acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Failure of Privacy Notices and Consumer Choice
From Schneier on Security

The Failure of Privacy Notices and Consumer Choice

Paper from First Monday: "Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy." Abstract:...

GOURMETTROUGH: NSA Exploit of the Day
From Schneier on Security

GOURMETTROUGH: NSA Exploit of the Day

Continuing our walk through the NSA's Tailored Access Operations (TAO) group implant catalog: GOURMETTROUGH (TS//SI//REL) GOURMETTROUGH is a user configurable...

Matt Blaze on TAO's Methods
From Schneier on Security

Matt Blaze on TAO's Methods

Matt Blaze makes a point that I have been saying for a while now: Don't get me wrong, as a security specialist, the NSA's Tailored Access Operations (TAO) scare...

FEEDTROUGH: NSA Exploit of the Day
From Schneier on Security

FEEDTROUGH: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: FEEDTROUGH (TS//SI//REL) FEEDTROUGH is a persistence technique for two software...

I've Joined Co3 Systems
From Schneier on Security

I've Joined Co3 Systems

For decades, I've said that good security is a combination of protection, detection, and response. In 1999, when I formed Counterpane Internet Security, I focused...

Friday Squid Blogging: Squid-Shaped Dog Toy
From Schneier on Security

Friday Squid Blogging: Squid-Shaped Dog Toy

Just the thing.

NSA Documents from the <i>Spiegel</i> Story
From Schneier on Security

NSA Documents from the Spiegel Story

There are more source documents from the recent Spiegel story on the NSA than I realized. Here is what I think is the complete list: "Tailored Access Operations...

NSA Exploit of the Day: IRONCHEF
From Schneier on Security

NSA Exploit of the Day: IRONCHEF

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is IRONCHEF: IRONCHEF (TS//SI//REL) IRONCHEF provides access persistence to...

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program
From Schneier on Security

Cost/Benefit Analysis of NSA's 215 Metadata Collection Program

It has amazed me that the NSA doesn't seem to do any cost/benefit analyses on any of its surveillance programs. This seems particularly important for bulk surveillance...

NSA Exploit of the Day: DEITYBOUNCE
From Schneier on Security

NSA Exploit of the Day: DEITYBOUNCE

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is DEITYBOUNCE: DEITYBOUNCE (TS//SI//REL) DEITYBOUNCE provides software application...

"Military Style" Raid on California Power Station
From Schneier on Security

"Military Style" Raid on California Power Station

I don't know what to think about this: Around 1:00 AM on April 16, at least one individual (possibly two) entered two different manholes at the PG&E Metcalf power...

More about the NSA's Tailored Access Operations Unit
From Schneier on Security

More about the NSA's Tailored Access Operations Unit

Der Spiegel has a good article on the NSA's Tailored Access Operations unit: basically, its hackers. The article also has more details on how QUANTUM -- particularly...

Joseph Stiglitz on Trust
From Schneier on Security

Joseph Stiglitz on Trust

Joseph Stiglitz has an excellent essay on the value of trust, and the lack of it in today's society. Trust is what makes contracts, plans and everyday transactions...

Friday Squid Blogging: Kim Jong Un Tours Frozen Squid Factory
From Schneier on Security

Friday Squid Blogging: Kim Jong Un Tours Frozen Squid Factory

Frozen squid makes him happy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Operation Vula
From Schneier on Security

Operation Vula

"Talking to Vula" is the story of a 1980s secret communications channel between black South African leaders and others living in exile in the UK. The system used...

Christmas Comic
From Schneier on Security

Christmas Comic

Amusing.

Report on Syrian Malware
From Schneier on Security

Report on Syrian Malware

Fascinating report from Citizen Lab on the use of malware in the current Syrian conflict (EFF summary and Wired article).

NSA Spying: Who Do You Believe?
From Schneier on Security

NSA Spying: Who Do You Believe?

On Friday, Reuters reported that RSA entered a secret contract to make DUAL_EC_PRNG the default random number generator in the BSAFE toolkit. DUA_EC_PRNG is now...

Friday Squid Blogging: "What Does the Squid Say?"
From Schneier on Security

Friday Squid Blogging: "What Does the Squid Say?"

Minecraft parody. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Yes, I'm Leaving BT
From Schneier on Security

Yes, I'm Leaving BT

The Register reported that I am leaving BT at the end of the year. It quoted BT as saying: We hired Bruce because of his thought leadership in security and as...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account