Crypto-Gram Security Podcast
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter

Syndication

add to my PodNova

Obligatory Fine Print: The Crypto-Gram Newsletter is created by and Copyright (c) Bruce Schneier. The newsletter is hosted here in audio format with Bruce Schneier's permission. Dan Henage is responsible for creation of the audio version of the newsletter. The official site of the Crypto-Gram Newsletter is here. The Crypto-Gram Newsletter may not be reproduced, duplicated, copied, sold, resold, or otherwise exploited without the express written permission of Bruce Schneier.

Support the web hosting costs for this podcast:

Thank you to all those that have donated in the past years!

Archives:

2021
June
May
April
March
February
January

2020
December
November
October
September
August
July
June
May
April
March
February
January

2019
December
November
October
September
August
July
June
May
April
March
February
January

2018
November
October
September
August
July
June
May
April
February
January

2017
December
November
October
August
July
June
May
April
March
February
January

2016
December
November
October
September
August
July
June
May
April
March
February
January

2015
December
November
October
September
August
July
June
May
April
March
February
January

2014
December
November
October
September
August
July
June
May
April
March
February
January

2013
December
November
October
September
August
July
June
May
April
March
February
January

2012
December
November
October
September
August
July
June
May
April
March
February
January

2011
December
November
October
September
August
July
June
May
April
March
February
January

2010
December
November
October
September
August
July
June
May
April
March
February
January

2009
December
November
October
September
August
July
June
May
April
March
February
January

2008
December
November
October
September
August
July
June
May
April
March
February
January

2007
December
November
October
September
August
July
June
May
April
March
February
January

2006
December
November
October
September
August
July
June
May
April
March
February
January

2005
December
November
October
September
August

Thanks to Amplifico for the tunes!

In this issue:

  • NSA Spying on Online Gaming Worlds
  • NSA Tracks People Using Google Cookies
  • How Antivirus Companies Handle State-Sponsored Malware
  • Surveillance as a Business Model
  • Evading Airport Security
  • The TQP Patent

from the December 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-12.mp3
Category:podcast -- posted at: 1:05am MDT

In this issue:

  • NSA Harvesting Contact Lists
  • NSA Eavesdropping on Google and Yahoo Networks
  • Code Names for NSA Exploit Tools
  • Defending Against Crypto Backdoors
  • Why the Government Should Help Leakers
  • The Trajectories of Government and Corporate Surveillance
  • A Fraying of the Public/Private Surveillance Partnership
  • Book Review: "Cyber War Will Not Take Place"
  • Understanding the Threats in Cyberspace
  • SecureDrop
  • Dry Ice Bombs at LAX
  • The Battle for Power on the Internet

from the November 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-11.mp3
Category:podcast -- posted at: 12:08am MDT

In this issue:

  • How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
  • Why It's Important to Publish the NSA Programs
  • The NSA's New Risk Analysis
  • Reforming the NSA
  • The Limitations of Intelligence
  • Metadata Equals Surveillance
  • Senator Feinstein Admits the NSA Taps the Internet Backbone
  • NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
  • Air Gaps
  • Will Keccak = SHA-3?
  • Google Knows Every Wi-Fi Password in the World
  • Surreptitiously Tampering with Computer Chips

from the October 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-10.mp3
Category:podcast -- posted at: 11:19am MDT

In this issue:

  • Take Back the Internet
  • More on the NSA Commandeering the Internet
  • Detaining David Miranda
  • Government Secrecy and the Generation Gap
  • Conspiracy Theories and the NSA
  • The NSA's Cryptographic Capabilities
  • How to Remain Secure Against the NSA
  • Protecting Against Leakers
  • Our Newfound Fear of Risk
  • Human-Machine Trust Failures
  • Excess Automobile Deaths as a Result of 9/11
  • iPhone Fingerprint Authentication
  • Hacking Consumer Devices
  • Syrian Electronic Army Cyberattacks
  • The Cryptopocalypse
  • Measuring Entropy and its Applications to Encryption

from the September 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-09.mp3
Category:podcast -- posted at: 10:01am MDT

In this issue:

  • The Public/Private Surveillance Partnership
  • The NSA is Commandeering the Internet
  • Restoring Trust in Government and the Internet
  • Book Review: "Rise of the Warrior Cop"
  • Michael Hayden on the Effects of Snowden's Whistleblowing
  • Counterterrorism Mission Creep

from the August 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-08.mp3
Category:podcast -- posted at: 9:11am MDT

In this issue:

  • Blowback from the NSA Surveillance
  • Evidence that the NSA Is Storing Voice Content, Not Just Metadata
  • NSA Secrecy and Personal Privacy
  • Petition the NSA to Subject its Surveillance Program to Public Comment
  • New Details on Skype Eavesdropping
  • Pre-9/11 NSA Thinking
  • How the NSA Eavesdrops on Americans
  • NSA E-Mail Eavesdropping
  • US Offensive Cyberwar Policy
  • Finding Sociopaths on Facebook
  • My Fellowship at the Berkman Center
  • Protecting E-Mail from Eavesdropping
  • Is Cryptography Engineering or Science?
  • Sixth Movie-Plot Threat Contest Winner

from the July 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-07.mp3
Category:podcast -- posted at: 7:30am MDT

In this issue:

  • Government Secrets and the Need for Whistleblowers
  • Prosecuting Snowden
  • Trading Privacy for Convenience
  • Essays Related to NSA Spying Documents
  • The Politics of Security in a Democracy
  • More on Feudal Security
  • Surveillance and the Internet of Things
  • The Problems with CALEA-II
  • Sixth Annual Movie-Plot Threat Semifinalists
  • A Really Good Article on How Easy it Is to Crack Passwords
  • Bluetooth-Controlled Door Lock
  • Security and Human Behavior (SHB 2013)
  • The Cost of Terrorism in Pakistan

from the June 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-06.mp3
Category:podcast -- posted at: 7:27am MDT

In this issue:

  • Refuse to be Terrorized
  • Intelligence Analysis and the Connect-the-Dots Metaphor
  • Transparency and Accountability
  • The Boston Marathon Bomber Manhunt
  • The Public/Private Surveillance Partnership
  • Michael Chertoff on Google Glass

from the May 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-05.mp3
Category:podcast -- posted at: 6:11am MDT

In this issue:

  • Our Internet Surveillance State
  • Sixth Movie-Plot Threat Contest
  • IT for Oppression
  • When Technology Overtakes Security
  • Security Awareness Training
  • What I've Been Thinking About
  • Changes to My Blog

from the April 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-04.mp3
Category:podcast -- posted at: 5:13am MDT

In this issue:

  • Nationalism on the Internet
  • Automobile Data Surveillance and the Future of Black Boxes
  • The Court of Public Opinion
  • More on Chinese Cyberattacks
  • Technologies of Surveillance
  • Phishing Has Gotten *Very* Good
  • Hacking the Papal Election
  • Getting Security Incentives Right
  • All Those Companies that Can't Afford Dedicated Security

from the March 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-03.mp3
Category:podcast -- posted at: 4:14am MDT

In this issue:

  • Power and the Internet
  • Who Does Skype Let Spy?
  • Our New Regimes of Trust
  • TSA Removing Rapiscan Full-Body Scanners from U.S. Airports
  • Dangerous Security Theater: Scrambling Fighter Jets
  • Massive Police Shootout in Cleveland Despite Lack of Criminals
  • "New York Times" Hacked by China
  • Jared Diamond on Common Risks
  • Man-in-the-Middle Attacks Against Browser Encryption
  • "People, Process, and Technology"

from the February 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-02.mp3
Category:podcast -- posted at: 4:11am MDT

In this issue:

  • Last Month's Overreactions
  • Public Shaming as a Security Measure
  • Terms of Service as a Security Threat
  • Classifying a Shape
  • I Seem to Be a Verb Now
  • Experimental Results: "Liars and Outliers" Trust Offer

from the January 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-01.mp3
Category:podcast -- posted at: 2:07am MDT