Filters Applied


When IoT Kills: Preparing for Digital Products Liability

Today we released a paper that examines issues in product liability for Internet of Thing (IoT) devices to mark the start of a research agenda in this area. We expect that the digital technology industry is about to undergo a process of change akin to what the automobile industry experienced in the 1960s and 70s. Then, as now, insufficient security measures, dangerous design or adding-on of security features post-design were widely accepted industry practice. Those practices had to change as the perils of unsafe cars became obvious – as is increasingly the case today with IoT devices.

Read More Read More

Three Core Security & Privacy Issues of Connected Vehicles

Connected vehicles have tremendous potential to reshape the transportation landscape – bringing important safety and efficiency benefits but also creating new security and privacy risks. In addition, there are long-standing security and privacy issues that, if not resolved, will be compounded with the continued trends towards greater use of software and connectivity in motor vehicles. Our comments focus on three main issues: the need for secure software, the increasing dependence on critical information infrastructures, and the need for greater transparency around data privacy.

Read More Read More

CDT provides comments to the NTIA green paper “Fostering the Advancement of the Internet of Things”

This week, CDT provided public comments on a National Telecommunications and Information Administration (NTIA) green paper titled “Fostering the Advancement of the Internet of Things (IoT).” CDT applauds the NTIA and its Internet Policy Task Force for the green paper. It provides a comprehensive examination of the key issues that decision-makers in the public and private sectors must grapple with in order to realize the benefits of the IoT, while mitigating security, privacy, and other risks.

Read More Read More

Vault 7: The CIA’s cyber capabilities escape from the lab

Reviewing the collection of documents from this week’s Wikileaks release, at times it feels as though one is reading through chat logs taken from a start-up. There are push-up competitions, exploits named after Pokemon, internet memes and supposedly “all the dankest trojans and collection tools for all your windows asset assist and QRC needs.” This is not what one might, at least initially, expect to see when reviewing internal documents from a department within the Central Intelligence Agency (CIA) tasked to develop tools with such damaging capabilities.

Read More Read More