acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

The Japanese Response to Terrorism
From Schneier on Security

The Japanese Response to Terrorism

Lessons from Japan's response to Aum Shinrikyo: Yet what's as remarkable as Aum's potential for mayhem is how little of it, on balance, they actually caused. Don't...

New Details on Skype Eavesdropping
From Schneier on Security

New Details on Skype Eavesdropping

This article, on the cozy relationship between the commercial personal-data industry and the intelligence industry, has new information on the security of Skype...

Love Letter to an NSA Agent
From Schneier on Security

Love Letter to an NSA Agent

A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity." A similar sentiment is expressed in this video.

The US Uses Vulnerability Data for Offensive Purposes
From Schneier on Security

The US Uses Vulnerability Data for Offensive Purposes

Companies allow US intelligence to exploit vulnerabilities before it patches them: Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...

Petition the NSA to Subject its Surveillance Program to Public Comment
From Schneier on Security

Petition the NSA to Subject its Surveillance Program to Public Comment

I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on: In a request today...

Finding Sociopaths on Facebook
From Schneier on Security

Finding Sociopaths on Facebook

On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media. My hypothesis is that scienceknow...

Cost/Benefit Questions NSA Surveillance
From Schneier on Security

Cost/Benefit Questions NSA Surveillance

John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...

Details of NSA Data Requests from US Corporations
From Schneier on Security

Details of NSA Data Requests from US Corporations

Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...

NSA Secrecy and Personal Privacy
From Schneier on Security

NSA Secrecy and Personal Privacy

In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...

Evidence that the NSA Is Storing Voice Content, Not Just Metadata
From Schneier on Security

Evidence that the NSA Is Storing Voice Content, Not Just Metadata

Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading. I expressed skepticism about this just...

Project C-43: A Final Piece of Public-Key Cryptography History
From Schneier on Security

Project C-43: A Final Piece of Public-Key Cryptography History

This finally explains what John Ellis was talking about in "The Possibility of Non-Secret Encryption" when he dropped a tantalizing hint about wartime work at Bell...

Blowback from the NSA Surveillance
From Schneier on Security

Blowback from the NSA Surveillance

There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD...

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid
From Schneier on Security

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid

It's a novel behavior. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Sixth Annual Movie-Plot Threat Contest Semifinalists
From Schneier on Security

Sixth Annual Movie-Plot Threat Contest Semifinalists

On April 1, I announced the Sixth Annual Movie Plot Threat Contest: I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...

Ricin as a Terrorist Tool
From Schneier on Security

Ricin as a Terrorist Tool

This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction: Abstract: In recent yearsThis...

Trading Privacy for Convenience
From Schneier on Security

Trading Privacy for Convenience

Ray Wang makes an important point about trust and our data: This is the paradox. The companies contending to win our trust to manage our digital identities all...

More on Feudal Security
From Schneier on Security

More on Feudal Security

Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...

Essays Related to NSA Spying Documents
From Schneier on Security

Essays Related to NSA Spying Documents

Here's a quick list of some of my older writings that are related to the current NSA spying documents: "The Internet Is a Surveillance State ," 2013. The importance...

Prosecuting Snowden
From Schneier on Security

Prosecuting Snowden

Edward Snowden broke the law by releasing classified information. This isn't under debate; it's something everyone with a security clearance knows. It's written...

The Psychology of Conspiracy Theories
From Schneier on Security

The Psychology of Conspiracy Theories

Interesting. Crazy as these theories are, those propagating them are not -- they’re quite normal, in fact. But recent scientific research tells us this much: if...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account