Comment on the Trump Dossier

from the January 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-01.mp3
Category:podcast -- posted at: 1:22am MST

Crypto-Gram 15 December 2016

In this issue:

  • My Priorities for the Next Four Years
  • Hacking and the 2016 Presidential Election
  • Dumb Security Survey Questions

from the December 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-12.mp3
Category:podcast -- posted at: 12:31am MST

Crypto-Gram 15 November 2016

In this issue:

  • Election Security
  • Lessons From the Dyn DDoS Attack
  • Regulation of the Internet of Things
  • Virtual Kidnapping
  • Intelligence Oversight and How It Can Fail
  • Whistleblower Investigative Report on NSA Suite B Cryptography

from the November 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-11.mp3
Category:podcast -- posted at: 12:08am MST

Crypto-Gram 15 October 2016

In this issue:

  • Security Economics of the Internet of Things
  • Cybersecurity Issues for the Next Administration
  • Security Design: Stop Trying to Fix the User
  • Recovering an iPhone 5c Passcode
  • The Hacking of Yahoo

from the October 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-10.mp3
Category:podcast -- posted at: 10:25am MST

Crypto-Gram 15 September 2016

In this issue:

  • The NSA Is Hoarding Vulnerabilities
  • Someone Is Learning How to Take Down the Internet
  • Organizational Doxing and Disinformation
  • iPhone Zero-Day Used by UAE Government
  • Apple's Cloud Key Vault

from the September 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-09.mp3
Category:podcast -- posted at: 10:03am MST

Crypto-Gram 15 August 2016

In this issue:

  • The Security of Our Election Systems
  • Hacking the Vote
  • Real-World Security and the Internet of Things
  • Hacking Your Computer Monitor
  • More on the Vulnerabilities Equities Process

from the August 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-08.mp3
Category:podcast -- posted at: 8:22am MST

Crypto-Gram 15 July 2016

In this issue:

  • CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist
  • Report on the Vulnerabilities Equities Process
  • Apple's Differential Privacy
  • Google's Post-Quantum Cryptography

from the July 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

 

Direct download: crypto-gram-16-07.mp3
Category:podcast -- posted at: 7:19am MST

Crypto-Gram 15 June 2016

In this issue:

  • The Unfalsifiability of Security Claims
  • Arresting People for Walking Away from Airport Security
  • Suckfly
  • Google Moving Forward on Automatic Logins
  • Security and Human Behavior (SHB 2016)

from the June 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-06.mp3
Category:podcast -- posted at: 6:22am MST

Crypto-Gram 15 May 2016

In this issue:

  • Credential Stealing as an Attack Vector
  • Helen Nissenbaum on Regulating Data Collection and Use
  • Amazon Unlimited Fraud
  • I'm Writing a Book on Security

from the May 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-05.mp3
Category:podcast -- posted at: 5:17am MST

Crypto-Gram 15 April 2016

In this issue:

  • Lawful Hacking and Continuing Vulnerabilities
  • More Links on the San Bernardino iPhone Case
  • Cryptography Is Harder Than It Looks
  • Memphis Airport Inadvertently Gets Security Right
  • New NIST Encryption Guidelines
  • Hacking Lottery Machines
  • IRS Security

from the April 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-04.mp3
Category:podcast -- posted at: 4:29am MST

Crypto-Gram 15 March 2016

In this issue:

  • Data Is a Toxic Asset
  • The FBI vs. Apple: Decrypting an iPhone
  • The Importance of Strong Encryption to Security
  • Security Implications of Cash
  • WikiLeaks Publishes NSA Target List
  • Cheating at Professional Bridge
  • Simultaneous Discovery of Vulnerabilities

from the March 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-03.mp3
Category:podcast -- posted at: 3:31am MST

Crypto-Gram 15 February 2016

In this issue:

  • The Internet of Things Will Be the World's Biggest Robot
  • Integrity and Availability Threats
  • Security vs. Surveillance
  • Paper on the Going Dark Debate
  • The 2016 National Threat Assessment
  • AT&T Does Not Care about Your Privacy
  • "Data and Goliath" Published in Paperback
  • NSA's TAO Head on Internet Offense and Defense
  • Worldwide Encryption Products Survey

from the February 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-02.mp3
Category:podcast -- posted at: 2:29am MST

Crypto-Gram 15 January 2016

In this issue:

  • The Internet of Things that Talk About You Behind Your Back
  • Using Law against Technology
  • DMCA and the Internet of Things
  • NSA Spies on Israeli Prime Minister
  • Replacing Judgment with Algorithms
  • IT Security and the Normalization of Deviance

from the January 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-01.mp3
Category:podcast -- posted at: 1:21am MST

Crypto-Gram 15 December 2015

In this issue:

  • Policy Repercussions of the Paris Terrorist Attacks
  • NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails
  • Reputation in the Information Age
  • On CISA
  • Voter Surveillance
  • Worldwide Cryptographic Products Survey: Edits and Additions Wanted
  • Security vs. Business Flexibility

from the December 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-12.mp3
Category:podcast -- posted at: 12:21am MST

Crypto-Gram 15 November 2015

In this issue:

  • The Doxing Trend
  • The Rise of Political Doxing
  • Breaking Diffie-Hellman with Massive Precomputation (Again)
  • Australia Is Testing Virtual Passports
  • The Effects of Surveillance on the Victims

from the November 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-11.mp3
Category:podcast -- posted at: 12:02am MST

Crypto-Gram 15 October 2015

In this issue:

  • Volkswagen and Cheating Software
  • Living in a Code Yellow World
  • Obama Administration Not Pursuing a Backdoor to Commercial Encryption
  • Stealing Fingerprints
  • Automatic Face Recognition and Surveillance
  • Bringing Frozen Liquids through Airport Security
  • SHA-1 Freestart Collision

from the October 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-10.mp3
Category:podcast -- posted at: 11:05am MST

Crypto-Gram 15 September 2015

In this issue:

  • The Security Risks of Third-Party Data
  • NSA Plans for a Post-Quantum World
  • Drone Self-Defense and the Law
  • Hacking Team, Computer Vulnerabilities, and the NSA
  • TSA Master Keys
  • Oracle CSO Rant Against Security Experts
  • FBI and Apple's Encryption
  • Animals vs. Drones
  • Glenn Greenwald Debates Keith Alexander
  • Wanted: Cryptography Products for Worldwide Survey

from the September 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-09.mp3
Category:podcast -- posted at: 10:06am MST

Crypto-Gram 15 August 2015

In this issue:

  • Backdoors Won't Solve Comey's Going Dark Problem
  • Another Salvo in the Second Crypto War (of Words)
  • Cosa Nostra Dead Drops
  • Bizarre High-Tech Kidnapping
  • Fugitive Located by Spotify
  • Intimidating Military Personnel by Targeting Their Families
  • Stagefright Vulnerability in Android Phones

from the August 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-08.mp3
Category:podcast -- posted at: 8:24am MST

Crypto-Gram 15 July 2015

In this issue:

  • Organizational Doxing
  • Why We Encrypt
  • The Secrecy of the Snowden Documents
  • The Risks of Mandating Backdoors in Encryption Products
  • What is the DoD's Position on Backdoors in Security Systems?
  • Office of Personnel Management Data Hack
  • More about the NSA's XKEYSCORE
  • Hayden Mocks NSA Reforms
  • NSA French and German Intercepts
  • Hacking Team Is Hacked

from the July 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-07.mp3
Category:podcast -- posted at: 8:06am MST

Crypto-Gram 15 June 2015

In this issue:

  • The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
  • NSA Running a Massive IDS on the Internet Backbone
  • Duqu 2.0
  • Why the Recent Section 215 Reform Debate Doesn't Matter Much
  • TSA Not Detecting Weapons at Security Checkpoints
  • Chris Roberts and Avionics Security
  • Encrypting Windows Hard Drives
  • Should Companies Do Most of Their Computing in the Cloud? (Part 1)
  • Should Companies Do Most of Their Computing in the Cloud? (Part 2)
  • Should Companies Do Most of Their Computing in the Cloud? (Part 3)
  • Eighth Movie-Plot Threat Contest Winner

from the June 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-06.mp3
Category:podcast -- posted at: 6:30am MST

Crypto-Gram 15 May 2015

In this issue:

  • Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit
  • The Further Democratization of QUANTUM
  • The Further Democratization of Stingray
  • Eighth Movie-Plot Threat Contest Semifinalists
  • Hacking Airplanes
  • Counting the US Intelligence Community Leakers
  • "Hinky" in Action

from the May 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-05.mp3
Category:podcast -- posted at: 5:25am MST

Crypto-Gram 15 April 2015

In this issue:

  • More "Data and Goliath" News
  • The Eighth Movie-Plot Threat Contest
  • Metal Detectors at Sports Stadiums
  • Cisco Shipping Equipment to Fake Addresses to Foil NSA Interception
  • New Zealand's XKEYSCORE Use
  • Australia Outlaws Warrant Canaries

from the April 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-04.mp3
Category:podcast -- posted at: 5:12am MST

Crypto-Gram 15 March 2015

In this issue:

  • "Data and Goliath"'s Big Idea
  • "Data and Goliath" News
  • Everyone Wants You To Have Security, But Not from Them
  • The Democratization of Cyberattack
  • The Equation Group's Sophisticated Hacking and Exploitation Tools
  • Ford Proud that "Mustang" Is a Common Password
  • Attack Attribution and Cyber Conflict
  • Co3 Systems Changes Its Name to Resilient Systems
  • FREAK: Security Rollback Attack Against SSL
  • Can the NSA Break Microsoft's BitLocker?
  • Hardware Bit-Flipping Attack

from the March 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-03.mp3
Category:podcast -- posted at: 4:12am MST

Crypto-Gram 15 February 2015

In this issue:

  • Samsung Television Spies on Viewers
  • Accountability as a Security System
  • When Thinking Machines Break the Law
  • Obama Says Terrorism Is Not an Existential Threat
  • National Academies Report on Bulk Intelligence Collection
  • My Superpower
  • New Book: "Data and Goliath"
  • DEA Also Conducting Mass Telephone Surveillance

from the February 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-02.mp3
Category:podcast -- posted at: 3:05am MST

Crypto-Gram 15 January 2015

In this issue:

  • Lessons from the Sony Hack
  • Reacting to the Sony Hack
  • Did North Korea Really Attack Sony?
  • Attributing the Sony Attack
  • The Limits of Police Subterfuge
  • Leaked CIA Documents
  • Doxing as an Attack
  • Attack Attribution in Cyberspace
  • The Security of Data Deletion

from the January 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-01.mp3
Category:podcast -- posted at: 2:11am MST

Crypto-Gram 15 December 2014

In this issue:

  • Regin
  • FBI Agents Pose as Repairmen to Bypass Warrant Process
  • NSA Hacking of Cell Phone Networks
  • Comments on the Sony Hack
  • Over 700 Million People Taking Steps to Avoid NSA Surveillance
  • Corporations Misusing Our Data

from the December 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-12.mp3
Category:podcast -- posted at: 1:12am MST

Crypto-Gram 15 November 2014

In this issue:

  • Crypto Wars II
  • Hacking Team Documentation
  • The Future of Incident Response
  • How Did the Feds Identity Dread Pirate Roberts?
  • Spritz: A New RC4-Like Stream Cipher
  • NSA Classification ECI = Exceptionally Controlled Information

from the November 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-11.mp3
Category:podcast -- posted at: 12:02am MST

Crypto-Gram 15 October 2014

In this issue:

  • Data and Goliath Is Finished
  • iPhone Encryption and the Return of the Crypto Wars
  • Fake Cell Phone Towers Across the US
  • FOXACID Operations Manual
  • NSA Has Undercover Operatives in Foreign Companies
  • DEA Creates Fake Facebook Page in Woman's Name

from the October 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-10.mp3
Category:podcast -- posted at: 10:31am MST

Crypto-Gram 15 September 2014

In this issue:

  • NSA/GCHQ/CSEC Infecting Innocent Computers Worldwide
  • The Security of al Qaeda Encryption Software
  • QUANTUM Technology Sold by Cyberweapons Arms Manufacturers
  • The Concerted Effort to Remove Data Collection Restrictions
  • Cell Phone Kill Switches Mandatory in California
  • Security of Password Managers

from the September 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-09.mp3
Category:podcast -- posted at: 9:30am MST

In this issue:

  • New Snowden Interview in Wired
  • The US Intelligence Community has a Third Leaker
  • Over a Billion Passwords Stolen?
  • Irrational Fear of Risks Against Our Children

from the August 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-08.mp3
Category:podcast -- posted at: 8:24am MST

Crypto-Gram 15 July 2014

In this issue:

  • GCHQ Catalog of Exploit Tools
  • NSA Spied on Prominent Muslim Americans
  • Web Activity Used in Court to Portray State of Mind
  • NSA Targets the Privacy-Conscious for Surveillance
  • Co3 Systems Is Hiring
  • Could Keith Alexander's Advice Possibly Be Worth $600K a Month?

from the July 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-07.mp3
Category:podcast -- posted at: 7:27am MST

Crypto-Gram 15 Jun 2014

In this issue:

  • Disclosing vs. Hoarding Vulnerabilities
  • The NSA is Not Made of Magic
  • GCHQ Intercept Sites in Oman
  • Chinese Hacking of the US
  • The Human Side of Heartbleed
  • TrueCrypt
  • Security and Human Behavior (SHB 2014)
  • Seventh Movie-Plot Threat Contest Winner

from the June 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-06.mp3
Category:podcast -- posted at: 7:09am MST

Crypto-Gram 15 May 2014

In this issue:

  • Internet Subversion
  • New Al Qaeda Encryption Software
  • Seventh Movie-Plot Threat Contest Semifinalists
  • Espionage vs. Surveillance

from the May 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-05.mp3
Category:podcast -- posted at: 6:08am MST

In this issue:

  • Heartbleed
  • Seventh Movie-Plot Threat Contest
  • MYSTIC: The NSA's Telephone Call Collection Program
  • The Continuing Public/Private Surveillance Partnership
  • New Book on Data and Power
  • An Open Letter to IBM's Open Letter
  • Ephemeral Apps
  • Details of the Target Credit Card Breach

from the April 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-04.mp3
Category:podcast -- posted at: 5:09am MST

Crypto-Gram 15 Mar 2014

In this issue:

  • Breaking Up the NSA
  • Computer Network Exploitation vs. Computer Network Attack
  • Metadata = Surveillance
  • Surveillance by Algorithm
  • Who Should Store NSA Surveillance Data
  • The Security of the Fortuna PRNG
  • RCS Spyware and Citizen Lab
  • Choosing Secure Passwords

from the March 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-03.mp3
Category:podcast -- posted at: 4:01am MST

In this issue:

  • Finding People's Locations Based on Their Activities in Cyberspace
  • The Insecurity of Secret IT Systems
  • Last Month I Briefed Congress on the NSA
  • US Privacy and Civil Liberties Oversight Board (PCLOB) Condemns NSA Mass Surveillance
  • NSA/GCHQ Accused of Hacking Belgian Cryptographer
  • CSEC Surveillance Analysis of IP and User Data

from the February 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-02.mp3
Category:podcast -- posted at: 3:05am MST

Crypto-Gram 15 Jan 2014

In this issue:

  • How the NSA Threatens National Security
  • NSA Exploit of the Day
  • Tor User Identified by FBI
  • Security Risks of Embedded Systems
  • Schneier News: I've Joined Co3[“Co-Three”] Systems
  • Twitter Users: Please Make Sure You're Following the Right Feed

from the January 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-01.mp3
Category:podcast -- posted at: 2:12am MST

In this issue:

  • NSA Spying on Online Gaming Worlds
  • NSA Tracks People Using Google Cookies
  • How Antivirus Companies Handle State-Sponsored Malware
  • Surveillance as a Business Model
  • Evading Airport Security
  • The TQP Patent

from the December 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-12.mp3
Category:podcast -- posted at: 1:05am MST

In this issue:

  • NSA Harvesting Contact Lists
  • NSA Eavesdropping on Google and Yahoo Networks
  • Code Names for NSA Exploit Tools
  • Defending Against Crypto Backdoors
  • Why the Government Should Help Leakers
  • The Trajectories of Government and Corporate Surveillance
  • A Fraying of the Public/Private Surveillance Partnership
  • Book Review: "Cyber War Will Not Take Place"
  • Understanding the Threats in Cyberspace
  • SecureDrop
  • Dry Ice Bombs at LAX
  • The Battle for Power on the Internet

from the November 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-11.mp3
Category:podcast -- posted at: 12:08am MST

In this issue:

  • How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
  • Why It's Important to Publish the NSA Programs
  • The NSA's New Risk Analysis
  • Reforming the NSA
  • The Limitations of Intelligence
  • Metadata Equals Surveillance
  • Senator Feinstein Admits the NSA Taps the Internet Backbone
  • NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
  • Air Gaps
  • Will Keccak = SHA-3?
  • Google Knows Every Wi-Fi Password in the World
  • Surreptitiously Tampering with Computer Chips

from the October 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-10.mp3
Category:podcast -- posted at: 11:19am MST

In this issue:

  • Take Back the Internet
  • More on the NSA Commandeering the Internet
  • Detaining David Miranda
  • Government Secrecy and the Generation Gap
  • Conspiracy Theories and the NSA
  • The NSA's Cryptographic Capabilities
  • How to Remain Secure Against the NSA
  • Protecting Against Leakers
  • Our Newfound Fear of Risk
  • Human-Machine Trust Failures
  • Excess Automobile Deaths as a Result of 9/11
  • iPhone Fingerprint Authentication
  • Hacking Consumer Devices
  • Syrian Electronic Army Cyberattacks
  • The Cryptopocalypse
  • Measuring Entropy and its Applications to Encryption

from the September 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-09.mp3
Category:podcast -- posted at: 10:01am MST

In this issue:

  • The Public/Private Surveillance Partnership
  • The NSA is Commandeering the Internet
  • Restoring Trust in Government and the Internet
  • Book Review: "Rise of the Warrior Cop"
  • Michael Hayden on the Effects of Snowden's Whistleblowing
  • Counterterrorism Mission Creep

from the August 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-08.mp3
Category:podcast -- posted at: 9:11am MST

In this issue:

  • Blowback from the NSA Surveillance
  • Evidence that the NSA Is Storing Voice Content, Not Just Metadata
  • NSA Secrecy and Personal Privacy
  • Petition the NSA to Subject its Surveillance Program to Public Comment
  • New Details on Skype Eavesdropping
  • Pre-9/11 NSA Thinking
  • How the NSA Eavesdrops on Americans
  • NSA E-Mail Eavesdropping
  • US Offensive Cyberwar Policy
  • Finding Sociopaths on Facebook
  • My Fellowship at the Berkman Center
  • Protecting E-Mail from Eavesdropping
  • Is Cryptography Engineering or Science?
  • Sixth Movie-Plot Threat Contest Winner

from the July 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-07.mp3
Category:podcast -- posted at: 7:30am MST

In this issue:

  • Government Secrets and the Need for Whistleblowers
  • Prosecuting Snowden
  • Trading Privacy for Convenience
  • Essays Related to NSA Spying Documents
  • The Politics of Security in a Democracy
  • More on Feudal Security
  • Surveillance and the Internet of Things
  • The Problems with CALEA-II
  • Sixth Annual Movie-Plot Threat Semifinalists
  • A Really Good Article on How Easy it Is to Crack Passwords
  • Bluetooth-Controlled Door Lock
  • Security and Human Behavior (SHB 2013)
  • The Cost of Terrorism in Pakistan

from the June 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-06.mp3
Category:podcast -- posted at: 7:27am MST

In this issue:

  • Refuse to be Terrorized
  • Intelligence Analysis and the Connect-the-Dots Metaphor
  • Transparency and Accountability
  • The Boston Marathon Bomber Manhunt
  • The Public/Private Surveillance Partnership
  • Michael Chertoff on Google Glass

from the May 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-05.mp3
Category:podcast -- posted at: 6:11am MST

In this issue:

  • Our Internet Surveillance State
  • Sixth Movie-Plot Threat Contest
  • IT for Oppression
  • When Technology Overtakes Security
  • Security Awareness Training
  • What I've Been Thinking About
  • Changes to My Blog

from the April 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-04.mp3
Category:podcast -- posted at: 5:13am MST

In this issue:

  • Nationalism on the Internet
  • Automobile Data Surveillance and the Future of Black Boxes
  • The Court of Public Opinion
  • More on Chinese Cyberattacks
  • Technologies of Surveillance
  • Phishing Has Gotten *Very* Good
  • Hacking the Papal Election
  • Getting Security Incentives Right
  • All Those Companies that Can't Afford Dedicated Security

from the March 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-03.mp3
Category:podcast -- posted at: 4:14am MST

In this issue:

  • Power and the Internet
  • Who Does Skype Let Spy?
  • Our New Regimes of Trust
  • TSA Removing Rapiscan Full-Body Scanners from U.S. Airports
  • Dangerous Security Theater: Scrambling Fighter Jets
  • Massive Police Shootout in Cleveland Despite Lack of Criminals
  • "New York Times" Hacked by China
  • Jared Diamond on Common Risks
  • Man-in-the-Middle Attacks Against Browser Encryption
  • "People, Process, and Technology"

from the February 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-02.mp3
Category:podcast -- posted at: 4:11am MST

In this issue:

  • Last Month's Overreactions
  • Public Shaming as a Security Measure
  • Terms of Service as a Security Threat
  • Classifying a Shape
  • I Seem to Be a Verb Now
  • Experimental Results: "Liars and Outliers" Trust Offer

from the January 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-01.mp3
Category:podcast -- posted at: 2:07am MST

In this issue:

  • Feudal Security
  • E-Mail Security in the Wake of Petraeus
  • Squids on the "Economist" Cover
  • IT for Oppression
  • Dictators Shutting Down the Internet
  • Book Review: "Against Security"

from the December 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-12.mp3
Category:podcast -- posted at: 1:14am MST

In this issue:

  • Stoking Cyber Fears
  • Hacking TSA PreCheck
  • Encryption in Cloud Computing
  • The Risks of Trusting Experts

from the November 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-11.mp3
Category:podcast -- posted at: 11:19am MST

In this issue:

  • Keccak Is SHA-3
  • What I Wrote Just Before the SHA-3 Announcement
  • Recent Developments in Password Cracking
  • Master Keys
  • When Will We See Collisions for SHA-1?

from the October 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-10.mp3
Category:podcast -- posted at: 10:30am MST

In this issue:

  • The Importance of Security Engineering
  • Security at the 9/11 WTC Memorial
  • Poll: Americans Like the TSA
  • Five "Neglects" in Risk Management
  • Is iPhone Security Really this Good?

from the September 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-09.mp3
Category:podcasts -- posted at: 10:14am MST

In this issue:

  • Overreaction and Overly Specific Reactions to Rare Risks
  • Cryptocat
  • Yet Another Risk of Storing Everything in the Cloud
  • Sexual Harassment at DefCon (and Other Hacker Cons)
  • Police Sting Operation Yields No Mobile Phone Thefts
  • Remote Scanning Technology

from the August 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-08.mp3
Category:podcast -- posted at: 9:03am MST

In this issue:

  • So You Want to Be a Security Expert
  • Rand Paul Takes on the TSA
  • On Securing Potentially Dangerous Virology Research
  • The Failure of Anti-Virus Companies to Catch Military Malware
  • E-Mail Accounts More Valuable than Bank Accounts
  • "Top Secret America' on the Post-9/11 Cycle of Fear and Funding

from the July 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-07.mp3
Category:podcast -- posted at: 7:26am MST

In this issue:

  • The Vulnerabilities Market and the Future of Security
  • Cyberwar Treaties
  • Flame
  • My Last Post About Ethnic Profiling at Airports
  • Kip Hawley and Me
  • Security and Human Behavior (SHB 2012)

from the June 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-06.mp3
Category:podcast -- posted at: 7:24am MST

In this issue:

  • The Trouble with Airport Profiling
  • Hawley Channels His Inner Schneier
  • TSA Behavioral Detection Statistics
  • Stolen Phone Database
  • "Liars & Outliers" Update
  • Overreacting to Potential Bombs
  • A Foiled Terrorist Plot
  • Fear and the Attention Economy
  • Amazing Round of "Split or Steal"

from the May 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-05.mp3
Category:podcast -- posted at: 7:23am MST

In this issue:

  • Harms of Post-9/11 Airline Security
  • Congressional Testimony on the TSA
  • Bomb Threats As a Denial-of-Service Attack
  • Can the NSA Break AES?
  • Rare Spanish Enigma Machine
  • Buying Exploits on the Grey Market
  • Hacking Critical Infrastructure

from the April 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-04.mp3
Category:podcast -- posted at: 7:10am MST

In this issue:

  • "Liars and Outliers": The Big Idea
  • "Liars and Outliers": Interview on The Browser
  • "Liars and Outliers" Update
  • Lousy Random Numbers Cause Insecure Public Keys
  • Video Shows TSA Full-Body Scanner Failure
  • Themes from the RSA Conference
  • How Changing Technology Affects Security

from the March 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-03.mp3
Category:podcast -- posted at: 4:12am MST

In this issue:

  • Liars and Outliers Update
  • Possibly the Most Incompetent TSA Story Yet
  • What Happens When the Court Demands You Decrypt a Document and You Forget the Key?
  • Authentication by "Cognitive Footprint"
  • The Failure of Two-Factor Authentication

from the February 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-02.mp3
Category:podcast -- posted at: 4:11am MST

In this issue:

  • The TSA Proves its Own Irrelevance
  • Abolishing the Department of Homeland Security
  • "Going Dark" vs. a "Golden Age of Surveillance"
  • "Chinese Hacking" of iBahn Internet Services
  • Liars and Outliers News

from the January 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-12-01.mp3
Category:podcast -- posted at: 2:09am MST

In this issue:

  • Status Report: Liars and Outliers
  • Malware on Smart Phones
  • The SCADA Attack that Wasn't
  • Carrier IQ Spyware
  • Biological Link Between Altruism and Fairness
  • Iranians Capture U.S. Drone
  • Recent Developments in Full Disclosure

from the December 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-12.mp3
Category:podcast -- posted at: 1:24am MST

In this issue:

  • Advanced Persistent Threat (APT)
  • Another ATM Theft Tactic
  • Remotely Opening Prison Doors
  • Fake Documents that Alarm if Opened

from the November 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-11.mp3
Category:podcast -- posted at: 12:11am MST

In this issue:

  • Three Emerging Cyber Threats
  • Status Report: Liars and Outliers
  • Official Malware from the German Police
  • Domain-in-the-Middle Attacks
  • Insider Attack Against Diebold Voting Machines
  • National Cybersecurity Awareness Month

from the October 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-10.mp3
Category:podcast -- posted at: 10:30am MST

In this issue:

  • Terrorism in the U.S. Since 9/11
  • The Efficacy of Post-9/11 Counterterrorism
  • Funniest Joke at the Edinburgh Fringe Festival
  • Unredacted U.S. Diplomatic WikiLeaks Cables Published
  • A Status Report: "Liars and Outliers"

from the September 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-09.mp3
Category:podcasts -- posted at: 10:02am MST

In this issue:

  • Developments in Facial Recognition
  • Is There a Hacking Epidemic?

from the August 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-08.mp3
Category:podcasts -- posted at: 8:23am MST

In this issue:

  • Man Flies with Someone Else's Ticket and No Legal ID
  • Court Ruling on "Reasonable" Electronic Banking Security
  • Protecting Private Information on Smart Phones
  • Yet Another "People Plug in Strange USB Sticks" Story

from the July 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-07.mp3
Category:podcast -- posted at: 8:07am MST

In this issue:

  • New Siemens SCADA Vulnerabilities Kept Secret
  • Yet Another Way to Avoid TSA's Full-Body Scanners
  • Keeping Sensitive Information Out of the Hands of Terrorists Through Self-Restraint
  • Man-in-the-Middle Attack Against the MCAT Exam
  • Open-Source Software Feels Insecure

from the June 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-06.mp3
Category:podcast -- posted at: 7:09am MST

In this issue:

  • Status Report: "The Dishonest Minority"
  • RFID Tags Protecting Hotel Towels
  • Hijacking the Coreflood Botnet
  • Drugging People and Then Robbing Them
  • Interviews with Me About the Sony Hack

from the May 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-05.mp3
Category:podcast -- posted at: 7:04am MST

In this issue:

  • Detecting Cheaters
  • Ebook Fraud
  • Unanticipated Security Risk of Keeping Your Money in a Home Safe
  • Changing Incentives Creates Security Risks
  • Euro Coin Recycling Scam
  • Security Fears of Wi-Fi in London Underground
  • Epsilon Hack
  • Schneier's Law
  • How did the CIA and FBI Know that Australian Government Computers Were Hacked?

from the April 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-04.mp3
Category:general -- posted at: 7:03am MST

In this issue:

  • Anonymous vs. HBGary
  • NIST Defines New Versions of SHA-512

from the March 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-03.mp3
Category:podcast -- posted at: 5:29am MST

In this issue:

  • Societal Security
  • Domodedovo Airport Bombing
  • Bioencryption
  • Scareware: How Crime Pays
  • UK Immigration Officer Puts Wife on the No-Fly List
  • Whitelisting vs. Blacklisting

from the February 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-02.mp3
Category:podcast -- posted at: 5:29am MST

In this issue:

  • Security in 2020
  • Recording the Police
  • Stealing SIM Cards from Traffic Lights
  • Book Review: Cyber War

from the January 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-11-01.mp3
Category:podcast -- posted at: 5:28am MST

In this issue:

  • Airline Security: A Waste of Money and Time
  • Full Body Scanners: What's Next?
  • Close the Washington Monument
  • WikiLeaks
  • Cyberwar and the Future of Cyber Conflict
  • NIST Announces SHA-3 Finalists (Skein is One of Them)
  • Software Monoculture
  • Term Paper Writing for Hire

from the December 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-10-12.mp3
Category:podcasts -- posted at: 12:00am MST

In this issue:

  • Crowdsourcing Surveillance
  • Internet Quarantines
  • Cargo Security
  • Changes in Airplane Security
  • Young Man in "Old Man" Mask Boards Plane in Hong Kong
  • Kahn, Diffie, Clark, and Me at Bletchley Park
  • Changing Passwords

from the November 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-10-11.mp3
Category:podcasts -- posted at: 5:00pm MST

In this issue:

  • Wiretapping the Internet
  • Me on Cyberwar
  • Putting Unique Codes on Objects to Detect Counterfeiting
  • Stuxnet

from the October 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-10-10.mp3
Category:podcasts -- posted at: 6:00pm MST

In this issue:

  • Consumerization and Corporate IT Security
  • More Skein News
  • Wanted: Skein Hardware Help

from the September 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-10-09.mp3
Category:podcasts -- posted at: 6:00pm MST

In this issue:

  • A Revised Taxonomy of Social Networking Data
  • WikiLeaks Insurance File
  • NSA and the National Cryptologic Museum
  • Book Review: How Risky Is It, Really?

from the August 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-10-08.mp3
Category:podcasts -- posted at: 6:00pm MST