acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Understanding NSA Malware
From Schneier on Security

Understanding NSA Malware

Here are two essays trying to understand NSA malware and how it works, in light of the enormous number of documents released by Speigel recently....

National Academies Report on Bulk Intelligence Collection
From Schneier on Security

National Academies Report on Bulk Intelligence Collection

In January, the National Academies of Science (NAS) released a report on the bulk collection of signals intelligence. Basically, a year previously President Obama...

Friday Squid Blogging: How to Fish for Squid
From Schneier on Security

Friday Squid Blogging: How to Fish for Squid

The Washington Department of Fish and Wildlife explains how to fish for squid. As usual, you can also use this squid post to talk about the security stories in...

NSA Using Hacker Research and Results
From Schneier on Security

NSA Using Hacker Research and Results

In the latest article based on the Snowden documents, the Intercept is reporting that the NSA and GCHQ are piggy-backing on the work of hackers: In some cases,...

GPG Financial Difficulties
From Schneier on Security

GPG Financial Difficulties

Werner Koch, who has been maintaining the GPG email encryption program since 1997, is going broke and considering quitting. Updates to the article say that, because...

Tracking Bitcoin Scams
From Schneier on Security

Tracking Bitcoin Scams

Interesting paper: "There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams," by Marie Vasek and Tyler Moore. Abstract...

Obama Says Terrorism Is Not an Existential Threat
From Schneier on Security

Obama Says Terrorism Is Not an Existential Threat

In an interview this week, President Obama said that terrorism does not pose an existential threat: What I do insist on is that we maintain a proper perspective...

Texas School Overreaction
From Schneier on Security

Texas School Overreaction

Seems that a Texas school has suspended a 9-year-old for threatening another student with a replica One Ring. (Yes, that One Ring.) I've written about this sort...

Hiding a Morse Code Message in a Pop Song
From Schneier on Security

Hiding a Morse Code Message in a Pop Song

In Colombia: The team began experimenting with Morse code using various percussion instruments and a keyboard. They learned that operators skilled in Morse code...

Friday Squid Blogging: Large Squid Washes up on Greek Beach
From Schneier on Security

Friday Squid Blogging: Large Squid Washes up on Greek Beach

No mention of the species, but the photo is a depressing one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Co3 Systems Is Expanding into Europe
From Schneier on Security

Co3 Systems Is Expanding into Europe

This was supposed to be a secret until the middle of February, but we've been found out. We already have European customers; this is our European office. And, by...

Operating a Fake Bank
From Schneier on Security

Operating a Fake Bank

Here's a story of a fake bank in China -- a real bank, not an online bank -- that stole $32m from depositors over a year. Pro tip: real banks never offer 2%/week...

Canada Spies on Internet Downloads
From Schneier on Security

Canada Spies on Internet Downloads

Another story from the Snowden documents: According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle...

Subconscious Keys
From Schneier on Security

Subconscious Keys

I missed this paper when it was first published in 2012: "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks" Abstract...

Police Using Radar that Sees Through Walls
From Schneier on Security

Police Using Radar that Sees Through Walls

In the latest example of a military technology that has secretly been used by the police, we have radar guns that can see through walls....

The IDEA Encryption Algorithm with a 128-bit Block Length
From Schneier on Security

The IDEA Encryption Algorithm with a 128-bit Block Length

Here's an IDEA-variant with a 128-bit block length. While I think it's a great idea to bring IDEA up to a modern block length, the paper has none of the cryptanalysis...

Basaaly Moalin: The One "Terrorist" Caught by Section 215 Surveillance
From Schneier on Security

Basaaly Moalin: The One "Terrorist" Caught by Section 215 Surveillance

Remember back in 2013 when the then-director of the NSA Keith Alexander claimed that Section 215 bulk telephone metadata surveillance stopped "fifty-four different...

My Conversation with Edward Snowden
From Schneier on Security

My Conversation with Edward Snowden

Today, as part of a Harvard computer science symposium, I had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography...

Friday Squid Blogging: Giggling Squid Restaurant
From Schneier on Security

Friday Squid Blogging: Giggling Squid Restaurant

Giggling Squid is a Thai restaurant chain in the UK. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

When Thinking Machines Break the Law
From Schneier on Security

When Thinking Machines Break the Law

Last year, two Swiss artists programmed a Random Botnot Shopper, which every week would spend $100 in bitcoin to buy a random item from an anonymous Internet black...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account