acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Changing Surveillance Techniques for Changed Communications Technologies
From Schneier on Security

Changing Surveillance Techniques for Changed Communications Technologies

New paper by Peter P. Swire -- "From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud": Abstract: This...

Friday Squid Blogging: Baby Opalescent Squid
From Schneier on Security

Friday Squid Blogging: Baby Opalescent Squid

Baby squid larvae are transparent after they hatch, so you can see the chromataphores (color control mechanisms) developing after a few days. As usual, you can...

The Catastrophic Consequences of 9/11
From Schneier on Security

The Catastrophic Consequences of 9/11

This is an interesting essay -- it claims to be the first in a series -- that looks at the rise of "homeland security" as a catastrophic consequence of the 9/11...

Homeland Security as Security Theater Metaphor
From Schneier on Security

Homeland Security as Security Theater Metaphor

Look at the last sentence in this article on hotel cleanliness: "I relate this to homeland security. We are not any safer, but many people believe that we are,"...

Ghostery
From Schneier on Security

Ghostery

Ghostery is a Firefox plug-in that tracks who is tracking your browsing habits in cyberspace. Here's a TED talk by Gary Kovacs, the CEO of Mozilla Corp., on it...

Security and Human Behavior (SHB 2012)
From Schneier on Security

Security and Human Behavior (SHB 2012)

I'm at the Fifth Interdisciplinary Workshop on Security and Human Behavior, SHB 2012. Google is hosting this year, at its offices in lower Manhattan. SHB is an...

Interesting Article on Libyan Internet Intelligence Gathering
From Schneier on Security

Interesting Article on Libyan Internet Intelligence Gathering

This is worth reading, for the insights it provides on how a country goes about monitoring its citizens in the information age: a combination of targeted attacks...

The Unreliability of Eyewitness Testimony
From Schneier on Security

The Unreliability of Eyewitness Testimony

Interesting article: The reliability of witness testimony is a vastly complex subject, but legal scholars and forensic psychologists say it's possible to extract...

Flame
From Schneier on Security

Flame

Flame seems to be another military-grade cyber-weapon, this one optimized for espionage. The worm is at least two years old, and is mainly confined to computers...

Friday Squid Blogging: Mimicking Squid Camouflage
From Schneier on Security

Friday Squid Blogging: Mimicking Squid Camouflage

Interesting: Cephalopods - squid, cuttlefish and octopuses - change colour by using tiny muscles in their skins to stretch out small sacs of black colouration....

Obama's Role in Stuxnet and Iranian Cyberattacks
From Schneier on Security

Obama's Role in Stuxnet and Iranian Cyberattacks

Really interesting article.

The Vulnerabilities Market and the Future of Security
From Schneier on Security

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...

Tax Return Identity Theft
From Schneier on Security

Tax Return Identity Theft

I wrote about this sort of thing in 2006 in the UK, but it's even bigger business here: The criminals, some of them former drug dealers, outwit the Internal Revenue...

Bar Code Switching
From Schneier on Security

Bar Code Switching

A particularly clever form of retail theft -- especially when salesclerks are working fast and don't know the products -- is to switch bar codes. This particular...

The Psychology of Immoral (and Illegal) Behavior
From Schneier on Security

The Psychology of Immoral (and Illegal) Behavior

When I talk about Liars and Outliers to security audiences, one of the things I stress is our traditional security focus -- on technical countermeasures -- is much...

The Problem of False Alarms
From Schneier on Security

The Problem of False Alarms

The context is tornado warnings: The basic problem, Smith says, it that sirens are sounded too often in most places. Sometimes they sound in an entire county for...

Backdoor Found in Chinese-Made Military Silicon Chips
From Schneier on Security

Backdoor Found in Chinese-Made Military Silicon Chips

We all knew this was possible, but researchers have found the exploit in the wild: Claims were made by the intelligence agencies around the world, from MI5, NSA...

Interview with a Safecracker
From Schneier on Security

Interview with a Safecracker

The legal kind. It's interesting: Q: How realistic are movies that show people breaking into vaults? A: Not very! In the movies it takes five minutes of razzle...

My Last Post About Ethnic Profiling at Airports
From Schneier on Security

My Last Post About Ethnic Profiling at Airports

Remember my rebuttal of Sam Harris's essay advocating the profiling of Muslims at airports? That wasn't the end of it. Harris and I conducted a back-and-forth...

Friday Squid Blogging: Squid Ink from the Jurassic
From Schneier on Security

Friday Squid Blogging: Squid Ink from the Jurassic

Seems that squid ink hasn't changed much in 160 million years. From this, researchers argue that the security mechanism of spraying ink into the water and escaping...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account