Remove 2012 Remove Surveillance Remove Technology
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. China denied having done so , of course.

article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

Flushed with venture capital funding in 2012, Norse’s founders started hiring dozens of talented cybersecurity professionals. An ad for RedTorch’s “Cheetah” counter-surveillance tech. whose LinkedIn profile says is now chief technology officer at RedTorch. White is RedTorch’s co-founder, “Mr.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden speaks about the role of surveillance firm NSO Group in Khashoggi murder

Security Affairs

Snowden warns of abuse of surveillance software that also had a role in the murder of the Saudi Arabian journalist Jamal Khashoggi. Officially the sale of surveillance software is limited to authorized governments to support investigation of agencies on criminal organizations and terrorist groups. COUNTRY NEXUS.

article thumbnail

LLMs and Phishing

Schneier on Security

In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible. This is due not only to AI advances, but to the business model of the internet—surveillance capitalism—which produces troves of data about all of us, available for purchase from data brokers.

Phishing 339
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Many have written about how being under constant surveillance changes a person. I am less trusting of communications technology. But I had a more personal involvement as well.

article thumbnail

AI and Trust

Schneier on Security

I wrote about this in 2012 in a book called Liars and Outliers. I wrote about four systems for enabling trust: our innate morals, concern about our reputations, the laws we live under, and security technologies that constrain our behavior. Laws and security technologies are systems of trust that force us to act trustworthy.

article thumbnail

Amnesty International employee targeted with NSO group surveillance malware

Security Affairs

An employee at Amnesty International has been targeted with Israeli surveillance malware, the news was revealed by the human rights group. Amnesty International revealed that one of its employees was targeted with a surveillance malware developed by an Israeli firm. com , pine-sales[.]com com , and ecommerce-ads[.]org.”