Author Archive

Bruce Schneier

Adjunct Lecturer in Public Policy, Harvard Kennedy School

Bruce Schneier
Bruce Schneier, an internationally renowned security technologist, is the author of 14 books—including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World—as well as hundreds of articles, essays, and academic papers. He isa an Adjunct Lecturer in Public Policy, Harvard Kennedy School
Ideas

AI disinformation is a threat to elections

COMMENTARY | Learning to spot Russian, Chinese and Iranian meddling in other countries can help the US prepare for 2024.

Digital Government

AI could shore up democracy – here’s one way

Artificial intelligence could be a new solution to an old problem.

Ideas

Bots Are Destroying Political Discourse As We Know It

They’re mouthpieces for foreign actors, domestic political groups, even the candidates themselves. And soon you won’t be able to tell they’re bots.

Cybersecurity

The New Way Your Computer Can Be Attacked

Unprecedented computer-chip vulnerabilities exposed this month paint a grim picture of the future of cybersecurity.

Cybersecurity

Who Are the Shadow Brokers?

What is—and isn’t—known about the mysterious hackers leaking National Security Agency secrets

Cybersecurity

How Long Until Hackers Start Faking Leaked Documents?

There’s nothing stopping attackers from manipulating the data they make public.

Modernization

How the Internet of Things Limits Consumer Choice

A recent dustup over smart light bulbs illuminates a larger problem.

Modernization

Lesson From the Ashley Madison Hack: Cloud Makes Everyone Vulnerable

Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don’t get too comfortable.

Digital Government

Why US Officials Stopped Talking about 'Cyberwar'

A future awaits where countries share intelligence one minute, and hack and cyberattack each other the next.

Cybersecurity

We Still Don't Know Who Hacked Sony

Welcome to a world where it's impossible to tell the difference between random hackers and governments.

Cybersecurity

Did North Korea Really Attack Sony?

It's too early to take the U.S. government at its word.

Cybersecurity

Should U.S. Hackers Fix Cybersecurity Holes or Exploit Them?

Maybe someday we'll patch vulnerabilities faster than the enemy can use them in an attack, but we're not there yet.

Cybersecurity

How NSA Uses Attack Servers Shows How It Thinks About Secrecy and Risk

First, the FOXACID basics.

Digital Government

Zero Sum: Americans Must Sacrifice Some Security to Reform the NSA

The nation can survive the occasional terrorist attack, but our freedoms can't survive an invulnerable leader like Keith Alexander operating within inadequate constraints.

Digital Government

Commentary: The NSA Is Commandeering the Internet

Technology companies have to fight for their users, or they'll eventually lose them.

Digital Government

Do You Want the Government Buying Your Data From Corporations?

A new bill moving through Congress would give the authorities unprecedented access to citizens' information.