acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

No More Mr. Nice Robot?
From ACM Opinion

No More Mr. Nice Robot?

Humans might want—and need—robots to be jerks, at least sometimes.

In Memory of Lawrence Roberts
From ACM Opinion

In Memory of Lawrence Roberts

Beeeeeeep.

Humans Are Getting More Botlike on Twitter
From ACM Opinion

Humans Are Getting More Botlike on Twitter

We know for sure that Cesar Sayoc, who allegedly targeted high-profile Democrats with mail bombs in late October, isn't a Russian bot.

How Sci-Fi Like WarGames Led to Real Policy During the Reagan Administration
From ACM Opinion

How Sci-Fi Like WarGames Led to Real Policy During the Reagan Administration

This year, John Badham's WarGames—one of the movies most beloved by hackers, techies, and tech policy wonks (like me!)—celebrates its 35th anniversary.

Borders in the Cloud
From ACM Opinion

Borders in the Cloud

Amazon may well be one of the companies with the strongest data security in the world.

Why Haven't Reporters Mass-Adopted Secure Tools For Communicating With Sources?
From ACM Opinion

Why Haven't Reporters Mass-Adopted Secure Tools For Communicating With Sources?

In the months since Donald Trump took office, Washington has been leaking like a sieve.

Wikileaks' Attack on ­.s. Intelligence
From ACM Opinion

Wikileaks' Attack on ­.s. Intelligence

Tuesday's WikiLeaks release exposing thousands of detailed documents on CIA hacking tools is an unbridled attack on U.S. intelligence operations with little or...

What Is 'military Artificial Intelligence'? 
From ACM Opinion

What Is 'military Artificial Intelligence'? 

We are in an era of existential fear of technology.

Vulnerability Is the Internet's Original Sin
From ACM Opinion

Vulnerability Is the Internet's Original Sin

On the day (perhaps not long from now) when the entire internet crashes, no one will be able to say that we didn’t see it coming.

Google Is Listening
From ACM Opinion

Google Is Listening

You know the cliché that if you're not paying for the product, you are the product?

The Leaky Myths of Snowden
From ACM Opinion

The Leaky Myths of Snowden

Oliver Stone's Snowden is a bad movie, stuffed with myth, short on drama.

You'll Never Guess This One Crazy Thing Governs Online Speech
From ACM Opinion

You'll Never Guess This One Crazy Thing Governs Online Speech

Early last week, Twitter announced that it would be using new tools to curb hate speech and harassment on its site.

The Lessons of the DNC Hack
From ACM Opinion

The Lessons of the DNC Hack

Just days after Robert Gates became secretary of defense in December 2006, in the middle of George W. Bush’s second term, he found himself so stunned by the volume...

What Cyberwar Against Isis Should Look Like
From ACM Opinion

What Cyberwar Against Isis Should Look Like

Pentagon officials have publicly said, in recent weeks, that they're hitting ISIS not only with bullets and bombs but also with cyberoffensive operations.

How Apple's Stand Against the Fbi Could Backfire
From ACM Opinion

How Apple's Stand Against the Fbi Could Backfire

The skirmish between Apple and the FBI is quickly escalating to a battle royal, a fight to the finish over lofty principles and national values, involving not just...

Metadata Surveillance Didn't Stop the Paris Attacks
From ACM Opinion

Metadata Surveillance Didn't Stop the Paris Attacks

Since terrorists struck Paris last Friday night, the debate over whether encryption prevents intelligence services from stopping attacks has reignited.

We Don't Need Humans on Mars
From ACM Opinion

We Don't Need Humans on Mars

The two mobile robots Spirit and Opportunity were launched from Earth in 2003 and arrived on opposite sides of Mars in 2004. A suite of cameras, instruments, and...

Fight Isis By Thinking Inside the Bot
From ACM Opinion

Fight Isis By Thinking Inside the Bot

What if we told you that fighting ISIS could be done cheaply, relatively easily, in a manner that would not escalate or put any in harm’s way?

Convicted By Code
From ACM Opinion

Convicted By Code

Secret code is everywhere—in elevators, airplanes, medical devices.

The Social Security Number's Insecurities
From ACM Opinion

The Social Security Number's Insecurities

In both the Anthem insurance hack and the two Office of Personnel Management hacks this year, attackers gained access to Social Security numbers, affecting 80 million...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account