BROWSE: Most Recent | Popular Tags |

Tags > NSA

Pursuing adoption of free and open source software in governments

By Andy Oram
March 25, 2014

Free and open source software creates a natural — and even necessary — fit with government. I joined a panel this past weekend at the Free Software Foundation conference LibrePlanet on this topic and have covered it previously in a …

The RSA/NSA controversy concerns you!

By Jeffrey Carr
February 18, 2014

As a cyber security author and CEO of a security consulting company, I was personally shocked by the RSA’s attitude about the alleged secret payments it received from the NSA as well as its willingness to weaken its BSAFE product; …

How did we end up with a centralized Internet for the NSA to mine?

By Andy Oram
January 8, 2014

I’m sure it was a Wired editor, and not the author Steven Levy, who assigned the title “How the NSA Almost Killed the Internet” to yesterday’s fine article about the pressures on large social networking sites. Whoever chose the title, …

Four short links: 8 January 2014

By Nat Torkington
January 8, 2014

Launching the Wolfram Connected Devices Project — Wolfram Alpha is cognition-as-a-service, which they hope to embed in devices. This data-powered Brain-in-the-Cloud play will pit them against Google, but G wants to own the devices and the apps and the eyeballs …

Four short links: 7 January 2014

By Nat Torkington
January 7, 2014

Pebble Gets App Store (ReadWrite Web) — as both Pebble and MetaWatch go after the high-end watch market. Wearables becoming more than a nerd novelty. Thinking About the Network as Filter (JP Rangaswami) — Constant re-openings of the same debate …

What in the World is the NSA Doing?

By David Collier-Brown
October 26, 2013

The U.S. NSA, our own CSE and various security services are in the midst of a thorough, professional effort to obtain access to everyone's communications, to be able to read them immediately, and to be able to save them away and read them later.

Security After the Death of Trust

By Simon St. Laurent
October 2, 2013

Security has to reboot. What has passed for strong security until now is going to be considered only casual security going forward. As I put it last week, the damage that has become visible over the past few months means …

Upward Mobility: Dig Out Your Tin-Foil Hats

By James Turner
September 23, 2013

The continual drip-drip-drop of NSA secrets, courtesy of Monsieur Snowden, has provided many of us with a new piece of daily entertainment. But as much fun as it can be to see No Such Agency’s dirty laundry being aired in …

Four short links: 11 September 2013

By Nat Torkington
September 9, 2013

On the NSA — intelligent unpacking of what the NSA crypto-weakening allegations mean. Overview of the 2013 OWASP Top 10 — rundown of web evil to avoid. (via Ecryption) Easy 6502 — teaches 6502 assembler, with an emulator built into …

Automation Myths

By Courtney Nash
August 19, 2013

In the aftermath of Edward Snowden’s revelations about NSA’s domestic surveillance activities, the NSA has recently announced that they plan to get rid of 90% of their system administrators via software automation in order to “improve security.” So far, I’ve mostly …

Strata Week: Leaked documents, intel committees, definition of data mining, and Accumulo

By Ann Spencer
June 22, 2013

I was pretty cranky before I spoke with Q Ethan McCallum on the phone today. I was cranky from absorbing the NSA news dominating many data conversations. There is a lot of yammering going on. Some good. Some super bad. …

Strata Week: Why we should care about what the NSA may or may not be doing

By Jenn Webb
June 14, 2013

It’s a question of power, not privacy — and what is the NSA really doing? In the wake of the leaked NSA data-collection programs, the Pew Research Center conducted a national survey to measure American’s response. The survey found that …

Strata Week: Wireless body area networks bring humans into the Internet of Things

By Jenn Webb
June 7, 2013

Collaborative sensor networks of humans, and your body may be the next two-factor authenticator There has been much coverage recently of the Internet of Things, connecting everything from washers and dryers to thermostats to cars to the Internet. Wearable sensors …

Susan Landau explores Internet security and the attribution problem

By Andy Oram
November 29, 2010

Landau, a noted privacy advocate, is seeking new technologies and new policies to identify people on the Internet without onerous effects on privacy.

1 to 14 of 14
The Watering Hole