acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

The Problems of Too Much Information Sharing
From Schneier on Security

The Problems of Too Much Information Sharing

Funny. Fake, but funny.

VeriSign Hacked, Successfully and Repeatedly, in 2010
From Schneier on Security

VeriSign Hacked, Successfully and Repeatedly, in 2010

Reuters discovered the information: The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new...

Prisons in the U.S.
From Schneier on Security

Prisons in the U.S.

Really good article on the huge incarceration rate in the U.S., its causes, its effects, and its value: Over all, there are now more people under "correctional...

The Idaho Loophole
From Schneier on Security

The Idaho Loophole

Brian C. Kalt (2012), "The Idaho Loophole," Georgetown Law Journal, Vol. 93, No. 2. Abstract: This article argues that there is a 50-square-mile swath of Idaho...

Possibly the Most Incompetent TSA Story Yet
From Schneier on Security

Possibly the Most Incompetent TSA Story Yet

The storyline: TSA screener finds two pipes in passenger's bags. Screener determines that they're not a threat. Screener confiscates them anyway, because of...

Biases in Forensic Science
From Schneier on Security

Biases in Forensic Science

Some errors in forensic science may be the result of the biases of the medical examiners: Though they cannot prove it, Dr Dror and Dr Hampikian suspect the difference...

<i>Liars and Outliers</i> Update
From Schneier on Security

Liars and Outliers Update

According to my publisher, the book was printed last week and the warehouse is shipping orders to booksellers today. Amazon is likely to start shipping books on...

British Tourists Arrested in the U.S. for Tweeting
From Schneier on Security

British Tourists Arrested in the U.S. for Tweeting

Does this story make sense to anyone? The Department of Homeland Security flagged him as a potential threat when he posted an excited tweet to his pals about his...

The Nature of Cyberwar
From Schneier on Security

The Nature of Cyberwar

This was pretty good, I thought: However, it may be difficult to write military doctrine for many aspects of cyberconflict that are truly revolutionary. Here are...

Password Sharing Among American Teenagers
From Schneier on Security

Password Sharing Among American Teenagers

Interesting article from the New York Times on password sharing as a show of affection. "It's a sign of trust," Tiffany Carandang, a high school senior in Sandiscusses...

Evidence on the Effectiveness of Terrorism
From Schneier on Security

Evidence on the Effectiveness of Terrorism

Readers of this blog will know that I like the works of Max Abrams, and regularly blog them. He has a new paper (full paper behind paywall) in Defence and Peace...

Federal Judge Orders Defendant to Decrypt Laptop
From Schneier on Security

Federal Judge Orders Defendant to Decrypt Laptop

A U.S. federal judge has ordered a defendent to decrypt her laptop.

Supreme Court Rules that GPS Tracking Requires a Warrant
From Schneier on Security

Supreme Court Rules that GPS Tracking Requires a Warrant

The U.S Supreme Court has ruled that the police cannot attach a GPS tracking device to a car without a warrant.

Research into an Information Security Risk Rating
From Schneier on Security

Research into an Information Security Risk Rating

The NSF is funding research on giving organizations information-security risk ratings, similar to credit ratings for individuals: Existing risk management techniques...

Using Plant DNA for Authentication
From Schneier on Security

Using Plant DNA for Authentication

Turns out you can create unique signatures from plant DNA. The idea is to spray this stuff on military components in order to verify authentic items and detect...

Authentication by "Cognitive Footprint"
From Schneier on Security

Authentication by "Cognitive Footprint"

DARPA is funding research into new forms of biometrics that authenticate people as they use their computer: things like keystroke patterns, eye movements, mouse...

The Continued Militarization of the U.S. Police
From Schneier on Security

The Continued Militarization of the U.S. Police

The state of Texas gets an armed PT boat. I guess armed drones weren't enough for them.

<i>The Onion</i> on Facebook
From Schneier on Security

The Onion on Facebook

Funny news video on Facebook and the CIA.

Using False Alarms to Disable Security
From Schneier on Security

Using False Alarms to Disable Security

I wrote about this technique in Beyond Fear: Beginning Sunday evening, the robbers intentionally set off the gallery's alarm system several times without entering...

Tor Opsec
From Schneier on Security

Tor Opsec

Good operational security guide to Tor.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account