One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...Slate From ACM Opinion | February 18, 2014
Glenn Greenwald is back reporting about the NSA, now with Pierre Omidyar's news organization FirstLook and its introductory publication, The Intercept.The Atlantic From ACM News | February 12, 2014
After an eight-year detour in which he served as governor of California, Arnold Schwarzenegger has returned to his true calling as a cyborg assassin.Bloomberg Businessweek From ACM Opinion | February 7, 2014
Bitcoin has been called many things, from the future of money to a drug dealer's dream and everything else in between.New Scientist From ACM Opinion | February 6, 2014
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?Wired From ACM Opinion | February 3, 2014
Many of us now expect our online activities to be recorded and analyzed, but we assume the physical spaces we inhabit are different.Scientific American From ACM Opinion | January 31, 2014
Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...The Washington Post From ACM Opinion | January 29, 2014
Privacy concerns have been ignited by "NameTag," a facial-recognition app designed to reveal personal information after analyzing photos taken on mobile devices...The Atlantic From ACM Opinion | January 27, 2014
Leading members of the U.S. cryptography and information-security research communities express their outrage over U.S. surveillance practices. .S. Cryptography and Information Security Researchers From ACM News | January 24, 2014
Assessing the benefits and challenges of knowledge spillovers.Marco Ceccagnoli, Chris Forman, Peng Huang, D. J. Wu From Communications of the ACM | February 1, 2014