From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
An expedition to study seamounts in the Indian Ocean has discovered some new species, including some squid.
schneier From Schneier on Security | November 20, 2009 at 10:57 PM
Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.
schneier From Schneier on Security | November 20, 2009 at 04:20 PM
Interesting:
The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...schneier From Schneier on Security | November 20, 2009 at 09:22 AM
At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...schneier From Schneier on Security | November 19, 2009 at 09:26 AM
"Use of a pig model to demonstrate vulnerability of major neck vessels to inflicted trauma from common household items," from the American Journal of Forensic Medical...schneier From Schneier on Security | November 19, 2009 at 09:16 AM
Organizational Learning and Islamic Militancy (May 2009) was written by Michael Kenney for the U.S. Department of Justice. It's long: 146 pages. From the executive...schneier From Schneier on Security | November 18, 2009 at 04:04 PM
This is cool:
Ghost imaging is a technique that allows a high-resolution camera to produce an image of an object that the camera itself cannot see. It uses two...schneier From Schneier on Security | November 18, 2009 at 09:43 AM
A study in the British Journal of Criminology makes the point that drink-spiking date-raping is basically an urban legend:
Abstract. There is a stark contrast...schneier From Schneier on Security | November 17, 2009 at 10:39 AM
Interesting research:
For the last five years we have researched the connection between times of terrorist threats and public opinion. In a series of tightly designed...schneier From Schneier on Security | November 16, 2009 at 09:51 AM
A month ago, ThatsMyFace.com approached me about making a Bruce Schneier action figure. It's $100. I'd like to be able to say something like "half the proceeds...schneier From Schneier on Security | November 15, 2009 at 04:22 PM
The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor.
P. 495:
The guy was using a fairly simple buffer overflow attack but withEvery...schneier From Schneier on Security | November 13, 2009 at 08:43 PM
Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.
schneier From Schneier on Security | November 13, 2009 at 07:47 PM
[I was asked to write this essay for the New Internationalist (n. 427, November 2009, pp. 10–13). It's nothing I haven't said before, but I'm pleased with howessay...schneier From Schneier on Security | November 13, 2009 at 11:31 AM
It's conventional wisdom that the legal "wall" between intelligence and law enforcement was one of the reasons we failed to prevent 9/11. The 9/11 Comission evaluated...schneier From Schneier on Security | November 12, 2009 at 08:26 PM
In the past, our relationship with our computers was technical. We cared what CPU they had and what software they ran. We understood our networks and how they worked...schneier From Schneier on Security | November 12, 2009 at 09:29 AM
We've seen lots of rumors about attacks against the power grid, both in the U.S. and elsewhere, of people hacking the power grid. Seems like the source of these...schneier From Schneier on Security | November 11, 2009 at 06:19 PM