acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Kip Hawley on Fixing the TSA
From Schneier on Security

Kip Hawley on Fixing the TSA

The further Kip Hawley has gotten from running the TSA, the more sense he has started to make. This is pretty good.

Restoring Trust in Government and the Internet
From Schneier on Security

Restoring Trust in Government and the Internet

In July 2012, responding to allegations that the video-chat service Skype -- owned by Microsoft -- was changing its protocols to make it possible for the government...

Has Tor Been Compromised?
From Schneier on Security

Has Tor Been Compromised?

There's speculation that the FBI is responsible for an exploit that compromised the Tor anonymity service. Note that Tor nodes installed or updated after June...

NSA Surveillance and Mission Creep
From Schneier on Security

NSA Surveillance and Mission Creep

Last month, I wrote about the potential for mass surveillance mission creep: the tendency for the vast NSA surveillance apparatus to be used for other, lesser,already...

The Public/Private Surveillance Partnership
From Schneier on Security

The Public/Private Surveillance Partnership

Imagine the government passed a law requiring all citizens to carry a tracking device. Such a law would immediately be found unconstitutional. Yet we all carryenormous...

Friday Squid Blogging: Squid Watch
From Schneier on Security

Friday Squid Blogging: Squid Watch

I like watches with no numbers. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

XKeyscore
From Schneier on Security

XKeyscore

The Guardian discusses a new secret NSA program: XKeyscore. It's the desktop system that allows NSA agents to spy on anyone over the Internet in real time. It...

<i>Cryptography Engineering</i> Book Review
From Schneier on Security

Cryptography Engineering Book Review

Good review of the strengths and weaknesses of Cryptography Engineering and Applied Cryptography. Best -- at least to me -- is the list of things missing, which...

False Positives and Ubiquitous Surveillance
From Schneier on Security

False Positives and Ubiquitous Surveillance

Searching on Google for a pressure cooker and backpacks got one family investigated by the police. More stories and comments. This seems not to be the NSA eavesdropping...

<i>Economist</i> Cyberwar Debate
From Schneier on Security

Economist Cyberwar Debate

Richard Bejtlich and Thomas Rid (author of the excellent book Cyber War Will Not Take Place) debate the cyberwar threat on the Economist website.

Scientists Banned from Revealing Details of Car-Security Hack
From Schneier on Security

Scientists Banned from Revealing Details of Car-Security Hack

The UK has banned researchers from revealing details of security vulnerabilities in car locks. In 2008, Phillips brought a similar suit against researchers who...

Brian Krebs Harassed
From Schneier on Security

Brian Krebs Harassed

This is what happens when you're a security writer and you piss off the wrong people: they conspire to have heroin mailed to you, and then to tip off the police...

Neighborhood Security: Feeling vs. Reality
From Schneier on Security

Neighborhood Security: Feeling vs. Reality

Research on why some neighborhoods feel safer: Salesses and collaborators Katja Schechtner and César A. Hidalgo built an online comparison tool using Google Street...

Really Clever Bank Card Fraud
From Schneier on Security

Really Clever Bank Card Fraud

This is a really clever social engineering attack against a bank-card holder: It all started, according to the police, on the Saturday night where one of this...

Obama's Continuing War Against Leakers
From Schneier on Security

Obama's Continuing War Against Leakers

The Obama Administration has a comprehensive "insider threat" program to detect leakers from within government. This is pre-Snowden. Not surprisingly, the combination...

Friday Squid Blogging: Squid Song
From Schneier on Security

Friday Squid Blogging: Squid Song

It's "Sparky the Giant Squid." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

NSA Cracked the Kryptos Sculpture Years Before the CIA Did
From Schneier on Security

NSA Cracked the Kryptos Sculpture Years Before the CIA Did

We interrupt this blog for some important inter-agency rivalry. The fourth part is still uncracked, though. Older links.

Secret Information Is More Trusted
From Schneier on Security

Secret Information Is More Trusted

This is an interesting, if slightly disturbing, result: In one experiment, we had subjects read two government policy papers from 1995, one from the State Department...

Details on NSA/FBI Eavesdropping
From Schneier on Security

Details on NSA/FBI Eavesdropping

We're starting to see Internet companies talk about the mechanics of how the US government spies on their users. Here, a Utah ISP owner describes his experiences...

Poached Eggs
From Schneier on Security

Poached Eggs

The story of people who poach and collect rare eggs, and the people who hunt them down. Securing wildlife against poachers is a difficult problem, especially when...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account