acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Close-In Surveillance Using Your Phone's Wi-Fi
From Schneier on Security

Close-In Surveillance Using Your Phone's Wi-Fi

This article talks about applications in retail, but the possibilities are endless. Every smartphone these days comes equipped with a WiFi card. When the cardpick...

NSA Eavesdropping on Google and Yahoo Networks
From Schneier on Security

NSA Eavesdropping on Google and Yahoo Networks

The Washington Post reported that the NSA is eavesdropping on the Google and Yahoo private networks -- the code name for the program is MUSCULAR. I may write more...

The Battle for Power on the Internet
From Schneier on Security

The Battle for Power on the Internet

We're in the middle of an epic battle for power in cyberspace. On one side are the traditional, organized, institutional powers such as governments and large multinational...

What the NSA Can and Cannot Do
From Schneier on Security

What the NSA Can and Cannot Do

Good summary from the London Review of Books.

Arguing for NSA-Level Internet Surveillance
From Schneier on Security

Arguing for NSA-Level Internet Surveillance

Jack Goldsmith argues that we need the NSA to surveil the Internet not for terrorism reasons, but for cyberespionage and cybercrime reasons. Daniel Gallington ...

Understanding the Threats in Cyberspace
From Schneier on Security

Understanding the Threats in Cyberspace

The primary difficulty of cyber security isn't technology -- it's policy. The Internet mirrors real-world society, which makes security policy online as complicated...

US Government Monitoring Public Internet in Real Time
From Schneier on Security

US Government Monitoring Public Internet in Real Time

Here's a demonstration of the US government's capabilities to monitor the public Internet. Former CIA and NSA Director Michael Hayden was on the Acela train between...

Friday Squid Blogging: Dynamic Biophotonics in Squid
From Schneier on Security

Friday Squid Blogging: Dynamic Biophotonics in Squid

Female squid exhibit sexually dimorphic tunable leucophores and iridocytes. Just so you know. Here's the story in more accessible language. As usual, you can...

Book Review: <i>Cyber War Will Not Take Place</i>
From Schneier on Security

Book Review: Cyber War Will Not Take Place

Thomas Rid, Cyber War Will Not Take Place, Oxford University Press, 2013. Cyber war is possibly the most dangerous buzzword of the Internet era. The fear-inducing...

Cognitive Biases About Violence as a Negotiating Tactic
From Schneier on Security

Cognitive Biases About Violence as a Negotiating Tactic

Interesting paper: Max Abrahms, "The Credibility Paradox: Violence as a Double-Edged Sword in International Politics," International Studies Quarterly, 2013: ...

DARPA Contest for Fully-Automated Network Defense
From Schneier on Security

DARPA Contest for Fully-Automated Network Defense

DARPA is looking for a fully-automated network defense system: What if computers had a "check engine" light that could indicate new, novel security problems? What...

Code Names for NSA Exploit Tools
From Schneier on Security

Code Names for NSA Exploit Tools

This is from a Snowden document released by Le Monde: General Term Descriptions: HIGHLANDS: Collection from Implants VAGRANT: Collection of Computer Screens MAGNETIC...

Dry Ice Bombs at LAX
From Schneier on Security

Dry Ice Bombs at LAX

The news story about the guy who left dry ice bombs in restricted areas of LAX is really weird. I can't get worked up over it, though. Dry ice bombs are a harmless...

Can I Be Trusted?
From Schneier on Security

Can I Be Trusted?

SlashDot asks the question: I'm a big fan of Bruce Schneier, but just to play devil's advocate, let's say, hypothetically, that Schneier is actually in cahoots...

Defending Against Crypto Backdoors
From Schneier on Security

Defending Against Crypto Backdoors

We already know the NSA wants to eavesdrop on the Internet. It has secret agreements with telcos to get direct access to bulk Internet traffic. It has massive systems...

The Trajectories of Government and Corporate Surveillance
From Schneier on Security

The Trajectories of Government and Corporate Surveillance

Historically, surveillance was difficult and expensive. Over the decades, as technology advanced, surveillance became easier and easier. Today, we find ourselves...

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video
From Schneier on Security

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video

Even I think this is weird.

D-Link Router Backdoor
From Schneier on Security

D-Link Router Backdoor

Several versions of D-Link router firmware contain a backdoor. Just set the browser's user agent string to "xmlset_roodkcableoj28840ybtide," and you're in. (Hint...

Identifying Cell Phones Through Sensor Imperfections
From Schneier on Security

Identifying Cell Phones Through Sensor Imperfections

There seems to be a bunch of research into uniquely identifying cell phones through unique analog characteristics of the various embedded sensors. These sortsSlashdot...

"A Court Order Is an Insider Attack"
From Schneier on Security

"A Court Order Is an Insider Attack"

Ed Felten makes a strong argument that a court order is exactly the same thing as an insider attack: To see why, consider two companies, which we'll call Lavabit...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account