acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Friday Squid Blogging: Squid Showerhead
From Schneier on Security

Friday Squid Blogging: Squid Showerhead

Neat.

Sprint Provides U.S. Law Enforcement with Cell Phone Customer Location Data
From Schneier on Security

Sprint Provides U.S. Law Enforcement with Cell Phone Customer Location Data

Wired summarizes research by Christopher Soghoian: Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between...

The Security Implications of Windows Volume Shadow Copy
From Schneier on Security

The Security Implications of Windows Volume Shadow Copy

It can be impossible to securely delete a file: What are the security implications of Volume Shadow Copy? Suppose you decide to protect one of your documents...

Fingerprinting RFID Chips
From Schneier on Security

Fingerprinting RFID Chips

This research centers on looking at the radio characteristics of individual RFID chips and creating a "fingerprint." It makes sense; fingerprinting individual...

Cyberwarfare Policy
From Schneier on Security

Cyberwarfare Policy

National Journal has an excellent article on cyberwar policy. I agree with the author's comments on The Atlantic blog: Would the United States ever use a morereport...

The Psychology of Being Scammed
From Schneier on Security

The Psychology of Being Scammed

This is a very interesting paper: "The Real Hustle, which does hidden camera demonstrations of con games. (There's no DVD of the show available, but there areprevious...

Friday Squid Blogging: Two Squid T-Shirts
From Schneier on Security

Friday Squid Blogging: Two Squid T-Shirts

From the Feed Store.

Fear and Public Perception
From Schneier on Security

Fear and Public Perception

This 1996 interview with psychiatrist Robert DuPont was part of a Frontline program called "Nuclear Reaction." He's talking about the role fear plays in the perception...

Leaked 9/11 Text Messages
From Schneier on Security

Leaked 9/11 Text Messages

Wikileaks has published pager intercepts from New York on 9/11: WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...

Mumbai Terrorist Attacks
From Schneier on Security

Mumbai Terrorist Attacks

Long, detailed, and very good story of the Mumbai terrorist attacks of last year. My own short commentary in the aftermath of the attacks.

Virtual Mafia in Online Worlds
From Schneier on Security

Virtual Mafia in Online Worlds

If you allow players in an online world to penalize each other, you open the door to extortion: One of the features that supported user socialization in the game...

Users Rationally Rejecting Security Advice
From Schneier on Security

Users Rationally Rejecting Security Advice

This paper, by Cormac Herley at Microsoft Research, sounds like me: Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...

Norbt
From Schneier on Security

Norbt

Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...

Decertifying "Terrorist" Pilots
From Schneier on Security

Decertifying "Terrorist" Pilots

This article reads like something written by the company's PR team. When it comes to sleuthing these days, knowing your way within a database is as valued a skill...

Al Qaeda Secret Code Broken
From Schneier on Security

Al Qaeda Secret Code Broken

I would sure like to know more about this: Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...

Friday Squid Blogging: New Squid Discovered
From Schneier on Security

Friday Squid Blogging: New Squid Discovered

An expedition to study seamounts in the Indian Ocean has discovered some new species, including some squid.

FailBlog on Security
From Schneier on Security

FailBlog on Security

Funny: career fair fail.

Interview with Me
From Schneier on Security

Interview with Me

Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.  

Denial-of-Service Attack Against CALEA
From Schneier on Security

Denial-of-Service Attack Against CALEA

Interesting: The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...

A Taxonomy of Social Networking Data
From Schneier on Security

A Taxonomy of Social Networking Data

At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account