acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Picking a Single Voice out of a Crowd
From Schneier on Security

Picking a Single Voice out of a Crowd

Interesting new technology. Squarehead's new system is like bullet-time for sound. 325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle...

Pen-and-Paper SQL Injection Attack Against Swedish Election
From Schneier on Security

Pen-and-Paper SQL Injection Attack Against Swedish Election

Some copycat imitated this xkcd cartoon in Sweden, hand writing an SQL injection attack onto a paper ballot. Even though the ballot was manually entered into the...

The FBI is Tracking Whom?
From Schneier on Security

The FBI is Tracking Whom?

They're tracking a college student in Silicon Valley. He's 20, partially Egyptian, and studying marketing at Mission College. He found the tracking device attached...

The Mahmoud al-Mabhouh Assassination
From Schneier on Security

The Mahmoud al-Mabhouh Assassination

Remember the Mahmoud al-Mabhouh assassination last January? The police identified 30 suspects, but haven't been able to find any of them. Police spent about 10...

<i>The Economist</i> on Biometrics
From Schneier on Security

The Economist on Biometrics

Good article. Here's my essay on biometrics, from 1999.

Friday Squid Blogging: Squid's Restaurant
From Schneier on Security

Friday Squid Blogging: Squid's Restaurant

In Chapel Hill, NC.

The Ineffectiveness of Vague Security Warnings
From Schneier on Security

The Ineffectiveness of Vague Security Warnings

From Slate: We do nothing, first and foremost, because there is nothing we can do. Unless the State Department gets specific

Hacking Trial Breaks D.C. Internet Voting System
From Schneier on Security

Hacking Trial Breaks D.C. Internet Voting System

Sounds like it was easy: Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer...

The Politics of Allocating Homeland Security Money to States
From Schneier on Security

The Politics of Allocating Homeland Security Money to States

From the Journal of Homeland Security and Emergency Management: "Politics or Risks? An Analysis of Homeland Security Grant Allocations to the States." Abstract...

Stuxnet
From Schneier on Security

Stuxnet

Computer security experts are often surprised at which stories get picked up by the mainstream media. Sometimes it makes no sense. Why this particular data breach...

Putting Unique Codes on Objects to Detect Counterfeiting
From Schneier on Security

Putting Unique Codes on Objects to Detect Counterfeiting

This will help some. At least two rival systems plan to put unique codes on packages containing antimalarials and other medications. Buyers will be able to text...

Analyzing CAPTCHAs
From Schneier on Security

Analyzing CAPTCHAs

New research: "Attacks and Design of Image Recognition CAPTCHAs." Abstract. We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper...

Sky Marshals Flying First Class
From Schneier on Security

Sky Marshals Flying First Class

I regularly say that security decisions are primarily made for non-security reasons. This article about the placement of sky marshals on airplanes is an excellent...

Monitoring Employees' Online Behavior
From Schneier on Security

Monitoring Employees' Online Behavior

Not their online behavior at work, but their online behavior in life. Using automation software that slogs through Facebook, Twitter, Flickr, YouTube, LinkedIn...

Friday Squid Blogging: Beautiful Squid Sketches
From Schneier on Security

Friday Squid Blogging: Beautiful Squid Sketches

The Cephalopoda.

My Recording Debut
From Schneier on Security

My Recording Debut

Okay, so this isn't a normal blog post. It's not about security. I've been playing doumbek with a band at the Minneapolis Renaissance Festival called Brother...

Me on Cyberwar
From Schneier on Security

Me on Cyberwar

During the cyberwar debate a few months ago, I said this: If we frame this discussion as a war discussion, then what you do when there's a threat of war is you...

Master's Theses in Homeland Security
From Schneier on Security

Master's Theses in Homeland Security

This is a list of master's theses from the Naval Postgraduate School's Center for Homeland Defense and Security, this year. Some interesting stuff in there....

Wiretapping the Internet
From Schneier on Security

Wiretapping the Internet

On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet. Technologies...

NSA Publications
From Schneier on Security

NSA Publications

There is an interesting list of NSA publications in this document, pages 30
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account