acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


­npublished Iraq War Logs Trigger Internal Wikileaks Revolt
From ACM News

­npublished Iraq War Logs Trigger Internal Wikileaks Revolt

A domino chain of resignations at the secret-spilling site WikiLeaks followed a unilateral decision by autocratic founder Julian Assange to schedule an October...

Pentagon Bomb Squad Backs Super Snipers, Mini-Bots, Secret Spy Tech
From ACM News

Pentagon Bomb Squad Backs Super Snipers, Mini-Bots, Secret Spy Tech

"Devil Pup" robots. Super sniper scopes. Secret signals intelligence sensors. Flying spies to find buried threats. Campaigns to influence the media behind the...

From ACM News

Darpa Wants You To Build An Anti-Secrecy App

Usually the Pentagon expends time and technological effort to protect information. But now the far-out researchers at Darpa are looking for a few good futurists...

DARPA
From ACM News

DARPA

Tomorrow’s WikiLeakers may have to be sneakier than just dumping military docs onto a Lady Gaga disc. The futurists at Darpa are working on a project that would...

­.s. Escalates Air War Over Afghanistan
From ACM News

­.s. Escalates Air War Over Afghanistan

There may not be quite as many bombs falling from the sky. But don’t let that fool you. The United States has dramatically escalated its air war over Afghanistan...

Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack
From ACM News

Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack

In the fall of 2008, a variant of a three year-old, relatively benign worm began winding its way through the U.S. military's networks, spread by troops usingfirst...

How Spies (and Counter Spies) Are Using The Cloud
From ACM News

How Spies (and Counter Spies) Are Using The Cloud

Secret agents have long been at the cutting edge of technological developments. By studying how different spy agencies use technology, it’s often been possible...

Pentagon Demands Wikileaks
From ACM News

Pentagon Demands Wikileaks

A Pentagon spokesman on Thursday demanded that the secret-spilling website WikiLeaks return and delete all the classified Defense Department documents in its...

From ACM News

WikiLeaks Posts Mysterious 'Insurance' File

In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents, the secret-spilling site has posted a mysterious...

Defcon Ninja Party Badge
From ACM News

Defcon Ninja Party Badge

A hacker group known as the Ninjas has created what may be the best DefCon badge ever. The badge allows wireless ninja battle between badge holders. Unlike the...

From ACM News

Is Breaking Captcha a Crime?

Prosecutors in a New Jersey ticket scalping case are pushing the envelope on the federal computer hacking law, setting a precedent that could make it a felony to...

With World Watching, Wikileaks Falls Into Disrepair
From ACM News

With World Watching, Wikileaks Falls Into Disrepair

Would-be whistle-blowers hoping to leak documents to Wikileaks face a potentially frustrating surprise. Wikileaks’ submission process, which had been degraded for...

From ACM News

Nsa Gets Geeky After Dark, New Docs Show

It's an agency staffed by some of the government's top hackers, brainiest cryptographers, and most sophisticated network defenders. But when employees at the NSA...

From ACM News

Bill Would Give Feds 'Emergency' Powers to Secure Civilian Nets

A U.S. Senate draft bill would give the federal government the power to take over civilian networks' security, if there's an "imminent cyber threat" and provides...

Cyber Command: We Don
From ACM News

Cyber Command: We Don

Members of the military’s new Cyber Command insist that they’ve got no interest in taking over civilian Internet security--or even in becoming the Pentagon’s primary...

DARPA
From ACM News

DARPA

Software systems could one day analyze everything from blurry war-zone footage to the subtle sarcasm in a written paragraph, thanks to two unassuming scientists...

From ACM News

DARPA Wants Code to Spot

Can software spot a cyberspy’s tricky intentions, before he’s started to help the other side? The way-out researchers at Darpa think so.

From ACM News

Army Spy Plane May Have Snooped on Bomber: Report

Investigators were able to track wannabe terrorist Faisal Shahzad through his anonymous, pre-paid cell phone--exactly how, they won’t say. But there was a tantalizing...

The Legal Case For Robot War Gets Complicated
From ACM News

The Legal Case For Robot War Gets Complicated

The legal debate over America's undeclared drone war in Pakistan is getting sharper: In a congressional hearing yesterday, a prominent law professor suggested that...

Why Intel Wants to Get Into Energy
From ACM News

Why Intel Wants to Get Into Energy

Intel showed off an experimental device last week in China that could someday substantially cut the costs of wiring homes and offices for energy efficiency, one...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account