acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Beyond Security Theater
From Schneier on Security

Beyond Security Theater

[I was asked to write this essay for the New Internationalist (n. 427, November 2009, pp. 10–13). It's nothing I haven't said before, but I'm pleased with howessay...

FBI/CIA/NSA Information Sharing Before 9/11
From Schneier on Security

FBI/CIA/NSA Information Sharing Before 9/11

It's conventional wisdom that the legal "wall" between intelligence and law enforcement was one of the reasons we failed to prevent 9/11. The 9/11 Comission evaluated...

Security in a Reputation Economy
From Schneier on Security

Security in a Reputation Economy

In the past, our relationship with our computers was technical. We cared what CPU they had and what software they ran. We understood our networks and how they worked...

Hacking the Brazil Power Grid
From Schneier on Security

Hacking the Brazil Power Grid

We've seen lots of rumors about attacks against the power grid, both in the U.S. and elsewhere, of people hacking the power grid. Seems like the source of these...

Thieves Prefer Stealing Black Luggage
From Schneier on Security

Thieves Prefer Stealing Black Luggage

It's obvious why if you think about it: Thieves prefer to steal black luggage because so much of it looks alike. If the thief is caught red-handed by the bag's...

Protecting OSs from RootKits
From Schneier on Security

Protecting OSs from RootKits

Interesting research: "Countering Kernel Rootkits with Lightweight Hook Protection," by Zhi Wang, Xuxian Jiang, Weidong Cui, and and Peng Ning. Abstract: Kernel...

Is Antivirus Dead?
From Schneier on Security

Is Antivirus Dead?

Security is never black and white. If someone asks, "for best security, should I do A or B?" the answer almost invariably is both. But security is always a trade...

John Mueller on Zazi
From Schneier on Security

John Mueller on Zazi

I have refrained from commenting on the case against Najibullah Zazi, simply because it's so often the case that the details reported in the press have very little...

Laissez-Faire Access Control
From Schneier on Security

Laissez-Faire Access Control

Recently I wrote about the difficulty of making role-based access control work, and how reasearch at Dartmouth showed that it was better to let people take theThis...

Friday Squid Blogging: Dentyne Ice Squid Ad
From Schneier on Security

Friday Squid Blogging: Dentyne Ice Squid Ad

Weird.

Interview with Me
From Schneier on Security

Interview with Me

On CNet.com

The Doghouse: ADE 651
From Schneier on Security

The Doghouse: ADE 651

A divining rod to find explosives in Iraq: ATSC’s promotional material claims that its device can find guns, ammunition, drugs, truffles, human bodies and even...

The Problems with Unscientific Security
From Schneier on Security

The Problems with Unscientific Security

From the Open Access Journal of Forensic Psychology, by a whole llist of authors: "A Call for Evidence-Based Security Tools": Abstract: Since the 2001 attacks...

Mossad Hacked Syrian Official's Computer
From Schneier on Security

Mossad Hacked Syrian Official's Computer

It was unattended in a hotel room at the time: Israel's Mossad espionage agency used Trojan Horse programs to gather intelligence about a nuclear facility in Syria...

Fear and Overreaction
From Schneier on Security

Fear and Overreaction

It's hard work being prey. Watch the birds at a feeder. They're constantly on alert, and will fly away from food -- from easy nutrition -- at the slightest movement...

Zero-Tolerance Policies
From Schneier on Security

Zero-Tolerance Policies

Recent stories have documented the ridiculous effects of zero-tolerance weapons policies in a Delaware school district: a first-grader expelled for taking a camping...

Detecting Terrorists by Smelling Fear
From Schneier on Security

Detecting Terrorists by Smelling Fear

Really: The technology relies on recognising a pheromone - or scent signal - produced in sweat when a person is scared. Researchers hope the ''fear detector''...

The FBI and Wiretaps
From Schneier on Security

The FBI and Wiretaps

To aid their Wall Street investigations, the FBI used DCSNet, their massive surveillance system. Prosecutors are using the FBI's massive surveillance system, DCSNet...

Friday Squid Blogging: Humboldt Squid in Canada
From Schneier on Security

Friday Squid Blogging: Humboldt Squid in Canada

They're washing ashore on Vancouver Island. Scientists have begun attaching tracking devices to squid off the coast of Vancouver Island to find out why the marine...

Article on Me
From Schneier on Security

Article on Me

Article on me from a Luxembourg magazine.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account