Sign In

Communications of the ACM

Recent Opinion



How to Write About World War Iii
From ACM Opinion

How to Write About World War Iii

One of us first fought World War III from the backseat of a station wagon headed toward Myrtle Beach, South Carolina. For the other, it was at an island cabin on...

That Time the CIA Bugged a Cat to Spy on the Soviets
From ACM Opinion

That Time the CIA Bugged a Cat to Spy on the Soviets

My favorite story about American spying is one I've never been able to verify with the Central Intelligence Agency, and not for lack of trying.

Beware the Listening Machines
From ACM Opinion

Beware the Listening Machines

One of my great pleasures in life is attending conferences on fields I'm intrigued by, but know nothing about.

Facebook Is Eating the Internet
From ACM Careers

Facebook Is Eating the Internet

Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.

The Adultery Arms Race
From ACM Opinion

The Adultery Arms Race

Jay's wife, Ann, was supposed to be out of town on business.

When Everything Works Like Your Cell Phone
From ACM Opinion

When Everything Works Like Your Cell Phone

Everyone understands what it means to own a plunger.

Want to Reform the Nsa? Give Edward Snowden Immunity
From ACM Opinion

Want to Reform the Nsa? Give Edward Snowden Immunity

In 1970, Christopher Pyle disclosed in public writing that the U.S. Army was running a domestic intelligence program aimed at anti-war and civil-rights activists...

The New Editors of the Internet
From ACM Opinion

The New Editors of the Internet

Bowing to their better civic natures, and the pleas of James Foley's family, Twitter and YouTube have pulled down videos and photos of his murder.

Email Is Still the Best Thing on the Internet
From ACM Opinion

Email Is Still the Best Thing on the Internet

All these people are trying to kill email.

How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

If the Robots Kill ­s, It's Because It's Their Job
From ACM Opinion

If the Robots Kill ­s, It's Because It's Their Job

In the movie Transcendence, which opens in theaters on Friday, a sentient computer program embarks on a relentless quest for power, nearly destroying humanity in...

Captchas Are Becoming Security Theater
From ACM Opinion

Captchas Are Becoming Security Theater

CAPTCHAs are a time-worn way for humans to tell computers that we are human.

Google Wants to Make 'science Fiction' a Reality—and That's Limiting Their Imagination
From ACM Opinion

Google Wants to Make 'science Fiction' a Reality—and That's Limiting Their Imagination

Self-driving cars, extreme life extension, and global wifi provided by weather balloons: Google makes projects that sound like science fiction into reality at its...

There's No Real Difference Between Online Espionage and Online Attack
From ACM Opinion

There's No Real Difference Between Online Espionage and Online Attack

Back when we first started getting reports of the Chinese breaking into U.S. computer networks for espionage purposes, we described it in some very strong language...

Everything We Know About How the Nsa Tracks People's Physical Location
From ACM News

Everything We Know About How the Nsa Tracks People's Physical Location

Glenn Greenwald is back reporting about the NSA, now with Pierre Omidyar's news organization FirstLook and its introductory publication, The Intercept.

I See You: The Databases That Facial-Recognition Apps Need to Survive
From ACM Opinion

I See You: The Databases That Facial-Recognition Apps Need to Survive

Privacy concerns have been ignited by "NameTag," a facial-recognition app designed to reveal personal information after analyzing photos taken on mobile devices...

What If Your Autonomous Car Keeps Routing You Past Krispy Kreme?
From ACM Opinion

What If Your Autonomous Car Keeps Routing You Past Krispy Kreme?

On a future road trip, your robot car decides to take a new route, driving you past a Krispy Kreme Doughnut shop.

8 Hypotheses About Tech in 2014
From ACM Opinion

8 Hypotheses About Tech in 2014

If there was a feeling that defined the cultural backdrop for 2013, it was technoanxiety.

Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People
From ACM Opinion

Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People

In defending the NSA's telephony metadata collection efforts, government officials have repeatedly resorted to one seemingly significant detail: This is just metadata—numbers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account