acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

William Binney Explains NSA Surveillance Using Snowden's Documents
From Schneier on Security

William Binney Explains NSA Surveillance Using Snowden's Documents

Former NSA employee -- not technical director, as the link says -- explains how NSA bulk surveillance works, using some of the Snowden documents. Very interesting...

The NSA's Private Cloud
From Schneier on Security

The NSA's Private Cloud

The NSA is building a private cloud with its own security features: As a result, the agency can now track every instance of every individual accessing what is in...

Firechat
From Schneier on Security

Firechat

Firechat is a secure wireless peer-to-peer chat app: Firechat is theoretically resistant to the kind of centralized surveillance that the Chinese government (as...

Security Theater in China
From Schneier on Security

Security Theater in China

The Chinese government checked ten thousand pigeons for "dangerous materials." Because fear....

NSA Patents Available for License
From Schneier on Security

NSA Patents Available for License

There's a new article on NSA's Technology Transfer Program, a 1990s-era program to license NSA patents to private industry. I was pretty dismissive about the offerings...

Friday Squid Blogging: Squid Fishing Moves North in California
From Schneier on Security

Friday Squid Blogging: Squid Fishing Moves North in California

Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I...

Medical Records Theft and Fraud
From Schneier on Security

Medical Records Theft and Fraud

There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals...

Security Trade-offs of Cloud Backup
From Schneier on Security

Security Trade-offs of Cloud Backup

This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This...

Nasty Vulnerability found in Bash
From Schneier on Security

Nasty Vulnerability found in Bash

It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software...

Julian Sanchez on the NSA and Surveillance Reform
From Schneier on Security

Julian Sanchez on the NSA and Surveillance Reform

Julian Sanchez of the Cato Institute has a lengthy audio interview on NSA surveillance and reform. Worth listening to....

Detecting Robot-Handwriting
From Schneier on Security

Detecting Robot-Handwriting

Interesting article on the arms race between creating robot "handwriting" that looks human, and detecting text that has been written by a robot. Robots will continue...

Lesson in Successful Disaster Planning
From Schneier on Security

Lesson in Successful Disaster Planning

I found the story of the Federal Reserve on 9/11 to be fascinating. It seems they just flipped a switch on all their Y2K preparations, and it worked....

Kill Switches for Weapons
From Schneier on Security

Kill Switches for Weapons

Jonathan Zittrain argues that our military weapons should be built with a kill switch, so they become useless when they fall into enemy hands....

Security for Vehicle-to-Vehicle Communications
From Schneier on Security

Security for Vehicle-to-Vehicle Communications

The National Highway Traffic Safety Administration (NHTSA) has released a report titled "Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application...

Friday Squid Blogging: Colossal Squid Dissected in New Zealand
From Schneier on Security

Friday Squid Blogging: Colossal Squid Dissected in New Zealand

Months after it was found in August, scientists have dissected a colossal squid. As usual, you can also use this squid post to talk about the security stories in...

iOS 8 Security
From Schneier on Security

iOS 8 Security

Apple claims that they can no longer unlock iPhones, even if the police show up with a warrant. Of course they still have access to everything in iCloud, but it's...

Fake Cell Phone Towers Across the US
From Schneier on Security

Fake Cell Phone Towers Across the US

Earlier this month, there were a bunch of stories about fake cell phone towers discovered around the US These seems to be ISMI catchers, like Harris Corporation's...

Terrible Article on Vernam Ciphers
From Schneier on Security

Terrible Article on Vernam Ciphers

If there's anything that confuses wannabe cryptographers, it's one-time pads....

The Full Story of Yahoo's Fight Against PRISM
From Schneier on Security

The Full Story of Yahoo's Fight Against PRISM

In 2008 Yahoo fought the NSA to avoid becoming part of the PRISM program. They eventually lost their court battle, and at one point were threatened with a $250,000...

Identifying Dread Pirate Roberts
From Schneier on Security

Identifying Dread Pirate Roberts

According to court documents, Dread Pirate Roberts was identified because a CAPTCHA service used on the Silk Road login page leaked the users' true location....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account