Mon, 15 December 2014
In this issue:
- Regin
- FBI Agents Pose as Repairmen to Bypass Warrant Process
- NSA Hacking of Cell Phone Networks
- Comments on the Sony Hack
- Over 700 Million People Taking Steps to Avoid NSA Surveillance
- Corporations Misusing Our Data
from the December 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-12.mp3
Category: podcast
-- posted at: 1:12am MDT
|
|
Sat, 15 November 2014
In this issue:
- Crypto Wars II
- Hacking Team Documentation
- The Future of Incident Response
- How Did the Feds Identity Dread Pirate Roberts?
- Spritz: A New RC4-Like Stream Cipher
- NSA Classification ECI = Exceptionally Controlled Information
from the November 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-11.mp3
Category: podcast
-- posted at: 12:02am MDT
|
|
Wed, 15 October 2014
In this issue:
- Data and Goliath Is Finished
- iPhone Encryption and the Return of the Crypto Wars
- Fake Cell Phone Towers Across the US
- FOXACID Operations Manual
- NSA Has Undercover Operatives in Foreign Companies
- DEA Creates Fake Facebook Page in Woman's Name
from the October 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-10.mp3
Category: podcast
-- posted at: 10:31am MDT
|
|
Mon, 15 September 2014
In this issue:
- NSA/GCHQ/CSEC Infecting Innocent Computers Worldwide
- The Security of al Qaeda Encryption Software
- QUANTUM Technology Sold by Cyberweapons Arms Manufacturers
- The Concerted Effort to Remove Data Collection Restrictions
- Cell Phone Kill Switches Mandatory in California
- Security of Password Managers
from the September 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-09.mp3
Category: podcast
-- posted at: 9:30am MDT
|
|
Fri, 15 August 2014
In this issue:
- New Snowden Interview in Wired
- The US Intelligence Community has a Third Leaker
- Over a Billion Passwords Stolen?
- Irrational Fear of Risks Against Our Children
from the August 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-08.mp3
Category: podcast
-- posted at: 8:24am MDT
|
|
Tue, 15 July 2014
In this issue:
- GCHQ Catalog of Exploit Tools
- NSA Spied on Prominent Muslim Americans
- Web Activity Used in Court to Portray State of Mind
- NSA Targets the Privacy-Conscious for Surveillance
- Co3 Systems Is Hiring
- Could Keith Alexander's Advice Possibly Be Worth $600K a Month?
from the July 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-07.mp3
Category: podcast
-- posted at: 7:27am MDT
|
|
Mon, 16 June 2014
In this issue:
- Disclosing vs. Hoarding Vulnerabilities
- The NSA is Not Made of Magic
- GCHQ Intercept Sites in Oman
- Chinese Hacking of the US
- The Human Side of Heartbleed
- TrueCrypt
- Security and Human Behavior (SHB 2014)
- Seventh Movie-Plot Threat Contest Winner
from the June 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-06.mp3
Category: podcast
-- posted at: 7:09am MDT
|
|
Thu, 15 May 2014
In this issue:
- Internet Subversion
- New Al Qaeda Encryption Software
- Seventh Movie-Plot Threat Contest Semifinalists
- Espionage vs. Surveillance
from the May 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-05.mp3
Category: podcast
-- posted at: 6:08am MDT
|
|
Tue, 15 April 2014
In this issue:
- Heartbleed
- Seventh Movie-Plot Threat Contest
- MYSTIC: The NSA's Telephone Call Collection Program
- The Continuing Public/Private Surveillance Partnership
- New Book on Data and Power
- An Open Letter to IBM's Open Letter
- Ephemeral Apps
- Details of the Target Credit Card Breach
from the April 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-04.mp3
Category: podcast
-- posted at: 5:09am MDT
|
|
Sat, 15 March 2014
In this issue:
- Breaking Up the NSA
- Computer Network Exploitation vs. Computer Network Attack
- Metadata = Surveillance
- Surveillance by Algorithm
- Who Should Store NSA Surveillance Data
- The Security of the Fortuna PRNG
- RCS Spyware and Citizen Lab
- Choosing Secure Passwords
from the March 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-03.mp3
Category: podcast
-- posted at: 4:01am MDT
|
|
Sat, 15 February 2014
In this issue:
- Finding People's Locations Based on Their Activities in Cyberspace
- The Insecurity of Secret IT Systems
- Last Month I Briefed Congress on the NSA
- US Privacy and Civil Liberties Oversight Board (PCLOB) Condemns NSA Mass Surveillance
- NSA/GCHQ Accused of Hacking Belgian Cryptographer
- CSEC Surveillance Analysis of IP and User Data
from the February 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-02.mp3
Category: podcast
-- posted at: 3:05am MDT
|
|
Wed, 15 January 2014
In this issue:
- How the NSA Threatens National Security
- NSA Exploit of the Day
- Tor User Identified by FBI
- Security Risks of Embedded Systems
- Schneier News: I've Joined Co3[“Co-Three”] Systems
- Twitter Users: Please Make Sure You're Following the Right Feed
from the January 15, 2014 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-14-01.mp3
Category: podcast
-- posted at: 2:12am MDT
|
|