A few months ago I made the trek to the sylvan campus of the IBM research labs in Yorktown Heights, New York, to catch an early glimpse of the fast-arriving, long...Wired From ACM Opinion | October 27, 2014
Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...Wired From ACM Opinion | July 30, 2014
Non-human employees are filling positions in all sorts of workplaces, and they are proving themselves to be fast, accurate, and reliable—more so than their human...Wired From ACM Opinion | July 28, 2014
It's not always easy to spot the compromises in the technology we use, where we've allowed corporate interests to trump public ideals like privacy and press freedom...Wired From ACM Opinion | June 30, 2014
Even Sunday night HBO watchers are worried the Federal Communications Commission will soon put an end to net neutrality.Wired From ACM Opinion | June 23, 2014
Over the weekend, a group of programmers claimed they built a program that passed the famous Turing Test, in which a computer tries to trick judges into believing...Wired From ACM Opinion | June 9, 2014
In June 2013, Edward Snowden was sitting in his room at the Mira hotel in Hong Kong, watching the world react to the first of his explosive leaks about the NSA's...Wired From ACM Opinion | May 13, 2014
The Heartbleed bug crushed our faith in the secure Web, but a world without the encryption software that Heartbleed exploited would be even worse.Wired From ACM Opinion | April 21, 2014
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?Wired From ACM Opinion | February 3, 2014
My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry.Wired From ACM Opinion | January 15, 2014
The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...Wired From ACM Opinion | November 14, 2013
Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.Wired From ACM Opinion | October 9, 2013