acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Public/Private Surveillance Partnership
From Schneier on Security

The Public/Private Surveillance Partnership

Imagine the government passed a law requiring all citizens to carry a tracking device. Such a law would immediately be found unconstitutional. Yet we all carryenormous...

Friday Squid Blogging: Squid Watch
From Schneier on Security

Friday Squid Blogging: Squid Watch

I like watches with no numbers. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

XKeyscore
From Schneier on Security

XKeyscore

The Guardian discusses a new secret NSA program: XKeyscore. It's the desktop system that allows NSA agents to spy on anyone over the Internet in real time. It...

<i>Cryptography Engineering</i> Book Review
From Schneier on Security

Cryptography Engineering Book Review

Good review of the strengths and weaknesses of Cryptography Engineering and Applied Cryptography. Best -- at least to me -- is the list of things missing, which...

False Positives and Ubiquitous Surveillance
From Schneier on Security

False Positives and Ubiquitous Surveillance

Searching on Google for a pressure cooker and backpacks got one family investigated by the police. More stories and comments. This seems not to be the NSA eavesdropping...

<i>Economist</i> Cyberwar Debate
From Schneier on Security

Economist Cyberwar Debate

Richard Bejtlich and Thomas Rid (author of the excellent book Cyber War Will Not Take Place) debate the cyberwar threat on the Economist website.

Scientists Banned from Revealing Details of Car-Security Hack
From Schneier on Security

Scientists Banned from Revealing Details of Car-Security Hack

The UK has banned researchers from revealing details of security vulnerabilities in car locks. In 2008, Phillips brought a similar suit against researchers who...

Brian Krebs Harassed
From Schneier on Security

Brian Krebs Harassed

This is what happens when you're a security writer and you piss off the wrong people: they conspire to have heroin mailed to you, and then to tip off the police...

Neighborhood Security: Feeling vs. Reality
From Schneier on Security

Neighborhood Security: Feeling vs. Reality

Research on why some neighborhoods feel safer: Salesses and collaborators Katja Schechtner and César A. Hidalgo built an online comparison tool using Google Street...

Really Clever Bank Card Fraud
From Schneier on Security

Really Clever Bank Card Fraud

This is a really clever social engineering attack against a bank-card holder: It all started, according to the police, on the Saturday night where one of this...

Obama's Continuing War Against Leakers
From Schneier on Security

Obama's Continuing War Against Leakers

The Obama Administration has a comprehensive "insider threat" program to detect leakers from within government. This is pre-Snowden. Not surprisingly, the combination...

Friday Squid Blogging: Squid Song
From Schneier on Security

Friday Squid Blogging: Squid Song

It's "Sparky the Giant Squid." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

NSA Cracked the Kryptos Sculpture Years Before the CIA Did
From Schneier on Security

NSA Cracked the Kryptos Sculpture Years Before the CIA Did

We interrupt this blog for some important inter-agency rivalry. The fourth part is still uncracked, though. Older links.

Secret Information Is More Trusted
From Schneier on Security

Secret Information Is More Trusted

This is an interesting, if slightly disturbing, result: In one experiment, we had subjects read two government policy papers from 1995, one from the State Department...

Details on NSA/FBI Eavesdropping
From Schneier on Security

Details on NSA/FBI Eavesdropping

We're starting to see Internet companies talk about the mechanics of how the US government spies on their users. Here, a Utah ISP owner describes his experiences...

Poached Eggs
From Schneier on Security

Poached Eggs

The story of people who poach and collect rare eggs, and the people who hunt them down. Securing wildlife against poachers is a difficult problem, especially when...

Michael Hayden on the Effects of Snowden's Whistleblowing
From Schneier on Security

Michael Hayden on the Effects of Snowden's Whistleblowing

Former NSA director Michael Hayden lists three effects of the Snowden documents: "...the undeniable operational effect of informing adversaries of American intelligence's...

NSA Implements Two-Man Control for Sysadmins
From Schneier on Security

NSA Implements Two-Man Control for Sysadmins

In an effort to lock the barn door after the horse has escaped, the NSA is implementing two-man control for sysadmins: NSA chief Keith Alexander said his agency...

How the FISA Court Undermines Trust
From Schneier on Security

How the FISA Court Undermines Trust

This is a succinct explanation of how the secrecy of the FISA court undermines trust. Surveillance types make a distinction between secrecy of laws, secrecy of...

Marc Rotenberg on the NSA Supreme Court Suit
From Schneier on Security

Marc Rotenberg on the NSA Supreme Court Suit

Marc Rotenberg of EPIC explains why he is suing the NSA in the Supreme Court. And USA Today has a back and forth on the topic.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account