acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls
From ACM News

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls

What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach? Launch your personal, specially equipped WASP drone—short...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...

Here's How U.s. Spies Will Find You Through Your Pics
From ACM News

Here's How U.s. Spies Will Find You Through Your Pics

Iarpa, the intelligence community’s way-out research shop, wants to know where you took that vacation picture over the Fourth of July. It wants to know where...

From ACM News

Document: Fbi Surveillance Geeks Fear, Love New Gadgets

Can't wait for 4G to become the ubiquitous standard for mobile communication? On the edge of your seat for the unveiling of Microsoft's secret Menlo Project and...

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells
From ACM News

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells

Vulnerabilities in electronic systems that control prison doors could allow hackers or others to spring prisoners from their jail cells, according to researchers...

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
From ACM News

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz...

From ACM News

Spies Want to Mine Your Tweets For Signs of the Next Tsunami

The intelligence community has seen the future, and the future is Google Trends. Actually, more like a highly sophisticated version of Google Trends, with Twitter...

One Brain, Hundreds of Eyes: DARPA Plots Manhunt Master Controller
From ACM News

One Brain, Hundreds of Eyes: DARPA Plots Manhunt Master Controller

Thought military tracking technology couldn’t get any creepier? Hold onto your tinfoil hats and hide behind the nearest curtain because the next generation of...

Bill Would Keep Big Brother's Mitts Off Your Gps Data
From ACM News

Bill Would Keep Big Brother's Mitts Off Your Gps Data

The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...

Automotive Black Boxes, Minus the Gray Area
From ACM News

Automotive Black Boxes, Minus the Gray Area

The National Highway Traffic Safety Administration will later this year propose a requirement that all new vehicles contain an event data recorder, known more...

Crazy Military Tracking Tech, From Super Scents to Quantum Dots
From ACM News

Crazy Military Tracking Tech, From Super Scents to Quantum Dots

Scents that make you trackable, indoors and out. Nanocrystals that stick to your body, and light up on night-vision goggles. Miniradar that maps your location...

From ACM News

Domestic Surveillance Court Approved All 1,506 Warrant Applications in 2010

The secretive Foreign Intelligence Surveillance Court approved all 1,506 government requests to electronically monitor suspected "agents" of a foreign power or...

From ACM News

Darpa Apes Nick Fury to Map Social Networks

If the military is going to disrupt insurgent cells or understand how revolutionary movements congeal, it needs to perceive the connections between people that...

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists
From ACM News

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists

The U.S. forces that killed Osama bin Laden in his Abbottabad compound were more than expert marksmen. Some of them were forensics experts as well, using sophisticated...

Military
From ACM News

Military

The Pentagon has spent decades and gazillions of dollars trying to build the perfect translation device. Now, its far-out research arm is looking at a new direction...

From ACM News

The 'Panda' That Hates Farms: A Q&A With Google

Google's new update to its search engine addressed the growing complaint that low-quality content sites (derisively referred to as content farms) were ranked higher...

From ACM News

Is the Navy Trying to Start the Robot Apocalypse?

Whenever the military rolls out a new robot program, folks like to joke about SkyNet or the Rise of the Machines. But this time, the military really is starting...

 Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant
From ACM News

Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant

Attackers behind the Stuxnet computer worm focused on targeting five organizations in Iran that they believed would get them to their final target in that country...

­.s. Has Secret Tools to Force Internet on Dictators
From ACM News

­.s. Has Secret Tools to Force Internet on Dictators

When Hosni Mubarak shut down Egypt’s internet and cellphone communications, it seemed that all U.S. officials could do was ask him politely to change his mind...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account