acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Eye Twitch Patterns as a Biometric
From Schneier on Security

Eye Twitch Patterns as a Biometric

Yet another biometric: eye twitch patterns: ...a person's saccades, their tiny, but rapid, involuntary eye movements, can be measured using a video camera. The...

Friday Squid Blogging: "The Seasick Squid"
From Schneier on Security

Friday Squid Blogging: "The Seasick Squid"

A fable. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Conversation about <i>Liars and Outliers</i> on The WELL
From Schneier on Security

Conversation about Liars and Outliers on The WELL

I'm on The WELL right now -- for the next week or so -- discussing my new book with anyone who wants to participate. I'm also at Dragon*Con this weekend in Atlanta...

The Psychological Effects of Terrorism
From Schneier on Security

The Psychological Effects of Terrorism

Shelly C. McArdle, Heather Rosoff, Richard S. John (2012), "The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal...

Shared Lock
From Schneier on Security

Shared Lock

A reader sent me this photo of a shared lock. It's at the gate of a large ranch outside of Victoria, Texas. Multiple padlocks secure the device, but when a single...

The Importance of Security Engineering
From Schneier on Security

The Importance of Security Engineering

In May, neuroscientist and popular author Sam Harris and I debated the issue of profiling Muslims at airport security. We each wrote essays, then went back and...

Fear and Imagination
From Schneier on Security

Fear and Imagination

Interesting anecdote from World War II.

Friday Squid Blogging: Squid Sacrifices Arms to Avoid Predators
From Schneier on Security

Friday Squid Blogging: Squid Sacrifices Arms to Avoid Predators

The squid Octopoteuthis deletron will drop portions of an arm to escape from a predator. As usual, you can also use this squid post to talk about the security...

Internet Safety Talking Points for Schools
From Schneier on Security

Internet Safety Talking Points for Schools

A surprisingly sensible list. E. Why are you penalizing the 95% for the 5%? You don't do this in other areas of discipline at school. Even though you know some...

Fear and How it Scales
From Schneier on Security

Fear and How it Scales

Nice post: The screaming fear in your stomach before you give a speech to 12 kids in the fifth grade is precisely the same fear a presidential candidate feels...

Exaggerating Cybercrime
From Schneier on Security

Exaggerating Cybercrime

Finally, someone takes a look at the $1 trillion number government officials are quoting as the cost of cybercrime. While it's a good figure to scare people, it...

Video Filter that Detects a Pulse
From Schneier on Security

Video Filter that Detects a Pulse

Fascinating. How long before someone claims he can use this technology to detect nervous people in airports?

Five "Neglects" in Risk Management
From Schneier on Security

Five "Neglects" in Risk Management

Good list, summarized here: 1. Probability neglect – people sometimes don’t consider the probability of the occurrence of an outcome, but focus on the consequences...

Poll: Americans Like the TSA
From Schneier on Security

Poll: Americans Like the TSA

Gallup has the results: Despite recent negative press, a majority of Americans, 54%, think the U.S. Transportation Security Administration is doing either an excellent...

Is iPhone Security Really this Good?
From Schneier on Security

Is iPhone Security Really this Good?

Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore: Technologies the company has adopted protect...

Help Cryptanalyze Gauss
From Schneier on Security

Help Cryptanalyze Gauss

Kaspersky is looking for help decrypting the Gauss payload.

Passive Sensor That Sees Through Walls
From Schneier on Security

Passive Sensor That Sees Through Walls

A new technology uses the radiation given off by wi-fi devices to sense the positions of people through a one-foot-thick brick wall.

The View from an Israeli Security Checkpoint
From Schneier on Security

The View from an Israeli Security Checkpoint

This is an extraordinary (and gut-wrenching) first-person account of what it's like to staff an Israeli security checkpoint. It shows how power corrupts: how it's...

Friday Squid Blogging: Efforts to Film a Live Giant Squid
From Schneier on Security

Friday Squid Blogging: Efforts to Film a Live Giant Squid

Japanese researchers are attempting to film the elusive giant squid. As usual, you can also use this squid post to talk about the security stories in the news...

$200 for a Fake Security System
From Schneier on Security

$200 for a Fake Security System

This is pretty funny: Moving red laser beams scare away potential intruders Laser beams move along floor and wall 180 degrees Easy to install, 110v comes on automatically...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account