acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Fifth Annual Movie-Plot Threat Contest Winner
From Schneier on Security

Fifth Annual Movie-Plot Threat Contest Winner

On April 1, I announced the Fifth Annual Movie Plot Threat Contest: Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...

Protecting Cars with The Club
From Schneier on Security

Protecting Cars with The Club

From the Freakonomics blog: At some point, the Club was mentioned. The professional thieves laughed and exchanged knowing glances. What we knew was that the Club...

Behavioral Profiling at Airports
From Schneier on Security

Behavioral Profiling at Airports

There's a long article in Nature on the practice: It remains unclear what the officers found anomalous about George's behaviour, and why he was detained. The TSA's...

Friday Squid Blogging: Polymer Clay Squid Ornament
From Schneier on Security

Friday Squid Blogging: Polymer Clay Squid Ornament

Cute.

Security Cartoon
From Schneier on Security

Security Cartoon

Hi and Lois, no less.

Mainstream Cost-Benefit Security Analysis
From Schneier on Security

Mainstream Cost-Benefit Security Analysis

This essay in The New York Times is refreshingly cogent: You've seen it over and over. At a certain intersection in a certain town, there'll be an unfortunate...

Botox as a Terrorist Threat
From Schneier on Security

Botox as a Terrorist Threat

From Scientific American, no less.

Ninth Workshop on Economics and Information Security
From Schneier on Security

Ninth Workshop on Economics and Information Security

Earlier this week, the Ninth Workshop on Economics and Information Security (WEIS 2010) was held at Harvard. As always, it was a great workshop with some veryliveblogged...

The "Quake" Simulation and Risk Perception
From Schneier on Security

The "Quake" Simulation and Risk Perception

Read this.

Hiring Hackers
From Schneier on Security

Hiring Hackers

Any essay on hiring hackers quickly gets bogged down in definitions. What is a hacker, and how is he different from a cracker? I have my own definitions, but I'd...

DARPA Research into Clean-Slate Network Security Redesign
From Schneier on Security

DARPA Research into Clean-Slate Network Security Redesign

This looks like a good research direction: Is it possible that given a clean slate and likely millions of dollars, engineers could come up with the ultimate in...

Terrorists Placing Fake Bombs in Public Places
From Schneier on Security

Terrorists Placing Fake Bombs in Public Places

Supposedly, the latest terrorist tactic is to place fake bombs -- suspicious looking bags, backpacks, boxes, and coolers -- in public places in an effort to paralyze...

Fear in a Political Ad
From Schneier on Security

Fear in a Political Ad

Carly Fiorina wants to scare Californians into voting for her. Yes, terrorists kill -- about as often as home appliances.

Bletchley Park Archives to Go Online
From Schneier on Security

Bletchley Park Archives to Go Online

This is good: Simon Greenish, chief executive officer of the Bletchley Park Trust, said the plan was for the centre's entire archive to be digitised. [...] He...

How to Spot a CIA Officer
From Schneier on Security

How to Spot a CIA Officer

How to spot a CIA officer, at least in the mid 1970s. The reason the CIA office was located in the embassy -- as it is in most of the other countries in the world...

Friday Squid Blogging: <i>Kid vs. Squid</i>
From Schneier on Security

Friday Squid Blogging: Kid vs. Squid

A book. Also, read this.

The Four Stages of Fear
From Schneier on Security

The Four Stages of Fear

Interesting: In the throes of intense fear, we suddenly find ourselves operating in a different and unexpected way. The psychological tools that we normally use...

World War II Sabotage Field Manual
From Schneier on Security

World War II Sabotage Field Manual

The OSS Simple Sabotage Field Manual from 1944.

Intelligence Can Never Be Perfect
From Schneier on Security

Intelligence Can Never Be Perfect

Go read this article -- "Setting impossible standards on intelligence" -- on laying blame for the intelligence "failure" that allowed the Underwear Bomber to board...

Voluntary Security Inspections
From Schneier on Security

Voluntary Security Inspections

What could possibly be the point of this? Cars heading to Austin-Bergstrom International Airport will see random, voluntary inspections Monday. The searches are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account