"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your...CNN From ACM Opinion | August 7, 2013
Imagine the government passed a law requiring all citizens to carry a tracking device. Such a law would immediately be found unconstitutional. Yet we all carry...Bloomberg From ACM Opinion | August 2, 2013
In mid-May, Edward Snowden, an American in his late twenties, walked through the onyx entrance of the Mira Hotel on Nathan Road in Hong Kong and checked in.The New York Review of Books From ACM Opinion | August 1, 2013
Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.Krebs on Security From ACM Opinion | July 31, 2013
What do we do with the knowledge that people not all that different from ourselves have behaved with astounding stupidity and cruelty, over and over again, in the...Slate From ACM Opinion | July 30, 2013
You shouldn't have to surrender your constitutional rights in order to safeguard your electronic privacy.Electronic Frontier Foundation From ACM Opinion | July 30, 2013
During the sweltering heat wave earlier this month, it seemed too hot to wear much, carry much or do much of anything at all.The New York Times From ACM Opinion | July 29, 2013
In the past several weeks, EFF has received many requests for advice about privacy tools that provide technological shields against mass surveillance.Electronic Frontier Foundation From ACM Opinion | July 25, 2013
Considering new business models for massive open online courses.
Chrysanthos Dellarocas, Marshall Van Alstyne From Communications of the ACM | August 1, 2013
Attempting to use isolation as a security strategy for critical systems is unrealistic in an increasingly connected world.
Eric Byres From Communications of the ACM | August 1, 2013
How pair programming, peer instruction, and media computation have improved computer science education.Leo Porter, Mark Guzdial, Charlie McDowell, Beth Simon From Communications of the ACM | August 1, 2013
Censorship of information often has the opposite effect by drawing attention to the censored material.Jean-Loup Richet From Communications of the ACM | August 1, 2013
The NSA has a diverse range of surveillance capabilities—from monitoring Google Maps use to sifting through millions of phone call records and spying on Web searches...Slate From ACM Opinion | July 23, 2013
NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.Wired From ACM Opinion | July 23, 2013
Thursday, Colonel Denise Lind, the judge in the Bradley Manning court martial, refused to dismiss the "aiding the enemy" charge.The Guardian From ACM Opinion | July 22, 2013