US Declassifies Information on JUMPSEAT Spy Satellites

The US National Reconnaissance Office has declassified information about a fleet of spy satellites operating between 1971... https://www.schneier.com/blog/archives/2026/02/us-declassifies-information-on-jumpseat-spy-satellites.html

#nationalsecuritypolicy #historyofsecurity #Uncategorized #espionage

US Declassifies Information on JUMPSEAT Spy Satellites - Schneier on Security

The US National Reconnaissance Office has declassified information about a fleet of spy satellites operating between 1971 and 2006. I’m actually impressed to see a declassification only two decades after decommission.

Schneier on Security

1980s Hacker Manifesto

Forty years ago, The Mentor—Loyd Blankenship—published “The Conscience of a Hacker” in Phrack.
... https://www.schneier.com/blog/archives/2026/01/1980s-hacker-manifesto.html

#historyofsecurity #Uncategorized #hacking

1980s Hacker Manifesto - Schneier on Security

Forty years ago, The Mentor—Loyd Blankenship—published “The Conscience of a Hacker” in Phrack. You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals...

Schneier on Security

SIGINT During World War II

The NSA and GCHQ have jointly published a history of World War II SIGINT: “Secret Messengers: Disseminating SIGINT in the Second World War.” T... https://www.schneier.com/blog/archives/2025/08/sigint-during-world-war-ii.html

#historyofcryptography #historyofsecurity #Uncategorized #intelligence #reports #GCHQ #NSA #war

SIGINT During World War II - Schneier on Security

The NSA and GCHQ have jointly published a history of World War II SIGINT: “Secret Messengers: Disseminating SIGINT in the Second World War.” This is the story of the British SLUs (Special Liaison Units) and the American SSOs (Special Security Officers).

Schneier on Security

DeepSec 2024 Talk: Modern vs. 0ld Sk00l – Seth Law

The development landscape includes an ever-changing set of security practices. It has finally become standard practice to perform penetration testing, run threat modeling, teach developers about security, push left, and have zero trust. This shows the industry is better off today than in previous years. Or does it? Get a taste for the actual history of security and why everything old is new again. See security failures as they existed in years past and how they still exist in modern […]

https://whalers.ir/blog/deepsec-2024-talk-modern-vs-0ld-sk00l-seth-law/3769/

The First Password on the Internet

It was created in 1973 by Peter Kirstein:
So from the beginning I p... https://www.schneier.com/blog/archives/2025/01/the-first-password-on-the-internet.html

#historyofsecurity #Uncategorized #passwords #Internet

The First Password on the Internet - Schneier on Security

It was created in 1973 by Peter Kirstein: So from the beginning I put password protection on my gateway. This had been done in such a way that even if UK users telephoned directly into the communications computer provided by Darpa in UCL, they would require a password. In fact this was the first password on Arpanet. It proved invaluable in satisfying authorities on both sides of the Atlantic for the 15 years I ran the service ­ during which no security breach occurred over my link. I also put in place a system of governance that any UK users had to be approved by a committee which I chaired but which also had UK government and British Post Office representation...

Schneier on Security

Steve Bellovin’s Retirement Talk

Steve Bellovin is retiring. Here’s his retirement talk, reflecting on his career and what the cybersecurity field needs next.... https://www.schneier.com/blog/archives/2024/11/steve-bellovins-retirement-talk.html

#historyofsecurity #Uncategorized #cybersecurity

Steve Bellovin's Retirement Talk - Schneier on Security

Steve Bellovin is retiring. Here’s his retirement talk, reflecting on his career and what the cybersecurity field needs next.

Schneier on Security

Good Essay on the History of Bad Password Policies

Stuart Schechter makes some good points on the history of bad password policies:
Morris and Thompson’s work brought much-needed data to highlight a problem ... https://www.schneier.com/blog/archives/2024/11/good-essay-on-the-history-of-bad-password-policies.html

#historyofsecurity #Uncategorized #passwords #hashes

Good Essay on the History of Bad Password Policies - Schneier on Security

Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but that had not been studied scientifically. Their work was a big step forward, if not for two mistakes that would impede future progress in improving passwords for decades. First, was Morris and Thompson’s confidence that their solution, a password policy, would fix the underlying problem of weak passwords. They incorrectly assumed that if they prevented the specific categories of weakness that they had noted, that the result would be something strong. After implementing a requirement that password have multiple characters sets or more total characters, they wrote:...

Schneier on Security

List of Old NSA Training Videos

The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos.
There are ... https://www.schneier.com/blog/archives/2024/09/list-of-old-nsa-training-videos.html

#historyofcryptography #historyofsecurity #Uncategorized #cryptography #videos #FOIA #NSA

List of Old NSA Training Videos - Schneier on Security

Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published

The “long lost lecture” by Adm. Grace Hopper has <a href="h... https://www.schneier.com/blog/archives/2024/08/adm-grace-hoppers-1982-nsa-lecture-has-been-published.html

#historyofcomputing #historyofsecurity #Uncategorized #videos #NSA

Adm. Grace Hopper's 1982 NSA Lecture Has Been Published - Schneier on Security

The “long lost lecture” by Adm. Grace Hopper has been published by the NSA. (Note that there are two parts.) It’s a wonderful talk: funny, engaging, wise, prescient. Remember that talk was given in 1982, less than a year before the ARPANET switched to TCP/IP and the internet went operational. She was a remarkable person. Listening to it, and thinking about the audience of NSA engineers, I wonder how much of what she’s talking about as the future of computing—miniaturization, parallelization—was being done in the present and in secret. ...

Schneier on Security

Brett Solomon on Digital Rights

Brett Solomon is retiring from AccessNow after fifteen years as its Executive Director. He’s written a blog post about what he’s learned and what comes next.... https://www.schneier.com/blog/archives/2024/07/brett-solomon-on-digital-rights.html

#historyofsecurity #Uncategorized #humanrights

Brett Solomon on Digital Rights - Schneier on Security