Any headline that uses the phrase "wiretap the Internet" is likely to make people on the Internet cranky. When this wiretapping scheme comes from an administration...The Washington Post From ACM Opinion | September 28, 2010
A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...The Atlantic From ACM Opinion | September 23, 2010
Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life—online and off. Search...Time From ACM Opinion | September 14, 2010
Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving...Newsweek From ACM Opinion | August 30, 2010
Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This...Time From ACM Opinion | August 27, 2010
Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...Foreign Affairs From ACM Opinion | August 25, 2010
Should researchers focus on designing new network architectures or improving the current Internet?Jennifer Rexford, Constantine Dovrolis From Communications of the ACM | September 1, 2010
Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.Peter J. Denning, Dorothy E. Denning From Communications of the ACM | September 1, 2010
An overview of a new set of legal principles for software contracts developed by the American Law Institute.Robert A. Hillman, Maureen A. O'Rourke From Communications of the ACM | September 1, 2010
There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus...Ars Technica From ACM Opinion | August 23, 2010
Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...New Scientist From ACM Opinion | August 16, 2010
Should Pvt. Bradley Manning, the Army intelligence analyst charged with leaking troves of classified documents to WikiLeaks, be tried for treason? And what about...Slate From ACM Opinion | August 5, 2010
On the internet, nobody knows you’re a dog but advertisers may infer that you own one. The flow of information from users of the internet both to social networks...The Financial Times From ACM Opinion | July 30, 2010
While we obsessed over Russian spies, top diplomats were working to stop a greater espionage problem: the threat of cyberwarfare.Newsweek From ACM Opinion | July 28, 2010
The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.Samir Chopra From Communications of the ACM | August 1, 2010