acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

How the FISA Court Undermines Trust
From Schneier on Security

How the FISA Court Undermines Trust

This is a succinct explanation of how the secrecy of the FISA court undermines trust. Surveillance types make a distinction between secrecy of laws, secrecy of...

Marc Rotenberg on the NSA Supreme Court Suit
From Schneier on Security

Marc Rotenberg on the NSA Supreme Court Suit

Marc Rotenberg of EPIC explains why he is suing the NSA in the Supreme Court. And USA Today has a back and forth on the topic.

Prosecuting Snowden
From Schneier on Security

Prosecuting Snowden

I generally don't like stories about Snowden as a person, because they distract from the real story of the NSA surveillance programs, but this article on the costs...

Violence as a Source of Trust in Criminal Societies
From Schneier on Security

Violence as a Source of Trust in Criminal Societies

This is interesting: If I know that you have committed a violent act, and you know that I have committed a violent act, we each have information on each otherAbstract...

Friday Squid Blogging: Paul Burke Giant Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Paul Burke Giant Squid Sculpture

The wood sculpture is part of an art exhibit at the VanDusen Botanical Garden in Vancouver.

TSA Considering Implementing Randomized Security
From Schneier on Security

TSA Considering Implementing Randomized Security

For a change, here's a good idea by the TSA: TSA has just issued a Request for Information (RFI) to prospective vendors who could develop and supply such randomizers...

Counterterrorism Mission Creep
From Schneier on Security

Counterterrorism Mission Creep

One of the assurances I keep hearing about the U.S. government's spying on American citizens is that it's only used in cases of terrorism. Terrorism is, of course...

PRISM Q&A
From Schneier on Security

PRISM Q&A

Mikko Hypponen and I answered questions about PRISM on the TED website.

Snowden's Dead Man's Switch
From Schneier on Security

Snowden's Dead Man's Switch

Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...

DHS Puts its Head in the Sand
From Schneier on Security

DHS Puts its Head in the Sand

On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees: From: xxxxx Sent: Thursday, July...

Tapping Undersea Cables
From Schneier on Security

Tapping Undersea Cables

Good article on the longstanding practice of secretly tapping undersea cables. This is news right now because of a new Snowden document.

The Value of Breaking the Law
From Schneier on Security

The Value of Breaking the Law

Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...

A Problem with the US Privacy and Civil Liberties Oversight Board
From Schneier on Security

A Problem with the US Privacy and Civil Liberties Oversight Board

I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents. This particular comment...

Walls Around Nations
From Schneier on Security

Walls Around Nations

A political history of walls: Roman walls such as Hadrian's Wall, the Great Wall of China, the Berlin Wall, and the wall between Mexico and the U.S. Moral: they...

My Fellowship at the Berkman Center
From Schneier on Security

My Fellowship at the Berkman Center

I have been awarded a fellowship at the Berkman Center for Internet and Society at Harvard University, for the 2013–2014 academic year. I'm excited about this;...

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships
From Schneier on Security

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships

This is really interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

F2P Monetization Tricks
From Schneier on Security

F2P Monetization Tricks

This is a really interesting article about something I never even thought about before: how games ("F2P" means "free to play") trick players into paying for stuff...

More NSA Code Names
From Schneier on Security

More NSA Code Names

We don't know what they mean, but there are a bunch of NSA code names on LinkedIn profiles. ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE...

The NSA's Project SHAMROCK
From Schneier on Security

The NSA's Project SHAMROCK

Nice history of Project SHAMROCK, the NSA's illegal domestic surveillance program from the 1970s. It targeted telegrams.

Musing on Secret Languages
From Schneier on Security

Musing on Secret Languages

This is really interesting. It starts by talking about a "cant" dictionary of 16th-century thieves' argot, and ends up talking about secret languages in general...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account