From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Masters Thesis from the Naval Postgraduate School: "Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our...schneier From Schneier on Security | December 7, 2010 at 12:43 PM
The U.S. Federal Trade Commission released its privacy report: "Protecting Consumer Privacy in an Era of Rapid Change."
From the press release:
One method of...schneier From Schneier on Security | December 6, 2010 at 07:52 PM
The world is gearing up for cyberwar. The U.S. Cyber Command became operational in November. NATO has enshrined cyber security among its new strategic priorities...schneier From Schneier on Security | December 6, 2010 at 12:42 PM
Detecting fixed football (soccer) games.
There is a certain buzz of expectation, because Oscar, one of the fraud analysts, has spotted a game he is sure has been...schneier From Schneier on Security | December 3, 2010 at 06:41 PM
Organizers of National Opt Out Day, the Wednesday before Thanksgiving when air travelers were urged to opt out of the full-body scanners at security checkpoints...schneier From Schneier on Security | December 3, 2010 at 12:20 PM
Securing the Washington Monument from terrorism has turned out to be a surprisingly difficult job. The concrete fence around the building protects it from attacking...schneier From Schneier on Security | December 2, 2010 at 04:41 PM
That's no less sensational than the Calgary Herald headline: "Total cyber-meltdown almost inevitable, expert tells Calgary audience." That's former NSA Technical...schneier From Schneier on Security | December 2, 2010 at 01:06 PM
By two teenagers:
Mikalah uses Facebook but when she goes to log out, she deactivates her Facebook account. She knows that this doesnschneier From Schneier on Security | December 1, 2010 at 07:27 PM
In 2003, a group of security experts -- myself included -- published a paper saying that 1) software monocultures are dangerous and 2) Microsoft, being the largest...schneier From Schneier on Security | December 1, 2010 at 11:55 AM
Jeffrey Rosen opines:
Although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals forThe...schneier From Schneier on Security | November 30, 2010 at 06:09 PM
I agree with Glenn Greenwald. I don't know if it's an actual terrorist that the FBI arrested, or if it's another case of entrapment.
All of the information about...schneier From Schneier on Security | November 30, 2010 at 11:54 AM
From a study on zoo security:
Among other measures, the scientists recommend not allowing animals to walk freely within the zoo grounds, and ensuring there is...schneier From Schneier on Security | November 29, 2010 at 06:32 PM
Total cost for the Yemeni printer cartridge bomb plot: $4200.
"Two Nokia mobiles, $150 each, two HP printers, $300 each, plus shipping, transportation and other...schneier From Schneier on Security | November 29, 2010 at 12:52 PM
At Woods Hole:
It is known now, through the work of Mooney and others, that the squid hearing system has some similarities and some differences compared to human...schneier From Schneier on Security | November 26, 2010 at 10:58 PM
I have been thinking a lot about security against psychopaths. Or, at least, how we have traditionally secured social systems against these sorts of people, and...schneier From Schneier on Security | November 26, 2010 at 07:52 PM
Interesting story of the withdrawal of the A5/2 encryption algorithm from GSM phones.
schneier From Schneier on Security | November 26, 2010 at 11:51 AM
Good. It was always a dumb idea:
The color-coded threat levels were doomed to fail because "they donschneier From Schneier on Security | November 25, 2010 at 12:39 PM
In Europe, although the article doesn't say where:
Many banks have fitted ATMs with devices that are designed to thwart criminals from attaching skimmers to the...schneier From Schneier on Security | November 24, 2010 at 07:33 PM