Published March 17, 2017
As the Monitor winds down its cybersecurity and privacy project, Passcode founders give special thanks to readers, writers, contributors, and sponsors, and look back on some of their favorite articles, projects, and columns.
CSM Projects
Published February 10, 2017
Scroll right to continue –>
Published October 25, 2016
At the inaugural Passcode Cup capture the flag challenge, competitors raced through hacking challenges that ranged from password-cracking to compromising a mock water treatment facility.
Jack Detsch
Published October 23, 2016
By Sara Sorcher & Ann Hermes
Published August 19, 2016
At the Black Hat and Def Con conferences, attendees addressed the lack of diversity in the cybersecurity community.
CSM Projects
Published August 15, 2016
Published July 31, 2016
Story by Michael Holtz, photos by Ann Hermes | July 31, 2016
Published July 20, 2016
An excerpt from “Rise of the Machines: A Cybernetic History.”
CSM Projects
Published June 10, 2016
CSM Projects
Published March 25, 2016
CSM Projects
Published March 23, 2016
At this year’s South by Southwest Interactive festival, photographer Ann Hermes asked people what privacy means to them. Here’s what she found out.
CSM Projects
Published March 21, 2016
Though the Department of Justice has concluded the cases over locked iPhones in San Bernardino and Brooklyn, those cases could prove instrumental in future fights with Apple involving smartphone security. Here are the significant dates, legal filings, and arguments in both cases.
Malena Carollo | March 21, 2016
Published March 21, 2016
Security and privacy were hot topics for the tens of thousands of digerati who flocked to Austin for the 2016 South by Southwest Interactive festival.
CSM Projects
Published March 17, 2016
CSM Projects
Published March 8, 2016
The Cambridge 2 Cambridge contest involved MIT and the University of Cambridge in a hackathon meant to hone students’ cybersecurity skills.
Story by Jack Detsch and photos by Ann Hermes | Mar. 8, 2016
Published February 23, 2016
Cristina Maza, Staff writer of the Christian Science Monitor • Feb. 23, 2016
Published February 11, 2016
Passcode spoke with cybersecurity experts and human rights activists to better understand how and why China is hacking the world.
Michael B. Farrell • Feb. 11, 2016
Published January 29, 2016
By John H. Miller, Carnegie Mellon University and the Santa Fe Institute
Published January 27, 2016
As presidential candidates take the stage Thursday for an important Republican debate – the last before the Iowa caucuses – all of them will likely be prepared for questions on digital security and privacy.
By Lauren Leatherby | Jan. 27, 2016
Published January 25, 2016
CSM Projects
Published January 19, 2016
Mirta Galesic, Santa Fe Institute
Published January 18, 2016
CSM Projects
Published January 11, 2016
CSM Projects
Published January 8, 2016
The Global Positioning System that some 4 billion people rely on daily is essentially unprotected, opening it up to serious attacks from rogue nation states or criminal hackers who want to wreak havoc on American cities. But there is a simple solution to protect the navigation and timing network that underpins modern daily life.
By Joe Uchill | Jan. 8, 2016
Published January 6, 2016
Jessica C. Flack, Santa Fe Institute, and Manfred D. Laubichler, Arizona State University and Santa Fe Institute
Published January 4, 2016
CSM Projects
Published December 22, 2015
Jennifer A. Dunne and Marcus J. Hamilton, Santa Fe Institute
Published December 21, 2015
Taking on diplomatic immunity that shields labor trafficking
CSM Projects
Published December 14, 2015
CSM Projects
Published December 7, 2015
CSM Projects
Published December 1, 2015
Rob Axtell, George Mason University, and J. Doyne Farmer, the Institute for New Economic Thinking and the Santa Fe Institute
Published November 30, 2015
CSM Projects
Published November 25, 2015
CSM Projects
Published November 25, 2015
by David J. Unger, staff writer of The Christian Science Monitor • Nov. 25, 2015
Published November 18, 2015
Part 5 in a series on solutions to labor trafficking.
CSM Projects
Published November 17, 2015
Luís M. A. Bettencourt and Geoffrey B. West, The Santa Fe Institute
Published November 13, 2015
CSM Projects
Published November 11, 2015
CSM Projects
Published November 10, 2015
David Krakauer, President, Santa Fe Institute
Published November 9, 2015
Curated by The Christian Science Monitor
Published November 9, 2015
CSM Projects
Published November 9, 2015
To achieve the kind of environmentally sustainable future we will want our grandchildren to inherit, we need everyone on board, Armstrong writes.
By Robert Armstrong, MIT Energy Initiative • Nov. 9, 2015
Published November 8, 2015
CSM Projects
Published November 4, 2015
by Cristina Maza, staff writer of The Christian Science Monitor • Nov. 3, 2015
Published November 2, 2015
CSM Projects
Published October 26, 2015
CSM Projects
Published October 16, 2015
Story by Malena Carollo and illustrations by Erick Montes
Published October 16, 2015
by Cristina Maza, staff writer of The Christian Science Monitor • Oct. 16, 2015
Published October 14, 2015
by Cristina Maza, staff writer of The Christian Science Monitor
Published October 6, 2015
by Cristina Maza, staff writer of The Christian Science Monitor • Oct. 6, 2015
Published October 2, 2015
David J. Unger, staff writer of The Christian Science Monitor • Oct. 2, 2015
Published September 24, 2015
by Cristina Maza, staff writer of The Christian Science Monitor • Sept. 24, 2015
Published September 15, 2015
By Cristina Maza and David J. Unger, Staff writers of The Christian Science Monitor • Sept. 15, 2015
Published September 8, 2015
By Joe Uchill
Published September 2, 2015
In five minutes, you can hit the switch on clean, renewable wind energy for your entire home. Learn how from Arcadia Power.
Sponsored by Arcadia Power
Published August 31, 2015
by David J. Unger, Staff writer of The Christian Science Monitor • Sept. 3, 2015
Published August 18, 2015
By Mary Cirincione
Published July 7, 2015
The debate heating up in Washington over privacy safeguards on consumer devices may seem complex. But, simply put, strong encryption is better for everyone.
Robert M. Lee
Published June 30, 2015
Tech titans such as Apple and Google are battling the Obama administration over strong security on consumer devices, strengthened after the Snowden leaks. The outcome could impact the future of the Internet.
Story by Sara Sorcher & illustrations by Erick Montes
Published May 5, 2015
Passcode | For ID360
Published March 12, 2015
Sara Sorcher
Published March 6, 2015
Sara Sorcher and Photos by Ann Hermes
Published February 11, 2015
Sara Sorcher
Published October 17, 2014
By Sara Sorcher