acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Lessons from Biological Security
From Schneier on Security

Lessons from Biological Security

Nice essay: The biological world is also open source in the sense that threats are always present, largely unpredictable, and always changing. Because of this,...

Secrecy and Privacy
From Schneier on Security

Secrecy and Privacy

Interesting article on the history of, and the relationship between, secrecy and privacy As a matter of historical analysis, the relationship between secrecy and...

Cracking the Kryptos Sculpture
From Schneier on Security

Cracking the Kryptos Sculpture

Great story.

MAD in Cyberspace
From Schneier on Security

MAD in Cyberspace

Ron Beckstrom gives a talk (video and transcript) about "Mutually Assured Destruction," "Mutually Assured Disruption," and "Mutually Assured Dependence."

Spear Phishing Attack Against the <cite>Financial Times</cite>
From Schneier on Security

Spear Phishing Attack Against the Financial Times

Interesting story with a lot of details.

The Future of Satellite Surveillance
From Schneier on Security

The Future of Satellite Surveillance

Pretty scary -- and cool. Remember, it's not any one thing that's worrisome; it's everything together.

Friday Squid Blogging: How the Acidification of the Oceans Affects Squid
From Schneier on Security

Friday Squid Blogging: How the Acidification of the Oceans Affects Squid

It's not good. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Me on the Lou Dobbs Show
From Schneier on Security

Me on the Lou Dobbs Show

I was on the Lou Dobbs Show earlier this week.

US Offensive Cyberwar Policy
From Schneier on Security

US Offensive Cyberwar Policy

Today, the United States is conducting offensive cyberwar actions around the world. More than passively eavesdropping, we're penetrating and damaging foreign networks...

The Japanese Response to Terrorism
From Schneier on Security

The Japanese Response to Terrorism

Lessons from Japan's response to Aum Shinrikyo: Yet what's as remarkable as Aum's potential for mayhem is how little of it, on balance, they actually caused. Don't...

New Details on Skype Eavesdropping
From Schneier on Security

New Details on Skype Eavesdropping

This article, on the cozy relationship between the commercial personal-data industry and the intelligence industry, has new information on the security of Skype...

Love Letter to an NSA Agent
From Schneier on Security

Love Letter to an NSA Agent

A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity." A similar sentiment is expressed in this video.

The US Uses Vulnerability Data for Offensive Purposes
From Schneier on Security

The US Uses Vulnerability Data for Offensive Purposes

Companies allow US intelligence to exploit vulnerabilities before it patches them: Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...

Petition the NSA to Subject its Surveillance Program to Public Comment
From Schneier on Security

Petition the NSA to Subject its Surveillance Program to Public Comment

I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on: In a request today...

Finding Sociopaths on Facebook
From Schneier on Security

Finding Sociopaths on Facebook

On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media. My hypothesis is that scienceknow...

Cost/Benefit Questions NSA Surveillance
From Schneier on Security

Cost/Benefit Questions NSA Surveillance

John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...

Details of NSA Data Requests from US Corporations
From Schneier on Security

Details of NSA Data Requests from US Corporations

Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...

NSA Secrecy and Personal Privacy
From Schneier on Security

NSA Secrecy and Personal Privacy

In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...

Evidence that the NSA Is Storing Voice Content, Not Just Metadata
From Schneier on Security

Evidence that the NSA Is Storing Voice Content, Not Just Metadata

Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading. I expressed skepticism about this just...

Project C-43: A Final Piece of Public-Key Cryptography History
From Schneier on Security

Project C-43: A Final Piece of Public-Key Cryptography History

This finally explains what John Ellis was talking about in "The Possibility of Non-Secret Encryption" when he dropped a tantalizing hint about wartime work at Bell...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account