acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

NSA Hacking of Cell Phone Networks
From Schneier on Security

NSA Hacking of Cell Phone Networks

The Intercept has published an article -- based on the Snowden documents -- about AURORAGOLD, an NSA surveillance operation against cell phone network operators...

Rapiscan Full-Body Scanner for Sale
From Schneier on Security

Rapiscan Full-Body Scanner for Sale

Government surplus. Only $8,000 on eBay. Note that this device has been analyzed before....

Corporate Abuse of our Data
From Schneier on Security

Corporate Abuse of our Data

Last week, we learned about a striking piece of malware called Regin that has been infecting computer networks worldwide since 2008. It's more sophisticated than...

Friday Squid Blogging: Squid Poaching off the Coast of Japan
From Schneier on Security

Friday Squid Blogging: Squid Poaching off the Coast of Japan

There has been an increase in squid poaching by North Korea out of Japanese territorial waters. As usual, you can also use this squid post to talk about the security...

Surveillance Cartoon
From Schneier on Security

Surveillance Cartoon

Funny....

Corporations Misusing Our Data
From Schneier on Security

Corporations Misusing Our Data

In the Internet age, we have no choice but to entrust our data with private companies: e-mail providers, service providers, retailers, and so on. We realize that...

Olfactory Surveillance
From Schneier on Security

Olfactory Surveillance

The Denver police are using olfactometers to measure the concentration of cannabis in the air. I haven't found any technical information about these devices, their...

Quantum Attack on Public-Key Algorithm
From Schneier on Security

Quantum Attack on Public-Key Algorithm

This talk (and paper) describe a lattice-based public-key algorithm called Soliloquy developed by GCHQ, and a quantum-computer attack on it. News article....

The Future of Auditory Surveillance
From Schneier on Security

The Future of Auditory Surveillance

Interesting essay on the future of speech recognition, microphone miniaturization, and the future ubiquity of auditory surveillance....

Putting NSA/GCHQ Spying Together
From Schneier on Security

Putting NSA/GCHQ Spying Together

This is a really good analysis of how the NSA/GCHQ spying programs actually work. It's nice that we finally have enough documents public that we can start putting...

Friday Squid Blogging: Squid Bikes
From Schneier on Security

Friday Squid Blogging: Squid Bikes

Squid Bikes is a California brand. Article from Velo News. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Economic Failures of HTTPS Encryption
From Schneier on Security

Economic Failures of HTTPS Encryption

Interesting paper: "Security Collapse of the HTTPS Market." From the conclusion: Recent breaches at CAs have exposed several systemic vulnerabilities and market...

"Cooperating with the Future"
From Schneier on Security

"Cooperating with the Future"

This is an interesting paper -- the full version is behind a paywall -- about how we as humans can motivate people to cooperate with future generations. Abstract...

New Snowden Documents Show GCHQ Paying Cable & Wireless for Access
From Schneier on Security

New Snowden Documents Show GCHQ Paying Cable & Wireless for Access

A new story based on the Snowden documents and published in the German newspaper Süddeutsche Zeitung shows how the GCHQ worked with Cable & Wireless -- acquired...

FBI Agents Pose as Repairmen to Bypass Warrant Process
From Schneier on Security

FBI Agents Pose as Repairmen to Bypass Warrant Process

This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...

Regin: Another Military-Grade Malware
From Schneier on Security

Regin: Another Military-Grade Malware

Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...

The Security Underpinnnings of Cryptography
From Schneier on Security

The Security Underpinnnings of Cryptography

Nice article on some of the security assumptions we rely on in cryptographic algorithms....

New Kryptos Clue
From Schneier on Security

New Kryptos Clue

Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....

Friday Squid Blogging: Cephalopod Cognition
From Schneier on Security

Friday Squid Blogging: Cephalopod Cognition

Tales of cephalopod behavior, including octopuses, squid, cuttlefish and nautiluses. Cephalopod Cognition, published by Cambridge University Press, is currently...

Pre-Snowden Debate About NSA Call-Records Collection Program
From Schneier on Security

Pre-Snowden Debate About NSA Call-Records Collection Program

Reuters is reporting that in 2009, several senior NSA officials objected to the NSA call-records collection program. The now-retired NSA official, a longtime code...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account