acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid
From Schneier on Security

Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid

It's a novel behavior. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Sixth Annual Movie-Plot Threat Contest Semifinalists
From Schneier on Security

Sixth Annual Movie-Plot Threat Contest Semifinalists

On April 1, I announced the Sixth Annual Movie Plot Threat Contest: I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...

Ricin as a Terrorist Tool
From Schneier on Security

Ricin as a Terrorist Tool

This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction: Abstract: In recent yearsThis...

Trading Privacy for Convenience
From Schneier on Security

Trading Privacy for Convenience

Ray Wang makes an important point about trust and our data: This is the paradox. The companies contending to win our trust to manage our digital identities all...

More on Feudal Security
From Schneier on Security

More on Feudal Security

Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...

Essays Related to NSA Spying Documents
From Schneier on Security

Essays Related to NSA Spying Documents

Here's a quick list of some of my older writings that are related to the current NSA spying documents: "The Internet Is a Surveillance State ," 2013. The importance...

Prosecuting Snowden
From Schneier on Security

Prosecuting Snowden

Edward Snowden broke the law by releasing classified information. This isn't under debate; it's something everyone with a security clearance knows. It's written...

The Psychology of Conspiracy Theories
From Schneier on Security

The Psychology of Conspiracy Theories

Interesting. Crazy as these theories are, those propagating them are not -- they’re quite normal, in fact. But recent scientific research tells us this much: if...

Trust in IT
From Schneier on Security

Trust in IT

Ignore the sensationalist headline. This article is a good summary of the need for trust in IT, and provides some ideas for how to enable more of it. Virtually...

Tagging and Location Technologies
From Schneier on Security

Tagging and Location Technologies

Interesting speculative article.

Government Secrets and the Need for Whistle-blowers
From Schneier on Security

Government Secrets and the Need for Whistle-blowers

Yesterday, we learned that the NSA received all calling records from Verizon customers for a three-month period starting in April. That's everything except themetadata...

Friday Squid Blogging: Squid Comic
From Schneier on Security

Friday Squid Blogging: Squid Comic

A squid comic about the importance of precise language in security warnings. As usual, you can also use this squid post to talk about the security stories in the...

Audio Interview with Me
From Schneier on Security

Audio Interview with Me

In this podcast interview, I talk about security, power, and the various things I have been thinking about recently.

A Really Good Article on How Easy it Is to Crack Passwords
From Schneier on Security

A Really Good Article on How Easy it Is to Crack Passwords

Ars Technica gave three experts a 16,000-entry encrypted password file, and asked them to break them. The winner got 90% of them, the loser 62% -- in a few hours...

The Cost of Terrorism in Pakistan
From Schneier on Security

The Cost of Terrorism in Pakistan

This study claims "terrorism has cost Pakistan around 33.02% of its real national income" between the years 1973 and 2008, or about 1% per year. The St. Louis$100...

Eugene Spafford Answers Questions on CNN.com
From Schneier on Security

Eugene Spafford Answers Questions on CNN.com

Excellent interview.

Security and Human Behavior (SHB 2013)
From Schneier on Security

Security and Human Behavior (SHB 2013)

I'm at the Sixth Interdisciplinary Workshop on Security and Human Behavior (SHB 2013). This year we're in Los Angeles, at USC -- hosted by CREATE. My description...

The Problems with CALEA-II
From Schneier on Security

The Problems with CALEA-II

The FBI wants a new law that will make it easier to wiretap the Internet. Although its claim is that the new law will only maintain the status quo, it's reallyeverything...

The Security Risks of Unregulated Google Search
From Schneier on Security

The Security Risks of Unregulated Google Search

Someday I need to write an essay on the security risks of secret algorithms that become part of our infrastructure. This paper gives one example of that. Could...

The Problems with Managing Privacy by Asking and Giving Consent
From Schneier on Security

The Problems with Managing Privacy by Asking and Giving Consent

New paper from the Harvard Law Review by Daniel Solove: "Privacy Self-Management and the Consent Dilemma": Privacy self-management takes refuge in consent. It...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account