From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A divining rod to find explosives in Iraq:
ATSC’s promotional material claims that its device can find guns, ammunition, drugs, truffles, human bodies and even...schneier From Schneier on Security | November 6, 2009 at 09:40 AM
From the Open Access Journal of Forensic Psychology, by a whole llist of authors: "A Call for Evidence-Based Security Tools":
Abstract: Since the 2001 attacks...schneier From Schneier on Security | November 5, 2009 at 12:11 PM
It was unattended in a hotel room at the time:
Israel's Mossad espionage agency used Trojan Horse programs to gather intelligence about a nuclear facility in Syria...schneier From Schneier on Security | November 5, 2009 at 09:39 AM
It's hard work being prey. Watch the birds at a feeder. They're constantly on alert, and will fly away from food -- from easy nutrition -- at the slightest movement...schneier From Schneier on Security | November 4, 2009 at 01:51 PM
Recent stories have documented the ridiculous effects of zero-tolerance weapons policies in a Delaware school district: a first-grader expelled for taking a camping...schneier From Schneier on Security | November 3, 2009 at 04:40 PM
Really:
The technology relies on recognising a pheromone - or scent signal - produced in sweat when a person is scared.
Researchers hope the ''fear detector''...schneier From Schneier on Security | November 3, 2009 at 11:25 AM
To aid their Wall Street investigations, the FBI used DCSNet, their massive surveillance system.
Prosecutors are using the FBI's massive surveillance system, DCSNet...schneier From Schneier on Security | November 2, 2009 at 11:40 AM
They're washing ashore on Vancouver Island.
Scientists have begun attaching tracking devices to squid off the coast of Vancouver Island to find out why the marine...schneier From Schneier on Security | October 30, 2009 at 09:15 PM
Squirrel terrorists.
We have a cognitive bias to exaggerate risks caused by other humans, and downplay risks caused by animals (and, even more, by natural phenomena...schneier From Schneier on Security | October 30, 2009 at 03:17 PM
"Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation," prepared for the US-China Economic and Security Review...schneier From Schneier on Security | October 30, 2009 at 09:54 AM
The U.S. Deputy Director of National Intelligence for Collection gives a press conference on the new Utah data collection facility: video and transcript.
schneier From Schneier on Security | October 29, 2009 at 05:59 PM
A critical essay on the TSA from a former assistant police chief:
This is where I find myself now obsessing over TSA policy, or its apparent lack. Every one of...schneier From Schneier on Security | October 29, 2009 at 09:59 AM
Only $99.99:
Keep tabs on your child at all times with this small but sophisticated device that combines GPS and cellular technology to provide you with real-time...schneier From Schneier on Security | October 28, 2009 at 06:28 PM
Ross Anderson has put together a great resource page on security and psychology:
At a deeper level, the psychology of security touches on fundamental scientific...schneier From Schneier on Security | October 28, 2009 at 10:29 AM
From Wired:
In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes...schneier From Schneier on Security | October 26, 2009 at 11:12 AM