acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Programming No-Fly Zones into Drones
From Schneier on Security

Programming No-Fly Zones into Drones

DJI is programming no-fly zones into its drone software. Here's how it'll work. The update will add a list of GPS coordinates to the drone's computer that tells...

Electronic Surveillance Failures Leading up to the 2008 Mumbai Terrorist Attacks
From Schneier on Security

Electronic Surveillance Failures Leading up to the 2008 Mumbai Terrorist Attacks

Long New York Times article based on "former American and Indian officials and classified documents disclosed by Edward J. Snowden" outlining the intelligence failures...

Understanding NSA Malware
From Schneier on Security

Understanding NSA Malware

Here are two essays trying to understand NSA malware and how it works, in light of the enormous number of documents released by Speigel recently....

National Academies Report on Bulk Intelligence Collection
From Schneier on Security

National Academies Report on Bulk Intelligence Collection

In January, the National Academies of Science (NAS) released a report on the bulk collection of signals intelligence. Basically, a year previously President Obama...

Friday Squid Blogging: How to Fish for Squid
From Schneier on Security

Friday Squid Blogging: How to Fish for Squid

The Washington Department of Fish and Wildlife explains how to fish for squid. As usual, you can also use this squid post to talk about the security stories in...

NSA Using Hacker Research and Results
From Schneier on Security

NSA Using Hacker Research and Results

In the latest article based on the Snowden documents, the Intercept is reporting that the NSA and GCHQ are piggy-backing on the work of hackers: In some cases,...

GPG Financial Difficulties
From Schneier on Security

GPG Financial Difficulties

Werner Koch, who has been maintaining the GPG email encryption program since 1997, is going broke and considering quitting. Updates to the article say that, because...

Tracking Bitcoin Scams
From Schneier on Security

Tracking Bitcoin Scams

Interesting paper: "There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams," by Marie Vasek and Tyler Moore. Abstract...

Obama Says Terrorism Is Not an Existential Threat
From Schneier on Security

Obama Says Terrorism Is Not an Existential Threat

In an interview this week, President Obama said that terrorism does not pose an existential threat: What I do insist on is that we maintain a proper perspective...

Texas School Overreaction
From Schneier on Security

Texas School Overreaction

Seems that a Texas school has suspended a 9-year-old for threatening another student with a replica One Ring. (Yes, that One Ring.) I've written about this sort...

Hiding a Morse Code Message in a Pop Song
From Schneier on Security

Hiding a Morse Code Message in a Pop Song

In Colombia: The team began experimenting with Morse code using various percussion instruments and a keyboard. They learned that operators skilled in Morse code...

Friday Squid Blogging: Large Squid Washes up on Greek Beach
From Schneier on Security

Friday Squid Blogging: Large Squid Washes up on Greek Beach

No mention of the species, but the photo is a depressing one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Co3 Systems Is Expanding into Europe
From Schneier on Security

Co3 Systems Is Expanding into Europe

This was supposed to be a secret until the middle of February, but we've been found out. We already have European customers; this is our European office. And, by...

Operating a Fake Bank
From Schneier on Security

Operating a Fake Bank

Here's a story of a fake bank in China -- a real bank, not an online bank -- that stole $32m from depositors over a year. Pro tip: real banks never offer 2%/week...

Canada Spies on Internet Downloads
From Schneier on Security

Canada Spies on Internet Downloads

Another story from the Snowden documents: According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle...

Subconscious Keys
From Schneier on Security

Subconscious Keys

I missed this paper when it was first published in 2012: "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks" Abstract...

Police Using Radar that Sees Through Walls
From Schneier on Security

Police Using Radar that Sees Through Walls

In the latest example of a military technology that has secretly been used by the police, we have radar guns that can see through walls....

The IDEA Encryption Algorithm with a 128-bit Block Length
From Schneier on Security

The IDEA Encryption Algorithm with a 128-bit Block Length

Here's an IDEA-variant with a 128-bit block length. While I think it's a great idea to bring IDEA up to a modern block length, the paper has none of the cryptanalysis...

Basaaly Moalin: The One "Terrorist" Caught by Section 215 Surveillance
From Schneier on Security

Basaaly Moalin: The One "Terrorist" Caught by Section 215 Surveillance

Remember back in 2013 when the then-director of the NSA Keith Alexander claimed that Section 215 bulk telephone metadata surveillance stopped "fifty-four different...

My Conversation with Edward Snowden
From Schneier on Security

My Conversation with Edward Snowden

Today, as part of a Harvard computer science symposium, I had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account