From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Brian C. Kalt (2012), "The Idaho Loophole," Georgetown Law Journal, Vol. 93, No. 2.
Abstract: This article argues that there is a 50-square-mile swath of Idaho...schneier From Schneier on Security | February 1, 2012 at 12:05 PM
The storyline:
TSA screener finds two pipes in passenger's bags.
Screener determines that they're not a threat.
Screener confiscates them anyway, because of...schneier From Schneier on Security | January 31, 2012 at 11:03 PM
Some errors in forensic science may be the result of the biases of the medical examiners:
Though they cannot prove it, Dr Dror and Dr Hampikian suspect the difference...schneier From Schneier on Security | January 31, 2012 at 05:13 PM
According to my publisher, the book was printed last week and the warehouse is shipping orders to booksellers today. Amazon is likely to start shipping books on...schneier From Schneier on Security | January 30, 2012 at 07:59 PM
Does this story make sense to anyone?
The Department of Homeland Security flagged him as a potential threat when he posted an excited tweet to his pals about his...schneier From Schneier on Security | January 30, 2012 at 04:52 PM
This was pretty good, I thought:
However, it may be difficult to write military doctrine for many aspects of cyberconflict that are truly revolutionary. Here are...schneier From Schneier on Security | January 30, 2012 at 12:02 PM
Interesting article from the New York Times on password sharing as a show of affection.
"It's a sign of trust," Tiffany Carandang, a high school senior in Sandiscusses...schneier From Schneier on Security | January 27, 2012 at 12:39 PM
Readers of this blog will know that I like the works of Max Abrams, and regularly blog them. He has a new paper (full paper behind paywall) in Defence and Peace...schneier From Schneier on Security | January 26, 2012 at 04:36 PM
The U.S Supreme Court has ruled that the police cannot attach a GPS tracking device to a car without a warrant.schneier From Schneier on Security | January 25, 2012 at 06:54 PM
The NSF is funding research on giving organizations information-security risk ratings, similar to credit ratings for individuals:
Existing risk management techniques...schneier From Schneier on Security | January 25, 2012 at 12:44 PM
Turns out you can create unique signatures from plant DNA. The idea is to spray this stuff on military components in order to verify authentic items and detect...schneier From Schneier on Security | January 24, 2012 at 12:46 PM
DARPA is funding research into new forms of biometrics that authenticate people as they use their computer: things like keystroke patterns, eye movements, mouse...schneier From Schneier on Security | January 23, 2012 at 05:49 PM
The state of Texas gets an armed PT boat.
I guess armed drones weren't enough for them. schneier From Schneier on Security | January 20, 2012 at 12:39 PM
I wrote about this technique in Beyond Fear:
Beginning Sunday evening, the robbers intentionally set off the gallery's alarm system several times without entering...schneier From Schneier on Security | January 19, 2012 at 12:36 PM
Thankfully, this doesn't happen very often:
A US man who had been convicted on a second-degree murder charge will get a new trial after a computer virus destroyed...schneier From Schneier on Security | January 17, 2012 at 01:31 PM
Tomorrow, from 8 am to 8 pm EDT, this site, Schneier on Security, is going on strike to protest SOPA and PIPA. In doing so, I'll be joining Wikipedia (in English)...schneier From Schneier on Security | January 17, 2012 at 09:31 AM
This is a first:
...the McCombs allege that the bank, and the payment card industry (PCI) in general, force merchants to sign one-sided contracts that are based...schneier From Schneier on Security | January 16, 2012 at 03:58 PM