This chilling paragraph is in a comprehensive Brookings report about the use of tech to deport people from the US:
The administration has also adapted its methods of social...
Read more
This chilling paragraph is in a comprehensive Brookings report about the use of tech to deport people from the US:
The administration has also adapted its methods of social...
Read more
Article. Report.
Read moreNew report: “Scam GPT: GenAI and the Automation of Fraud.”
This primer maps what we currently know about generative AI’s role in scams, the communities most at risk, and...
Read more
The Atlantic Council has published its second annual report: “Mythical Beasts: Diving into the depths of the global spyware market.”
Too much good detail to summarize, but here are...
Read moreThe NSA and GCHQ have jointly published a history of World War II SIGINT: “Secret Messengers: Disseminating SIGINT in the Second World War.” This is the story of the...
Read more“Who’s winning on the internet, the attackers or the defenders?”
I’m asked this all the time, and I can only ever give a qualitative hand-wavy answer. But Jason Healey...
Read moreThe Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.
Read moreOnce you build a surveillance system, you can’t control who will use it:
A hacker working for the Sinaloa drug cartel was able to obtain an FBI official’s phone...
Read more
One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them...
Read moreIn response to a FOIA request, the NSA released “Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, with a lot of redactions. Weirdly, this is the second time...
Read more
Recent Comments