acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Petition the U.S. Government to Force the TSA to Follow the Law
From Schneier on Security

Petition the U.S. Government to Force the TSA to Follow the Law

This is important: In July 2011, a federal appeals court ruled that the Transportation Security Administration had to conduct a notice-and-comment rulemaking on...

Cryptanalyze the Agrippa Code
From Schneier on Security

Cryptanalyze the Agrippa Code

William Gibson's Grippa Code is available for cryptanalysis. Break the code, win a prize.

Attacking Fences
From Schneier on Security

Attacking Fences

From an article on the cocaine trade between Mexico and the U.S.: "They erect this fence," he said, "only to go out there a few days later and discover that these...

Sensible Comments about Terrorism
From Schneier on Security

Sensible Comments about Terrorism

Two, at least: "Bee stings killed as many in UK as terrorists, says watchdog." "Americans Are as Likely to Be Killed by Their Own Furniture as by Terrorism." Is...

Students Hack DHS Drone
From Schneier on Security

Students Hack DHS Drone

A team at the University of Texas successfully spoofed the GPS and took control of a DHS drone, for about $1,000 in off-the-shelf parts. Does anyone think that...

Friday Squid Blogging: Dissecting a Squid
From Schneier on Security

Friday Squid Blogging: Dissecting a Squid

This was suprisingly interesting. When a body is mysterious, you cut it open. You peel back the skin and take stock of its guts. It is the science of an arrow,...

Me on Military Cyberattacks and Cyberweapons Treaties
From Schneier on Security

Me on Military Cyberattacks and Cyberweapons Treaties

I did a short Q&A for Network World.

Naming Pets
From Schneier on Security

Naming Pets

Children are being warned that the name of their first pet should contain at least eight characters and a digit.

So You Want to Be a Security Expert
From Schneier on Security

So You Want to Be a Security Expert

I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering...

Commercial Espionage Virus
From Schneier on Security

Commercial Espionage Virus

It's designed to steal blueprints and send them to China. Note that although this is circumstantial evidence that the virus is from China, it is possible that...

On Fear
From Schneier on Security

On Fear

A poet reflects on the nature of fear.

WEIS 2012
From Schneier on Security

WEIS 2012

Last week I was at the Workshop on Economics and Information Security in Berlin. Excellent conference, as always. Ross Anderson liveblogged the event; see the...

Friday Squid Blogging: Another Giant Squid Found
From Schneier on Security

Friday Squid Blogging: Another Giant Squid Found

A dead 13-foot-long giant squid has been found off the coast of New South Wales. As usual, you can also use this squid post to talk about the security stories...

FireDogLake Book Salon for <i>Liars and Outliers</i>
From Schneier on Security

FireDogLake Book Salon for Liars and Outliers

Here's the permalink.

On Securing Potentially Dangerous Virology Research
From Schneier on Security

On Securing Potentially Dangerous Virology Research

Abstract: The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough toScience...

Nuclear Fears
From Schneier on Security

Nuclear Fears

Interesting review -- by David Roepik -- of The Rise of Nuclear Fear, by Spencer Weart: Along with contributing to the birth of the environmental movement, Weart...

<i>Top Secret America</i> on the Post-9/11 Cycle of Fear and Funding
From Schneier on Security

Top Secret America on the Post-9/11 Cycle of Fear and Funding

I'm reading Top Secret America: The Rise of the New American Security State, by Dana Priest and William M. Arkin. Both work for The Washington Post. The book...

Russian Nuclear Launch Code Backup Procedure
From Schneier on Security

Russian Nuclear Launch Code Backup Procedure

If the safe doesn't open, use a sledgehammer: The sledgehammer's existence first came to light in 1980, when a group of inspecting officers from the General Staff...

E-Mail Accounts More Valuable than Bank Accounts
From Schneier on Security

E-Mail Accounts More Valuable than Bank Accounts

This informal survey produced the following result: "45% of the users found their email accounts more valuable than their bank accounts." The author believes this...

Stratfor on the Phoenix Serial Flashlight Bomber
From Schneier on Security

Stratfor on the Phoenix Serial Flashlight Bomber

Interesting.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account