acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Ninth Workshop on Economics and Information Security
From Schneier on Security

Ninth Workshop on Economics and Information Security

Earlier this week, the Ninth Workshop on Economics and Information Security (WEIS 2010) was held at Harvard. As always, it was a great workshop with some veryliveblogged...

The "Quake" Simulation and Risk Perception
From Schneier on Security

The "Quake" Simulation and Risk Perception

Read this.

Hiring Hackers
From Schneier on Security

Hiring Hackers

Any essay on hiring hackers quickly gets bogged down in definitions. What is a hacker, and how is he different from a cracker? I have my own definitions, but I'd...

DARPA Research into Clean-Slate Network Security Redesign
From Schneier on Security

DARPA Research into Clean-Slate Network Security Redesign

This looks like a good research direction: Is it possible that given a clean slate and likely millions of dollars, engineers could come up with the ultimate in...

Terrorists Placing Fake Bombs in Public Places
From Schneier on Security

Terrorists Placing Fake Bombs in Public Places

Supposedly, the latest terrorist tactic is to place fake bombs -- suspicious looking bags, backpacks, boxes, and coolers -- in public places in an effort to paralyze...

Fear in a Political Ad
From Schneier on Security

Fear in a Political Ad

Carly Fiorina wants to scare Californians into voting for her. Yes, terrorists kill -- about as often as home appliances.

Bletchley Park Archives to Go Online
From Schneier on Security

Bletchley Park Archives to Go Online

This is good: Simon Greenish, chief executive officer of the Bletchley Park Trust, said the plan was for the centre's entire archive to be digitised. [...] He...

How to Spot a CIA Officer
From Schneier on Security

How to Spot a CIA Officer

How to spot a CIA officer, at least in the mid 1970s. The reason the CIA office was located in the embassy -- as it is in most of the other countries in the world...

Friday Squid Blogging: <i>Kid vs. Squid</i>
From Schneier on Security

Friday Squid Blogging: Kid vs. Squid

A book. Also, read this.

The Four Stages of Fear
From Schneier on Security

The Four Stages of Fear

Interesting: In the throes of intense fear, we suddenly find ourselves operating in a different and unexpected way. The psychological tools that we normally use...

World War II Sabotage Field Manual
From Schneier on Security

World War II Sabotage Field Manual

The OSS Simple Sabotage Field Manual from 1944.

Intelligence Can Never Be Perfect
From Schneier on Security

Intelligence Can Never Be Perfect

Go read this article -- "Setting impossible standards on intelligence" -- on laying blame for the intelligence "failure" that allowed the Underwear Bomber to board...

Voluntary Security Inspections
From Schneier on Security

Voluntary Security Inspections

What could possibly be the point of this? Cars heading to Austin-Bergstrom International Airport will see random, voluntary inspections Monday. The searches are...

Terrorizing Ourselves
From Schneier on Security

Terrorizing Ourselves

Who needs actual terrorists? How

Canada Spending $1B on Security for G8/G20 Summit in June
From Schneier on Security

Canada Spending $1B on Security for G8/G20 Summit in June

Amazing: The Canadian government disclosed Tuesday that the total price tag to police the elite Group of Eight meeting in Muskoka, as well as the bigger-tent Group...

Friday Squid Blogging: 500-Million-Year-Old Squid
From Schneier on Security

Friday Squid Blogging: 500-Million-Year-Old Squid

Early squid: New Canadian research into 500 million-year-old carnivore fossils has revealed an early ancestor of modern-day squids and octopuses, solving the mystery...

Friday Squid Blogging: The Contents of Squid Stomachs
From Schneier on Security

Friday Squid Blogging: The Contents of Squid Stomachs

Not that interesting, really. Preliminarily, I can tell you that within my sample, cannibalism seems to be on the rise, myctophid consumption is falling, and a...

Another Scene from an Airport
From Schneier on Security

Another Scene from an Airport

I've gotten to the front of the security line at a different airport, and handed a different TSA officer my ID and ticket. TSA Officer: (Looks everything over....

Low-Tech Burglars to Get Lighter Sentences in Louisiana
From Schneier on Security

Low-Tech Burglars to Get Lighter Sentences in Louisiana

This is the kind of law that annoys me: A Senate bill to toughen penalties for crimes committed with the aid of Internet-generated "virtual maps," including acts...

End-to-End Encrypted Cell Phone Calls
From Schneier on Security

End-to-End Encrypted Cell Phone Calls

Android app. (Slashdot thread.)
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account