Home
Search results “Secrets lies schneier”
Secrets and Lies By Bruce Schneier PDF, ePub and Kindle eBook
 
00:12
More about this video Read: http://gee.by/vzexh
Views: 557 sameotheruser
Michael Shermer with Bruce Schneier — Hacked! Security and Survival in a Hyper-Connected World
 
01:12:01
Listen to the Podcast (audio) version: https://goo.gl/grtBfJ Bruce Schneier is a fellow and lecturer at the Harvard Kennedy School and the Berkman-Klein Center for Internet and Society. He is a special advisor to IBM Security and a board member of the Electronic Frontier Foundation, Access Now, and the Tor Project. You can find him on Schneier.com and on twitter at @schneierblog He is the author of Data and Goliath, Applied Cryptography, Liars and Outliers, Secrets and Lies, and Beyond Fear: Thinking Sensibly about Security in an Uncertain World. His new book is Click Here to Kill Everybody, which we discuss at length, as well as: • How to protect yourself from being hacked and what to do if you are hacked • Why companies do not invest more in software security • The motivation of hackers: money, power, fun • The probability of your car being hacked and driven into a wall • The probability of planes being hacked and felled from the sky • Edward Snowden and Wikileaks: hero or villain • The Pentagon Papers and Daniel Ellsberg • What would happen if the electrical grid was hacked • Cyberdeaths (homicides done remotely over the Internet) and how the government will respond with regulations when it does • If the government were to set a policy for the security level of an IoT device that can kill people, is there a maximum allowed probability that it could be hacked? • The North Korean hack of Sony • The Russian hack of the 2016 election and how to prevent that from happening again • Why we’re still using paper ballots in our voting system rather than computers and ATMs like banks use. • The lessons of Y2K for the coming AI apocalypse • What keeps him up at night This dialogue was recorded on January 21, 2019 as part of the Science Salon Podcast series hosted by Michael Shermer and presented by The Skeptics Society, in California. Listen to Science Salon via iTunes, Spotify, Google Play Music, Stitcher, iHeartRadio, TuneIn, and Soundcloud https://www.skeptic.com/podcasts/science-salon/ Watch past Science Salon videos https://www.skeptic.com/science-salon/ Learn more about Science Salon: https://www.skeptic.com/science-salon/about/ Learn more about Skeptic https://www.skeptic.com/ SUPPORT THE PODCAST You play a vital part in our commitment to promote science and reason. If you enjoy the Science Salon Podcast, please show your support by making a donation. Your ongoing patronage will help ensure that sound scientific viewpoints are heard around the world. https://www.skeptic.com/donate/ #sciencesalon
Views: 3303 Skeptic
TEDxPSU - Bruce Schneier - Reconceptualizing Security
 
21:14
Bruce Schneier is an internationally-renowned security technologist and author. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier. His first bestseller, "Applied Cryptography," explained how the arcane science of secret codes actually works and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, "Secrets and Lies," was called by Fortune "[a] jewel box of little surprises you can actually use." "Beyond Fear" tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His current book, "Schneier on Security," offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections. Regularly quoted in the media — and subject of an Internet meme — he has testified on security before the U.S. Congress on several occasions and has written articles and op-eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, and The Washington Post. Schneier also publishes a free monthly newsletter, Crypto-Gram, with more than 150,000 readers. In its 10 years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. About TEDx, x = independently organized event In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized. (Subject to certain rules and regulations.)
Views: 48955 TEDx Talks
DEFCON 17: Q & A with Bruce Schneier
 
44:25
Bruce Schneier is an internationally renowned security technologist and CTO of BT Counterpane, referred to by The Economist as a "security guru." He is the author of eight books -- including the best sellers "Beyond Fear: Thinking Sensibly about Security in an Uncertain World," "Secrets and Lies," and "Applied Cryptography" -- and hundreds of articles and academic papers. His influential newsletter, Crypto-Gram, and blog "Schneier on Security," are read by over 250,000 people. He is a prolific writer and lecturer, a frequent guest on television and radio, has testified before Congress, and is regularly quoted in the press on issues surrounding security and privacy. For more information visit: http://bit.ly/defcon17_information To download the video visit: http://bit.ly/defcon17_videos
Views: 3042 Christiaan008
NSA - Codenames, Capabilities and Countermeasures - Bruce Schneier
 
55:02
NSA: Codenames, Capabilities & Countermeasures - Presentation by Bruce Schneier - ShmooCon 2014. Bruce Schneier is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Bruce Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization. In 1994, Schneier published Applied Cryptography, which details the design, use, and implementation of cryptographic algorithms. In 2010 he published Cryptography Engineering, which is focused more on how to use cryptography in real systems and less on its internal design. He has also written books on security for a broader audience. In 2000, Schneier published Secrets and Lies: Digital Security in a Networked World; in 2003, Beyond Fear: Thinking Sensibly About Security in an Uncertain World; in 2012, Liars and Outliers: Enabling the Trust that Society Needs to Thrive; and in 2015, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Schneier writes a freely available monthly Internet newsletter on computer and other security issues, Crypto-Gram, as well as a security weblog, Schneier on Security. The blog focuses on the latest threats, and his own thoughts. The weblog started out as a way to publish essays before they appeared in Crypto-Gram, making it possible for others to comment on them while the stories were still current, but over time the newsletter became a monthly email version of the blog, re-edited and re-organized. Schneier is frequently quoted in the press on computer and other security issues, pointing out flaws in security and cryptographic implementations. Subscribe to this channel - http://www.youtube.com/c/ProperGander Proper Gander on Minds.com - http://www.minds.com/Joelsee Join Minds.com today: https://www.minds.com/register;referrer=Joelsee Proper Gander on Facebook - http://www.facebook.com/aProperGander PayPal Donations welcome. Click here: http://goo.gl/FxXWYQ Bruce Schneier wiki - https://en.wikipedia.org/wiki/Bruce_Schneier NSA Codenames - https://cryptome.org/2014/01/nsa-codenames.htm List of government mass surveillance projects - https://en.wikipedia.org/wiki/List_of_government_mass_surveillance_projects NSA Nicknames and Codewords - http://electrospaces.blogspot.ca/p/nicknames-and-codewords.html The NSA’s weird alphabet soup of code names for secret spy programs and hacker tools - http://www.networkworld.com/article/2289018/security/130199-The-NSA-s-weird-alphabet-soup-of-code-names-for-secret-spy-programs-and-hacker-tools.html Schneier on Security - https://www.schneier.com/cgi-bin/mt/mt-search.cgi?tag=NSA The NSA Is Hoarding Vulnerabilities - https://www.schneier.com/blog/archives/2016/08/the_nsa_is_hoar.html Major NSA/Equation Group Leak - https://www.schneier.com/blog/archives/2016/08/major_nsaequati.html NSA surveillance: A guide to staying secure - https://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance The NSA, Snowden, and Surveillance - http://crcs.seas.harvard.edu/event/bruce-schneier-crcs-lunch-seminar Congressional Reps Ask Bruce Schneier To Explain To Them What The NSA Is Doing, Because The NSA Won't Tell Them - https://www.techdirt.com/articles/20140116/13152525907/congressional-reps-ask-bruce-schneier-to-explain-to-them-what-nsa-is-doing-because-nsa-wont-tell-them.shtml Schneier on NSA's encryption defeating efforts: Trust no one - http://www.pcworld.com/article/2048268/schneier-on-nsas-encryption-defeating-efforts-trust-no-one.html Edward Snowden and Bruce Schneier discuss encryption and cyberwar - https://edwardsnowden.com/2015/01/26/edward-snowden-and-bruce-schneier-discuss-encryption-and-cyberwar/ "Undermining the Very Fabric of the Internet": Bruce Schneier on NSA's Secret Online Spying - https://www.democracynow.org/2013/9/6/undermining_the_very_fabric_of_the Schneier: The NSA Is Commandeering the Internet - https://news.slashdot.org/story/13/08/12/1850229/schneier-the-nsa-is-commandeering-the-internet National Security Agency - https://www.nsa.gov/ As always, use this info to gather more info.
Views: 1275 Proper Gander
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
 
50:58
By Thomas Ptacek and Big Ol Al "Over the past year, more than 10,000 people participated in the Matasano crypto challenges, a staged learning exercise where participants implemented 48 different attacks against realistic cryptographic constructions. In the process, we collected crypto exploit code in dozens of different languages, ranging from X86 assembly to Haskell. With the permission of the participants, we've built a ""Rosetta Code"" site with per-language implementations of each of the crypto attacks we taught. In this talk, we'll run through all 48 of the crypto challenges, giving Black Hat attendees early access to all of the crypto challenges. We'll explain the importance of each of the attacks, putting them into the context of actual software flaws. Our challenges cover crypto concepts from block cipher mode selection to public key agreement algorithms. For some of the more interesting attacks, we'll step-by-step the audience through exploit code, in several languages simultaneously."
Views: 68557 Black Hat
Bruce Schneier on Identification & I.D. Security
 
03:58
Bruce Schneier is the chief security technology officer of BT. An internationally renowned security technologist, he is referred to by The Economist as a "security guru." He is the author of eight books, including the best sellers Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Secrets and Lies, and Applied Cryptography, as well as hundreds of academic articles and papers, and the influential Blowfish and Twofish encryption algorithms. Best known as a refreshingly candid and lucid security critic and commentator, his influential newsletter "Crypto-Gram," and his blog "Schneier on Security," are read by over 250,000 people. He has testified before Congress on several occasions, and has served on several government technical committees. He is a prolific writer and lecturer, and his essays have been published in national and international publications. He is a frequent guest on television and radio, and is regularly quoted in the press on issues surrounding security and privacy.
Views: 6305 seeprogress
الدروس المستفاده من هجمات شمعون | المهندس أحمد عبدالحميد والمهندس محمد علوي
 
01:32:14
الدروس المستفاده من هجمات شمعون | المهندس أحمد عبدالحميد والمهندس محمد علوي كتب لازم تكون عندك فى مكتبتك : The Art of War for Security Managers - Scott A. Watson Botnets: The Killer Web App - Schiller, Binkly et al Secrets and Lies - Bruce Schneier Websites Every Day to See https://www.us-cert.gov/government-users/reporting-requirements https://www.nist.gov/ https://cve.mitre.org/ https://www.owasp.org/index.php/Main_Page لا تنسوا الاشتراك في قناتنا على اليوتيوب .. ليصلكم كل جديد http://bit.ly/Free4arab http://www.free4arab.com https://www.facebook.com/free4arab https://twitter.com/free4arab1 https://plus.google.com/113503705132872627915
DEF CON 15 - Bruce Schneier - Q and A with Bruce Schneier
 
49:21
Bruce Schneier: Q&A with Bruce Schneier Security is both a feeling and a reality. You can feel secure without actually being secure, and you can be secure even though you don't feel secure. In the industry, we tend to discount the feeling in favor of the reality, but the difference between the two is important. It explains why we have so much security theater that doesn't work, and why so many smart security solutions go unimplemented. Two different fields?behavioral economics and the psychology of decision making'shed light on how we perceive security, risk, and cost. Learn how perception of risk matters and, perhaps more importantly, learn how to design security systems that will actually get used. Bruce Schneier is an internationally renowned security technologist and CTO of BT Counterpane, referred to by The Economist as a "security guru." He is the author of eight books?including the best sellers "Beyond Fear: Thinking Sensibly about Security in an Uncertain World,"Secrets and Lies," and "Applied Cryptography"?and hundreds of articles and academic papers. His influential newsletter, Crypto-Gram, and blog "Schneier on Security," are read by over 250,000 people. He is a prolific writer and lecturer, a frequent guest on television and radio, has testified before Congress, and is regularly quoted in the press on issues surrounding security and privacy.
Views: 158 DEFCONConference
Secrets and Lies - Curtain Twitchers
 
03:14
By Secrets and Lies on the their second album "A Bit Strange, but I think we got away with it." www.facebook.com/Secrets.and.Lies.uk
Views: 15 Secrets and Lies
Secrets and Lies- Episode 1
 
04:16
My new serial *Secrets and lies*... I´m new on this so please don´t tell me that the video sucks, i allredy know that!
Views: 1565 annna888
SOCIAL MEDIA: A Loss of Privacy?
 
03:01
See more in our series on social media Digital U: http://bit.ly/tvodigitalu The internet has closed the geographical gap and put information right at our fingertips but its also important for all users to remember that anything they put on the web, can be difficult to remove, and accessible by almost anyone. Any profile or account you create online can be searched by employers, potential spouses, friends, family and strangers which not only puts your reputation at risk, but also your safety. Sites like Facebook and Lava Life have varying degrees of privacy settings and its extremely important to be conscious of how much of your personal information is open to the public. As a user you need to be aware and beware of the digital crumbs you can leave behind.
Views: 16651 TVO
Gen Michael Hayden - Cybersecurity and Intelligence
 
53:02
Presented at TTI/Vanguard's Cybersecurity September 26-28, 2016 Washington, D.C. Gen. Michael Hayden, Chertoff Group Cybersecurity and Intelligence The U.S. government has had trouble lately keeping secrets— Manning, Snowden, OPM, the list just keeps getting longer. Fortunately, historically, when the government doesn’t get something done, the private sector steps up and does. However, that turns things on their head: The government needs to conform to the needs of the private sector, not the other way around, when it comes to things like classification and encryption. This has consequences for how we think about the FBI/Apple case, and others to come. If there is to be an outsize role for the private sector in cybersecurity, what are its challenges? What are its limits?
Views: 1661 TTI/Vanguard
DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
 
48:00
Speaker: MARCIA HOFMANN SENIOR STAFF ATTORNEY, ELECTRONIC FRONTIER FOUNDATION Can the government force you to turn over your encryption passphrase or decrypt your data? The law surrounding police attempts to force decryption is developing at breakneck speed, with two major court decisions this year alone. This talk will start off with an in-depth explanation of the Fifth Amendment privilege against self-incrimination, its origins, and how it applies to government attempts to force disclosure of keys or decrypted versions of data in the United States. We'll also discuss law enforcement authority to demand passphrases and decryption of data stored with third parties, and survey key disclosure laws in other countries. Marcia Hofmann is a senior staff attorney at the Electronic Frontier Foundation, where she works on a broad range of digital civil liberties issues including computer security, electronic privacy, and free expression. She currently focuses on computer crime and EFF's Coders' Rights Project, which promotes innovation and protects the rights of curious tinkerers and researchers in their cutting-edge exploration of technology. Prior to joining EFF, Marcia was staff counsel and director of the Open Government Project at the Electronic Privacy Information Center (EPIC). For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 18098 Christiaan008
Bruce Schneier - Privacy, Security & the Future - Interview
 
22:24
Interview at the Winter Intelligence / AGI 12 conference in Oxford 2012 Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier. His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power. His latest book, Liars and Outliers, explains how societies use security to enable the trust that they need to survive. Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post. Schneier also publishes a free monthly newsletter, Crypto-Gram, and a blog, Schneier on Security, with a combined 250,000 readers. In more than ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news. http://www.schneier.com/
Breaking the Security of Physical Devices by Silvio Cesare
 
43:31
In this talk, I look at a number of household or common devices and things, including a popular model car and physical security measures such as home alarm systems. I then proceed to break the security of those devices. The keyless entry of a 2004/2005 popular make and widely used car is shown to be breakable with predictable rolling codes. The actual analysis involved not only mathematics and software defined radio, but the building of a button pushing robot to press the keyless entry to capture data sets that enable the mathematical analysis. Software defined radio is not only used in the kelyess entry attack, but in simple eavesdropping attacks against 40mhz analog baby monitors. But that's an easy attack. A more concering set of attacks are against home alarm systems. Practically all home alarm systems that had an RF remote to enable and disable the system were shown to used fixed codes. This meant that a replay attack could disable the alarm. I built an Arduino and Raspberry Pi based device for less than $50 dollars that could be trained to capture and replay those codes to defeat the alarms. I also show that by physically tampering with a home alarm system by connecting a device programmer, the eeprom data off the alarm's microcontroller can be read. This means that an attacker can read the secret passcode that disables or enables the alarm. In summary, these attacks are simple but effective in physical devices that are common in today's world. I will talk about ways of mitigating these attacks, which essentially comes down to avoiding the bad and buying the good. But how do you know what's the difference? Come to this talk to find out.
Views: 9229 Black Hat
Bruce Schneier on Cyber War and Cyber Crime
 
26:58
About the Event: In this address, Bruce examined the future of cyber war and cyber security. Mr. Schneier explored the current debate on the threat of cyber war, asking whether or not the threat had been over-stated. He then explored the range of attacks that have taken place, including the Latvian DOS attack and the Stuxnet worm. The address concluded with an exploration of the future of international treaties on cyber war. About the Speaker: Bruce Schneier is Chief Security Technology Officer of BT, an internationally renowned security technologist and author. Described by The Economist as a "security guru," he is best known as a candid and lucid security critic and commentator. His bestselling books include Applied Cryptography, Secrets and Lies, Beyond Fear and Schneier on Security. Regularly quoted in the media, he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post. Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security.
Views: 10302 IIEA1
DEFCON 15: Q & A with Bruce Schneier
 
49:24
Speaker: Bruce Schneier Bruce Schneier is an internationally renowned security technologist and CTO of BT Counterpane, referred to by The Economist as a "security guru." He is the author of eight books -- including the best sellers "Beyond Fear: Thinking Sensibly about Security in an Uncertain World," "Secrets and Lies," and "Applied Cryptography" -- and hundreds of articles and academic papers. His influential newsletter, Crypto-Gram, and blog "Schneier on Security," are read by over 250,000 people. He is a prolific writer and lecturer, a frequent guest on television and radio, has testified before Congress, and is regularly quoted in the press on issues surrounding security and privacy. For more information visit: http://bit.ly/defcon15_information To download the video visit: http://bit.ly/defcon15_videos
Views: 520 Christiaan008
DEFCON 20: Safes and Containers: Insecurity Design Excellence
 
52:17
Speakers; MARC WEBER TOBIAS INVESTIGATIVE ATTORNEY AND SECURITY SPECIALIST, SECURITY.ORG MATT FIDDLER SECURITY SPECIALIST, SECURITY.ORG TOBIAS BLUZMANIS SECURITY SPECIALIST, SECURITY.ORG Insecure designs in physical security locks, safes, and other products have consequences in terms of security, liability, and even loss of life. Marc Weber Tobias and his colleagues Tobias Bluzmanis and Matthew Fiddler will discuss a number of cases involving design issues that allow locks and safes to be opened in seconds, focusing on consumer-level containers that are specified as secure for storing valuables and weapons, and in-room hotel safes that travelers rely upon. In one instance, the insecurity of a consumer gun safe that is sold by major retailers in the United States played a part in the death of a three year old child who was able to gain access to a handgun that was locked in a supposedly secure container. The presenters will demonstrate different product designs that were represented as secure but in fact are not. For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 29882 Christiaan008
#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society
 
54:53
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Making sure those defectors don't destroy the very cooperative systems they're abusing is an age-old problem, and we've developed a variety of societal pressures to induce cooperation: moral systems, reputational systems, institutional systems, and security systems. Understanding how these different societal pressures work — and fail — is essential to understanding the problems we face in today's increasingly technological and interconnected world. ABOUT BRUCE SCHNEIER Bruce Schneier is an internationally renowned security technologist, referred to by The Economist as a "security guru." He is the author of eleven books — including the best sellers Liars and Outliers, Beyond Fear, and Secrets and Lies -- as well as hundreds of articles and essays, and many more academic papers. His influential newsletter "Crypto-Gram," and his blog "Schneier on Security," are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. Schneier is the Chief Security Technology Officer of BT.
Go Open - Bruce Schneier Part 1 Full Interview
 
10:01
Bruce Schneier is an internationally-renowned Security Technologist and author. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier. His first bestseller, "Applied Cryptography" explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, "Secrets and Lies", was called by Fortune a "jewel box of little surprises you can actually use." His current book, "Beyond Fear" tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. Interviewed by Marc Chase
Views: 4707 voiceover.me
Bruce Schneier - Enabling the Trust that Makes Society Function - FHI Oxford Winter Intelligence
 
01:08:32
http://www.winterintelligence.org/ Winter Intelligence 2012 Oxford University - Enabling the Trust that Makes Society Function. Bruce Schneier is an American cryptographer, computer security specialist, and writer. He is the author of several books on general security topics, computer security and cryptography. In 1994, Schneier published "Applied Cryptography", which details the design, use, and implementation of cryptographic algorithms. More recently he published "Cryptography Engineering", which is focused more on how to use cryptography in real systems and less on its internal design. He has also written books on security for a broader audience. In 2000, Schneier published Secrets and Lies: Digital Security in a Networked World, and in 2003, Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Most recently, in 2012 Schneier published Liars and Outliers: Enabling the Trust that Society Needs to Thrive. Schneier writes a freely available monthly Internet newsletter on computer and other security issues, Crypto-Gram, as well as a security weblog, Schneier on Security. The weblog started out as a way to publish essays before they appeared in Crypto-Gram, making it possible for others to comment on them while the stories were still current, but over time the newsletter became a monthly email version of the blog, re-edited and re-organized. Schneier is frequently quoted in the press on computer and other security issues, pointing out flaws in security and cryptographic implementations ranging from biometrics to airline security after the September 11 attacks. He also writes "Security Matters", a regular column for Wired Magazine. Schneier revealed on his blog that in the December 2004 issue of the SIGCSE Bulletin, three Pakistani academics, Khawaja Amer Hayat, Umar Waqar Anis, and S. Tauseef-ur-Rehman, from the International Islamic University in Islamabad, Pakistan, plagiarized an article written by Schneier and got it published. The same academics subsequently plagiarized another article by Ville Hallivuori on "Real-time Transport Protocol (RTP) security" as well. Schneier complained to the editors of the periodical, which generated a minor controversy. The editor of the SIGCSE Bulletin removed the paper from their website and demanded official letters of admission and apology. Schneier noted on his blog that International Islamic University personnel had requested him "to close comments in this blog entry"; Schneier refused to close comments on the blog, but he did delete posts which he deemed "incoherent or hostile".
Go Open - Bruce Schneier Part 2 Full Interview
 
10:01
Bruce Schneier is an internationally-renowned Security Technologist and author. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier. His first bestseller, "Applied Cryptography" explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, "Secrets and Lies", was called by Fortune a "jewel box of little surprises you can actually use." His current book, "Beyond Fear" tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. Interviewed by Marc Chase
Views: 1751 voiceover.me
SANS DFIR Webcast - APT Attacks Exposed: Network, Host, Memory, and Malware Analysis
 
01:42:32
For many years, professionals have been asking to see real APT data in a way that shows them how the adversaries compromise and maintain presence on our networks. Now you can experience it first hand - using real data. The SANS Digital Forensics and Incident Response team will take you through an end-to-end investigation similar to briefs that are supplied to C-level executives who want to understand how their network was compromised and how these adversaries think, act, and move around their enterprise. Starting with core steps in digital forensics, incident response, network forensics, memory analysis, and RE malware, instructors Rob Lee (FOR408 - Digital Forensics), Chad Tilbury (FOR508 - Incident Response), Alissa Torres (FOR526 - Windows Memory Forensics), Phil Hagen (FOR572 Network Forensics), and Lenny Zeltser (FOR610 - RE Malware) will walk through how key skills are used to solve a single intrusion for 20 minutes each. The tag team approach will detail how response teams can be leveraged in your environment to effectively respond to incidents in your enterprise. This talk is perfect for those in the trenches or for those in management who really want to understand how a response team identifies and responds to these adversaries. What is it they are after? How did they get in? How did our systems fail to detect them? These questions and more will be answered in this one-of-a-kind keynote. For more incident response training courses at SANS: http://www.sans.org/course/advanced-incident-response-digital-forensics http://www.sans.org/course/advanced-network-forensics-analysis
Defcon 15 - Q & A with Bruce Schneier
 
49:21
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net Defcon 15 - Q & A with Bruce Schneier Bruce Schneier is an internationally renowned security technologist and CTO of BT Counterpane, referred to by The Economist as a security guru. He is the author of eight books -- including the best sellers Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Secrets and Lies, and Applied Cryptography -- and hundreds of articles and academic papers. His influential newsletter, Crypto-Gram, and blog Schneier on Security, are read by over 250,000 people. He is a prolific writer and lecturer, a frequent guest on television and radio, has testified before Congress, and is regularly quoted in the press on issues surrounding security and privacy.
Views: 759 SecurityTubeCons
Go Open - Bruce Schneier Part 3 Full Interview
 
03:45
Bruce Schneier is an internationally-renowned Security Technologist and author. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier. His first bestseller, "Applied Cryptography" explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, "Secrets and Lies", was called by Fortune a "jewel box of little surprises you can actually use." His current book, "Beyond Fear" tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security.
Views: 1309 voiceover.me
DEF CON 17 - Bruce Schneier - Question and Answer Session
 
44:25
Q & A with Bruce Schneier Bruce Schneier is an internationally renowned security technologist and CTO of BT Counterpane, referred to by The Economist as a "security guru." He is the author of eight books -- including the best sellers "Beyond Fear: Thinking Sensibly about Security in an Uncertain World," "Secrets and Lies," and "Applied Cryptography" -- and hundreds of articles and academic papers. His influential newsletter, Crypto-Gram, and blog "Schneier on Security," are read by over 250,000 people. He is a prolific writer and lecturer, a frequent guest on television and radio, has testified before Congress, and is regularly quoted in the press on issues surrounding security and privacy. For copies of the slides and additional materials please see the DEF CON 17 Archive here: https://defcon.org/html/links/dc-archives/dc-17-archive.html
Views: 114 DEFCONConference
The Alex Jones Show 2012-04-06 Friday
 
02:11:28
On the Friday, April 6 edition of the Alex Jones Show, Alex talks with cryptographer, computer security specialist, and author Bruce Schneier. Mr. Schneier is a vocal critic of "security measures" used by the Transportation Security Administration. He was invited to testify before Congress about TSA abuses but was "formally uninvited" after the TSA complained. He is the author of numerous books, including Liars and Outliers: Enabling the Trust that Society Needs to Thrive, Secrets and Lies: Digital Security in a Networked World, and Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Alex also covers the latest news and takes your calls. WEBSITES TO CHECK OUT: http://Astonisher.Wordpress.com http://Astonisher.Wordpress.com/Links http://Facebook.com/100002139371230 http://Twitter.com/Astonisher http://Youtube.com/Astonisher1 http://Youtube.com/Astonisher2 FAIR USE NOTICE: This video may contain copyrighted material. Such material is made available for educational purposes only. This constitutes a 'fair use' of any such copyrighted material as provided for in Title 17 U.S.C. section 107 of the US Copyright Law.
Views: 7603 Astonisher2
Voynich Manuscript Revealed (2018)
 
12:07
The Voynich Manuscript is a mysterious medieval manuscript written in the early 15th century. To date, scientists, historians, mathematicians and linguists have struggled to decipher the manuscript. However, the mystery has finally been put to rest. Ata Team Alberta (ATA) has deciphered and translated over 30% the manuscript. Currently, a formal paper of the philological study was submitted to an academic journal in John Hopkins University. [email protected]
Secrets and Lies | Five Minute Theatre
 
05:19
Part of the National Theatre of Scotland's Five Minute Theatre 21st-22nd June, 2011. What would you do if someone confessed their deepest secrets to you? Someone has a confession to make, a secret to tell and they want you to listen... but what is real and what are lies? You will leave with a story that only you have heard, no one else! Knox Academy Performed by: Louise Boyd Zoe Connell Sarah Gellatly Mason Gibbons Ajdin Husic Iona Lee Gavin McManus Hamish McNeil Abraham Osman Holly Ramage Greg Russell Kimberley Smith Kirsty Stenhouse Joy Szymoszowsky Sam Turvill
Views: 318 FiveMinuteTheatre
Growth of Botnets on the internet.
 
02:54
http://www.freeimages.com/photo/linux-login-1497422 http://www.freeimages.com/photo/internet-1467469 http://www.freeimages.co.uk/galleries/transtech/informationtechnology/slides/network_ethernet.htm http://www.freeimages.com/photo/bitcoin-1056983 http://www.itnews.com.au/news/dutch-police-arrest-botnet-trio-63782 https://www.damballa.com/wp-content/uploads/2014/02 /WP-Botnet-Communications-Primer-2009-06-04.pdf http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5543027&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5543027 www.lexology.com/library/detail.aspx?g=5b959b58-4627-4587-8aed-f8b8518f205e https://en.wikipedia.org/wiki/Botnet http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4634985&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4634985 http://usenix.org/legacy/publications/library/proceedings/sruti05/tech/full_papers/cooke/cooke_html/index.html http://usenix.org/legacy/publications/library/proceedings/sruti05/tech/full_papers/cooke/cooke_html/index.html Bruce Schneier (23 Jan 2004). Secrets and lies - digital security in a networked world. United States of America: Robert Ipsen. 184-186.
Views: 16 Jamie Hutton
Black Hat USA 2018 Keynote: Parisa Tabriz
 
01:12:08
Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes By Parisa Tabriz, Project Zero Manager & Director of Engineering at Google This talk offers guiding advice that we as security practitioners and leaders must embrace in order to succeed. Drawing on her experiences leading some of the biggest, ongoing security efforts that aim to make technology safer for all users, Parisa will first share how throwing out the rule book on vulnerability disclosure has been moving giants of the software industry toward measurably faster patching and end-user security. Next, she will share how a grassroots side project grew to shift the majority of the web ecosystem to secure transport, nearly 25 years after the technology was first made available. Finally, she will review the major effort to implement an intern’s publication in one of today’s largest open source projects, and how they persevered for 5+ years of refactoring, avoiding efforts to defund the work along the way. (Coincidentally, this project helped the world’s most popular browser mitigate a new class of hardware vulnerabilities earlier this year!) Full Abstract: https://www.blackhat.com/us-18/briefings/schedule/index.html#optimistic-dissatisfaction-with-the-status-quo-steps-we-must-take-to-improve-security-in-complex-landscapes-11956
Views: 84753 Black Hat
Bruce Schneier: Global Threats 1
 
29:58
Global threats on the internet lessons learned in 2013 by Bruce Schneier; IT-security expert and cryptographer. From the Digital Threats and Solutions conference 20 March 2014 by InfinIT. Copyright Keld Simonsen, [email protected], 2014, under GFDL-licensen
Views: 971 infinitDK
Security Specialist Exposes TSA Body Scanners as Giant Fraud
 
22:26
On the Friday, April 6 edition of the Alex Jones Show, Alex talks with cryptographer, computer security specialist, and author Bruce Schneier. Mr. Schneier is a vocal critic of "security measures" used by the Transportation Security Administration. He was invited to testify before Congress about TSA abuses but was "formally uninvited" after the TSA complained. He is the author of numerous books, including Liars and Outliers: Enabling the Trust that Society Needs to Thrive, Secrets and Lies: Digital Security in a Networked World, and Beyond Fear: Thinking Sensibly About Security in an Uncertain World.
Views: 75 WeThePeople991
NSA Contractor Charged for Leak After Intercept Exposé Reveals Russian Cyberattack of 2016 Election
 
21:09
https://democracynow.org - A military intelligence contractor has been arrested and charged with leaking a top-secret NSA report to the media that reveals Russian military intelligence conducted a cyberattack on at least one U.S. voting software company just days before last November’s presidential election. The charges were announced after The Intercept published part of the NSA report on Monday. It is the first criminal leak case under President Trump. We speak with security technologists Bruce Schneier and Jake Williams, who is a former member of the NSA’s Tailored Access Operations hacking team. Democracy Now! is an independent global news hour that airs weekdays on nearly 1,400 TV and radio stations Monday through Friday. Watch our livestream 8-9AM ET: https://democracynow.org Please consider supporting independent media by making a donation to Democracy Now! today: https://democracynow.org/donate FOLLOW DEMOCRACY NOW! ONLINE: Facebook: http://facebook.com/democracynow Twitter: https://twitter.com/democracynow YouTube: http://youtube.com/democracynow SoundCloud: http://soundcloud.com/democracynow Daily Email: https://democracynow.org/subscribe Google+: https://plus.google.com/+DemocracyNow Instagram: http://instagram.com/democracynow Tumblr: http://democracynow.tumblr.com Pinterest: http://pinterest.com/democracynow iTunes: https://itunes.apple.com/podcast/democracy-now!-audio/id73802554 TuneIn: http://tunein.com/radio/Democracy-Now-p90/ Stitcher Radio: http://www.stitcher.com/podcast/democracy-now
Views: 23296 Democracy Now!
Former CIA Operative Explains How Spies Use Disguises | WIRED
 
09:25
Former Chief of Disguise for the CIA, Jonna Mendez, explains how disguises are used in the CIA, and what aspects to the deception make for an effective disguise. You can watch new episodes of WIRED MASTERMINDS on Roku, Apple TV, Amazon Fire TV, and Android TV: https://www.wired.com/brandlab/2018/06/wired-smart-tv-app-new-way-watch-wired/ Still haven’t subscribed to WIRED on YouTube? ►► http://wrd.cm/15fP7B7 Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. Here you can find your favorite WIRED shows and new episodes of our latest hit series Masterminds. ABOUT WIRED WIRED is where tomorrow is realized. Through thought-provoking stories and videos, WIRED explores the future of business, innovation, and culture. Former CIA Operative Explains How Spies Use Disguises | WIRED
Views: 9651590 WIRED
Keynote: The Seven Axioms of Security
 
50:38
By Saumil Shah "Today's attacks succeed because the defense is reactive.” As the defenses have caught up and closed open doors, we attackers have looked for new avenues and vectors. Looking back on the state of defenses from One-Way Web Hacking in 2001 to Stegosploit in 2016, a common pattern emerges. Defense boils down to reacting to new attacks and then playing catch-up. It is time to transition defense from being reactive to proactive. This talk discusses seven axioms for implementing proactive defense strategy and measures for the future, concluding with a blueprint of the next evolution of pro-active defense architecture.
Views: 13709 Black Hat
Day 1 Keynote: National Cyber-Aggression and Private-Sector Internet Infrastructure
 
45:58
Black Hat Asia 2018 Day 1 Keynote Bill Woodcock addresses past and current efforts to curtail nation-state cyber-attacks on the private-sector core infrastructure of the Internet. From the live fire cyber exercises of the dot-com era and the US-China-Russia cyber-conflicts and United Nations “Group of Government Experts" of the subsequent decade to the current effort of the Global Commission on the Stability of Cyberspace, Bill will discuss the misaligned incentives that encourage militaries to focus on cyber-offense while ignoring defense, the direct effects and blowback that endanger the central infrastructure of the Internet, and the economic costs these attacks impose on Internet users. Read More: https://www.blackhat.com/asia-18/briefings/schedule/index.html#national-cyber-aggression-and-private-sector-internet-infrastructure-10164
Views: 14583 Black Hat
What's Motivating Gulf States to Befriend Israel? (Pt. 1)
 
05:26
THE RUNDOWN | Israel and the Gulf states appear to be growing closer together. Why did they all of a sudden become close after decades of animosity and what's stopping them from normalizing relations? Israel's Open University Gulf-Israel relations lecturer Michal Ya'ari, Gulf State Analytics CEO Giorgio Cafiero and FDD analyst Varsha Koduvayur analyze. Story: Last month, Netanyahu welcomed Déby to Israel on a historic visit. Déby became the first leader of the Muslim-majority west African nation to visit Israel since its establishment in 1948. During Déby’s stay, Netanyahu vowed that 'There will be more such visits in Arab countries very soon,' referring to his visit to Oman. 'Currently we can fly over Egypt, Chad, and probably we can fly over Sudan, and there we can fly directly to Brazil, which would save about two hours,' he told Israeli diplomats on Monday. Netanyahu has repeatedly said that Sunni states have been making overtures to Israel, spurred by the perceived mutual threat of Iran which both accuse of fueling regional conflicts by supporting armed proxies in Syria, Iraq, Yemen and Bahrain. Bahrain is among the Gulf states which has softened its rhetoric vis a vis Israel recently. The Kingdom’s foreign minister wrote on Twitter in May that the Jewish state has a right to defend itself against Iran. 'As long as Iran has breached the status quo in the region and invaded countries with its forces and missiles, so any state in the region, including Israel, is entitled to defend itself by destroying sources of danger,' the minister wrote following a rare direct confrontation between Israel and Iranian forces in Syria. For more, see our ⬇ Website Articles: https://www.i24news.tv/en Live: https://video.i24news.tv/page/live?clip=5a94117623eec6000c557fec (Subscription) Replay: https://video.i24news.tv/page/5a97b81f23eec6000c55857d?utm_source=youtube.com&utm_medium=social&utm_campaign=the_rundown&utm_content=en2 (Subscription) Social Media Facebook: https://www.facebook.com/i24newsEN/ Twitter: https://twitter.com/i24NEWS_EN Instagram: https://www.instagram.com/i24news/
Views: 4625 i24NEWS English
The Alex Jones Show - April 6, 2012
 
02:59:03
On the Friday, April 6 edition of the Alex Jones Show, Alex talks with cryptographer, computer security specialist, and author Bruce Schneier. Mr. Schneier is a vocal critic of "security measures" used by the Transportation Security Administration. He was invited to testify before Congress about TSA abuses but was "formally uninvited" after the TSA complained. He is the author of numerous books, including Liars and Outliers: Enabling the Trust that Society Needs to Thrive, Secrets and Lies: Digital Security in a Networked World, and Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Alex also covers the latest news and takes your calls.
Views: 266 Freedom4Fresno
DEFCON 20: Panel: Meet the Feds 1 - Law Enforcement
 
51:29
Panel: JIM CHRISTY MODERATOR, DC3 LEON CARROLL EX-NCIS ANDY FRIED EX-IRS JON IADONISI EX-NAVY SEAL RICH MARSHALL NSA DAVID MCCALLUM TV-NCIS JUSTIN WYKES NW3C Did you ever wonder if the Feds were telling you're the truth when you asked a question? Join current and former federal agents from numerous agencies to discuss cyber investigations and answer your burning questions. Enjoy the opportunity to grill 'em and get down to the bottom of things! Agencies that will have representatives include: Defense Cyber Crime Center (DC3), National White Collar Crime Center (NWC3), US Department of Treasury, Internal R evenue Service (IRS), and the US Navy SEALs. This year, the "Meet the Feds" panel has gone Hollywood with special guests - Mr. David McCallum and Mr. Leon Carroll from CBS's NCIS! Each of the agency reps will make an opening statement regarding their agencies role, and then open it up to the audience for questions. For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 22892 Christiaan008
'Whistleblowers persecuted & prosecuted for exposing illegality' - Snowden's lawyer
 
04:35
Jesselyn Radack, 2011 Sam Adams Award winner & the attorney of Edward Snowden & Bill Binney, tells about her experience. RT LIVE http://rt.com/on-air Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday Like us on Facebook http://www.facebook.com/RTnews Follow us on Twitter http://twitter.com/RT_com Follow us on Instagram http://instagram.com/rt Follow us on Google+ http://plus.google.com/+RT Listen to us on Soundcloud: https://soundcloud.com/rttv RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.
Views: 8937 RT
How NSA Tracks You (Bill Binney) [improved audio]
 
53:19
William "Bill" Binney, former NSA technical director on how NSA track you. From the SHA2017 conference in Netherlands. Original video: https://www.youtube.com/watch?v=P1JDqNKMaus ... Audio/video enhanced and edited by Angel North. Published for the public interest. The video is not monetized.
Views: 298925 Angel North
Michael Shermer with Adam Higginbotham — The True Story of What Happened at Chernobyl
 
56:32
Listen to the Podcast (audio) version: https://goo.gl/pH2Cv7 In this discussion with the author of the newly published book Midnight in Chernobyl: The Untold Story of the World’s Greatest Nuclear Disaster, Adam Higginbotham tells what really happened at Chernobyl, by far the worst nuclear disaster in history, and why it took so long to discover what really happened. Human error and technological design flaws in the reactor are only proximate explanations for the core meltdown and explosion. The ultimate explanation is to be found in Soviet secrecy and lies. The book reads like an adventure novel, but it’s a richly researched non-fiction work by a brilliant storyteller. Don’t wait for the motion picture based on the book, which is years down the line. Get and read this gripping account to understand why people are still so afraid of nuclear power. Adam Higginbotham was born in England in 1968. His narrative non-fiction and feature writing has appeared in magazines including GQ, The New Yorker and the The New York Times magazine. He is the author of A Thousand Pounds of Dynamite, named one of Amazon’s Best Books of 2014 and optioned as a film by Warner Brothers. He recently completed Midnight In Chernobyl: The Untold Story of the World’s Greatest Nuclear Disaster, which will be published in the US by Simon & Schuster on February 12th 2019. The former US correspondent for The Sunday Telegraph magazine and editor-in-chief of The Face, he lives with his family in New York City. This dialogue was recorded on February 5, 2019 as part of the Science Salon Podcast series hosted by Michael Shermer and presented by The Skeptics Society, in California. Listen to Science Salon via iTunes, Spotify, Google Play Music, Stitcher, iHeartRadio, TuneIn, and Soundcloud https://www.skeptic.com/podcasts/science-salon/ Watch past Science Salon videos https://www.skeptic.com/science-salon/ Learn more about Science Salon: https://www.skeptic.com/science-salon/about/ Learn more about Skeptic https://www.skeptic.com/ SUPPORT THE PODCAST You play a vital part in our commitment to promote science and reason. If you enjoy the Science Salon Podcast, please show your support by making a donation, or by becoming a patron. Your ongoing patronage will help ensure that sound scientific viewpoints are heard around the world. https://www.skeptic.com/donate/ #sciencesalon
Views: 3767 Skeptic
Two years after Snowden: 'Benefits brought to public were worth it'
 
03:21
It's been two years since the world discovered the extent of American eavesdropping. And the man who lifted the lid on the National Security Agency's massive spy programme - Edward Snowden - says he has no regrets. RT LIVE http://rt.com/on-air Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday Like us on Facebook http://www.facebook.com/RTnews Follow us on Twitter http://twitter.com/RT_com Follow us on Instagram http://instagram.com/rt Follow us on Google+ http://plus.google.com/+RT Listen to us on Soundcloud: https://soundcloud.com/rttv RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.
Views: 11909 RT
UAE Business Magnate Khalaf Al-Habtoor: We Want Peace with Israel
 
01:21
UAE business magnate Khalaf Al-Habtoor said that he believed Israelis should be allowed to participate in sports events in the Arab world. "Let them play. We in the Arab world want to have peace with Israel in the future," he said. In a video uploaded to his Twitter account on March 2, Al-Habtoor called to stop referring to Israel as a "criminal enemy," to use modern logic and identify the interests of the Arab world and the GCC, and "pay no heed to what all the hypocrites and charlatans have to say."
Views: 3085 MEMRI TV Videos
A Debate on Torture: Legal Architect of CIA Secret Prisons, Rendition vs. Human Rights Attorney 2/3
 
24:25
http://www.democracynow.org - As the Senate Select Committee on Intelligence feuds with the CIA over the declassification of its 6,000-page report on the agency's secret detention and interrogation programs, we host a debate between former CIA acting general counsel John Rizzo and human rights attorney Scott Horton. This comes as the United Nations Human Rights Committee has criticized the Obama administration for closing its investigations into the CIA's actions after September 11. A U.N. report issued Thursday stated, "The Committee notes with concern that all reported investigations into enforced disappearances, torture and other cruel, inhuman or degrading treatment that had been committed in the context of the CIA secret rendition, interrogation and detention programmes were closed in 2012 leading only to a meager number of criminal charges brought against low-level operatives." Rizzo served as acting general counsel during much of the George W. Bush administration and was a key legal architect of the U.S. interrogation and detention program after the Sept. 11 attacks. He recently published a book titled, "Company Man: Thirty Years of Controversy and Crisis in the CIA." Attorney Scott Horton is contributing editor at Harper's Magazine and author of the forthcoming book, "The Lords of Secrecy: The National Security Elite and America's Stealth Foreign Policy." Watch and share the full debate uninterrupted: http://www.democracynow.org/2014/3/28/a_debate_on_torture_legal_architect Democracy Now!, is an independent global news hour that airs weekdays on 1,200+ TV and radio stations Monday through Friday. Watch our livestream 8-9am ET at http://www.democracynow.org. Please consider supporting independent media by making a donation to Democracy Now! today, visit http://owl.li/ruJ5Q. FOLLOW DEMOCRACY NOW! ONLINE: Facebook: http://www.facebook.com/democracynow Twitter: @democracynow Subscribe on YouTube: http://www.youtube.com/democracynow Listen on SoundCloud: http://www.soundcloud.com/democracynow Daily Email News Digest: http://www.democracynow.org/subscribe Google+: https://plus.google.com/+DemocracyNow Instagram: http://instagram.com/democracynow Tumblr: http://democracynow.tumblr Pinterest: http://www.pinterest.com/democracynow
Views: 3104 Democracy Now!
CITP/LAPA/WWS Special Event: Edward Snowden in Conversation with Bart Gellman
 
01:36:04
CITP, LAPA, and WWS hosted a live conversation between Edward Snowden (in Russia) and Bart Gellman (in Princeton). Since June 2013, author and Pulitzer Prize-winning journalist Gellman has written stories for The Washington Post about the National Security Agency (NSA) documents provided to him by former NSA contractor Snowden.
Views: 19445 CITP Princeton