From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a very interesting paper: "The Real Hustle, which does hidden camera demonstrations of con games. (There's no DVD of the show available, but there areprevious...schneier From Schneier on Security | November 30, 2009 at 10:20 AM
This 1996 interview with psychiatrist Robert DuPont was part of a Frontline program called "Nuclear Reaction."
He's talking about the role fear plays in the perception...schneier From Schneier on Security | November 27, 2009 at 02:25 PM
Wikileaks has published pager intercepts from New York on 9/11:
WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...schneier From Schneier on Security | November 26, 2009 at 01:11 PM
Long, detailed, and very good story of the Mumbai terrorist attacks of last year.
My own short commentary in the aftermath of the attacks.
schneier From Schneier on Security | November 25, 2009 at 07:52 PM
If you allow players in an online world to penalize each other, you open the door to extortion:
One of the features that supported user socialization in the game...schneier From Schneier on Security | November 25, 2009 at 10:11 AM
This paper, by Cormac Herley at Microsoft Research, sounds like me:
Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...schneier From Schneier on Security | November 24, 2009 at 04:06 PM
Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...schneier From Schneier on Security | November 24, 2009 at 09:24 AM
This article reads like something written by the company's PR team.
When it comes to sleuthing these days, knowing your way within a database is as valued a skill...schneier From Schneier on Security | November 23, 2009 at 08:36 PM
I would sure like to know more about this:
Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...schneier From Schneier on Security | November 23, 2009 at 09:53 AM
An expedition to study seamounts in the Indian Ocean has discovered some new species, including some squid.
schneier From Schneier on Security | November 20, 2009 at 10:57 PM
Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.
schneier From Schneier on Security | November 20, 2009 at 04:20 PM
Interesting:
The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...schneier From Schneier on Security | November 20, 2009 at 09:22 AM
At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...schneier From Schneier on Security | November 19, 2009 at 09:26 AM
"Use of a pig model to demonstrate vulnerability of major neck vessels to inflicted trauma from common household items," from the American Journal of Forensic Medical...schneier From Schneier on Security | November 19, 2009 at 09:16 AM
Organizational Learning and Islamic Militancy (May 2009) was written by Michael Kenney for the U.S. Department of Justice. It's long: 146 pages. From the executive...schneier From Schneier on Security | November 18, 2009 at 04:04 PM
This is cool:
Ghost imaging is a technique that allows a high-resolution camera to produce an image of an object that the camera itself cannot see. It uses two...schneier From Schneier on Security | November 18, 2009 at 09:43 AM
A study in the British Journal of Criminology makes the point that drink-spiking date-raping is basically an urban legend:
Abstract. There is a stark contrast...schneier From Schneier on Security | November 17, 2009 at 10:39 AM