acm-header
Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Past Editor's Letters Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe New York Times
bg-corner

Beyond Sopa
From ACM Opinion

Beyond Sopa

We welcomed the collapse this month of two flawed bills to prevent online piracy, bills that could have stifled speech and undermined Internet safety. But piracy...

From ACM Opinion

Internet Access Is Not a Human Right

From the streets of Tunis to Tahrir Square and beyond, protests around the world last year were built on the Internet and the many devices that interact with...

From ACM Opinion

The Future of Moral Machines

A robot walks into a bar and says, "I’ll have a screwdriver." A bad joke, indeed. But even less funny if the robot says "Give me what’s in your cash register."...

From ACM Opinion

The Court's Gps Test

There were no GPS tracking devices when the framers wrote the Fourth Amendment’s prohibition against unreasonable searches. But that does not mean this sometimes...

From ACM Opinion

Protect Our Right to Anonymity

In November, the Supreme Court will hear arguments in a case that could redefine the scope of privacy in an age of increasingly ubiquitous surveillance technologies...

Bike Crash Wiped Details; Gps Data Filled Them In
From ACM News

Bike Crash Wiped Details; Gps Data Filled Them In

After racing and biking back roads on the San Francisco Peninsula for almost half a century without serious incident, on July 3 I crashed while riding downhill...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

From ACM Opinion

Free to Search and Seize

This spring was a rough season for the Fourth Amendment.

From ACM Opinion

Internet Piracy and How to Stop It

Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...

There's No Data Sheriff on the Wild Web
From ACM Opinion

There's No Data Sheriff on the Wild Web

A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...

Your Iphone Is Tracking You. So What.
From ACM Opinion

Your Iphone Is Tracking You. So What.

Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...

25 Years of Digital Vandalism
From ACM Opinion

25 Years of Digital Vandalism

In January 1986, Basit and Amjad Alvi, sibling programmers living near the main train station in Lahore, Pakistan, wrote a piece of code to safeguard the latest...

Dealing With Assange and the Secrets He Spilled
From ACM News

Dealing With Assange and the Secrets He Spilled

This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....

From ACM Opinion

Careful When Shooting the Messenger

In May 2009, The Daily Telegraph set off a political storm in Britain when it detailed widespread expense-account abuse by members of Parliament. Among the claims...

I Was Hacked in Beijing
From ACM Opinion

I Was Hacked in Beijing

The reality--and my fears--dawned only slowly. For weeks, friends and colleagues complained I had not answered their e-mail messages. I swore I had not received...

From ACM Opinion

Not Creating Content. Just Protecting It.

Should we be surprised that the biggest fight over freedom of expression in years involves Google, a company that produces algorithms rather than articles? Probably...

To Stop Crime, Share Your Genes
From ACM Opinion

To Stop Crime, Share Your Genes

Perhaps the only thing more surprising than President Obama’s decision to give an interview for "America’s Most Wanted" last weekend was his apparent agreement...

The 0s and 1s of Computer Warfare
From ACM Opinion

The 0s and 1s of Computer Warfare

We are already in the Brave New World of cyberwarfare. Cyberattacks have become a permanent fixture on the international scene because they have become easy and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account