Published September 21, 2016

Influencers: Calling it 'critical infrastructure' won't protect the vote

Jack Detsch | September 21, 2016
Published August 22, 2016

The Cybersecurity Book Club

Join Passcode’s book club to discuss – online and in person – the best books on digital security and privacy.

Passcode’s book club will endeavor to explore some of the newest and most influential additions to the growing collection of books exploring hacking, cybersecurity, and digital privacy.
Passcode
Published August 19, 2016

Hacking diversity in cybersecurity

How gender and racial imbalance in the field affects women, minorities, and white men working in digital security.

At the Black Hat and Def Con conferences, attendees addressed the lack of diversity in the cybersecurity community.
Passcode
Published August 15, 2016

The Cybersecurity Podcast

Passcode and New America have a new podcast featuring the leaders and thinkers of cybersecurity

Published August 9, 2016

Send Passcode to SXSW

Help us return to Austin by voting for our panel ideas at the South by Southwest PanelPicker.

Passcode
Published July 20, 2016

The cypherpunk revolution

How the tech vanguard turned public-key cryptography into one of the most potent political ideas of the 21st century.

An excerpt from “Rise of the Machines: A Cybernetic History.”
Passcode
Published July 13, 2016

Influencers: Antihacking law obstructs security research

Jack Detsch | July 13, 2016
Published June 10, 2016

Artist’s campaign targets biometric surveillance

Artist and researcher Adam Harvey wants to raise awareness about the pervasiveness of biometric tracking on the web and in everyday life.

Passcode
Published May 11, 2016

Passcode launches Security Culture section

The Christian Science Monitor’s digital security and privacy news project expands staff, sharpens focus on the personal side of cybersecurity

Passcode
Published May 9, 2016

Influencers oppose expanding federal hacking authorities

Jack Detsch | May 9, 2016
Published March 24, 2016

Influencers: FBI should disclose San Bernardino iPhone security hole to Apple

Sara Sorcher and Malena Carollo | March 24, 2016
Published March 23, 2016

What does privacy mean to you?

A photo series exploring this key issue of the Digital Age.

At this year’s South by Southwest Interactive festival, photographer Ann Hermes asked people what privacy means to them. Here’s what she found out.
Passcode
Published March 21, 2016

FBI v. Apple timeline: Tracking legal battles over iPhone security

Though the Department of Justice has concluded the cases over locked iPhones in San Bernardino and Brooklyn, those cases could prove instrumental in future fights with Apple involving smartphone security. Here are the significant dates, legal filings, and arguments in both cases.
Malena Carollo | March 21, 2016
Published March 21, 2016

Lessons on security and privacy from SXSW

Everything we talked about, debated, and discovered at the 2016 South by Southwest Interactive festival in Austin.

Security and privacy were hot topics for the tens of thousands of digerati who flocked to Austin for the 2016 South by Southwest Interactive festival.
Passcode
Published March 10, 2016

Guide to digital security and privacy at SXSW

Passcode’s picks for this year’s South by Southwest Interactive festival.

Passcode’s guide to digital security and privacy events at this year’s South by Southwest Interactive festival in Austin.
Jack Detsch | March, 10 2016
Published March 8, 2016

Hackers in training

Students from two of the world’s top universities raced to conquer the toughest cybersecurity challenges.

The Cambridge 2 Cambridge contest involved MIT and the University of Cambridge in a hackathon meant to hone students’ cybersecurity skills.
Story by Jack Detsch and photos by Ann Hermes | Mar. 8, 2016
Published March 1, 2016

Influencers: Incoming federal CISO can improve US government’s cybersecurity

Malena Carollo | March 1, 2016
Published February 19, 2016

Passcode @ SXSW

Passcode
Published February 19, 2016

Influencers: Apple should not help FBI crack San Bernardino iPhone

Malena Carollo | Feb. 19, 2016
Published February 11, 2016

Exploring cybersecurity from China’s perspective

Excerpts from a talk with Adam Segal, Sharon Hom, Michael Sulmeyer, and Lobsang Gyatso Sither.

Passcode spoke with cybersecurity experts and human rights activists to better understand how and why China is hacking the world.
Michael B. Farrell • Feb. 11, 2016
Published January 27, 2016

Where the candidates stand on cybersecurity

From encryption to Chinese hackers, a handy guide to Internet politics in the 2016 presidential election.

As presidential candidates take the stage Thursday for an important Republican debate – the last before the Iowa caucuses – all of them will likely be prepared for questions on digital security and privacy.
By Lauren Leatherby | Jan. 27, 2016
Published January 27, 2016

Influencers: Tech firms should do more to block extremist content

Malena Carollo
Published January 8, 2016

Why GPS is more vulnerable than ever

The space-based navigation and timing system faces a growing risk of attack. But there is a simple solution.

The Global Positioning System that some 4 billion people rely on daily is essentially unprotected, opening it up to serious attacks from rogue nation states or criminal hackers who want to wreak havoc on American cities. But there is a simple solution to protect the navigation and timing network that underpins modern daily life.
By Joe Uchill | Jan. 8, 2016
Published October 16, 2015

The secretive industry of social media monitoring

Schools and police turn to private firms to help address school violence.

Story by Malena Carollo and illustrations by Erick Montes
Published September 8, 2015

‘Hackers’ at 20:

How a 20-year-old, mostly inaccurate flop predicted the future, reshaped sci-fi, and won over the real hacker community.

By Joe Uchill
Published August 31, 2015

Passcode Events

Be part of the security and privacy conversation

Join Passcode at one of our events, or catch up on an event you might have missed.
Published August 18, 2015

Whistleblower’s dilemma

Before Snowden, Robert MacLean’s leak ruined his career. Now, he’s calling for stronger whistleblower protection.

By Mary Cirincione
Published July 21, 2015

The security industry files formal objections to Wassenaar proposal

Export restrictions classifying certain cybersecurity technology as arms caused industry outrage.

Joe Uchill
Published July 7, 2015

Opinion: Why strong encryption is elementary

The case against encryption ‘back doors’ simplified so even a child can understand it.

The debate heating up in Washington over privacy safeguards on consumer devices may seem complex. But, simply put, strong encryption is better for everyone.
Robert M. Lee
Published June 30, 2015

The battle between Washington and Silicon Valley over encryption

Tech titans such as Apple and Google are battling the Obama administration over strong security on consumer devices, strengthened after the Snowden leaks. The outcome could impact the future of the Internet.
Story by Sara Sorcher & illustrations by Erick Montes
Published June 29, 2015

Influencers: OPM chief should be held responsible for breach

Sara Sorcher
Published June 29, 2015

Influencers: US should sanction China for economic espionage

Malena Carollo
Published June 29, 2015

Influencers: Lawsuits to prevent reporting vulnerabilities will chill research

Malena Carollo
Published June 29, 2015

Influencers: Revise copyright law so researchers can tinker with car software

Malena Carollo
Published June 29, 2015

Influencers: China’s arrests of hackers don’t prove commitment to stop economic espionage

Malena Carollo
Published June 29, 2015

Influencers: Europeans should be able to sue over data misuse in US

Malena Carollo
Published June 29, 2015

Influencers: Paris attacks don’t justify government access to encryption

Malena Carollo
Published June 26, 2015

Meet Passcode's Influencers

Big thinkers vote on the most critical issues in security and privacy.

Published June 10, 2015

Influencers oppose US plan to limit export of software flaws

Published May 6, 2015

Influencers: Congress should end NSA bulk data collection

Published May 5, 2015

Exploring the identity economy

From the black market to the consumer protection business boom

Published May 5, 2015

The identity underground

Criminals barter for your Social Security number and the most intimate details of your personal life.

Published May 5, 2015

What it's like to have your identity stolen

Victims rarely know anything about their predators. Yet the thieves know absolutely everything about them.

Published May 5, 2015

The new fraud squad

Identity protection has become a big business. But are the fees really worth it?

Published April 10, 2015

Wanted: Awesome cybersecurity fellow

Published March 31, 2015

Influencers: Companies should not be allowed to hack back

Published March 12, 2015

The race to build the Silicon Valley of cybersecurity

Cities and regions around the US vie to draw business and brainpower in a market projected to top $160 billion by 2020.

Published March 11, 2015

Stronger encryption on consumer devices won't hurt national security

... according to three-quarters of Passcode Influencers

Published March 6, 2015

What we learned about security and privacy at SXSW

Published February 25, 2015

Obama's info-sharing plan won't significantly reduce security breaches

...according to Passcode's Influencers Poll.

Published February 16, 2015

Introducing: Passcode

The Christian Science Monitor's new section on security and privacy in the Digital Age.

Published February 11, 2015

The Pentagon is building an app store for cyberoperations

An exclusive inside look at DARPA's futuristic Plan X.

Published January 26, 2015

Frank Pasquale unravels the new machine age of algorithms and bots

In his book "The Black Box Society," Pasquale exposes secret algorithms behind the scenes of corporate America.

Published December 8, 2014

Nicole Wong on how big data could change the way we live

After stints at the White House, Google and Twitter, Wong understands the promise and peril of big data.

Published December 6, 2014

Molly Sauter’s quest to make political DDoS legitimate

In “The Coming Swarm,” Sauter argues that denial of service should be no more controversial than sit-ins.

Published November 20, 2014

Why it's harder than ever to remain anonymous on the Web

Even with apps and services such as Whisper and Tor, many obstacles remain in the new quest for online anonymity.

Published October 24, 2014

Passcode, a new project from The Christian Science Monitor

We're launching a section on security and privacy in the digital age. Here's why.

Published October 17, 2014

How I learned to stop worrying and love the Twitterbot

What it’s like to have your identity hijacked and replaced with a Russian-speaking Bruce Willis impostor.