acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Squid Bicycle Parking Sculpture
From Schneier on Security

Friday Squid Blogging: Squid Bicycle Parking Sculpture

Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Tampon-Shaped USB Drive
From Schneier on Security

Tampon-Shaped USB Drive

This vendor is selling a tampon-shaped USB drive. Although it's less secure now that there are blog posts about it.

Facial Recognition of Avatars
From Schneier on Security

Facial Recognition of Avatars

I suppose this sort of thing might be useful someday. In Second Life, avatars are easily identified by their username, meaning police can just ask San Francisco...

Criminal Intent Prescreening and the Base Rate Fallacy
From Schneier on Security

Criminal Intent Prescreening and the Base Rate Fallacy

I've often written about the base rate fallacy and how it makes tests for rare events -- like airplane terrorists -- useless because the false positives vastlyThis...

Al Qaeda Steganography
From Schneier on Security

Al Qaeda Steganography

The reports are still early, but it seems that a bunch of terrorist planning documents were found embedded in a digital file of a porn movie. Several weeks later...

Cybercrime as a Tragedy of the Commons
From Schneier on Security

Cybercrime as a Tragedy of the Commons

Two very interesting points in this essay on cybercrime. The first is that cybercrime isn't as big a problem as conventional wisdom makes it out to be. We have...

When Investigation Fails to Prevent Terrorism
From Schneier on Security

When Investigation Fails to Prevent Terrorism

I've long advocated investigation, intelligence, and emergency response as the places where we can most usefully spend our counterterrorism dollars. Here's anthat...

JCS Chairman Sows Cyberwar Fears
From Schneier on Security

JCS Chairman Sows Cyberwar Fears

Army General Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, said: A cyber attack could stop our society in its tracks. Gadzooks. A scared populace...

Vote for <i>Liars and Outliers</i>
From Schneier on Security

Vote for Liars and Outliers

Actionable Books is having a vote to determine which of four books to summarize on their site. If you are willing, please go there and vote for Liars and Outliers...

Friday Squid Blogging: Chesapeake Bay Squid
From Schneier on Security

Friday Squid Blogging: Chesapeake Bay Squid

Great pictures. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Attack Mitigation
From Schneier on Security

Attack Mitigation

At the RSA Conference this year, I noticed a trend of companies that have products and services designed to help victims recover from attacks. Kelly Jackson Higgins...

Biometric Passports Make it Harder for Undercover CIA Officers
From Schneier on Security

Biometric Passports Make it Harder for Undercover CIA Officers

Last year, I wrote about how social media sites are making it harder than ever for undercover police officers. This story talks about how biometric passports are...

Fear and the Attention Economy
From Schneier on Security

Fear and the Attention Economy

danah boyd is thinking about -- in a draft essay, and as a recording of a presentation -- fear and the attention economy. Basically, she is making the argument...

Amazing Round of "Split or Steal"
From Schneier on Security

Amazing Round of "Split or Steal"

In Liars and Outliers, I use the metaphor of the Prisoner's Dilemma to exemplify the conflict between group interest and self-interest. There are a gazillion academic...

Alan Turing Cryptanalysis Papers
From Schneier on Security

Alan Turing Cryptanalysis Papers

GCHQ, the UK government's communications headquarters, has released two new -- well, 70 years old, but new to us -- cryptanalysis documents by Alan Turing. The...

Friday Squid Blogging: Extracting Squid Ink
From Schneier on Security

Friday Squid Blogging: Extracting Squid Ink

How to extract squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Liars & Outliers</i> Update
From Schneier on Security

Liars & Outliers Update

Liars & Outliers has been available for about two months, and is selling well both in hardcover and e-book formats. More importantly, I'm very pleased with the...

TSA Behavioral Detection Statistics
From Schneier on Security

TSA Behavioral Detection Statistics

Interesting data from the U.S. Government Accounting Office: But congressional auditors have questions about other efficiencies as well, like having 3,000 "behavior...

Dance Moves As an Identifier
From Schneier on Security

Dance Moves As an Identifier

A burglar was identified by his dance moves, captured on security cameras: "The 16-year-old juvenile suspect is known for his 'swag,' or signature dance move,"...

Smart Meter Hacks
From Schneier on Security

Smart Meter Hacks

Brian Krebs writes about smart meter hacks: But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account