acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Cryptopocalypse
From Schneier on Security

The Cryptopocalypse

There was a presentation at Black Hat last month warning us of a "factoring cryptopocalypse": a moment when factoring numbers and solving the discrete log problem...

Friday Squid Blogging: Squid Ink as Food Coloring
From Schneier on Security

Friday Squid Blogging: Squid Ink as Food Coloring

Alton Brown suggests it for ice cream. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Wired</i> Names "Schneier on Security" to Best Blog List
From Schneier on Security

Wired Names "Schneier on Security" to Best Blog List

I made the list of Wired's best "Government and Security" blogs.

Management Issues in Terrorist Organizations
From Schneier on Security

Management Issues in Terrorist Organizations

Terrorist organizations have the same management problems as other organizations, and new ones besides: Terrorist leaders also face a stubborn human resources...

The NSA is Commandeering the Internet
From Schneier on Security

The NSA is Commandeering the Internet

It turns out that the NSA's domestic and world-wide surveillance apparatus is even more extensive than we thought. Bluntly: The government has commandeered the...

<i>Time</i> Magazine Names "Schneier on Security" to Best Blog List
From Schneier on Security

Time Magazine Names "Schneier on Security" to Best Blog List

My blog as made the Time magazine "The 25 Best Bloggers 2013 Edition" list. I can't believe this was published ten days ago, and I'm only just finding out about...

Stories from MI5
From Schneier on Security

Stories from MI5

This essay is filled historical MI5 stories -- often bizarre, sometimes amusing. My favorite: It was recently revealed that back in the 1970s -- at the height...

Circumventing Communications Blackouts
From Schneier on Security

Circumventing Communications Blackouts

Rangzen looks like a really interesting ad hoc mesh networking system to circumvent government-imposed communications blackouts. I am particularly interested in...

Book Review: <i>Rise of the Warrior Cop</i>
From Schneier on Security

Book Review: Rise of the Warrior Cop

Rise of the Warrior Cop: The Militarization of America's Police Forces, by Radley Balko, PublicAffairs, 2013, 400 pages. War as a rhetorical concept is firmly...

The 2013 Cryptologic History Symposium
From Schneier on Security

The 2013 Cryptologic History Symposium

The 2013 Cryptologic History Symposium, sponsored by the NSA, will be held at John Hopkins University this October.

NSA Increasing Security by Firing 90% of Its Sysadmins
From Schneier on Security

NSA Increasing Security by Firing 90% of Its Sysadmins

General Keith Alexander thinks he can improve security by automating sysadmin duties such that 90% of them can be fired: Using technology to automate much of the...

Security at Sports Stadiums
From Schneier on Security

Security at Sports Stadiums

Lots of sports stadiums have instituted Draconian new rules. Here are the rules for St. Louis Rams games: Fans will be able to carry the following style and size...

Friday Squid Blog: Rickshaw Cart Woodblock Print
From Schneier on Security

Friday Squid Blog: Rickshaw Cart Woodblock Print

With a squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Lavabit E-Mail Service Shut Down
From Schneier on Security

Lavabit E-Mail Service Shut Down

Lavabit, the more-secure e-mail service that Edward Snowden -- among others -- used, has abruptly shut down. From the message on their homepage: I have been forced...

Latest Movie-Plot Threat: Explosive-Dipped Clothing
From Schneier on Security

Latest Movie-Plot Threat: Explosive-Dipped Clothing

It's being reported, although there's no indication of where this rumor is coming from or what it's based on. ...the new tactic allows terrorists to dip ordinary...

Twitter's Two-Factor Authentication System
From Schneier on Security

Twitter's Two-Factor Authentication System

Twitter just rolled out a pretty nice two-factor authentication system using your smart phone as the second factor: The new two-factor system works like this....

Kip Hawley on Fixing the TSA
From Schneier on Security

Kip Hawley on Fixing the TSA

The further Kip Hawley has gotten from running the TSA, the more sense he has started to make. This is pretty good.

Restoring Trust in Government and the Internet
From Schneier on Security

Restoring Trust in Government and the Internet

In July 2012, responding to allegations that the video-chat service Skype -- owned by Microsoft -- was changing its protocols to make it possible for the government...

Has Tor Been Compromised?
From Schneier on Security

Has Tor Been Compromised?

There's speculation that the FBI is responsible for an exploit that compromised the Tor anonymity service. Note that Tor nodes installed or updated after June...

NSA Surveillance and Mission Creep
From Schneier on Security

NSA Surveillance and Mission Creep

Last month, I wrote about the potential for mass surveillance mission creep: the tendency for the vast NSA surveillance apparatus to be used for other, lesser,already...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account