acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Telegraph to the Iphone: A Short History of Corporate Defiance
From ACM Opinion

Telegraph to the Iphone: A Short History of Corporate Defiance

The high-stakes stalemate between Apple and the Justice Department isn’t the first time that Washington and Silicon Valley have come to a showdown over security...

Apple's Fbi Battle Is Complicated. Here's What's Really Going On
From ACM News

Apple's Fbi Battle Is Complicated. Here's What's Really Going On

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...

The Apple Fight Isn't About Encryption
From ACM Opinion

The Apple Fight Isn't About Encryption

The most striking aspect of Apple's message to customers on Tuesday wasn't the rejection of U.S. authorities' demand that the company help them break the encryption...

Eff to Support Apple in Encryption Battle
From ACM Opinion

Eff to Support Apple in Encryption Battle

We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of the San Bernardino...

Why Robots and Smart Thermostats Keep America's Spy Chief ­p at Night
From ACM Opinion

Why Robots and Smart Thermostats Keep America's Spy Chief ­p at Night

Some people are already used to having their personal information exposed in massive data breaches.

Obama's Cybersecurity Plan Is Meant to Secure His Legacy
From ACM Opinion

Obama's Cybersecurity Plan Is Meant to Secure His Legacy

The end of White House terms are often about trying to shape historic legacies, and President Obama is out to build his in the new area of cybersecurity.

Congress Starts to Get Serious About Online Privacy
From ACM Opinion

Congress Starts to Get Serious About Online Privacy

Congress could soon vote on a bill that would require law enforcement agencies to get a search warrant from a judge to obtain emails, photographs and other documents...

When Will We Be Able to Vote Online?
From ACM Opinion

When Will We Be Able to Vote Online?

Sooner or later everything seems to go online. Newspapers. TV. Radio. Shopping. Banking. Dating.

Proposed State Bans on Phone Encryption Make Zero Sense
From ACM Opinion

Proposed State Bans on Phone Encryption Make Zero Sense

American politics has long accepted the strange notion that just a pair of states—namely Iowa and New Hampshire—get an outsize vote in choosing America’s next president...

There May Be a Way to Allow Mass Surveillance and Preserve Our Privacy at the Same Time
From ACM Opinion

There May Be a Way to Allow Mass Surveillance and Preserve Our Privacy at the Same Time

If we've learned anything over the past few years, it's that governments will make all sorts of excuses to justify the surveillance of its citizens.

Is Blockchain the Most Important It Invention of Our Age?
From ACM News

Is Blockchain the Most Important It Invention of Our Age?

There are not many occasions when one can give an unqualified thumbs-up to something the government does, but this is one such occasion.

If Killer Robots Arrive, the Terminator Will Be the Least of Our Problems
From ACM Opinion

If Killer Robots Arrive, the Terminator Will Be the Least of Our Problems

Autonomous weapons experts sounded the alarm last week at the World Economic Forum in Davos, Switzerland, cautioning that unless governments act to limit these...

Power Wars: How Obama Justified, Expanded Bush-Era Surveillance
From ACM Opinion

Power Wars: How Obama Justified, Expanded Bush-Era Surveillance

Over the winter holidays, I took some well-needed time offline, away from e-mail and social media.

Psa: Do Not ­se the New Prime Number For Rsa Encryption
From ACM Opinion

Psa: Do Not ­se the New Prime Number For Rsa Encryption

You may have heard that there’s a new largest prime number in town.

Having a Conversation About Bulk Surveillance
From Communications of the ACM

Having a Conversation About Bulk Surveillance

Considering a controversial subject that extends far beyond the collection of phone metadata.

Lessons from the Tech Transfer Trenches
From Communications of the ACM

Lessons from the Tech Transfer Trenches

Moving from the research realm to real-world business application.

Code Hoarding
From Communications of the ACM

Code Hoarding

Committing to commits, and the beauty of summarizing graphs.

Broadening Access to Computing Education State By State
From Communications of the ACM

Broadening Access to Computing Education State By State

Influencing computer science education at the state level.

Privacy Research Directions
From Communications of the ACM

Privacy Research Directions

What must we learn in order to support privacy requirements as technology advances?

The Case For Looking to the States, Not the Federal Government, to Protect Your Privacy
From ACM Opinion

The Case For Looking to the States, Not the Federal Government, to Protect Your Privacy

A year ago, President Obama stood behind a podium at the Federal Trade Commission and called for legislation that would set a single national standard for when...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account