Home  /  Podcast Directory  /  Technology  /  Crypto-Gram Security Podcast


Last update: 2013-05-15

Crypto-Gram 15 May 2013

2013-05-15
Length: 24s

In this issue:

Refuse to be Terrorized Intelligence Analysis and the Connect-the-Dots Metaphor Transparency and Accountability The Boston Marathon Bomber Manhunt The Public/Private Surveillance Partnership Michael Chertoff on Google Glass

from the May 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 May 2013


Crypto-Gram 15 Apr 2013

2013-04-15
Length: 33s

In this issue:

Our Internet Surveillance State Sixth Movie-Plot Threat Contest IT for Oppression When Technology Overtakes Security Security Awareness Training What I've Been Thinking About Changes to My Blog

from the April 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Apr 2013


Crypto-Gram 15 Mar 2013

2013-03-15
Length: 47s

In this issue:

Nationalism on the Internet Automobile Data Surveillance and the Future of Black Boxes The Court of Public Opinion More on Chinese Cyberattacks Technologies of Surveillance Phishing Has Gotten *Very* Good Hacking the Papal Election Getting Security Incentives Right All Those Companies that Can't Afford Dedicated Security

from the March 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Mar 2013


Crypto-Gram 15 Feb 2013

2013-02-15
Length: 30s

In this issue:

Power and the Internet Who Does Skype Let Spy? Our New Regimes of Trust TSA Removing Rapiscan Full-Body Scanners from U.S. Airports Dangerous Security Theater: Scrambling Fighter Jets Massive Police Shootout in Cleveland Despite Lack of Criminals "New York Times" Hacked by China Jared Diamond on Common Risks Man-in-the-Middle Attacks Against Browser Encryption "People, Process, and Technology"

from the February 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Feb 2013


Crypto-Gram 15 Jan 2013

2013-01-15
Length: 13s

In this issue:

Last Month's Overreactions Public Shaming as a Security Measure Terms of Service as a Security Threat Classifying a Shape I Seem to Be a Verb Now Experimental Results: "Liars and Outliers" Trust Offer

from the January 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jan 2013


Crypto-Gram 15 Dec 2012

2012-12-15
Length: 30s

In this issue:

Feudal Security E-Mail Security in the Wake of Petraeus Squids on the "Economist" Cover IT for Oppression Dictators Shutting Down the Internet Book Review: "Against Security"

from the December 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Dec 2012


Crypto-Gram 15 Nov 2012

2012-11-15
Length: 11s

In this issue:

Stoking Cyber Fears Hacking TSA PreCheck Encryption in Cloud Computing The Risks of Trusting Experts

from the November 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Nov 2012


Crypto-Gram 15 Oct 2012

2012-10-15
Length: 11s

In this issue:

Keccak Is SHA-3 What I Wrote Just Before the SHA-3 Announcement Recent Developments in Password Cracking Master Keys When Will We See Collisions for SHA-1?

from the October 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Oct 2012


Crypto-Gram 15 Sep 2012

2012-09-15
Length: 15s

In this issue:

The Importance of Security Engineering Security at the 9/11 WTC Memorial Poll: Americans Like the TSA Five "Neglects" in Risk Management Is iPhone Security Really this Good?

from the September 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Sep 2012


Crypto-Gram 15 Aug 2012

2012-08-15
Length: 16s

In this issue:

Overreaction and Overly Specific Reactions to Rare Risks Cryptocat Yet Another Risk of Storing Everything in the Cloud Sexual Harassment at DefCon (and Other Hacker Cons) Police Sting Operation Yields No Mobile Phone Thefts Remote Scanning Technology

from the August 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Aug 2012


Crypto-Gram 15 Jul 2012

2012-07-15
Length: 23s

In this issue:

So You Want to Be a Security Expert Rand Paul Takes on the TSA On Securing Potentially Dangerous Virology Research The Failure of Anti-Virus Companies to Catch Military Malware E-Mail Accounts More Valuable than Bank Accounts "Top Secret America' on the Post-9/11 Cycle of Fear and Funding

from the July 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jul 2012


Crypto-Gram 15 Jun 2012

2012-06-15
Length: 13s

In this issue:

The Vulnerabilities Market and the Future of Security Cyberwar Treaties Flame My Last Post About Ethnic Profiling at Airports Kip Hawley and Me Security and Human Behavior (SHB 2012)

from the June 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jun 2012


Crypto-Gram 15 May 2012

2012-05-15
Length: 31s

In this issue:

The Trouble with Airport Profiling Hawley Channels His Inner Schneier TSA Behavioral Detection Statistics Stolen Phone Database "Liars & Outliers" Update Overreacting to Potential Bombs A Foiled Terrorist Plot Fear and the Attention Economy Amazing Round of "Split or Steal"

from the May 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 May 2012


Crypto-Gram 15 Apr 2012

2012-04-15
Length: 16s

In this issue:

Harms of Post-9/11 Airline Security Congressional Testimony on the TSA Bomb Threats As a Denial-of-Service Attack Can the NSA Break AES? Rare Spanish Enigma Machine Buying Exploits on the Grey Market Hacking Critical Infrastructure

from the April 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Apr 2012


Crypto-Gram 15 Mar 2012

2012-03-15
Length: 31s

In this issue:

"Liars and Outliers": The Big Idea "Liars and Outliers": Interview on The Browser "Liars and Outliers" Update Lousy Random Numbers Cause Insecure Public Keys Video Shows TSA Full-Body Scanner Failure Themes from the RSA Conference How Changing Technology Affects Security

from the March 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Mar 2012


Crypto-Gram 15 Feb 2012

2012-02-15
Length: 5s

In this issue:

Liars and Outliers Update Possibly the Most Incompetent TSA Story Yet What Happens When the Court Demands You Decrypt a Document and You Forget the Key? Authentication by "Cognitive Footprint" The Failure of Two-Factor Authentication

from the February 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Feb 2012


Crypto-Gram 15 Jan 2012

2012-01-15
Length: 13s

In this issue:

The TSA Proves its Own Irrelevance Abolishing the Department of Homeland Security "Going Dark" vs. a "Golden Age of Surveillance" "Chinese Hacking" of iBahn Internet Services Liars and Outliers News

from the January 15, 2012 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jan 2012


Crypto-Gram 15 Dec 2011

2011-12-15
Length: 13s

In this issue:

Status Report: Liars and Outliers Malware on Smart Phones The SCADA Attack that Wasn't Carrier IQ Spyware Biological Link Between Altruism and Fairness Iranians Capture U.S. Drone Recent Developments in Full Disclosure

from the December 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Dec 2011


Crypto-Gram 15 Nov 2011

2011-11-14
Length: 5s

In this issue:

Advanced Persistent Threat (APT) Another ATM Theft Tactic Remotely Opening Prison Doors Fake Documents that Alarm if Opened

from the November 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Nov 2011


Crypto-Gram 15 Oct 2011

2011-10-15
Length: 8s

In this issue:

Three Emerging Cyber Threats Status Report: Liars and Outliers Official Malware from the German Police Domain-in-the-Middle Attacks Insider Attack Against Diebold Voting Machines National Cybersecurity Awareness Month

from the October 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Oct 2011


Crypto-Gram 15 Sep 2011

2011-09-15
Length: 8s

In this issue:

Terrorism in the U.S. Since 9/11 The Efficacy of Post-9/11 Counterterrorism Funniest Joke at the Edinburgh Fringe Festival Unredacted U.S. Diplomatic WikiLeaks Cables Published A Status Report: "Liars and Outliers"

from the September 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Sep 2011


Crypto-Gram 15 Aug 2011

2011-08-15
Length: 7s

In this issue:

Developments in Facial Recognition Is There a Hacking Epidemic?

from the August 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Aug 2011


Crypto-Gram 15 Jul 2011

2011-07-15
Length: 8s

In this issue:

Man Flies with Someone Else's Ticket and No Legal ID Court Ruling on "Reasonable" Electronic Banking Security Protecting Private Information on Smart Phones Yet Another "People Plug in Strange USB Sticks" Story

from the July 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jul 2011


Crypto-Gram 15 Jun 2011

2011-06-15
Length: 10s

In this issue:

New Siemens SCADA Vulnerabilities Kept Secret Yet Another Way to Avoid TSA's Full-Body Scanners Keeping Sensitive Information Out of the Hands of Terrorists Through Self-Restraint Man-in-the-Middle Attack Against the MCAT Exam Open-Source Software Feels Insecure

from the June 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jun 2011


Crypto-Gram 15 May 2011

2011-05-15
Length: 10s

In this issue:

Status Report: "The Dishonest Minority" RFID Tags Protecting Hotel Towels Hijacking the Coreflood Botnet Drugging People and Then Robbing Them Interviews with Me About the Sony Hack

from the May 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 May 2011


Crypto-Gram 15 Apr 2011

2011-04-15
Length: 18s

In this issue:

Detecting Cheaters Ebook Fraud Unanticipated Security Risk of Keeping Your Money in a Home Safe Changing Incentives Creates Security Risks Euro Coin Recycling Scam Security Fears of Wi-Fi in London Underground Epsilon Hack Schneier's Law How did the CIA and FBI Know that Australian Government Computers Were Hacked?

from the April 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Apr 2011


Crypto-Gram 15 Mar 2011

2011-03-15
Length: 2s

In this issue:

Anonymous vs. HBGary NIST Defines New Versions of SHA-512

from the March 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Mar 2011


Crypto-Gram 15 Feb 2011

2011-02-15
Length: 16s

In this issue:

Societal Security Domodedovo Airport Bombing Bioencryption Scareware: How Crime Pays UK Immigration Officer Puts Wife on the No-Fly List Whitelisting vs. Blacklisting

from the February 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Feb 2011


Crypto-Gram 15 Jan 2011

2011-01-15
Length: 21s

In this issue:

Security in 2020 Recording the Police Stealing SIM Cards from Traffic Lights Book Review: Cyber War

from the January 15, 2011 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jan 2011


Crypto-Gram 15 Dec 2010

2010-12-14
Length: 29s

In this issue:

Airline Security: A Waste of Money and Time Full Body Scanners: What's Next? Close the Washington Monument WikiLeaks Cyberwar and the Future of Cyber Conflict NIST Announces SHA-3 Finalists (Skein is One of Them) Software Monoculture Term Paper Writing for Hire

from the December 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Dec 2010


Crypto-Gram 15 Nov 2010

2010-11-14
Length: 29s

In this issue:

Crowdsourcing Surveillance Internet Quarantines Cargo Security Changes in Airplane Security Young Man in "Old Man" Mask Boards Plane in Hong Kong Kahn, Diffie, Clark, and Me at Bletchley Park Changing Passwords

from the November 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Nov 2010


Crypto-Gram 15 Oct 2010

2010-10-14
Length: 18s

In this issue:

Wiretapping the Internet Me on Cyberwar Putting Unique Codes on Objects to Detect Counterfeiting Stuxnet

from the October 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Oct 2010


Crypto-Gram 15 Sep 2010

2010-09-14
Length: 8s

In this issue:

Consumerization and Corporate IT Security More Skein News Wanted: Skein Hardware Help

from the September 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Sep 2010


Crypto-Gram 15 Aug 2010

2010-08-14
Length: 8s

In this issue:

A Revised Taxonomy of Social Networking Data WikiLeaks Insurance File NSA and the National Cryptologic Museum Book Review: How Risky Is It, Really?

from the August 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Aug 2010


Crypto-Gram 15 Jul 2010

2010-07-14
Length: 18s

In this issue:

The Threat of Cyberwar Has Been Grossly Exaggerated Internet Kill Switch Third SHB Workshop Data at Rest vs. Data in Motion

from the July 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jul 2010


Crypto-Gram 15 Jun 2010

2010-06-14
Length: 11s

In this issue:

Hiring Hackers Scenes from an Airport Fifth Annual Movie-Plot Threat Contest Winner Outsourcing to an Indian Jail Terrorists Placing Fake Bombs in Public Places Reading Me

from the June 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jun 2010


Crypto-Gram 15 May 2010

2010-05-15
Length: 22s

In this issue:

Worst-Case Thinking Why Aren't There More Terrorist Attacks? 9/11 Made us Safer? Fifth Annual Movie-Plot Threat Contest Semi-Finalists Young People, Privacy, and the Internet The Doghouse: Lock My PC "If You See Something, Say Something" Preventing Terrorist Attacks in Crowded Areas Punishing Security Breaches

from the May 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 May 2010


Crypto-Gram 15 Apr 2010

2010-04-14
Length: 16s

In this issue:

Privacy and Control New York and the Moscow Subway Bombing Fifth Annual Movie-Plot Threat Contest New Book: Cryptography Engineering Should the Government Stop Outsourcing Code Development?

from the April 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Apr 2010


Crypto-Gram 15 Mar 2010

2010-03-14
Length: 7s

In this issue:

Al-Mabhouh Assassination Small Planes and Lone Terrorist Nutcases The Doghouse: Demiurge Consulting TSA Logo Contest Winner

from the March 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Mar 2010


Crypto-Gram 15 Feb 2010

2010-02-14
Length: 14s

In this issue:

Fixing Intelligence Failures Anonymity and the Internet Security and Function Creep The Chinese Attack Against Google New Attack on Threefish

from the February 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Feb 2010


Crypto-Gram 15 Jan 2010

2010-01-14
Length: 19s

In this issue:

Post-Underwear-Bomber Airport Security TSA Logo Contest Another Contest: Fixing Airport Security Fixing Intelligence Intercepting Predator Video Breaching the Secure Area in Airports

from the January 15, 2010 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jan 2010


Crypto-Gram 15 Dec 2009

2009-12-04
Length: 12s

In this issue: Terrorists Targeting High-Profile Events Eric Schmidt on Privacy A Taxonomy of Social Networking Data The Psychology of Being Scammed Reacting to Security Vulnerabilities from the December 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Dec 2009


Crypto-Gram 15 Nov 2009

2009-11-14
Length: 25s

In this issue: Fear and Overreaction Zero-Tolerance Policies Security in a Reputation Economy The Commercial Speech Arms Race The Doghouse: ADE 651 "Evil Maid" Attacks on Encrypted Hard Drives Is Antivirus Dead? from the November 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Nov 2009


Crypto-Gram 15 Oct 2009

2009-10-14
Length: 11s

In this issue: Ass Bomber Unauthentication The Futility of Defending the Targets Texas Instruments Signing Keys Broken The Doghouse UK Defense Security Manual Leaked from the October 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Oct 2009


Crypto-Gram 15 Sep 2009

2009-09-14
Length: 15s

In this issue: Eighth Anniversary of 9/11 Skein News Real-World Access Control File Deletion On London's Surveillance Cameras Robert Sawyer's Alibis Stealing 130 Million Credit Card Numbers "The Cult of Schneier" from the September 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Sep 2009


Crypto-Gram 15 Aug 2009

2009-08-14
Length: 30s

In this issue: Risk Intuition Privacy Salience and Social Networking Sites Building in Surveillance Laptop Security while Crossing Borders Self-Enforcing Protocols Another New AES Attack Lockpicking and the Internet from the August 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Aug 2009


Crypto-Gram 15 Jul 2009

2009-07-14
Length: 43s

In this issue: Imagining Threats Security, Group Size, and the Human Brain North Korean Cyberattacks Why People Don't Understand Risks Fraud on eBay Authenticating Paperwork The Pros and Cons of Password Masking The "Hidden Cost" of Privacy Fixing Airport Security Homomorphic Encryption Breakthrough New Attack on AES MD6 Withdrawn from SHA-3 Competition Ever Better Cryptanalytic Results Against SHA-1 from the July 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jul 2009


Crypto-Gram 15 Jun 2009

2009-06-14
Length: 14s

In this issue: Obama's Cybersecurity Speech "Lost" Puzzle in Wired Magazine Last Month's Terrorism Arrests Me on Full-Body Scanners in Airports The Doghouse: Net1 Cloud Computing The Second Interdisciplinary Workshop on Security and Human Behaviour from the June 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jun 2009


Crypto-Gram 15 May 2009

2009-05-14
Length: 23s

In this issue: Fourth Annual Movie-Plot Threat Contest Winner Book Review: The Science of Fear An Expectation of Online Privacy Malicious Contamination of the Food Supply Unfair and Deceptive Data Trade Practices Mathematical Illiteracy Conficker from the May 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 May 2009


Crypto-Gram 15 Apr 2009

2009-04-14
Length: 22s

In this issue: Fourth Annual Movie-Plot Threat Contest Who Should be in Charge of U.S. Cybersecurity? Privacy and the Fourth Amendment The Definition of "Weapon of Mass Destruction" Stealing Commodities from the April 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Apr 2009


Crypto-Gram 15 Mar 2009

2009-03-14
Length: 35s

In this issue: Perverse Security Incentives Privacy in the Age of Persistence Insiders The Doghouse: Singularics Three Security Anecdotes from the Insect World The Kindness of Strangers New eBay Fraud IT Security: Blaming the Victim Balancing Security and Usability in Authentication from the March 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Mar 2009


Crypto-Gram 15 Feb 2009

2009-02-14
Length: 14s

In this issue: Helping the Terrorists Monster.com Data Breach The Exclusionary Rule and Security BitArmor's No-Breach Guarantee Breach Notification Laws from the February 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Feb 2009


Crypto-Gram 15 Jan 2009

2009-01-14
Length: 12s

In this issue: Impersonation Forging SSL Certificates Biometrics from the January 15, 2009 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jan 2009


Crypto-Gram 15 Dec 2008

2008-12-14
Length: 25s

In this issue: Lessons from Mumbai Communications During Terrorist Attacks are *Not* Bad Mumbai Terrorists Used Google Earth, Boats, Food Audit The Future of Ephemeral Conversation "Here Comes Everybody" Review FBI Stoking Fear Schneier for TSA Administrator? Skein and SHA-3 News from the December 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Dec 2008


Crypto-Gram 15 Nov 2008

2008-11-14
Length: 20s

In this issue: The Skein Hash Function (pronounce: SKAIN) Me and the TSA Quantum Cryptography The Economics of Spam The Psychology of Con Men Movie-Plot Threat: Terrorists Using Twitter Giving Out Replacement Hotel Room Keys P = NP? from the November 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Nov 2008


Crypto-Gram 15 Oct 2008

2008-10-14
Length: 18s

In this issue: The Seven Habits of Highly Ineffective Terrorists The Two Classes of Airport Contraband The More Things Change, the More They Stay the Same NSA's Warrantless Eavesdropping Targets Innocent Americans Taleb on the Limitations of Risk Management "New Attack" Against Encrypted Images Nonviolent Activists Are Now Terrorists Does Risk Management Make Sense? from the October 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Oct 2008


Crypto-Gram 15 Sep 2008

2008-09-14
Length: 30s

In this issue: New Book: Schneier on Security Identity Farming BT, Phorm, and Me Security ROI Diebold Finally Admits its Voting Machines Drop Votes Full Disclosure and the Boston Fare Card Hack Contest: Cory Doctorow's Cipher Wheel Rings Photo ID Checks at Airport Mental Illness and Murder Movie-Plot Threats from the September 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Sep 2008


Crypto-Gram 15 Aug 2008

2008-08-14
Length: 27s

In this issue: Memo to the Next President TSA Proud of Confiscating Non-Dangerous Item Homeland Security Cost-Benefit Analysis Hacking Mifare Transport Cards Information Security and Liabilities Software Liabilities and Free Software Congratulations to Our Millionth Terrorist! TrueCrypt's Deniable File System The DNS Vulnerability from the August 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Aug 2008


Crypto-Gram 15 Jul 2008

2008-07-14
Length: 27s

In this issue: CCTV Cameras Kill Switches and Remote Control LifeLock and Identity Theft The First Interdisciplinary Workshop on Security and Human Behavior The Truth About Chinese Hackers Man-in-the-Middle Attacks from the July 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jul 2008


Crypto-Gram 15 Jun 2008

2008-06-14
Length: 26s

In this issue: The War on Photography Crossing Borders with Laptops and PDAs E-Mail After the Rapture Fax Signatures The War on T-Shirts More on Airplane Seat Cameras How to Sell Security from the June 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jun 2008


Crypto-Gram 15 May 2008

2008-05-14
Length: 36s

In this issue: Happy Ten-Year Anniversary Dual-Use Technologies and the Equities Issue Crossing Borders with Laptops and PDAs Third Annual Movie-Plot Threat Contest Winner The RSA Conference Risk Preferences in Chimpanzees and Bonobos The Doghouse: Passwordsafe.com The Ethics of Vulnerability Research Our Data, Ourselves from the May 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 May 2008


Crypto-Gram 15 Apr 2008

2008-04-14
Length: 23s

In this issue: Third Annual Movie-Plot Threat Contest The Security Mindset The Feeling and Reality of Security Web Entrapment Speeding Tickets and Agenda Seat Belts and Compensating Behavior Internet Censorship from the April 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Apr 2008


Crypto-Gram 15 Mar 2008

2008-03-14
Length: 16s

In this issue: Privacy and Power Israel Implementing IFF System for Commercial Aircraft Third Parties Controlling Information Amtrak to Start Passenger Screening The Doghouse: Drecom Security Products: Suites vs. Best-of-Breed from the March 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Mar 2008


Crypto-Gram 15 Feb 2008

2008-02-14
Length: 25s

In this issue: Security vs. Privacy MySpace and U.S. Attorneys General Agree to Fight Sexual Predators Anti-Missile Technology on Commercial Aircraft Lock-In Hacking Power Networks Mujahideen Secrets 2 TSA News DHS Warns of Female Suicide Bombers Giving Driver's Licenses to Illegal Immigrants from the February 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Feb 2008


Crypto-Gram 15 Jan 2008

2008-01-14
Length: 17s

In this issue: Anonymity and the Netflix Dataset "Where Should Airport Security Begin?" Airport Security Study My Open Wireless Network from the January 15, 2008 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jan 2008


Crypto-Gram 15 Dec 2007

2007-12-14
Length: 21s

In this issue: How to Secure Your Computer, Disks, and Portable Drives Defeating the Shoe Scanning Machine at Heathrow Airport Gitmo Manual Leaked Security in Ten Years from the December 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Dec 2007


Crypto-Gram 15 Nov 2007

2007-11-14
Length: 27s

In this issue: The War on the Unexpected Security Risks of Online Political Contributing Chemical Plant Security and Externalities Switzerland Protects its Vote with Quantum Cryptography Security by Letterhead Cyberwar: Myth or Reality? Understanding the Black Market in Internet Crime The Strange Story of Dual_EC_DRBG from the November 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Nov 2007


Crypto-Gram 15 Oct 2007

2007-10-14
Length: 19s

In this issue: The Storm Worm Fraudulent Amber Alerts UK Police Can Now Demand Encryption Keys Anonymity and the Tor Network Remote-Controlled Toys and the TSA Staged Attack Causes Generator to Self-Destruct from the October 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Oct 2007


Crypto-Gram 15 Sep 2007

2007-09-14
Length: 23s

In this issue: First Responders Basketball Referees and Single Points of Failure Interview with National Intelligence Director Mike McConnell Home Users: A Public Health Problem? Vague Threat Prompts Overreaction Stupidest Terrorist Overreaction? Wholesale Automobile Surveillance Comes to New York City U.S. Government Threatens Retaliation Against States who Reject REAL ID Computer Forensics Case Study Getting Free Food at a Fast-Food Drive-In from the September 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Sep 2007


Crypto-Gram 15 Aug 2007

2007-08-14
Length: 1s

In this issue: Assurance More Voting News New Harry Potter Book Leaked on BitTorrent Avian Flu and Disaster Planning TSA Warns of Terrorist Dry Runs Security-Theater Cameras Coming to New York Airport Security Breach Details on the U.K. Liquid Terrorist Plot House of Lords on Computer Security Conversation with Kip Hawley from the August 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Aug 2007


Crypto-Gram 15 Jul 2007

2007-07-14
Length: 26s

In this issue: Correspondent Inference Theory and Terrorism TSA and the Sippy Cup Incident Ubiquity of Communication 4th Amendment Rights Extended to E-Mail Credit Card Gas Limits Designing Voting Machines to Minimize Coercion Risks of Data Reuse from the July 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jul 2007


Crypto-Gram 15 Jun 2007

2007-06-14
Length: 41s

In this issue: Rare Risk and Overreactions Tactics, Targets, and Objectives Portrait of the Modern Terrorist as an Idiot Teaching Viruses Bush's Watch Stolen? Second Movie-Plot Threat Contest Winner Perpetual Doghouse: Meganet Non-Security Considerations in Security Decisions from the June 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jun 2007


Crypto-Gram 15 May 2007

2007-05-14
Length: 41s

In this issue: A Security Market for Lemons Is Big Brother a Big Deal? Citizen-Counterterrorist Training Video Recognizing "Hinky" vs. Citizen Informants More on REAL ID Least Risk Bomb Location Social Engineering Notes 1933 Anti-Spam Doorbell Does Secrecy Help Protect Personal Information? Is Penetration Testing Worth It? Do We Really Need a Security Industry? from the May 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 May 2007


Crypto-Gram 15 Apr 2007

2007-04-14
Length: 13s

In this issue: Announcing: Second Annual Movie-Plot Threat Contest The U.S. Terrorist Database JavaScript Hijacking Bank Botches Two-Factor Authentication U.S. Government Contractor Injects Malicious Software into Critical Military Computers The Doghouse: Brutuslib Cyber-Attack from the April 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Apr 2007


Crypto-Gram 15 Mar 2007

2007-03-14
Length: 24s

In this issue: CYA Security Copycats U.S Terrorism Arrests/Convictions Significantly Overstated Movie Plot Threat in Vancouver The Doghouse: Onboard Threat Detection System Private Police Forces The Doghouse: Sniffex Drive-By Pharming Cloning RFID Chips Made by HID from the March 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Mar 2007


Crypto-Gram 28 Feb 2007

2007-02-27
Length: 1s

In this SPECIAL issue: About "The Psychology of Security" THE PSYCHOLOGY OF SECURITY from the February 28, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 28 Feb 2007


Crypto-Gram 15 Feb 2007

2007-02-14
Length: 37s

In this issue: In Praise of Security Theater Real-ID: Costs and Benefits Debating Full Disclosure Sending Photos to 911 Operators “Clear" Registered Traveler Program DRM in Windows Vista Psychology of Security A New Secure Hash Standard from the February 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Feb 2007


Crypto-Gram 15 Jan 2007

2007-01-14
Length: 28s

In this issue: Automated Targeting System Surveillance Cameras Catch a Cold-Blooded Killer Auditory Eavesdropping Tracking Automobiles Through their Tires Licensing Boaters Wal-Mart Stays Open During Bomb Scare NSA Helps Microsoft with Windows Vista Microsoft Anti-Phishing and Small Businesses Not Paying Attention at the Virginia DMV More on the Unabomber's Code Radio Transmitters in Canadian Coins Choosing Secure Passwords from the January 15, 2007 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jan 2007


Crypto-Gram 15 Dec 2006

2006-12-14
Length: 29s

In this issue: Revoting Real-World Passwords Tracking People by their Sneakers Notary Fraud Separating Data Ownership and Device Ownership Fighting Fraudulent Transactions Cybercrime Hype Alert from the December 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Dec 2006


Crypto-Gram 15 Nov 2006

2006-11-14
Length: 1s

In this issue: Voting Technology and Security More on Electronic Voting Machines The Inherent Inaccuracy of Voting The Need for Professional Election Officials Perceived Risk vs. Actual Risk Total Information Awareness Is Back Forge Your Own Boarding Pass The Death of Ephemeral Conversation Airline Passenger Profiling for Profit Architecture and Security The Doghouse: Skylark Utilities Heathrow Tests Biometric ID Please Stop My Car Air Cargo Security Cheyenne Mountain Retired from the November 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Nov 2006


Crypto-Gram 15 Oct 2006

2006-10-14
Length: 36s

In this issue: Screening People with Clearances Did Hezbollah Crack Israeli Secure Radio? Renew Your Passport Now! Faulty Data and the Arar Case Expensive Cameras in Checked Luggage Facebook and Data Control Indexes to NSA Publications Declassified and Online Pupillometer On-Card Displays Screaming Cell Phones FairUse4WM News Voting Software and Secrecy Torture Bill as C Code The Doghouse: SecureRF Bureau of Industry and Security Hacked University Networks and Data Security from the October 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Oct 2006


Crypto-Gram 15 Sep 2006

2006-09-14
Length: 34s

In this issue: What the Terrorists Want Details on the British Terrorist Arrest More Than 10 Ways to Avoid the Next 9/11 Educating Users Human/Bear Security Trade-Off Land Title Fraud Is There Strategic Software? Media Sanitization and Encryption What is a Hacker? TrackMeNot USBDumper Microsoft and FairUse4WM from the September 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Sep 2006


Crypto-Gram 15 Aug 2006

2006-08-14
Length: 20s

In this issue: Last Week's Terrorism Arrests Remote-Control Airplane Software Doping in Professional Sports iPod Thefts Security Certifications A Month of Browser Bugs HSBC Insecurity Hype Updating the Traditional Security Model Bot Networks from the August 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Aug 2006


Crypto-Gram 15 Jul 2006

2006-07-14
Length: 21s

In this issue: Economics and Information Security Google and Click Fraud A Minor Security Lesson from Mumbai Terrorist Bombings Getting a Personal Unlock Code for Your O2 Cell Phone The League of Women Voters Supports Voter-Verifiable Paper Trails Brennan Center and Electronic Voting from the July 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jul 2006


Crypto-Gram 15 Jun 2006

2006-06-14
Length: 21s

In this issue: The Value of Privacy Movie-Plot Threat Contest Winner Diebold Doesn't Understand the Security Threat Hacking Computers Over USB The Doghouse: KRYPTO 2.0 Aligning Interest with Capability from the June 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

x

Share: Crypto-Gram 15 Jun 2006


Crypto-Gram 15 May 2006

2006-05-14
Length: 29s

In this issue: Movie Plot Threat Contest: Status Report Who Owns Your Computer? Identity-Theft Disclosure Laws When "Off" Doesn't Mean Off RFID Cards and Man-in-the-Middle Attacks Software Failure Causes Airport Evacuation Microsoft's BitLocker The Security Risk of Special Cases from the May 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage…

x

Share: Crypto-Gram 15 May 2006


Crypto-Gram 15 Apr 2006

2006-04-14
Length: 24s

In this issue: Movie-Plot Threat Contest Airport Passenger Screening 80 Cameras for 2,400 People VOIP Encryption Security through Begging DHS Privacy and Integrity Report KittenAuth Terrorism Risks of Google Earth New Kind of Door Lock Evading Copyright Through XOR iJacking Security Screening for New York Helicopters from the April 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage…

x

Share: Crypto-Gram 15 Apr 2006


Crypto-Gram 15 Mar 2006

2006-03-14
Length: 28s

In this issue: The Future of Privacy Face Recognition Comes to Bars Security, Economics, and Lost Conference Badges Data Mining for Terrorists Airport Security Failure Police Department Privilege Escalation Database Error Causes Unbalanced Budget Credit Card Companies and Agenda Proof that Employees Don't Care About Security U.S. Port Security and Proxies from the March 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage…

x

Share: Crypto-Gram 15 Mar 2006


Crypto-Gram 15 Feb 2006

2006-02-14
Length: 26s

In this issue: Risks of Losing Portable Devices Multi-Use ID Cards Ben Franklin on the Feeling of Security Valentine's Day Security U.S. Customs Opening International Mail The Failure of US-VISIT Identity Theft in the UK Passlogix Misquotes Me in Their PR Material Privatizing Registered Traveler Security Problems with Controlled Access Systems Countering "Trusting Trust" Security in the Cloud from the February 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage…

x

Share: Crypto-Gram 15 Feb 2006


Crypto-Gram 15 Jan 2006

2006-01-14
Length: 31s

from the January 15, 2006 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

In this issue: Anonymity and Accountability Cell Phone Companies and Security Dutch Botnet Internet Explorer Sucks Security Notes from All Over: Electronic Shackles and Telephone Communications Insider Threat Statistics Are Computer-Security Export Controls Back? Vehicle Tracking in the UK NSA and Bush's Illegal Eavesdropping The Security Threat of Unchecked Presidential Power Project Shamrock …

x

Share: Crypto-Gram 15 Jan 2006


Crypto-Gram 15 Dec 2005

2005-12-14
Length: 48s

from the December 15, 2005 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

In this issue: Airplane Security Australian Minister's Sensible Comments on Airline Security Spark Outcry Sky Marshal Shooting in Miami New Airplane Security Regulations Sony's DRM Rootkit: The Real Story CME in Practice OpenDocument Format and the Commonwealth of Massachusetts Surveillance and Oversight Truckers Watching the Highways Snake-Oil Research in the Magazine "Nature" Twofish Cryptanalysis Rumors Totally Secure Classical Communications? …

x

Share: Crypto-Gram 15 Dec 2005


Crypto-Gram 15 Nov 2005

2005-11-14
Length: 24s

from the November 15, 2005 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

In this issue: The Security of RFID Passports Liabilities and Software Vulnerabilities Preventing Identity Theft: The Living and the Dead Banks and Two-Factor Authentication Sony Secretly Installs Rootkit on Computers DMCA Review Taser Cam A "Typical" Terrorist The Zotob Worm …

x

Share: Crypto-Gram 15 Nov 2005


Crypto-Gram 15 Oct 2005

2005-10-14
Length: 28s

from the October 15, 2005 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

In this issue: Phishing Major Security at a Minor Ferry DUI Cases Thrown Out Due to Closed-Source Breathalyzer Automatic License Plate Scanners Terrorism Laws Used to Stifle Political Speech Jamming Aircraft Navigation Near Nuclear Power Plants Secure Flight Working Group Report The Doghouse: CryptIt Hurricane Security and Airline Security Collide Tax Breaks for Good Security Forging Low-Value Paper Certificates Judge Roberts, Privacy, and the Future …

x

Share: Crypto-Gram 15 Oct 2005


Crypto-Gram 15 Sep 2005

2005-09-14
Length: 25s

from the September 15, 2005 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

In this issue: Movie-Plot Threats Katrina and Security The Keys to the Sydney Subway New Cryptanalytic Results Against SHA-1 Zotob Airline Security, Trade-offs, and Agenda Cameras in the New York City Subways Lance Armstrong Accused of Doping Peggy Noonan and Movie-Plot Terrorist Threats Trusted Computing Best Practices …

x

Share: Crypto-Gram 15 Sep 2005


Crypto-Gram 15 Aug 2005

2005-08-14
Length: 49s

from the August 15, 2005 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

In this issue: Profiling Cisco and ISS Harass Security Researcher E-Mail Interception Decision Reversed Stealing Imaginary Things Turning Cell Phones off in Tunnels Searching Bags in Subways Plagiarism and Academia: Personal Experience RFID Passport Security Revisited Risks of Losing Portable Devices How to Not Fix the ID Problem Secure Flight Shoot-to-Kill Visa and Amex Drop CardSystems …

x

Share: Crypto-Gram 15 Aug 2005


Crypto-Gram Security Podcast

Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter

Crypto-Gram Security Podcast


Switch to our mobile site