acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NSA Collects Hundreds of Millions of Text Messages Daily
From Schneier on Security

NSA Collects Hundreds of Millions of Text Messages Daily

No surprise here. Although we some new codenames: DISHFIRE: The NSA's program to collect text messages and text-message metadata. PREFER: The NSA's program to...

SIERRAMONTANA: NSA Exploit of the Day
From Schneier on Security

SIERRAMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: SIERRAMONTANA (TS//SI//REL) SIERRAMONTANA provides persistence for DNThere...

Today I Briefed Congress on the NSA
From Schneier on Security

Today I Briefed Congress on the NSA

This morning I spent an hour in a closed room with six Members of Congress: Rep. Logfren, Rep. Sensenbrenner, Rep. Scott, Rep. Goodlate, Rep Thompson, and Rep....

Edward Elgar's Ciphers
From Schneier on Security

Edward Elgar's Ciphers

Elgar's cryptography puzzles from the late 1890s.

Cell Phone Tracking by Non-State Actors
From Schneier on Security

Cell Phone Tracking by Non-State Actors

This is interesting: Adding credence to the theory that Brooklyn landlord Menachem Stark was kidnapped and murdered by professionals, a law enforcement source ...

SCHOOLMONTANA: NSA Exploit of the Day
From Schneier on Security

SCHOOLMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: SCHOOLMONTANA (TS//SI//REL) SCHOOLMONTANA provides persistence for DNThere...

The Changing Cost of Surveillance
From Schneier on Security

The Changing Cost of Surveillance

From Ashkan Soltani's blog post: The Yale Law Journal Online (YLJO) just published an article that I co-authored with Kevin Bankston (first workshopped at the ...

HEADWATER: NSA Exploit of the Day
From Schneier on Security

HEADWATER: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: HEADWATER (TS//SI//REL) HEADWATER is a Persistent Backdoor (PDB) software...

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth
From Schneier on Security

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth

It's something that we're hearing a lot, both from NSA Director General Keith Alexander and others: the NSA's mass surveillance programs could have stopped 9/11...

SOUFFLETROUGH: NSA Exploit of the Day
From Schneier on Security

SOUFFLETROUGH: NSA Exploit of the Day

One of the top secret NSA documents published by Der Spiegel is a 50-page catalog of "implants" from the NSA's Tailored Access Group. Because the individual implants...

How the NSA Threatens National Security
From Schneier on Security

How the NSA Threatens National Security

Secret NSA eavesdropping is still in the news. Details about once secret programs continue to leak. The Director of National Intelligence has recently declassified...

Friday Squid Blogging: Squid New Year
From Schneier on Security

Friday Squid Blogging: Squid New Year

Happy squid new year. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

1971 FBI Burglary
From Schneier on Security

1971 FBI Burglary

Interesting story: ...burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with...

JETPLOW: NSA Exploit of the Day
From Schneier on Security

JETPLOW: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: JETPLOW (TS//SI//REL) JETPLOW is a firmware persistence implant for Cisco...

Security Risks of Embedded Systems
From Schneier on Security

Security Risks of Embedded Systems

We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself -- as with the Internet of Things...

HALLUXWATER: NSA Exploit of the Day
From Schneier on Security

HALLUXWATER: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: HALLUXWATER (TS//SI//REL) The HALLUXWATER Persistence Back Door implant...

The Failure of Privacy Notices and Consumer Choice
From Schneier on Security

The Failure of Privacy Notices and Consumer Choice

Paper from First Monday: "Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy." Abstract:...

GOURMETTROUGH: NSA Exploit of the Day
From Schneier on Security

GOURMETTROUGH: NSA Exploit of the Day

Continuing our walk through the NSA's Tailored Access Operations (TAO) group implant catalog: GOURMETTROUGH (TS//SI//REL) GOURMETTROUGH is a user configurable...

Matt Blaze on TAO's Methods
From Schneier on Security

Matt Blaze on TAO's Methods

Matt Blaze makes a point that I have been saying for a while now: Don't get me wrong, as a security specialist, the NSA's Tailored Access Operations (TAO) scare...

FEEDTROUGH: NSA Exploit of the Day
From Schneier on Security

FEEDTROUGH: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: FEEDTROUGH (TS//SI//REL) FEEDTROUGH is a persistence technique for two software...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account