acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Alternate Scanning Technologies
From Schneier on Security

Alternate Scanning Technologies

Iscon uses infrared light rather than X-rays. I have no idea how well it works. And Rapiscan has a new patent: Abstract: The present invention is directed towards...

Department of Homeland Security Getting a Little too 1984ish
From Schneier on Security

Department of Homeland Security Getting a Little too 1984ish

A DHS video message, reminding people to look out for and report suspicious activity, will be displayed at WalMart stores around the country.

WikiLeaks
From Schneier on Security

WikiLeaks

I don't have a lot to say about WikiLeaks, but I do want to make a few points. 1. Encryption isn't the issue here. Of course the cables were encrypted, for transmission...

Never Let the Terrorists Know How We're Storing Road Salt
From Schneier on Security

Never Let the Terrorists Know How We're Storing Road Salt

This seems not to be a joke: The American Civil Liberties Union has filed a lawsuit against the state after it refused to release the construction plans for a...

Sane Comments on Terrorism
From Schneier on Security

Sane Comments on Terrorism

From Michael Leiter, the director of the National Counterterrorism Center: Ultimately, Leiter said, it'll be the "quiet, confident resilience" of Americans after...

Profiling Lone Terrorists
From Schneier on Security

Profiling Lone Terrorists

Masters Thesis from the Naval Postgraduate School: "Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our...

FTC Privacy Report
From Schneier on Security

FTC Privacy Report

The U.S. Federal Trade Commission released its privacy report: "Protecting Consumer Privacy in an Era of Rapid Change." From the press release: One method of...

Cyberwar and the Future of Cyber Conflict
From Schneier on Security

Cyberwar and the Future of Cyber Conflict

The world is gearing up for cyberwar. The U.S. Cyber Command became operational in November. NATO has enshrined cyber security among its new strategic priorities...

Friday Squid Blogging: New Species of Squid Discovered
From Schneier on Security

Friday Squid Blogging: New Species of Squid Discovered

New species of squid discovered in the Southern Indian Ocean.

Football Match Fixing
From Schneier on Security

Football Match Fixing

Detecting fixed football (soccer) games. There is a certain buzz of expectation, because Oscar, one of the fraud analysts, has spotted a game he is sure has been...

Full Body Scanners: What's Next?
From Schneier on Security

Full Body Scanners: What's Next?

Organizers of National Opt Out Day, the Wednesday before Thanksgiving when air travelers were urged to opt out of the full-body scanners at security checkpoints...

Close the Washington Monument
From Schneier on Security

Close the Washington Monument

Securing the Washington Monument from terrorism has turned out to be a surprisingly difficult job. The concrete fence around the building protects it from attacking...

Brian Snow Sows Cyber Fears
From Schneier on Security

Brian Snow Sows Cyber Fears

That's no less sensational than the Calgary Herald headline: "Total cyber-meltdown almost inevitable, expert tells Calgary audience." That's former NSA Technical...

Risk Reduction Strategies on Social Networking Sites
From Schneier on Security

Risk Reduction Strategies on Social Networking Sites

By two teenagers: Mikalah uses Facebook but when she goes to log out, she deactivates her Facebook account. She knows that this doesn

Software Monoculture
From Schneier on Security

Software Monoculture

In 2003, a group of security experts -- myself included -- published a paper saying that 1) software monocultures are dangerous and 2) Microsoft, being the largest...

The Constitutionality of Full-Body Scanners
From Schneier on Security

The Constitutionality of Full-Body Scanners

Jeffrey Rosen opines: Although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals forThe...

Mohamed Osman Mohamud
From Schneier on Security

Mohamed Osman Mohamud

I agree with Glenn Greenwald. I don't know if it's an actual terrorist that the FBI arrested, or if it's another case of entrapment. All of the information about...

Zoo Security
From Schneier on Security

Zoo Security

From a study on zoo security: Among other measures, the scientists recommend not allowing animals to walk freely within the zoo grounds, and ensuring there is...

Causing Terror on the Cheap
From Schneier on Security

Causing Terror on the Cheap

Total cost for the Yemeni printer cartridge bomb plot: $4200. "Two Nokia mobiles, $150 each, two HP printers, $300 each, plus shipping, transportation and other...

Friday Squid Blogging: Studying Squid Hearing
From Schneier on Security

Friday Squid Blogging: Studying Squid Hearing

At Woods Hole: It is known now, through the work of Mooney and others, that the squid hearing system has some similarities and some differences compared to human...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account