acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Lawful Hacking and Continuing Vulnerabilities
From Schneier on Security

Lawful Hacking and Continuing Vulnerabilities

The FBI's legal battle with Apple is over, but the way it ended may not be good news for anyone. Federal agents had been seeking to compel Apple to break the security...

Mass Surveillance Silences Minority Opinions
From Schneier on Security

Mass Surveillance Silences Minority Opinions

Research paper: Elizabeth Stoycheff, "Under Surveillance: Examining Facebook's Spiral of Silence Effects in the Wake of NSA Internet Monitoring": Abstract: Since...

A 1976 Congressional Report on Surveillance
From Schneier on Security

A 1976 Congressional Report on Surveillance

Here's a 1,300-page Congressional report on "surveillance technology" from 1976....

Power on the Internet
From Schneier on Security

Power on the Internet

Interesting paper: Yochai Benkler, "Degrees of Freedom, Dimensions of Power," Daedelus, winter 2016: Abstract: The original Internet design combined technical,...

Friday Squid Blogging: President Squid
From Schneier on Security

Friday Squid Blogging: President Squid

New children's book....

Memphis Airport Inadvertently Gets Security Right
From Schneier on Security

Memphis Airport Inadvertently Gets Security Right

A local newspaper recently tested airport security at Memphis Airport: Our crew sat for 30 minutes in the passenger drop-off area Tuesday without a word from anyone...

Interesting Lottery Terminal Hack
From Schneier on Security

Interesting Lottery Terminal Hack

It was a manipulation of the terminals. The 5 Card Cash game was suspended in November after Connecticut Lottery and state Department of Consumer Protection officials...

FBI vs. Apple: Who Is Helping the FBI?
From Schneier on Security

FBI vs. Apple: Who Is Helping the FBI?

On Monday, the FBI asked the court for a two-week delay in a scheduled hearing on the San Bernardino iPhone case, because some "third party" approached it with...

Cryptography Is Harder Than It Looks
From Schneier on Security

Cryptography Is Harder Than It Looks

Writing a magazine column is always an exercise in time travel. I'm writing these words in early December. You're reading them in February. This means anything...

FBI's Cyber Most Wanted List
From Schneier on Security

FBI's Cyber Most Wanted List

The FBI just added two members of the Syrian Electronic Army to its cyber most-wanted list. I had no idea that the FBI had a cyber most-wanted list....

1981 US Document on Encryption Policy
From Schneier on Security

1981 US Document on Encryption Policy

This was newly released under FOIA at my request: Victor C. Williams, Jr., Donn B. Parker, and Charles C. Wood, "Impacts of Federal Policy Options for Nonmilitary...

Observations on the Surveillance that Resulted in the Capture of Salah Abdeslam
From Schneier on Security

Observations on the Surveillance that Resulted in the Capture of Salah Abdeslam

Interesting analysis from The Grugq: Bottom Line Up Front Intelligence agencies must cooperate more rapidly and proactively to counter ISIS' rapid and haphazard...

iMessage Encryption Flaw Found and Fixed
From Schneier on Security

iMessage Encryption Flaw Found and Fixed

Matthew Green and team found and reported a significant iMessage encryption flaw last year. Green suspected there might be a flaw in iMessage last year after he...

Brennan Center Report on NSA Overseas Spying and Executive Order 12333
From Schneier on Security

Brennan Center Report on NSA Overseas Spying and Executive Order 12333

The Brennan Center has released a report on EO 12333, the executive order that regulates the NSA's overseas surveillance. Much of what the NSA does here is secret...

Friday Squid Blogging: Braised Squid With Harissa and Olives
From Schneier on Security

Friday Squid Blogging: Braised Squid With Harissa and Olives

Recommended recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

I'm a Wall Street Journal Acrostic Answer
From Schneier on Security

I'm a Wall Street Journal Acrostic Answer

A quote from Data and Goliath is the answer to a Wall Street Journal acrostic. It's not the same as being a New York Times crossword puzzle answer, but it's close...

Companies Handing Source Code Over to Governments
From Schneier on Security

Companies Handing Source Code Over to Governments

ZDNet has an article on US government pressure on software companies to hand over copies of their source code. There's no details because no one is talking on the...

New NIST Encryption Guidelines
From Schneier on Security

New NIST Encryption Guidelines

NIST has published a draft of their new standard for encryption use: "NIST Special Publication 800-175B, Guideline for Using Cryptographic Standards in the Federal...

Another FBI Filing on the San Bernardino iPhone Case
From Schneier on Security

Another FBI Filing on the San Bernardino iPhone Case

The FBI's reply to Apple is more of a character assassination attempt than a legal argument. It's as if it only cares about public opinion at this point. Although...

Financial Cryptography 2016
From Schneier on Security

Financial Cryptography 2016

Ross Anderson liveblogged this year's Financial Cryptography conference....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account