From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This article reads like something written by the company's PR team.
When it comes to sleuthing these days, knowing your way within a database is as valued a skill...schneier From Schneier on Security | November 23, 2009 at 08:36 PM
I would sure like to know more about this:
Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...schneier From Schneier on Security | November 23, 2009 at 09:53 AM
An expedition to study seamounts in the Indian Ocean has discovered some new species, including some squid.
schneier From Schneier on Security | November 20, 2009 at 10:57 PM
Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.
schneier From Schneier on Security | November 20, 2009 at 04:20 PM
Interesting:
The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...schneier From Schneier on Security | November 20, 2009 at 09:22 AM
At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...schneier From Schneier on Security | November 19, 2009 at 09:26 AM
"Use of a pig model to demonstrate vulnerability of major neck vessels to inflicted trauma from common household items," from the American Journal of Forensic Medical...schneier From Schneier on Security | November 19, 2009 at 09:16 AM
Organizational Learning and Islamic Militancy (May 2009) was written by Michael Kenney for the U.S. Department of Justice. It's long: 146 pages. From the executive...schneier From Schneier on Security | November 18, 2009 at 04:04 PM
This is cool:
Ghost imaging is a technique that allows a high-resolution camera to produce an image of an object that the camera itself cannot see. It uses two...schneier From Schneier on Security | November 18, 2009 at 09:43 AM
A study in the British Journal of Criminology makes the point that drink-spiking date-raping is basically an urban legend:
Abstract. There is a stark contrast...schneier From Schneier on Security | November 17, 2009 at 10:39 AM
Interesting research:
For the last five years we have researched the connection between times of terrorist threats and public opinion. In a series of tightly designed...schneier From Schneier on Security | November 16, 2009 at 09:51 AM
A month ago, ThatsMyFace.com approached me about making a Bruce Schneier action figure. It's $100. I'd like to be able to say something like "half the proceeds...schneier From Schneier on Security | November 15, 2009 at 04:22 PM
The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor.
P. 495:
The guy was using a fairly simple buffer overflow attack but withEvery...schneier From Schneier on Security | November 13, 2009 at 08:43 PM
Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.
schneier From Schneier on Security | November 13, 2009 at 07:47 PM
[I was asked to write this essay for the New Internationalist (n. 427, November 2009, pp. 10–13). It's nothing I haven't said before, but I'm pleased with howessay...schneier From Schneier on Security | November 13, 2009 at 11:31 AM
It's conventional wisdom that the legal "wall" between intelligence and law enforcement was one of the reasons we failed to prevent 9/11. The 9/11 Comission evaluated...schneier From Schneier on Security | November 12, 2009 at 08:26 PM