Information and Computer Security

Computer Security is No Sure Thing

July 31, 2000

Computer Security Is No Sure Thing Richard Thieme Originally published by Forbes Digital ( on July 31, 2000. copyright (c) 2000  All rights reserved. Two-thirds of the way through the process of writing his new book on computer security, cryptographer, mathematician and computer security guru Bruce Schneier made a horrifying discovery. He was writing […]

Read the full article →

Melissa, or, The Canary in the Network

October 11, 1999

The Canary in the Network by Richard Thieme originally published in Information Security magazine, Like last week’s weather, the Melissa virus is old news, but its lessons have – once again – probably been forgotten already. Melissa is a canary on its back, its little legs twitching in the air, but we tunnel on through […]

Read the full article →

Cyborg Creep

February 6, 1999

By Richard Thieme Wearable computers and ubiquitous wireless environments will undermine independence and compromise security. “1984 was a beta version of what’s coming next.”–Chris Esposito, Boeing Today’s threats to security and privacy will seem tame by comparison to those of the next millennium, when we are living and working in ubiquitous wireless networks, where home, […]

Read the full article →

Knock Knock

May 2, 1997

Knock Knock by Richard Thieme published as “Mapping the Human Heart”  in Internet Underground, January 1997 “Who are you?” said the caterpillar. Lewis Carroll, Alice’s Adventures in Wonderland “How can it not know what it is?” Deckard, Blade Runner Blade Runner. A film about replicants, genetically engineered androids, machines that look and act human — […]

Read the full article →

Life in the Electronic Fortress

April 12, 1997

Life in the Electronic Fortress published in the Small Business Times (Milwaukee WI) Innocents Abroad I received a telephone call recently from a young friend. Marcus (not his real name) was excited. Marcus lives and works in Tokyo, where he spends his days breaking into electronic bank accounts. then moving the money into hidden accounts. […]

Read the full article →