acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Wrasse Punish Cheaters
From Schneier on Security

Wrasse Punish Cheaters

Interesting: The bluestreak cleaner wrasse (Labroides dimidiatus) operates an underwater health spa for larger fish. It advertises its services with bright colours...

The Problems of Profiling at Security Checkpoints
From Schneier on Security

The Problems of Profiling at Security Checkpoints

Good article.

Privacy Violations by Facebook Employees
From Schneier on Security

Privacy Violations by Facebook Employees

I don't know if this is real, but it seems perfectly reasonable that all of Facebook is stored in a huge database that someone with the proper permissions can access...

Eavesdropping in the Former Soviet Union
From Schneier on Security

Eavesdropping in the Former Soviet Union

Interesting story: The phone's ringer is a pretty simple thing: there's a coil, a magnet and a hammer controlled by the magnet that hits the gongs when there is...

Security vs. Sustainability in Building Construction
From Schneier on Security

Security vs. Sustainability in Building Construction

Interesting: Any facility executive involved in the design of a new building would agree that security is one important goal for the new facility. These days,...

Google vs. China
From Schneier on Security

Google vs. China

I'm not sure what I can add to this: politically motivated attacks against Gmail from China. I've previously written about hacking from China. Shishir Nagaraja...

Prison Escape Artist
From Schneier on Security

Prison Escape Artist

Clever ruse: When he went to court for hearings, he could see the system was flawed. He would arrive on the twelfth floor in handcuffs and attached at the waist...

Fixing Intelligence Failures
From Schneier on Security

Fixing Intelligence Failures

President Obama, in his speech last week, rightly focused on fixing the intelligence failures that resulted in Umar Farouk Abdulmutallab being ignored, rather than...

Loretta Napoleoni on the Economics of Terrorism
From Schneier on Security

Loretta Napoleoni on the Economics of Terrorism

Interesting TED talk: Loretta Napoleoni details her rare opportunity to talk to the secretive Italian Red Brigades -- an experience that sparked a lifelong interest...

Ray McGovern on Intelligence Failures
From Schneier on Security

Ray McGovern on Intelligence Failures

Good commentary from former CIA analyst Ray McGovern: The short answer to the second sentence is: Yes, it is inevitable that "certain plots will succeed." A more...

$3.2 Million Jewelry Store Theft
From Schneier on Security

$3.2 Million Jewelry Store Theft

I've written about this sort of thing before: A robber bored a hole through the wall of jewelry shop and walked off with about 200 luxury watches worth 300 million...

Body Cavity Scanners
From Schneier on Security

Body Cavity Scanners

At least one company is touting its technology: Nesch, a company based in Crown Point, Indiana, may have a solution. It’s called diffraction-enhanced X-ray imaging...

Airplane Security Commentary
From Schneier on Security

Airplane Security Commentary

Excellent commentary from The Register: As the smoke clears following the case of Umar Farouk Abdul Mutallab, the failed Christmas Day "underpants bomber" of Northwest...

Op-ed on CIA's National Clandestine Service
From Schneier on Security

Op-ed on CIA's National Clandestine Service

Interesting.

The Power Law of Terrorism
From Schneier on Security

The Power Law of Terrorism

Research result #1: "A Generalized Fission-Fusion Model for the Frequency of Severe Terrorist Attacks," by Aaron Clauset and Frederik W. Wiegel. Plot the number...

The Comparative Risk of Terrorism
From Schneier on Security

The Comparative Risk of Terrorism

Good essay from the Wall Street Journal: It might be unrealistic to expect the average citizen to have a nuanced grasp of statistically based risk analysis, but...

My Second CNN.com Essay on the Underwear Bomber
From Schneier on Security

My Second CNN.com Essay on the Underwear Bomber

This one is about our tendency to overreact to rare risks, and is an update of this 2007 essay. I think we should start calling them the "underpants of mass destruction...

768-bit Number Factored
From Schneier on Security

768-bit Number Factored

News: On December 12, 2009, we factored the 768-bit, 232-digit number RSA-768 by the number field sieve. The number RSA-768 was taken from the now obsolete RSA...

Friday Squid Blogging: Squid Quilt
From Schneier on Security

Friday Squid Blogging: Squid Quilt

Light-up squid quilt.

Cybersecurity Theater at FOSE
From Schneier on Security

Cybersecurity Theater at FOSE

FOSE, the big government IT conference, has a Cybersecurity Theater" this year. I wonder if they'll check the photo ID of everyone who tries to get in. On a similar...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account