Border patrol agents have Predator drones at their disposal, and using them has the potential to become a serious breach of privacy — but it also could be a terrific...Wired From ACM Opinion | May 20, 2015
Theodore Beale had a big day when the nominations for science fiction's annual Hugo Awards were announced last month: He received two nominations for his editing...The Wall Street Journal From ACM Opinion | May 15, 2015
Five years ago, on the afternoon of May 6, 2010, the Dow and the S. & P. fell more than six per cent in a matter of minutes, losing a trillion dollars in value.The New Yorker From ACM Opinion | May 14, 2015
The White House is adding one of the tech policy world's most valuable players to its roster: Princeton Professor Ed Felten.The Washington Post From ACM Opinion | May 13, 2015
In the late 20th century, while the blue-collar working class gave way to the forces of globalization and automation, the educated elite looked on with benign condescension...The New York Times From ACM Opinion | May 12, 2015
Last summer, after months of encrypted emails, I spent three days in Moscow hanging out with Edward Snowden for a Wired cover story.Reuters From ACM Opinion | May 12, 2015
A federal appeals court ruling that the National Security Agency's collection of millions of Americans' phone records is illegal could undercut more than just that...The Washington Post From ACM Opinion | May 11, 2015
There is a lot to praise in the powerful ruling issued by a three-judge federal appeals panel in New York on Thursday, which held that the government's vast, continuing...The New York Times From ACM Opinion | May 8, 2015
One of EFF's first major legal victories was Bernstein v. Department of Justice, a landmark case that resulted in establishing code as speech and changed United...Electronic Frontier Foundation From ACM Opinion | April 30, 2015
Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.The Atlantic From ACM Careers | April 29, 2015
The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...The New York Times From ACM Opinion | April 28, 2015
When I was 10 years old, my friend Sarah and I found a newly minted copy of "The Joy of Sex" under her parents' bed.The Wall Street Journal From ACM Opinion | April 27, 2015
Ars recently reviewed two "Tor routers," devices that are supposed to improve your privacy by routing all traffic through the Tor anonymity network. Although the...Ars Technica From ACM Opinion | April 24, 2015
Imagine an America where federal, state, and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so.The Wall Street Journal From ACM Opinion | April 24, 2015
People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...The Wall Street Journal From ACM Opinion | April 24, 2015
Everyone should be able to manage their personal data with a personal information management system.Serge Abiteboul, Benjamin André, Daniel Kaplan From Communications of the ACM | May 1, 2015
Industry is ready and waiting for more graduates educated in the principles of programming languages.Thomas Ball, Benjamin Zorn From Communications of the ACM | May 1, 2015
Copyrighting APIs threatens significant harm to both consumers and the software industry.Christopher Jon Sprigman From Communications of the ACM | May 1, 2015
Research on the cognitive, educational, and policy dimensions of teaching computing is critical to achieving "computer literacy."Sally Fincher From Communications of the ACM | May 1, 2015