acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Let the Nsa Keep Hold of the Data
From ACM Opinion

Let the Nsa Keep Hold of the Data

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...

Everything We Know About How the Nsa Tracks People's Physical Location
From ACM News

Everything We Know About How the Nsa Tracks People's Physical Location

Glenn Greenwald is back reporting about the NSA, now with Pierre Omidyar's news organization FirstLook and its introductory publication, The Intercept.

The Digital Ties That Bind: Love, Loss and Oversharing in the Internet Age
From ACM Opinion

The Digital Ties That Bind: Love, Loss and Oversharing in the Internet Age

The most serious relationship of my life so far ended last summer without a trace—physically at least.

Bitcoin's Political Problem
From ACM Opinion

Bitcoin's Political Problem

Money is always political.

Why Tech Companies and the NSA Diverge on Snowden
From ACM Opinion

Why Tech Companies and the NSA Diverge on Snowden

Is Edward Snowden a whistleblower or a traitor?

A Creator of Skynet Ponders Google
From ACM Opinion

A Creator of Skynet Ponders Google

After an eight-year detour in which he served as governor of California, Arnold Schwarzenegger has returned to his true calling as a cyborg assassin.

The Case of the Hacked Refrigerator—could 'the Internet of Things' Connect Everything?
From ACM Opinion

The Case of the Hacked Refrigerator—could 'the Internet of Things' Connect Everything?

Somebody hacked a refrigerator recently, and it could mark a tipping point for civilization.

Bitcoin: How Its Core Technology Will Change the World
From ACM Opinion

Bitcoin: How Its Core Technology Will Change the World

Bitcoin has been called many things, from the future of money to a drug dealer's dream and everything else in between.

Microsoft Ceo Nadella's Top Challenge: Figuring Out Mobile
From ACM Opinion

Microsoft Ceo Nadella's Top Challenge: Figuring Out Mobile

Microsoft stands at a crossroads when it comes to mobile.

Judges Poised to Hand ­.s. Spies the Keys to the Internet
From ACM Opinion

Judges Poised to Hand ­.s. Spies the Keys to the Internet

How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?

Through a Face Scanner Darkly
From ACM Opinion

Through a Face Scanner Darkly

Anonymity forms a protective casing.

When Big Data Marketing Becomes Stalking
From ACM Opinion

When Big Data Marketing Becomes Stalking

Many of us now expect our online activities to be recorded and analyzed, but we assume the physical spaces we inhabit are different.

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt
From ACM Opinion

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt

Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...

Bitcoin and the Fictions of Money
From ACM Opinion

Bitcoin and the Fictions of Money

How should we think about a currency like Bitcoin?

I See You: The Databases That Facial-Recognition Apps Need to Survive
From ACM Opinion

I See You: The Databases That Facial-Recognition Apps Need to Survive

Privacy concerns have been ignited by "NameTag," a facial-recognition app designed to reveal personal information after analyzing photos taken on mobile devices...

An Open Letter from ­.s. Researchers in Cryptography and Information Security
From ACM News

An Open Letter from ­.s. Researchers in Cryptography and Information Security

Leading members of the U.S. cryptography and information-security research communities express their outrage over U.S. surveillance practices.

Ready Technology
From Communications of the ACM

Ready Technology

Fast-tracking emerging business technologies.

Digital Platforms
From Communications of the ACM

Digital Platforms: When Is Participation Valuable?

Assessing the benefits and challenges of knowledge spillovers.

Bugs and Bragging Rights
From Communications of the ACM

Bugs and Bragging Rights

It is not always size that matters.

An Integrated Approach to Safety and Security Based on Systems Theory
From Communications of the ACM

An Integrated Approach to Safety and Security Based on Systems Theory

Applying a more powerful new safety methodology to security risks.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account