acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Guide to Microsoft Police Forensic Services
From Schneier on Security

Guide to Microsoft Police Forensic Services

The "Microsoft Online Services Global Criminal Compliance Handbook (U.S. Domestic Version)" (also can be found here, here, and here) outlines exactly what Microsoft...

Google in <i>The Onion</i>
From Schneier on Security

Google in The Onion

Funny: MOUNTAIN VIEW, CA

Eating a Flash Drive
From Schneier on Security

Eating a Flash Drive

How not to destroy evidence: In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...

De-Anonymizing Social Network Users
From Schneier on Security

De-Anonymizing Social Network Users

Interesting paper: "A Practical Attack to De-Anonymize Social Network Users." Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...

Friday Squid Blogging: Squid Teapot
From Schneier on Security

Friday Squid Blogging: Squid Teapot

Squid teapot. Could be squiddier.

Another Interview with Me
From Schneier on Security

Another Interview with Me

I gave this one two days ago, at the RSA Conference.

Mariposa Botnet Shut Down
From Schneier on Security

Mariposa Botnet Shut Down

The Spanish police arrested three people in connection with the 13-million-computer Mariposa botnet.

Comprehensive National Cybersecurity Initiative
From Schneier on Security

Comprehensive National Cybersecurity Initiative

On Tuesday, the White House published an unclassified summary of its Comprehensive National Cybersecurity Initiative (CNCI). Howard Schmidt made the announcement...

Crypto Implementation Failure
From Schneier on Security

Crypto Implementation Failure

Look at this new AES-encrypted USB memory stick. You enter the key directly into the stick via the keypad, thereby bypassing any eavesdropping software on the...

Tom Engelhardt on Fear on Terrorism
From Schneier on Security

Tom Engelhardt on Fear on Terrorism

Nice essay. Similar sentiment from Newsweek.

More on the Al-Madhouh Assassination
From Schneier on Security

More on the Al-Madhouh Assassination

Interesting essay by a former CIA field officer on the al-Mabhouh assassination: The truth is that Mr. Mabhouh's assassination was conducted according to the book...

Breaking in to Hotel Rooms
From Schneier on Security

Breaking in to Hotel Rooms

Is this how the al-Mabhouh assassins got in?

Friday Squid Blogging: Squid Homophone Lessons
From Schneier on Security

Friday Squid Blogging: Squid Homophone Lessons

Squids make great examples.

Me on Surveillance Cameras
From Schneier on Security

Me on Surveillance Cameras

My fourth essay for CNN.com, on surveillance cameras. The Al-Mabhouh assassination made a nice news hook.

Hitler and Cloud Computing
From Schneier on Security

Hitler and Cloud Computing

Funny video by Marcus Ranum and Gunnar Peterson.

Small Planes and Lone Terrorist Nutcases
From Schneier on Security

Small Planes and Lone Terrorist Nutcases

A Washington Post article concludes that small planes are not the next terror threat: Pilots of private planes fly about 200,000 small and medium-size aircraft...

Remotely Spying on Kids with School Laptops
From Schneier on Security

Remotely Spying on Kids with School Laptops

It's a really creepy story. A school issues laptops to students, and then remotely and surreptitiously turns on the camera. (Here's the lawsuit.) This is anLower...

NSA Historical Documents
From Schneier on Security

NSA Historical Documents

Just declassified: "A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service, 1931

The Doghouse: Demiurge Consulting
From Schneier on Security

The Doghouse: Demiurge Consulting

They claim to be "one of the nation's only and most respected security and intelligence providers" -- I've never heard of them -- but their blog consists entirely...

Mark Twain on Risk Analysis
From Schneier on Security

Mark Twain on Risk Analysis

From 1871: I hunted up statistics, and was amazed to find that after all the glaring newspaper headings concerning railroad disasters, less than three hundred...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account