acm-header
Sign In

Communications of the ACM

BLOG@CACM


Refine your search:
dateMore Than a Year Ago
subjectComputers And Society
authorJohn Arquilla
bg-corner

From U-boats to 'U-bots'
From BLOG@CACM

From U-boats to 'U-bots'

Considering the outlook for undersea cyberwar.

From Solar Sunrise to SolarWinds
From BLOG@CACM

From Solar Sunrise to SolarWinds

The hack of critical departments of the U.S. government—and of many leading corporations—should come as no surprise.

Hacking the Axis
From BLOG@CACM

Hacking the Axis

The role of early high-performance computing capabilities in World War II.

The COVID Catalyst
From BLOG@CACM

The COVID Catalyst

The coronavirus pandemic has once again demonstrated the great vulnerability of social and economic systems to microbes.

In (Virtual) Defense of Democracy
From BLOG@CACM

In (Virtual) Defense of Democracy

There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.

From 007 to 'Agent 111'
From BLOG@CACM

From 007 to 'Agent 111'

James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...

Massive Retaliation 2.0
From BLOG@CACM

Massive Retaliation 2.0

Reacting to the U.S. Nuclear Posture Review, which now tries to extend nuclear deterrence to cyberspace.

The Rise of Strategic Cyberwar?
From BLOG@CACM

The Rise of Strategic Cyberwar?

Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.

Toward Oversight, and More Debate, of Cyber Weaponry
From BLOG@CACM

Toward Oversight, and More Debate, of Cyber Weaponry

Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny. 

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

A Presidential Policy Directive With Little Direction
From BLOG@CACM

A Presidential Policy Directive With Little Direction

Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.

Toward a Discourse on Cyber Strategy
From BLOG@CACM

Toward a Discourse on Cyber Strategy

Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.

A Farewell to (Virtual) Arms?
From BLOG@CACM

A Farewell to (Virtual) Arms?

The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.

Deterrence After Stuxnet
From BLOG@CACM

Deterrence After Stuxnet

In the cyber context, "Mutual Assured Destruction" becomes "Mutual Assured Disruption." 

The Ethics of Cyberwar
From BLOG@CACM

The Ethics of Cyberwar

Under what conditions should one engage in cyberwar? How should such a conflict be waged?

From Russia, Without Love
From BLOG@CACM

From Russia, Without Love

Considering Russia's alleged involvement in international cyber incidents, and its willingness to stop them.

Meet A.I. Joe
From BLOG@CACM

Meet A.I. Joe

In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots....

The Three Faces of Cyberwar
From BLOG@CACM

The Three Faces of Cyberwar

The different aspects of cyberwar, and what can be done about them.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account