acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Another Interview
From Schneier on Security

Another Interview

I was interviewed by MinnPost.

Conspiracy Theories and the NSA
From Schneier on Security

Conspiracy Theories and the NSA

I've recently seen two articles speculating on the NSA's capability, and practice, of spying on members of Congress and other elected officials. The evidence is...

The NSA's Cryptographic Capabilities
From Schneier on Security

The NSA's Cryptographic Capabilities

The latest Snowden document is the US intelligence "black budget." There's a lot of information in the few pages the Washington Post decided to publish, including...

The NSA is Breaking Most Encryption on the Internet
From Schneier on Security

The NSA is Breaking Most Encryption on the Internet

The new Snoden revelations are explosive. Basically, the NSA is able to decrypt most of the Internet. They're doing it primarily by cheating, not by mathematics...

The Effect of Money on Trust
From Schneier on Security

The Effect of Money on Trust

Money reduces trust in small groups, but increases it in larger groups. Basically, the introduction of money allows society to scale. The team devised an experiment...

<i>Journal of Homeland Security and Emergency Management</i>
From Schneier on Security

Journal of Homeland Security and Emergency Management

I keep getting alerts of new issues, but there are rarely articles I find interesting.

Human/Machine Trust Failures
From Schneier on Security

Human/Machine Trust Failures

I jacked a visitor's badge from the Eisenhower Executive Office Building in Washington, DC, last month. The badges are electronic; they're enabled when you check...

SHA-3 Status
From Schneier on Security

SHA-3 Status

NIST's John Kelsey gave an excellent talk on the history, status, and future of the SHA-3 hashing standard. The slides are online.

Business Opportunities in Cloud Security
From Schneier on Security

Business Opportunities in Cloud Security

Bessemer Venture Partners partner David Cowan has an interesting article on the opportunities for cloud security companies. Richard Stiennnon, an industry analyst...

Syrian Electronic Army Cyberattacks
From Schneier on Security

Syrian Electronic Army Cyberattacks

The Syrian Electronic Army attacked again this week, compromising the websites of the New York Times, Twitter, the Huffington Post, and others. Political hacking...

Our Newfound Fear of Risk
From Schneier on Security

Our Newfound Fear of Risk

We're afraid of risk. It's a normal part of life, but we're increasingly unwilling to accept it at any level. So we turn to technology to protect us. The problem...

1983 Article on the NSA
From Schneier on Security

1983 Article on the NSA

The moral is that NSA surveillance overreach has been going on for a long, long time.

Friday Squid Blogging: Bobtail Squid Photo
From Schneier on Security

Friday Squid Blogging: Bobtail Squid Photo

Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Opsec Details of Snowden Meeting with Greenwald and Poitras
From Schneier on Security

Opsec Details of Snowden Meeting with Greenwald and Poitras

I don't like stories about the personalities in the Snowden affair, because it detracts from the NSA and the policy issues. But I'm a sucker for operational security...

More on the NSA Commandeering the Internet
From Schneier on Security

More on the NSA Commandeering the Internet

If there's any confirmation that the U.S. government has commandeered the Internet for worldwide surveillance, it is what happened with Lavabit earlier this month...

How Many Leakers Came Before Snowden?
From Schneier on Security

How Many Leakers Came Before Snowden?

Assume it's really true that the NSA has no idea what documents Snowden took, and that they wouldn't even know he'd taken anything if he hadn't gone public. The...

The Federal Trade Commission and Privacy
From Schneier on Security

The Federal Trade Commission and Privacy

New paper on the FTC and its actions to protect privacy: Abstract: One of the great ironies about information privacy law is that the primary regulation of privacy...

Feds Target Polygraph-Beating Company
From Schneier on Security

Feds Target Polygraph-Beating Company

A company that teaches people how to beat lie detectors is under investigation.

Evading Internet Censorship
From Schneier on Security

Evading Internet Censorship

This research project by Brandon Wiley -- the tool is called "Dust" -- looks really interesting. Here's the description of his Defcon talk: Abstract: The greatest...

More on NSA Data Collection
From Schneier on Security

More on NSA Data Collection

There's an article from Wednesday's Wall Street Journal that gives more details about the NSA's data collection efforts. The system has the capacity to reach roughly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account