acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?
From Communications of the ACM

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?

On cryptographic backdoors and prosthetic intelligence.

A Hunt For Ways to Combat Online Radicalization
From ACM Opinion

A Hunt For Ways to Combat Online Radicalization

Law enforcement officials, technology companies and lawmakers have long tried to limit what they call the "radicalization" of young people over the internet.

Sorry, Banning 'killer Robots' Just Isn't Practical
From ACM Opinion

Sorry, Banning 'killer Robots' Just Isn't Practical

Late Sunday, 116 entrepreneurs, including Elon Musk, released a letter to the United Nations warning of the dangerous "Pandora's Box" presented by weapons that...

Tracing the Sources of Today's Russian cyberthreat
From ACM Opinion

Tracing the Sources of Today's Russian cyberthreat

Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military...

What the Announced nsa / Cyber Command Split means
From ACM Opinion

What the Announced nsa / Cyber Command Split means

The move to elevate Cyber Command to a full Unified Combatant Command and split it off from the National Security Agency or NSA shows that cyber intelligence collection...

Fighting Neo-Nazis and the Future of Free Expression
From ACM Opinion

Fighting Neo-Nazis and the Future of Free Expression

In the wake of Charlottesville, both GoDaddy and Google have refused to manage the domain registration for the Daily Stormer, a neo-Nazi website that, in the...

Russia's Election Meddling Backfired—big-Time
From ACM Opinion

Russia's Election Meddling Backfired—big-Time

Intelligence officers sometimes talk about "blowback," when covert actions go bad and end up damaging the country that initiated them.

End-to-End Encryption Isn't Enough Security For 'real people'
From ACM Opinion

End-to-End Encryption Isn't Enough Security For 'real people'

Government officials continue to seek technology companies' help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular...

We Can Stop Hacking and Trolls, but It Would Ruin the Internet
From ACM Opinion

We Can Stop Hacking and Trolls, but It Would Ruin the Internet

Cyberterrorism fears are through the roof.

Preserving the Right to Cognitive Liberty
From ACM Opinion

Preserving the Right to Cognitive Liberty

The idea of the human mind as the domain of absolute protection from external intrusion has persisted for centuries.

Tracking Terrorists Online Might Invade Your Privacy
From ACM Opinion

Tracking Terrorists Online Might Invade Your Privacy

Remember that picture you sent to your family of your children playing in the paddling pool? Or that private text you sent to someone trusted? Or when you searched...

Fear of a Robot Planet
From ACM Opinion

Fear of a Robot Planet

It was in the 12th century that the great brass head built by Albertus Magnus moved its mouth for the first time, breathing steam as it spoke to Magnus' young religious...

Apple Is Pulling Vpns from the Chinese App Store. Here's What that Means. 
From ACM Opinion

Apple Is Pulling Vpns from the Chinese App Store. Here's What that Means. 

China's restrictive Internet policies are known for blocking Web users who want to reach Google, Facebook or other banned apps. But now some of those policies are...

The Guardian View on the Future of Crime: It Will Be Online
From ACM Opinion

The Guardian View on the Future of Crime: It Will Be Online

When software gets smarter, the first effect is to empower the already powerful.

What Happened to Trump's War on Data?
From ACM Opinion

What Happened to Trump's War on Data?

On May 16, three months' worth of data vanished quietly from the website of the U.S. Census Bureau.

Letting Cyberattack Victims Hack Back Is a Very ­nwise Idea
From ACM Opinion

Letting Cyberattack Victims Hack Back Is a Very ­nwise Idea

As the rate of cybercrime increases, so too does the intensity of those attacks.

Prophets, Seers, and Pioneers
From Communications of the ACM

Prophets, Seers, and Pioneers

Reflections on historical prognostications for the future.

From Communications of the ACM

The Natural Science of Computing

As unconventional computing comes of age, we believe a revolution is needed in our view of computer science.

When Companies Get Hacked, Should They Be Allowed to Hack Back?
From ACM Opinion

When Companies Get Hacked, Should They Be Allowed to Hack Back?

There is an old debate (at least, counting in internet years) that tends to crop up after major cybersecurity breaches such as the widespread WannaCry ransomware...

AI Could Revolutionize War As Much As Nukes
From ACM Opinion

AI Could Revolutionize War As Much As Nukes

In 1899, the world's most powerful nations signed a treaty at The Hague that banned military use of aircraft, fearing the emerging technology's destructive power...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account