acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

About Police Shoot Outs and Spectators
From Schneier on Security

About Police Shoot Outs and Spectators

Hopefully this advice is superfluous for my audience, but it's so well written it's worth reading nonetheless: 7. SO, the bottom line is this: If you are in a...

A Discussion of Redaction
From Schneier on Security

A Discussion of Redaction

Interesting.

The Boston Marathon Bomber Manhunt
From Schneier on Security

The Boston Marathon Bomber Manhunt

I generally give the police a lot of tactical leeway in times like this. The very armed and very dangerous suspects warranted extraordinary treatment. They were...

Me at the Berkman Center
From Schneier on Security

Me at the Berkman Center

Earlier this month I spent a week at the Berkman Center for Internet and Society, talking to people about power, security, technology, and threats (details here...

Friday Squid Blogging: Giant Squid Bike Rack
From Schneier on Security

Friday Squid Blogging: Giant Squid Bike Rack

It's the first on this page. Apparently this is the finished version of the design I blogged about last year. As usual, you can also use this squid post to talk...

NSA Cryptography Course
From Schneier on Security

NSA Cryptography Course

This article, from some internal NSA publication, is about Lambros Callimahos, who taught an intensive 18-week course on cryptology for many years and died in 1977...

The Nemim.gen Trojan
From Schneier on Security

The Nemim.gen Trojan

This clever piece of malware evades forensic examination by deleting its own components.

Initial Thoughts on the Boston Bombings
From Schneier on Security

Initial Thoughts on the Boston Bombings

I rewrote my "refuse to be terrorized" essay for the Atlantic. David Rothkoph (author of the great book Power, Inc.) wrote something similar, and so did John Cole...

FBI and Cell Phone Surveillance
From Schneier on Security

FBI and Cell Phone Surveillance

We're learning a lot about how the FBI eavesdrops on cell phones from a recent court battle.

Google Glass Enables New Forms of Cheating
From Schneier on Security

Google Glass Enables New Forms of Cheating

It's mentioned here: Mr. Doerr said he had been wearing the glasses and uses them especially for taking pictures and looking up words while playing Scattergories...

Friday Squid Blogging: Illegal Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal Squid Fishing

While we we're on the subject of squid fishing in Argentina, the country is dealing with foreign boats illegally fishing for squid inside its territorial waters...

Remotely Hijacking an Aircraft
From Schneier on Security

Remotely Hijacking an Aircraft

There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...

Thieves Use Video Camera to Stake Out Properties
From Schneier on Security

Thieves Use Video Camera to Stake Out Properties

If the police can use cameras, so can the burglars.

Security Externalities and DDOS Attacks
From Schneier on Security

Security Externalities and DDOS Attacks

Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited: The attackers' goal was to flood Spamhaus or itswriting...

Last Battle of Midway Cryptanalyst
From Schneier on Security

Last Battle of Midway Cryptanalyst

The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...

Nice Security Mindset Example
From Schneier on Security

Nice Security Mindset Example

A real-world one-way function: Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...

Bitcoins in the Mainstream Media
From Schneier on Security

Bitcoins in the Mainstream Media

Interesting article from the New Yorker. I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...

Elite Panic
From Schneier on Security

Elite Panic

I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...

Government Use of Hackers as an Object of Fear
From Schneier on Security

Government Use of Hackers as an Object of Fear

Interesting article about the perception of hackers in popular culture, and how the government uses the general fear of them to push for more power: But theseoverzealous...

Friday Squid Blogging: Nighttime Squid Fishing Seen from Space
From Schneier on Security

Friday Squid Blogging: Nighttime Squid Fishing Seen from Space

Page 18 of this thesis explains that squid fishing is done at night, and the lighting is so bright shows up in the satellite surveys of planetary lighting. This...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account