acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Ray McGovern on Intelligence Failures
From Schneier on Security

Ray McGovern on Intelligence Failures

Good commentary from former CIA analyst Ray McGovern: The short answer to the second sentence is: Yes, it is inevitable that "certain plots will succeed." A more...

$3.2 Million Jewelry Store Theft
From Schneier on Security

$3.2 Million Jewelry Store Theft

I've written about this sort of thing before: A robber bored a hole through the wall of jewelry shop and walked off with about 200 luxury watches worth 300 million...

Body Cavity Scanners
From Schneier on Security

Body Cavity Scanners

At least one company is touting its technology: Nesch, a company based in Crown Point, Indiana, may have a solution. It’s called diffraction-enhanced X-ray imaging...

Airplane Security Commentary
From Schneier on Security

Airplane Security Commentary

Excellent commentary from The Register: As the smoke clears following the case of Umar Farouk Abdul Mutallab, the failed Christmas Day "underpants bomber" of Northwest...

Op-ed on CIA's National Clandestine Service
From Schneier on Security

Op-ed on CIA's National Clandestine Service

Interesting.

The Power Law of Terrorism
From Schneier on Security

The Power Law of Terrorism

Research result #1: "A Generalized Fission-Fusion Model for the Frequency of Severe Terrorist Attacks," by Aaron Clauset and Frederik W. Wiegel. Plot the number...

The Comparative Risk of Terrorism
From Schneier on Security

The Comparative Risk of Terrorism

Good essay from the Wall Street Journal: It might be unrealistic to expect the average citizen to have a nuanced grasp of statistically based risk analysis, but...

My Second CNN.com Essay on the Underwear Bomber
From Schneier on Security

My Second CNN.com Essay on the Underwear Bomber

This one is about our tendency to overreact to rare risks, and is an update of this 2007 essay. I think we should start calling them the "underpants of mass destruction...

768-bit Number Factored
From Schneier on Security

768-bit Number Factored

News: On December 12, 2009, we factored the 768-bit, 232-digit number RSA-768 by the number field sieve. The number RSA-768 was taken from the now obsolete RSA...

Friday Squid Blogging: Squid Quilt
From Schneier on Security

Friday Squid Blogging: Squid Quilt

Light-up squid quilt.

Cybersecurity Theater at FOSE
From Schneier on Security

Cybersecurity Theater at FOSE

FOSE, the big government IT conference, has a Cybersecurity Theater" this year. I wonder if they'll check the photo ID of everyone who tries to get in. On a similar...

FIPS 140-2 Level 2 Certified USB Memory Stick Cracked
From Schneier on Security

FIPS 140-2 Level 2 Certified USB Memory Stick Cracked

Kind of a dumb mistake: The USB drives in question encrypt the stored data via the practically uncrackable AES 256-bit hardware encryption system. Therefore, the...

Connecting the Dots
From Schneier on Security

Connecting the Dots

I wrote about intelligence failures back in 2002.

Post-Underwear-Bomber Airport Security
From Schneier on Security

Post-Underwear-Bomber Airport Security

In the headlong rush to "fix" security after the Underwear Bomber's unsuccessful Christmas Day attack, there's far too little discussion about what worked and what...

Gift Cards and Employee Retail Theft
From Schneier on Security

Gift Cards and Employee Retail Theft

Retail theft by employees has always been a problem, but gift cards make it easier: At the Saks flagship store in Manhattan, a 23-year-old sales clerk was caught...

Nate Silver on the Risks of Airplane Terrorism
From Schneier on Security

Nate Silver on the Risks of Airplane Terrorism

Over at fivethirtyeight.com, Nate Silver crunches the numbers and concludes that, at least as far as terrorism is concerned, air travel is safer than it's eververy...

Another Contest: Fixing Airport Security
From Schneier on Security

Another Contest: Fixing Airport Security

Slate is hosting an airport security suggestions contest: ideas "for making airport security more effective, more efficient, or more pleasant." Deadline is midday...

David Brooks on Resilience in the Face of Security Imperfection
From Schneier on Security

David Brooks on Resilience in the Face of Security Imperfection

David Brooks makes some very good points in this New York Times op ed from last week: All this money and technology seems to have reduced the risk of future attack...

TSA Logo Contest
From Schneier on Security

TSA Logo Contest

Over at "Ask the Pilot," Patrick Smith has a great idea: Calling all artists: One thing TSA needs, I think, is a better logo and a snappy motto. Perhaps there's...

Breaching the Secure Area in Airports
From Schneier on Security

Breaching the Secure Area in Airports

An unidentified man breached airport security at Newark Airport on Sunday, walking into the secured area through the exit, prompting an evacuation of a terminal...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account