acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: LOLSquid
From Schneier on Security

Friday Squid Blogging: LOLSquid

It's supposed to be a classic, but I've never seen it before.

Remote Printing to an E-Mail Address
From Schneier on Security

Remote Printing to an E-Mail Address

This is cool technology from HP: Each printer with the ePrint capability will be assigned its own e-mail address. If someone wants to print a document from an...

The Continuing Incompetence of Terrorists
From Schneier on Security

The Continuing Incompetence of Terrorists

The Atlantic on stupid terrorists: Nowhere is the gap between sinister stereotype and ridiculous reality more apparent than in Afghanistan, where it's fair toPortrait...

Hot Dog Security
From Schneier on Security

Hot Dog Security

A nice dose of risk reality: Last week, the American Academy of Pediatrics issued a statement calling for large-type warning labels on the foods that kids most...

Patrolling the U.S./Canada Border
From Schneier on Security

Patrolling the U.S./Canada Border

Doesn't the DHS have anything else to do? As someone who believes that our nation has a right to enforce its borders, I should have been gratified when the Immigrations...

Filming the Police
From Schneier on Security

Filming the Police

In at least three U.S. states, it is illegal to film an active duty policeman: The legal justification for arresting the "shooter" rests on existing wiretapping...

Dating Recordings by Power Line Interference
From Schneier on Security

Dating Recordings by Power Line Interference

Interesting: The capability, called "electrical network frequency analysis" (ENF), is now attracting interest from the FBI and is considered the exciting new frontier...

Reading Me
From Schneier on Security

Reading Me

The number of different ways to read my essays, commentaries, and links has grown recently. Here's the rundown: You can read my writings daily on my blog. These...

Fifth Annual Movie-Plot Threat Contest Winner
From Schneier on Security

Fifth Annual Movie-Plot Threat Contest Winner

On April 1, I announced the Fifth Annual Movie Plot Threat Contest: Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...

Protecting Cars with The Club
From Schneier on Security

Protecting Cars with The Club

From the Freakonomics blog: At some point, the Club was mentioned. The professional thieves laughed and exchanged knowing glances. What we knew was that the Club...

Behavioral Profiling at Airports
From Schneier on Security

Behavioral Profiling at Airports

There's a long article in Nature on the practice: It remains unclear what the officers found anomalous about George's behaviour, and why he was detained. The TSA's...

Friday Squid Blogging: Polymer Clay Squid Ornament
From Schneier on Security

Friday Squid Blogging: Polymer Clay Squid Ornament

Cute.

Security Cartoon
From Schneier on Security

Security Cartoon

Hi and Lois, no less.

Mainstream Cost-Benefit Security Analysis
From Schneier on Security

Mainstream Cost-Benefit Security Analysis

This essay in The New York Times is refreshingly cogent: You've seen it over and over. At a certain intersection in a certain town, there'll be an unfortunate...

Botox as a Terrorist Threat
From Schneier on Security

Botox as a Terrorist Threat

From Scientific American, no less.

Ninth Workshop on Economics and Information Security
From Schneier on Security

Ninth Workshop on Economics and Information Security

Earlier this week, the Ninth Workshop on Economics and Information Security (WEIS 2010) was held at Harvard. As always, it was a great workshop with some veryliveblogged...

The "Quake" Simulation and Risk Perception
From Schneier on Security

The "Quake" Simulation and Risk Perception

Read this.

Hiring Hackers
From Schneier on Security

Hiring Hackers

Any essay on hiring hackers quickly gets bogged down in definitions. What is a hacker, and how is he different from a cracker? I have my own definitions, but I'd...

DARPA Research into Clean-Slate Network Security Redesign
From Schneier on Security

DARPA Research into Clean-Slate Network Security Redesign

This looks like a good research direction: Is it possible that given a clean slate and likely millions of dollars, engineers could come up with the ultimate in...

Terrorists Placing Fake Bombs in Public Places
From Schneier on Security

Terrorists Placing Fake Bombs in Public Places

Supposedly, the latest terrorist tactic is to place fake bombs -- suspicious looking bags, backpacks, boxes, and coolers -- in public places in an effort to paralyze...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account