acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Laissez-Faire Access Control
From Schneier on Security

Laissez-Faire Access Control

Recently I wrote about the difficulty of making role-based access control work, and how reasearch at Dartmouth showed that it was better to let people take theThis...

Friday Squid Blogging: Dentyne Ice Squid Ad
From Schneier on Security

Friday Squid Blogging: Dentyne Ice Squid Ad

Weird.

Interview with Me
From Schneier on Security

Interview with Me

On CNet.com

The Doghouse: ADE 651
From Schneier on Security

The Doghouse: ADE 651

A divining rod to find explosives in Iraq: ATSC’s promotional material claims that its device can find guns, ammunition, drugs, truffles, human bodies and even...

The Problems with Unscientific Security
From Schneier on Security

The Problems with Unscientific Security

From the Open Access Journal of Forensic Psychology, by a whole llist of authors: "A Call for Evidence-Based Security Tools": Abstract: Since the 2001 attacks...

Mossad Hacked Syrian Official's Computer
From Schneier on Security

Mossad Hacked Syrian Official's Computer

It was unattended in a hotel room at the time: Israel's Mossad espionage agency used Trojan Horse programs to gather intelligence about a nuclear facility in Syria...

Fear and Overreaction
From Schneier on Security

Fear and Overreaction

It's hard work being prey. Watch the birds at a feeder. They're constantly on alert, and will fly away from food -- from easy nutrition -- at the slightest movement...

Zero-Tolerance Policies
From Schneier on Security

Zero-Tolerance Policies

Recent stories have documented the ridiculous effects of zero-tolerance weapons policies in a Delaware school district: a first-grader expelled for taking a camping...

Detecting Terrorists by Smelling Fear
From Schneier on Security

Detecting Terrorists by Smelling Fear

Really: The technology relies on recognising a pheromone - or scent signal - produced in sweat when a person is scared. Researchers hope the ''fear detector''...

The FBI and Wiretaps
From Schneier on Security

The FBI and Wiretaps

To aid their Wall Street investigations, the FBI used DCSNet, their massive surveillance system. Prosecutors are using the FBI's massive surveillance system, DCSNet...

Friday Squid Blogging: Humboldt Squid in Canada
From Schneier on Security

Friday Squid Blogging: Humboldt Squid in Canada

They're washing ashore on Vancouver Island. Scientists have begun attaching tracking devices to squid off the coast of Vancouver Island to find out why the marine...

Article on Me
From Schneier on Security

Article on Me

Article on me from a Luxembourg magazine.

Attacking U.S. Critical Infrastructure
From Schneier on Security

Attacking U.S. Critical Infrastructure

Squirrel terrorists. We have a cognitive bias to exaggerate risks caused by other humans, and downplay risks caused by animals (and, even more, by natural phenomena...

Report on Chinese Cyberwarfare Capability
From Schneier on Security

Report on Chinese Cyberwarfare Capability

"Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation," prepared for the US-China Economic and Security Review...

DDNI for Collection Press Conference
From Schneier on Security

DDNI for Collection Press Conference

The U.S. Deputy Director of National Intelligence for Collection gives a press conference on the new Utah data collection facility: video and transcript.

A Critical Essay on the TSA
From Schneier on Security

A Critical Essay on the TSA

A critical essay on the TSA from a former assistant police chief: This is where I find myself now obsessing over TSA policy, or its apparent lack. Every one of...

Best Buy Sells Surveillance Tracker
From Schneier on Security

Best Buy Sells Surveillance Tracker

Only $99.99: Keep tabs on your child at all times with this small but sophisticated device that combines GPS and cellular technology to provide you with real-time...

Psychology and Security Resource Page
From Schneier on Security

Psychology and Security Resource Page

Ross Anderson has put together a great resource page on security and psychology: At a deeper level, the psychology of security touches on fundamental scientific...

2006 Wal-Mart Hack
From Schneier on Security

2006 Wal-Mart Hack

Interesting story of a 2006 Wal-Mart hack from, probably, Minsk.

CIA Invests in Social-Network Datamining
From Schneier on Security

CIA Invests in Social-Network Datamining

From Wired: In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account