Author Archives


Internal Surveillance, External Risks

Building surveillance technologies into communications networks is risky. Two years ago, Greece discovered that legally installed surveillance software in a cell phone network had been surreptitiously activated by unknown persons: over 100 senior members of their government were tapped for almost a year. Things were no better in Italy, where a number of employees at […]
Research and Advances

Ultimate Cryptography

Predict the state of cryptography in 1,000 years. The thought is daunting. The very narrowness of the field makes the problem that much more difficult. It is one thing to try to decide whether sentient life on Earth will be made of carbon or silicon, quite another to speculate on whether it will need to […]

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved