In January 2011, I was assigned to cover a hearing in Newark, where Daniel Spitler, then 26, stood accused of breaching AT&T's servers and stealing 114,000 email...The New York Times From ACM Opinion | January 30, 2013
A perversion of smartphone technology called "stalking apps"—precise, secretive trackings of the movements of cellphone users—is increasingly a matter of national...The New York Times From ACM Opinion | December 26, 2012
If you read the newspapers on the morning of Dec. 7, 1941, you would have been led to believe that Japan was poised to attack—but in Southeast Asia, not Pearl Harbor...The New York Times From ACM Opinion | December 7, 2012
Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.The New York Times From ACM Opinion | November 8, 2012
In late spring, the backroom number crunchers who powered Barack Obama's campaign to victory noticed that George Clooney had an almost gravitational tug on West...Time From ACM Opinion | November 7, 2012
I learned with disbelief last Monday about the decision of an Italian judge to convict seven scientific experts of manslaughter and to sentence them to six years...The New York Times From ACM Opinion | October 29, 2012
If you are wondering who will be your cellphone provider next year, so are the cellphone companies.The New York Times From ACM Opinion | October 25, 2012
There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...The New York Times From ACM Opinion | October 18, 2012
The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...The New York Times From ACM Opinion | October 11, 2012
Who created the Internet and why should we care? These questions, so often raised during the Bush-Gore election in 2000, have found their way back into the political...The New York Times From ACM Opinion | September 27, 2012
For the right to personal privacy to survive in America in this digital age, courts must be meticulous in applying longstanding privacy protections to new technology...The New York Times From ACM Opinion | September 24, 2012
Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals, and foreign governments,...The New York Times From ACM Opinion | September 10, 2012
Apple's victory on Friday in a patent lawsuit against Samsung could, if upheld, give its rivals a kick in the pants to create more original products.The New York Times From ACM Opinion | August 27, 2012
In March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National...The New York Times From ACM Opinion | August 24, 2012
Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...The New York Times From ACM Opinion | August 13, 2012
A blackout in Manhattan. A major dam failure. Mayhem at a chemical plant. Those are all potential, and entirely plausible, consequences of a cyber attack, according...Time From ACM Opinion | August 7, 2012