acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

The Senate's Draft Encryption Bill Is 'ludicrous, Dangerous, Technically Illiterate'
From ACM Opinion

The Senate's Draft Encryption Bill Is 'ludicrous, Dangerous, Technically Illiterate'

As Apple Battled the FBI for the last two months over the agency's demands that Apple help crack its own encryption, both the tech community and law enforcement...

What If Apple Is Wrong?
From ACM Opinion

What If Apple Is Wrong?

Soon after Devon Godfrey was shot to death in his apartment in Harlem on the evening of April 12, 2010, officers with the New York Police Department thought they...

Lessons from Apple vs. the F.b.i.
From ACM Opinion

Lessons from Apple vs. the F.b.i.

It's welcome news that the Federal Bureau of Investigation has dropped its legal effort to force Apple to help it create a method of accessing data on a lockedSan...

Should Hackers Help the F.b.i.?
From ACM Opinion

Should Hackers Help the F.b.i.?

The United States Justice Department announced this week that it was able to unlock the iPhone used by the gunman in the San Bernardino shooting in December, and...

Feds Set a Risky Precedent By Indicting 7 Iranian Hackers
From ACM Opinion

Feds Set a Risky Precedent By Indicting 7 Iranian Hackers

This week, the Department of Justice (DOJ) created a potentially dangerous precedent when it indicted seven Iranian hackers involved in attacks on the US financial...

The Internet and Inequality
From Communications of the ACM

The Internet and Inequality

Is universal access to the Internet a realistic method for addressing worldwide socioeconomic inequality?

The Need For Corporate Diplomacy
From Communications of the ACM

The Need For Corporate Diplomacy

Whether global companies succeed or fail often depends on how effectively they develop and maintain cooperative relationships with other organizations and governments...

Beyond Viral
From Communications of the ACM

Beyond Viral

The proliferation of social media usage has not resulted in significant social change.

Apple Policy on Bugs May Explain Why Hackers Would Help F.b.i.
From ACM Opinion

Apple Policy on Bugs May Explain Why Hackers Would Help F.b.i.

After a third party went to the F.B.I. with claims of being able to unlock an iPhone, many in the security industry said they were not surprised that the thirdApple...

From Reagan's Cyber Plan to Apple Vs. Fbi: 'everything Is ­p For Grabs'
From ACM Opinion

From Reagan's Cyber Plan to Apple Vs. Fbi: 'everything Is ­p For Grabs'

The heated debate between the FBI and Apple over the encryption of the iPhone used by Syed Rizwan Farook, one of the two people who massacred 14 people in San Bernardino...

Apple's Carekit Is the Best Argument Yet For Strong Encryption
From ACM Opinion

Apple's Carekit Is the Best Argument Yet For Strong Encryption

On the eve of his company’s court date with the FBI, where it will defend its right to not weaken the security of its own devices, Apple CEO Tim Cook took the stage...

How Self-Driving Cars Will Threaten Privacy
From ACM Opinion

How Self-Driving Cars Will Threaten Privacy

Allow me to join you, if I may, on your morning commute sometime in the indeterminate future.

The Internet of Things Is a Surveillance Nightmare
From ACM Opinion

The Internet of Things Is a Surveillance Nightmare

In 2014, security guru Bruce Schneier said, "Surveillance is the business model of the Internet.

The Law Is Clear: The Fbi Cannot Make Apple Rewrite its Os
From ACM Opinion

The Law Is Clear: The Fbi Cannot Make Apple Rewrite its Os

Every once in a while, President Obama removes his Law Professor in Chief hat and puts on his I Get Terrifying Briefings Every Day hat.

Inside Apple Ceo Tim Cook's Fight With the Fbi
From ACM Opinion

Inside Apple Ceo Tim Cook's Fight With the Fbi


Is Blockchain the Most Important It Invention of Our Age?
From ACM Opinion

Is Blockchain the Most Important It Invention of Our Age?

There are not many occasions when one can give an unqualified thumbs-up to something the government does, but this is one such occasion.

Cyberwar, Out of the Shadows
From ACM Opinion

Cyberwar, Out of the Shadows

A hacking attack on a Las Vegas hotel company. A power grid blackout in the Ukraine. A series of industrial accidents at an Iranian nuclear enrichment lab.

Head of British Intelligence Agency on Apple, Snowden, and Regrets
From ACM Opinion

Head of British Intelligence Agency on Apple, Snowden, and Regrets

Shortly after Robert Hannigan took over the British signals-intelligence agency GCHQ in 2014, he implored technology companies to do more to facilitate investigations...

How Apple Could Fed-Proof Its Software ­pdate System
From ACM Opinion

How Apple Could Fed-Proof Its Software ­pdate System

Apple's refusal to comply with a judge's demand that it help the FBI unlock a terrorist's iPhone has triggered a roiling debate about how much the U.S. government...

Surprising Tips from a Super-Hacker
From ACM Opinion

Surprising Tips from a Super-Hacker

Virtually everyone in technology knows about Kevin Mitnick, who in the 1970s, '80s and '90s was a notorious fugitive hacker on the run from the FBI.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account