acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

New Report on Teens, Social Media, and Privacy
From Schneier on Security

New Report on Teens, Social Media, and Privacy

Interesting report from the From the Pew Internet and American Life Project: Teens are sharing more information about themselves on their social media profiles...

One-Shot vs. Iterated Prisoner's Dilemma
From Schneier on Security

One-Shot vs. Iterated Prisoner's Dilemma

This post by Aleatha Parker-Wood is very applicable to the things I wrote in Liars & Outliers: A lot of fundamental social problems can be modeled as a disconnection...

"The Global Cyber Game"
From Schneier on Security

"The Global Cyber Game"

This 127-page report was just published by the UK Defence Academy. I have not read it yet, but it looks really interesting. Executive Summary: This report presents...

DDOS as Civil Disobedience
From Schneier on Security

DDOS as Civil Disobedience

For a while now, I have been thinking about what civil disobedience looks like in the Internet Age. Certainly DDOS attacks, and politically motivated hacking in...

Surveillance and the Internet of Things
From Schneier on Security

Surveillance and the Internet of Things

The Internet has turned into a massive surveillance tool. We're constantly monitored on the Internet by hundreds of companies -- both familiar and unfamiliar. Everything...

Security Risks of Too Much Security
From Schneier on Security

Security Risks of Too Much Security

All of the anti-counterfeiting features of the new Canadian $100 bill are resulting in people not bothering to verify them. The fanfare about the security features...

Friday Squid Blogging: Striped Pyjama Squid Pet Sculpture
From Schneier on Security

Friday Squid Blogging: Striped Pyjama Squid Pet Sculpture

Technically, it's a cuttlefish and not a squid. But it's still nice art. I posted a photo of a real striped pyjama squid way back in 2006. As usual, you can...

<i>Applied Cryptography</i> on <i>Elementary</i>
From Schneier on Security

Applied Cryptography on Elementary

In the episode that aired on May 9th, about eight or nine minutes in, there's a scene with a copy of Applied Cryptography prominently displayed on the coffee table...

Bluetooth-Controlled Door Lock
From Schneier on Security

Bluetooth-Controlled Door Lock

Here is a new lock that you can control via Bluetooth and an iPhone app. That's pretty cool, and I can imagine all sorts of reasons to get one of those. But I'm...

Transparency and Accountability
From Schneier on Security

Transparency and Accountability

As part of the fallout of the Boston bombings, we're probably going to get some new laws that give the FBI additional investigative powers. As with the Patriotmost...

2007 NSA Manual on Internet Hacking
From Schneier on Security

2007 NSA Manual on Internet Hacking

Mildly interesting.

Friday Squid Blogging: Squid Festival in Monterey
From Schneier on Security

Friday Squid Blogging: Squid Festival in Monterey

It's at the end of May. Note that it's being put on by the Calamari Entertainment Group. As usual, you can also use this squid post to talk about the security...

The <i>Onion</i> on Browser Security
From Schneier on Security

The Onion on Browser Security

Wise advice: At Chase Bank, we recognize the value of online banking­ -- it’s quick, convenient, and available any time you need it. Unfortunately, though, the...

Mail Cover
From Schneier on Security

Mail Cover

From a FOIAed Department of Transportation document on investigative techniques: A "mail cover" is the process by which the U.S. Postal Service records any data...

The <i>Economist</i> on Guantanamo
From Schneier on Security

The Economist on Guantanamo

Maybe the tide is turning: America is in a hole. The last response of the blowhards and cowards who have put it there is always: "So what would you do: set them...

Reidentifying Anonymous Data
From Schneier on Security

Reidentifying Anonymous Data

Latanya Sweeney has demonstrated how easy it can be to identify people from their birth date, gender, and zip code. The anonymous data she reidentified happened...

Evacuation Alerts at the Airport
From Schneier on Security

Evacuation Alerts at the Airport

Last week, an employee error caused the monitors at LAX to display a building evacuation order: At a little before 9:47 p.m., the message read: "An emergency has...

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?
From Schneier on Security

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?

I have no idea if "former counterterrorism agent for the FBI" Tom Clemente knows what he's talking about, but that's certainly what he implies here: More recently...

Intelligence Analysis and the Connect-the-Dots Metaphor
From Schneier on Security

Intelligence Analysis and the Connect-the-Dots Metaphor

The FBI and the CIA are being criticized for not keeping better track of Tamerlan Tsarnaev in the months before the Boston Marathon bombings. How could they have...

Michael Chertoff on Google Glass
From Schneier on Security

Michael Chertoff on Google Glass

Interesting op-ed by former DHS head Michael Chertoff on the privacy risks of Google Glass. Now imagine that millions of Americans walk around each day wearing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account