Sign In

Communications of the ACM

Recent Articles



Is the U.S. Lagging in the Quest for Quantum Computing?
From ACM Opinion

Is the U.S. Lagging in the Quest for Quantum Computing?

A quantum computer capable of breaking the strongest codes protecting online communications and computer data is highly unlikely to appear within the next decade...

The End of Privacy Began in the 1960s
From ACM Opinion

The End of Privacy Began in the 1960s

In the fall of 1965, President Lyndon Johnson's administration announced a plan to consolidate hundreds of federal databases into one centralized National Data...

The New Radicalization of the Internet
From ACM Opinion

The New Radicalization of the Internet

Social media has played a key role in the recent rise of violent right-wing extremism in the United States, including three recent incidents—one in which a man...

The Snowden Legacy: What's Changed, Really?
From ACM News

The Snowden Legacy: What's Changed, Really?

Digital privacy has come a long way since June 2013. In the five years since documents provided by Edward Snowden became the basis for a series of revelations that...

How Will We Outsmart A.I. Liars?
From ACM Opinion

How Will We Outsmart A.I. Liars?

During the summer before the 2016 presidential election, John Seymour and Philip Tully, two researchers with ZeroFOX, a security company in Baltimore, unveiled...

You Know What? Go Ahead and Use the Hotel Wi-Fi
From ACM Opinion

You Know What? Go Ahead and Use the Hotel Wi-Fi

As you travel this holiday season, bouncing from airport to airplane to hotel, you'll likely find yourself facing a familiar quandary: Do I really trust this ...

Video Doesn't Capture Truth
From ACM Opinion

Video Doesn't Capture Truth

The White House has revoked the press pass of Jim Acosta, CNN's chief White House correspondent, after a testy exchange between the reporter and President Trump...

Surveillance Kills Freedom By Killing Experimentation
From ACM Opinion

Surveillance Kills Freedom By Killing Experimentation

In my book Data and Goliath, I write about the value of privacy. I talk about how it is essential for political liberty and justice, and for commercial fairness...

Fake News: Can Teenagers Spot It?
From ACM Opinion

Fake News: Can Teenagers Spot It?

If we are to make it less of a threat to democracy, that effort is going to need to start in schools.

At China’s Internet Conference, a Darker Side of Tech Emerges
From ACM Opinion

At China’s Internet Conference, a Darker Side of Tech Emerges

Every year at the World Internet Conference, held since 2014 in the photogenic canal town of Wuzhen near Shanghai, companies and government officials have convened ...

How to Hack an Election (Without Touching the Machines)
From ACM Opinion

How to Hack an Election (Without Touching the Machines)

On Monday morning, just 24 hours before polls opened in the US midterm elections, President Trump sounded an alarm with a Tweet: "Law Enforcement has been strongly...

The Internet Is Splitting in Two Amid U.S. Dispute With China
From ACM Opinion

The Internet Is Splitting in Two Amid U.S. Dispute With China

Western bigwigs were a no-show at China's biggest web conference. But in their absence, the local overseers of the nation's technology industry were only too happy...

Humans Are Getting More Botlike on Twitter
From ACM Opinion

Humans Are Getting More Botlike on Twitter

We know for sure that Cesar Sayoc, who allegedly targeted high-profile Democrats with mail bombs in late October, isn't a Russian bot.

Even a Few Bots Can Shift Public Opinion in Big Ways
From ACM Opinion

Even a Few Bots Can Shift Public Opinion in Big Ways

Nearly two-thirds of the social media bots with political activity on Twitter before the 2016 U.S. presidential election supported Donald Trump.

The Real Houseguest of the Ecuadorian Embassy
From ACM Opinion

The Real Houseguest of the Ecuadorian Embassy

If Julian Assange of WikiLeaks denies the Ecuadorian government's stinging charge that he's a disgusting houseguest, he'd do well not to deny that charge "categorically...

Nobody's Cellphone Is Really That Secure
From ACM Opinion

Nobody's Cellphone Is Really That Secure

Earlier this week, The New York Times reported that the Russians and the Chinese were eavesdropping on President Donald Trump's personal cellphone and using the...

The Russia Investigations: The U.S. Launches a Digital Offensive, Gently 
From ACM Opinion

The Russia Investigations: The U.S. Launches a Digital Offensive, Gently 

Everyone knows how to picture the special operations troopers of, for example, the Army's elite Delta Force: Rough-looking customers with custom carbines and advanced...

My Thoughts Are My Password, Because My Brain Reactions Are Unique
From ACM Opinion

My Thoughts Are My Password, Because My Brain Reactions Are Unique

Your brain is an inexhaustible source of secure passwords—but you might not have to remember anything. Passwords and PINs with letters and numbers are relatively...

Using Any Surface to Realize a New Paradigm for Wireless Communications
From Communications of the ACM

Using Any Surface to Realize a New Paradigm for Wireless Communications

Programmable wireless environments use unique customizable software processes rather than traditional rigid channel models.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account