acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Squid Song
From Schneier on Security

Friday Squid Blogging: Squid Song

It's "Sparky the Giant Squid." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

NSA Cracked the Kryptos Sculpture Years Before the CIA Did
From Schneier on Security

NSA Cracked the Kryptos Sculpture Years Before the CIA Did

We interrupt this blog for some important inter-agency rivalry. The fourth part is still uncracked, though. Older links.

Secret Information Is More Trusted
From Schneier on Security

Secret Information Is More Trusted

This is an interesting, if slightly disturbing, result: In one experiment, we had subjects read two government policy papers from 1995, one from the State Department...

Details on NSA/FBI Eavesdropping
From Schneier on Security

Details on NSA/FBI Eavesdropping

We're starting to see Internet companies talk about the mechanics of how the US government spies on their users. Here, a Utah ISP owner describes his experiences...

Poached Eggs
From Schneier on Security

Poached Eggs

The story of people who poach and collect rare eggs, and the people who hunt them down. Securing wildlife against poachers is a difficult problem, especially when...

Michael Hayden on the Effects of Snowden's Whistleblowing
From Schneier on Security

Michael Hayden on the Effects of Snowden's Whistleblowing

Former NSA director Michael Hayden lists three effects of the Snowden documents: "...the undeniable operational effect of informing adversaries of American intelligence's...

NSA Implements Two-Man Control for Sysadmins
From Schneier on Security

NSA Implements Two-Man Control for Sysadmins

In an effort to lock the barn door after the horse has escaped, the NSA is implementing two-man control for sysadmins: NSA chief Keith Alexander said his agency...

How the FISA Court Undermines Trust
From Schneier on Security

How the FISA Court Undermines Trust

This is a succinct explanation of how the secrecy of the FISA court undermines trust. Surveillance types make a distinction between secrecy of laws, secrecy of...

Marc Rotenberg on the NSA Supreme Court Suit
From Schneier on Security

Marc Rotenberg on the NSA Supreme Court Suit

Marc Rotenberg of EPIC explains why he is suing the NSA in the Supreme Court. And USA Today has a back and forth on the topic.

Prosecuting Snowden
From Schneier on Security

Prosecuting Snowden

I generally don't like stories about Snowden as a person, because they distract from the real story of the NSA surveillance programs, but this article on the costs...

Violence as a Source of Trust in Criminal Societies
From Schneier on Security

Violence as a Source of Trust in Criminal Societies

This is interesting: If I know that you have committed a violent act, and you know that I have committed a violent act, we each have information on each otherAbstract...

Friday Squid Blogging: Paul Burke Giant Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Paul Burke Giant Squid Sculpture

The wood sculpture is part of an art exhibit at the VanDusen Botanical Garden in Vancouver.

TSA Considering Implementing Randomized Security
From Schneier on Security

TSA Considering Implementing Randomized Security

For a change, here's a good idea by the TSA: TSA has just issued a Request for Information (RFI) to prospective vendors who could develop and supply such randomizers...

Counterterrorism Mission Creep
From Schneier on Security

Counterterrorism Mission Creep

One of the assurances I keep hearing about the U.S. government's spying on American citizens is that it's only used in cases of terrorism. Terrorism is, of course...

PRISM Q&A
From Schneier on Security

PRISM Q&A

Mikko Hypponen and I answered questions about PRISM on the TED website.

Snowden's Dead Man's Switch
From Schneier on Security

Snowden's Dead Man's Switch

Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...

DHS Puts its Head in the Sand
From Schneier on Security

DHS Puts its Head in the Sand

On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees: From: xxxxx Sent: Thursday, July...

Tapping Undersea Cables
From Schneier on Security

Tapping Undersea Cables

Good article on the longstanding practice of secretly tapping undersea cables. This is news right now because of a new Snowden document.

The Value of Breaking the Law
From Schneier on Security

The Value of Breaking the Law

Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...

A Problem with the US Privacy and Civil Liberties Oversight Board
From Schneier on Security

A Problem with the US Privacy and Civil Liberties Oversight Board

I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents. This particular comment...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account