acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Profiling Lone Terrorists
From Schneier on Security

Profiling Lone Terrorists

Masters Thesis from the Naval Postgraduate School: "Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our...

FTC Privacy Report
From Schneier on Security

FTC Privacy Report

The U.S. Federal Trade Commission released its privacy report: "Protecting Consumer Privacy in an Era of Rapid Change." From the press release: One method of...

Cyberwar and the Future of Cyber Conflict
From Schneier on Security

Cyberwar and the Future of Cyber Conflict

The world is gearing up for cyberwar. The U.S. Cyber Command became operational in November. NATO has enshrined cyber security among its new strategic priorities...

Friday Squid Blogging: New Species of Squid Discovered
From Schneier on Security

Friday Squid Blogging: New Species of Squid Discovered

New species of squid discovered in the Southern Indian Ocean.

Football Match Fixing
From Schneier on Security

Football Match Fixing

Detecting fixed football (soccer) games. There is a certain buzz of expectation, because Oscar, one of the fraud analysts, has spotted a game he is sure has been...

Full Body Scanners: What's Next?
From Schneier on Security

Full Body Scanners: What's Next?

Organizers of National Opt Out Day, the Wednesday before Thanksgiving when air travelers were urged to opt out of the full-body scanners at security checkpoints...

Close the Washington Monument
From Schneier on Security

Close the Washington Monument

Securing the Washington Monument from terrorism has turned out to be a surprisingly difficult job. The concrete fence around the building protects it from attacking...

Brian Snow Sows Cyber Fears
From Schneier on Security

Brian Snow Sows Cyber Fears

That's no less sensational than the Calgary Herald headline: "Total cyber-meltdown almost inevitable, expert tells Calgary audience." That's former NSA Technical...

Risk Reduction Strategies on Social Networking Sites
From Schneier on Security

Risk Reduction Strategies on Social Networking Sites

By two teenagers: Mikalah uses Facebook but when she goes to log out, she deactivates her Facebook account. She knows that this doesn

Software Monoculture
From Schneier on Security

Software Monoculture

In 2003, a group of security experts -- myself included -- published a paper saying that 1) software monocultures are dangerous and 2) Microsoft, being the largest...

The Constitutionality of Full-Body Scanners
From Schneier on Security

The Constitutionality of Full-Body Scanners

Jeffrey Rosen opines: Although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals forThe...

Mohamed Osman Mohamud
From Schneier on Security

Mohamed Osman Mohamud

I agree with Glenn Greenwald. I don't know if it's an actual terrorist that the FBI arrested, or if it's another case of entrapment. All of the information about...

Zoo Security
From Schneier on Security

Zoo Security

From a study on zoo security: Among other measures, the scientists recommend not allowing animals to walk freely within the zoo grounds, and ensuring there is...

Causing Terror on the Cheap
From Schneier on Security

Causing Terror on the Cheap

Total cost for the Yemeni printer cartridge bomb plot: $4200. "Two Nokia mobiles, $150 each, two HP printers, $300 each, plus shipping, transportation and other...

Friday Squid Blogging: Studying Squid Hearing
From Schneier on Security

Friday Squid Blogging: Studying Squid Hearing

At Woods Hole: It is known now, through the work of Mooney and others, that the squid hearing system has some similarities and some differences compared to human...

Psychopaths and Security
From Schneier on Security

Psychopaths and Security

I have been thinking a lot about security against psychopaths. Or, at least, how we have traditionally secured social systems against these sorts of people, and...

The Withdrawal of the A5/2 Encryption Algorithm
From Schneier on Security

The Withdrawal of the A5/2 Encryption Algorithm

Interesting story of the withdrawal of the A5/2 encryption algorithm from GSM phones.

The DHS is Getting Rid of the Color-Coded Terrorism Alert System
From Schneier on Security

The DHS is Getting Rid of the Color-Coded Terrorism Alert System

Good. It was always a dumb idea: The color-coded threat levels were doomed to fail because "they don

New ATM Skimming Attack
From Schneier on Security

New ATM Skimming Attack

In Europe, although the article doesn't say where: Many banks have fitted ATMs with devices that are designed to thwart criminals from attaching skimmers to the...

David Kahn Donates his Cryptography Collection to the National Cryptologic Museum
From Schneier on Security

David Kahn Donates his Cryptography Collection to the National Cryptologic Museum

Good for him. I think that's where my collection will be going, too.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account