acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The NSA's Cryptolog
From Schneier on Security

The NSA's Cryptolog

The NSA has published declassified versions of its Cryptolog newsletter. All the issues from Aug 1974 through Summer 1997 are on the web, although there are some...

Identifying People from Mobile Phone Location Data
From Schneier on Security

Identifying People from Mobile Phone Location Data

Turns out that it's pretty easy: Researchers at the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain studied 15 months' worth...

Our Internet Surveillance State
From Schneier on Security

Our Internet Surveillance State

I'm going to start with three data points. One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. governmentaccessed...

Friday Squid Blogging: Giant Squid Genetics
From Schneier on Security

Friday Squid Blogging: Giant Squid Genetics

Despite looking very different from each other and being distributed across the world's oceans, all giant squid are the same species. There's also not a lot of...

Changes to the Blog
From Schneier on Security

Changes to the Blog

I have made a few changes to my blog that I'd like to talk about. The first is the various buttons associated with each post: a Facebook Like button, a Retweet...

FBI Secretly Spying on Cloud Computer Users
From Schneier on Security

FBI Secretly Spying on Cloud Computer Users

Both Google and recently ruled National Security Letters unconstitutional. Not that this changes anything yet.

Text Message Retention Policies
From Schneier on Security

Text Message Retention Policies

The FBI wants cell phone carriers to store SMS messages for a long time, enabling them to conduct surveillance backwards in time. Nothing new there -- data retention...

When Technology Overtakes Security
From Schneier on Security

When Technology Overtakes Security

A core, not side, effect of technology is its ability to magnify power and multiply force -- for both attackers and defenders. One side creates ceramic handguns...

Lessons From the FBI's Insider Threat Program
From Schneier on Security

Lessons From the FBI's Insider Threat Program

This article is worth reading. One bit: For a time the FBI put its back into coming up with predictive analytics to help predict insider behavior prior to malicious...

FinSpy
From Schneier on Security

FinSpy

Twenty five countries are using the FinSpy surveillance software package (also called FinFisher) to spy on their own citizens: The list of countries with servers...

Gauss
From Schneier on Security

Gauss

Nice summary article on the state-sponsored Gauss malware.

A 1962 Speculative Essay on Computers and Intelligence
From Schneier on Security

A 1962 Speculative Essay on Computers and Intelligence

From the CIA archives: Orrin Clotworthy, "Some Far-out Thoughts on Computers," Studies in Intelligence v. 6 (1962).

Prison Escape
From Schneier on Security

Prison Escape

Audacious daytime prison escape by helicopter. The escapees have since been recaptured.

Friday Squid Blogging: WTF, Evolution?
From Schneier on Security

Friday Squid Blogging: WTF, Evolution?

WTF, Evolution? is a great blog, and they finally mentioned squid.

xkcd on PGP
From Schneier on Security

xkcd on PGP

How security interacts with users.

Stuxnet is Much Older than We Thought
From Schneier on Security

Stuxnet is Much Older than We Thought

Symantec has found evidence of Stuxnet variants from way back in 2005. That's much older than the 2009 creation date we originally thought it had. More here and...

On Secrecy
From Schneier on Security

On Secrecy

Interesting law paper: "The Implausibility of Secrecy," by Mark Fenster. Abstract: Government secrecy frequently fails. Despite the executive branch’s obsessive...

Nationalism on the Internet
From Schneier on Security

Nationalism on the Internet

For technology that was supposed to ignore borders, bring the world closer together, and sidestep the influence of national governments the Internet is fostering...

Security Theater on the Wells Fargo Website
From Schneier on Security

Security Theater on the Wells Fargo Website

Click on the "Establishing secure connection" link at the top of this page. It's a Wells Fargo page that displays a progress bar with a bunch of security phrases...

Hacking Best-seller Lists
From Schneier on Security

Hacking Best-seller Lists

It turns out that you can buy a position for your book on best-seller lists.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account