acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Prosecuting Snowden
From Schneier on Security

Prosecuting Snowden

I generally don't like stories about Snowden as a person, because they distract from the real story of the NSA surveillance programs, but this article on the costs...

Violence as a Source of Trust in Criminal Societies
From Schneier on Security

Violence as a Source of Trust in Criminal Societies

This is interesting: If I know that you have committed a violent act, and you know that I have committed a violent act, we each have information on each otherAbstract...

Friday Squid Blogging: Paul Burke Giant Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Paul Burke Giant Squid Sculpture

The wood sculpture is part of an art exhibit at the VanDusen Botanical Garden in Vancouver.

TSA Considering Implementing Randomized Security
From Schneier on Security

TSA Considering Implementing Randomized Security

For a change, here's a good idea by the TSA: TSA has just issued a Request for Information (RFI) to prospective vendors who could develop and supply such randomizers...

Counterterrorism Mission Creep
From Schneier on Security

Counterterrorism Mission Creep

One of the assurances I keep hearing about the U.S. government's spying on American citizens is that it's only used in cases of terrorism. Terrorism is, of course...

PRISM Q&A
From Schneier on Security

PRISM Q&A

Mikko Hypponen and I answered questions about PRISM on the TED website.

Snowden's Dead Man's Switch
From Schneier on Security

Snowden's Dead Man's Switch

Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...

DHS Puts its Head in the Sand
From Schneier on Security

DHS Puts its Head in the Sand

On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees: From: xxxxx Sent: Thursday, July...

Tapping Undersea Cables
From Schneier on Security

Tapping Undersea Cables

Good article on the longstanding practice of secretly tapping undersea cables. This is news right now because of a new Snowden document.

The Value of Breaking the Law
From Schneier on Security

The Value of Breaking the Law

Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...

A Problem with the US Privacy and Civil Liberties Oversight Board
From Schneier on Security

A Problem with the US Privacy and Civil Liberties Oversight Board

I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents. This particular comment...

Walls Around Nations
From Schneier on Security

Walls Around Nations

A political history of walls: Roman walls such as Hadrian's Wall, the Great Wall of China, the Berlin Wall, and the wall between Mexico and the U.S. Moral: they...

My Fellowship at the Berkman Center
From Schneier on Security

My Fellowship at the Berkman Center

I have been awarded a fellowship at the Berkman Center for Internet and Society at Harvard University, for the 2013–2014 academic year. I'm excited about this;...

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships
From Schneier on Security

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships

This is really interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

F2P Monetization Tricks
From Schneier on Security

F2P Monetization Tricks

This is a really interesting article about something I never even thought about before: how games ("F2P" means "free to play") trick players into paying for stuff...

More NSA Code Names
From Schneier on Security

More NSA Code Names

We don't know what they mean, but there are a bunch of NSA code names on LinkedIn profiles. ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE...

The NSA's Project SHAMROCK
From Schneier on Security

The NSA's Project SHAMROCK

Nice history of Project SHAMROCK, the NSA's illegal domestic surveillance program from the 1970s. It targeted telegrams.

Musing on Secret Languages
From Schneier on Security

Musing on Secret Languages

This is really interesting. It starts by talking about a "cant" dictionary of 16th-century thieves' argot, and ends up talking about secret languages in general...

The Effectiveness of Privacy Audits
From Schneier on Security

The Effectiveness of Privacy Audits

This study concludes that there is a benefit to forcing companies to undergo privacy audits: "The results show that there are empirical regularities consistent...

Another Perspective on the Value of Privacy
From Schneier on Security

Another Perspective on the Value of Privacy

A philosophical perspective: But while Descartes's overall view has been rightly rejected, there is something profoundly right about the connection between privacy...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account