acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Modifying the Color-Coded Threat Alert System
From Schneier on Security

Modifying the Color-Coded Threat Alert System

I wrote about the DHS's color-coded threat alert system in 2003, in Beyond Fear: The color-coded threat alerts issued by the Department of Homeland Security are...

Printing Police Handcuff Keys
From Schneier on Security

Printing Police Handcuff Keys

Using a 3D printer. Impressive. At the end of the day he talked the officers into trying the key on their handcuffs and

Skein News
From Schneier on Security

Skein News

Skein is one of the 14 SHA-3 candidates chosen by NIST to advance to the second round. As part of the process, NIST allowed the algorithm designers to implement...

Robert Sawyer's Alibis
From Schneier on Security

Robert Sawyer's Alibis

Back in 2002, science fiction author Robert J. Sawyer wrote an essay about the trade-off between privacy and security, and came out in favor of less privacy. I...

Friday Squid Blogging: Stinky Squid
From Schneier on Security

Friday Squid Blogging: Stinky Squid

It's a mushroom: Pseudocolus fusiformis.

Schneier on "The Future of the Security Industry"
From Schneier on Security

Schneier on "The Future of the Security Industry"

Here's a video of a talk I gave at an OWASP meeting in August.

Refuse to be Terrorized
From Schneier on Security

Refuse to be Terrorized

Me from 2006.

Eighth Anniversary of 9/11
From Schneier on Security

Eighth Anniversary of 9/11

On September 30, 2001, I published a special issue of Crypto-Gram discussing the terrorist attacks. I wrote about the novelty of the attacks, airplane security...

File Deletion
From Schneier on Security

File Deletion

File deletion is all about control. This used to not be an issue. Your data was on your computer, and you decided when and how to delete a file. You could use the...

Demonstration of a Liquid Explosive
From Schneier on Security

Demonstration of a Liquid Explosive

The BBC has a video demonstration of a 16-ounce bottle of liquid blowing a hole in the side of a plane. I know no more details other than what's in the video. ...

NSA Intercepts Used to Convict Liquid Bombers
From Schneier on Security

NSA Intercepts Used to Convict Liquid Bombers

Three of the UK liquid bombers were convicted Monday. NSA-intercepted e-mail was introduced as evidence in the trial: The e-mails, several of which have been ...

The Global Illicit Economy
From Schneier on Security

The Global Illicit Economy

Interesting video: A new class of global actors is playing an increasingly important role in globalization: smugglers, warlords, guerrillas, terrorists, gangs,...

David Kilcullen on Security and Insurgency
From Schneier on Security

David Kilcullen on Security and Insurgency

Very interesting hour-long interview. Australian-born David Kilcullen was the senior advisor to US General David Petraeus during his time in Iraq, advising on...

Friday Squid Blogging: Squid Coloration
From Schneier on Security

Friday Squid Blogging: Squid Coloration

Fascinating video.

Subpoenas as a Security Threat
From Schneier on Security

Subpoenas as a Security Threat

Blog post from Ed Felten: Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...

"The Cult of Schneier"
From Schneier on Security

"The Cult of Schneier"

If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...

Real-World Access Control
From Schneier on Security

Real-World Access Control

Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...

The History of One-Time Pads and the Origins of SIGABA
From Schneier on Security

The History of One-Time Pads and the Origins of SIGABA

Blog post from Steve Bellovin: It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a...

The Exaggerated Fears of Cyber-War
From Schneier on Security

The Exaggerated Fears of Cyber-War

Good article, which basically says that our policies are based more on fear than on reality. On cyber-terrorism: So why is there so much concern about

Hacking Swine Flu
From Schneier on Security

Hacking Swine Flu

Interesting: So how many bits are in this instance of H1N1? The raw number of bits, by my count, is 26,022; the actual number of coding bits approximately 25,054...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account