acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Toronto 18
From Schneier on Security

The Toronto 18

Long and interesting article from The Toronto Star on the Toronto 18, a terrorist cell arrested in 2006. Lots of stuff in this article I had not read before....

Surveillance and Morality
From Schneier on Security

Surveillance and Morality

"Does Surveillance Make Us Morally Better?": Conclusion The upshot of these reflections is that the relation between surveillance and moral edification is complicated...

The Threat of Cyberwar Has Been Grossly Exaggerated
From Schneier on Security

The Threat of Cyberwar Has Been Grossly Exaggerated

There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...

"Don't Commit Crime"
From Schneier on Security

"Don't Commit Crime"

This sign is from a gas station in the U.K. My first reaction was to laugh, but then I started thinking about it. We know that signs like "No Shoplifting"...

Research Report on Cyberattack Capabilities
From Schneier on Security

Research Report on Cyberattack Capabilities

From the National Academies in 2009: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. It's 390 pages.

Tracking Location Based on Water Isotope Ratios
From Schneier on Security

Tracking Location Based on Water Isotope Ratios

Interesting: ...water molecules differ slightly in their isotope ratios depending on the minerals at their source. ...researchers found that water samples from...

Friday Squid Blogging: Squid Robots
From Schneier on Security

Friday Squid Blogging: Squid Robots

Two of them; one was blogged about last year.

Secret Stash
From Schneier on Security

Secret Stash

Hiding objects in everyday objects.

Vigilant Citizens: Then vs. Now
From Schneier on Security

Vigilant Citizens: Then vs. Now

This is from Atomic Bombing: How to Protect Yourself, published in 1950: Of course, millions of us will go through our lives never seeing a spy or a saboteur...

Cryptography Failure Story
From Schneier on Security

Cryptography Failure Story

By Russian spies: Ricci said the steganographic program was activated by pressing control-alt-E and then typing in a 27-character password, which the FBI found...

Data at Rest vs. Data in Motion
From Schneier on Security

Data at Rest vs. Data in Motion

For a while now, I've pointed out that cryptography is singularly ill-suited to solve the major network security problems of today: denial-of-service attacks, website...

Cryptography Success Story
From Schneier on Security

Cryptography Success Story

From Brazil: the moral, of course, is to choose a strong key and to encrypt the entire drive, not just key files.

Space Terrorism
From Schneier on Security

Space Terrorism

Space terrorism? Yes, space terrorism. This article, by someone at the European Space Policy Institute, hypes a terrorst threat I've never seen hyped before....

Baby Terrorists
From Schneier on Security

Baby Terrorists

This, from Congressman Louie Gohmert of Texas, is about as dumb as it gets: I talked to a retired FBI agent who said that one of the things they were looking at...

Third SHB Workshop
From Schneier on Security

Third SHB Workshop

I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...

Friday Squid Blogging: Vampire Squid
From Schneier on Security

Friday Squid Blogging: Vampire Squid

The vampire squid can turn itself inside out to avoid predators.

Hacker Scare Story
From Schneier on Security

Hacker Scare Story

"10 Everyday Items Hackers Are Targeting Right Now" 5. Your Blender. Yes, Your Blender That's right: your blender is under attack! Most mixers are self-contained...

Security Trade-Offs in Crayfish
From Schneier on Security

Security Trade-Offs in Crayfish

Interesting: The experiments offered the crayfish stark decisions -- a choice between finding their next meal and becoming a meal for an apparent predator. In...

TacSat-3 "Hyperspectral" Spy Satellite
From Schneier on Security

TacSat-3 "Hyperspectral" Spy Satellite

It's operational: The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal...

WikiLeaks
From Schneier on Security

WikiLeaks

Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker. Assange is an international trafficker, of sorts. He and his colleagues collect...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account