Sign In

Communications of the ACM

Recent Opinion


Articles Interviews Vardi's Insights Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe New York Times

From ACM Opinion

Sneaky Apps That Track Cellphones

A perversion of smartphone technology called "stalking apps"—precise, secretive trackings of the movements of cellphone users—is increasingly a matter of national...

From ACM Opinion

I Am Not Big Brother

I've grown accustomed to reading inaccurate accounts of my day job. I'm in political data.

From ACM Opinion

At Dawn We Sleep

If you read the newspapers on the morning of Dec. 7, 1941, you would have been led to believe that Japan was poised to attack—but in Southeast Asia, not Pearl Harbor...

Long Day For a Professor Who Puts Elections ­nder a Microscope
From ACM Opinion

Long Day For a Professor Who Puts Elections ­nder a Microscope

Monday afternoon, just half a day before the polls opened, Prof. Mark Crispin Miller was feeling pessimistic about the electoral process.

How to Devise Passwords That Drive Hackers Away
From ACM Opinion

How to Devise Passwords That Drive Hackers Away

Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.

Killing the Computer to Save It
From ACM Opinion

Killing the Computer to Save It

Many people cite Albert Einstein's aphorism "Everything should be made as simple as possible, but no simpler." Only a handful, however, have had the opportunity...

And the Firewalls Came Tumbling Down
From ACM Opinion

And the Firewalls Came Tumbling Down

There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...

Where's the Discussion of Trojan Horses?
From ACM Opinion

Where's the Discussion of Trojan Horses?

The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...

From ACM Opinion

When Gps Tracking Violates Privacy Rights

For the right to personal privacy to survive in America in this digital age, courts must be meticulous in applying longstanding privacy protections to new technology...

Breaking ­p the Echo
From ACM Opinion

Breaking ­p the Echo

It is well known that when like-minded people get together, they tend to end up thinking a more extreme version of what they thought before they started to talk...

From ACM Opinion

A New Kind of Warfare

Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals, and foreign governments,...

Giving In to the Surveillance State
From ACM Opinion

Giving In to the Surveillance State

In March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National...

Trust: Ill-Advised in a Digital Age
From ACM Opinion

Trust: Ill-Advised in a Digital Age

Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM Opinion

The Public Is Left in the Dark When Courts Allow Electronic Surveillance

A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...

From ACM Opinion

The End of Privacy?

Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

Following the Breadcrumbs on the Data-Sharing Trail
From ACM Opinion

Following the Breadcrumbs on the Data-Sharing Trail

Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? 

From ACM Opinion

From the Birthplace of Big Brother

The George W. Bush team must be consumed with envy. Britain's government is preparing sweeping new legislation that would let the country's domestic intelligence...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account