From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A criminal gang is stealing truckloads of food:
Late last month, a gang of thieves stole six tractor-trailer loads of tomatoes and a truck full of cucumbers from...schneier From Schneier on Security | April 20, 2011 at 11:52 AM
Interesting blog post on the security costs for the $50B Air Force bomber program -- estimated to be $8B. This isn't all computer security, but the original article...schneier From Schneier on Security | April 20, 2011 at 11:31 AM
Increasingly, chains of evidence include software steps. It's not just the RIAA suing people -- and getting it wrong -- based on automatic systems to detect and...schneier From Schneier on Security | April 19, 2011 at 11:47 AM
We know it's prevalent, but there's some new information:
Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party...schneier From Schneier on Security | April 18, 2011 at 02:33 PM
Back in 1998, I wrote:
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break.
In 2004, Cory Doctorow...schneier From Schneier on Security | April 15, 2011 at 06:45 PM
In Japan, lots of people -- especially older people -- keep their life savings in cash in their homes. (The country's banks pay very low interest rates, so the...schneier From Schneier on Security | April 15, 2011 at 11:49 AM
One of the things I am writing about in my new book is how security equilibriums change. They often change because of technology, but they sometimes change because...schneier From Schneier on Security | April 14, 2011 at 11:36 AM
The London Underground is getting Wi-Fi. Of course there are security fears:
But Will Geddes, founder of ICP Group which specialises in reducing terror or technology...schneier From Schneier on Security | April 13, 2011 at 06:14 PM
This story is just plain weird. Regularly, damaged coins are taken out of circulation. They're destroyed and then sold to scrap metal dealers. That makes sense...schneier From Schneier on Security | April 13, 2011 at 11:25 AM
You'd think the country would already have one of these:
Israel is mulling the creation of a counter-cyberterrorism unit designed to safeguard both government...schneier From Schneier on Security | April 12, 2011 at 07:06 PM
Newspapers are reporting that, for about a month, hackers had access to computers "of at least 10 federal ministers including the Prime Minister, Foreign Minister...schneier From Schneier on Security | April 12, 2011 at 11:03 AM
I didn't know about this:
The law obliges a range of e-commerce sites, video and music services and webmail providers to keep a host of data on customers.
This...schneier From Schneier on Security | April 11, 2011 at 06:20 PM
The former CIA general counsel, John A. Rizzo, talks about his agency's assassination program, which has increased dramatically under the Obama administration:
...schneier From Schneier on Security | April 11, 2011 at 11:33 AM
Wendy Williams, Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid.
Kraken is the traditional name for gigantic sea monsters, and this book...schneier From Schneier on Security | April 8, 2011 at 09:08 PM
Colors are so last decade:
The U.S. government's new system to replace the five color-coded terror alerts will have two levels of warnings schneier From Schneier on Security | April 8, 2011 at 06:23 PM
This is impressive, and scary:
Every computer connected to the web has an internet protocol (IP) address, but there is no simple way to map this to a physical...schneier From Schneier on Security | April 8, 2011 at 11:22 AM
Our brains are specially designed to deal with cheating in social exchanges. The evolutionary psychology explanation is that we evolved brain heuristics formodus...schneier From Schneier on Security | April 7, 2011 at 06:10 PM
It's been patented; no idea if it actually works.
...newly patented device can render an assailant helpless with a brief flash of high-intensity light. It works...schneier From Schneier on Security | April 7, 2011 at 11:29 AM
"Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security," by John Mueller and Mark Stewart:
Abstract:The cumulative increase...schneier From Schneier on Security | April 6, 2011 at 11:03 AM