acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

TSA Considering Implementing Randomized Security
From Schneier on Security

TSA Considering Implementing Randomized Security

For a change, here's a good idea by the TSA: TSA has just issued a Request for Information (RFI) to prospective vendors who could develop and supply such randomizers...

Counterterrorism Mission Creep
From Schneier on Security

Counterterrorism Mission Creep

One of the assurances I keep hearing about the U.S. government's spying on American citizens is that it's only used in cases of terrorism. Terrorism is, of course...

PRISM Q&A
From Schneier on Security

PRISM Q&A

Mikko Hypponen and I answered questions about PRISM on the TED website.

Snowden's Dead Man's Switch
From Schneier on Security

Snowden's Dead Man's Switch

Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...

DHS Puts its Head in the Sand
From Schneier on Security

DHS Puts its Head in the Sand

On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees: From: xxxxx Sent: Thursday, July...

Tapping Undersea Cables
From Schneier on Security

Tapping Undersea Cables

Good article on the longstanding practice of secretly tapping undersea cables. This is news right now because of a new Snowden document.

The Value of Breaking the Law
From Schneier on Security

The Value of Breaking the Law

Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...

A Problem with the US Privacy and Civil Liberties Oversight Board
From Schneier on Security

A Problem with the US Privacy and Civil Liberties Oversight Board

I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents. This particular comment...

Walls Around Nations
From Schneier on Security

Walls Around Nations

A political history of walls: Roman walls such as Hadrian's Wall, the Great Wall of China, the Berlin Wall, and the wall between Mexico and the U.S. Moral: they...

My Fellowship at the Berkman Center
From Schneier on Security

My Fellowship at the Berkman Center

I have been awarded a fellowship at the Berkman Center for Internet and Society at Harvard University, for the 2013–2014 academic year. I'm excited about this;...

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships
From Schneier on Security

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships

This is really interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

F2P Monetization Tricks
From Schneier on Security

F2P Monetization Tricks

This is a really interesting article about something I never even thought about before: how games ("F2P" means "free to play") trick players into paying for stuff...

More NSA Code Names
From Schneier on Security

More NSA Code Names

We don't know what they mean, but there are a bunch of NSA code names on LinkedIn profiles. ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE...

The NSA's Project SHAMROCK
From Schneier on Security

The NSA's Project SHAMROCK

Nice history of Project SHAMROCK, the NSA's illegal domestic surveillance program from the 1970s. It targeted telegrams.

Musing on Secret Languages
From Schneier on Security

Musing on Secret Languages

This is really interesting. It starts by talking about a "cant" dictionary of 16th-century thieves' argot, and ends up talking about secret languages in general...

The Effectiveness of Privacy Audits
From Schneier on Security

The Effectiveness of Privacy Audits

This study concludes that there is a benefit to forcing companies to undergo privacy audits: "The results show that there are empirical regularities consistent...

Another Perspective on the Value of Privacy
From Schneier on Security

Another Perspective on the Value of Privacy

A philosophical perspective: But while Descartes's overall view has been rightly rejected, there is something profoundly right about the connection between privacy...

Big Data Surveillance Results in Bad Policy
From Schneier on Security

Big Data Surveillance Results in Bad Policy

Evgeny Morozov makes a point about surveillance and big data: it just looks for useful correlations without worrying about causes, and leads people to implement...

Protecting E-Mail from Eavesdropping
From Schneier on Security

Protecting E-Mail from Eavesdropping

In the wake of the Snowden NSA documents, reporters have been asking me whether encryption can solve the problem. Leaving aside the fact that much of what theadvice...

Friday Squid Blogging: Giant Origami Squid
From Schneier on Security

Friday Squid Blogging: Giant Origami Squid

Giant origami squid photo found -- without explanation -- on Reddit. As usual, you can also use this squid post to talk about the security stories in the news...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account