Blog

Author

Issue

Trump Tower Claims Debunked, But Overbroad Surveillance Still Cause for Concern

It has now been confirmed by FBI Director Jim Comey, both of Congress’s intelligence committees, and the Speaker of the House that President Trump did not have his “wires tapped” at Trump Tower by the Obama administration prior to the president’s election. But here are some thoughts about why, while the president’s wiretapping claims are without merit, we should still be concerned about how communications intercepted for foreign intelligence purposes can now be shared more broadly across the intelligence and thus possibly misused to target people in the United States who have nothing to do with spying or terrorism.

Read More

CDT provides comments to the NTIA green paper “Fostering the Advancement of the Internet of Things”

This week, the Center for Democracy and Technology (CDT) provided public comments on a National Telecommunications and Information Administration (NTIA) green paper titled “Fostering the Advancement of the Internet of Things (IoT).” CDT applauds the NTIA and its Internet Policy Task Force for the green paper. It provides a comprehensive examination of the key issues that decision-makers in the public and private sectors must grapple with in order to realize the benefits of the IoT, while mitigating security, privacy, and other risks. CDT’s comments supported a proposed risk-based approach to IoT security, suggested development of metrics to assess the costs/losses due to IoT security issues, and urged a greater focus on the unique privacy concerns raised by IoT devices. CDT also cosigned a submission by Rapid 7 supporting the development and implementation of coordinated vulnerability disclosure and handling processes. All public comments can be found at the NTIA website.

Read More

CDT @ RightsCon 2017

This year, RightsCon is taking place in Brussels, and CDT is planning to be out in full force. RightsCon, organized by our friends at Access Now, is the can’t-miss event for the digital rights community. The EU-based CDT team is pleased to welcome a number of our colleagues from Washington to town for this important event, 29-31 March 2017. Take a look at all the events we’re a part of.

Read More

Meanwhile in India… the TRAI Continues Progress Toward Net Neutrality Regulation

India continues its efforts to develop a thoughtful and effective regulatory approach to the concept of net neutrality. CDT’s most recent filing focuses on three issues: the scope of regulatory coverage, the type of regulatory approach, and reasonable traffic management. The TRAI’s consultation paper referred extensively to the US and EU net neutrality regulations and, although neither the FCC’s Open Internet Order nor the EU’s Telecom Single Market regulation may fit perfectly in the Indian context, both offer many strong points for regulators considering a new regime. CDT’s comments highlight those strengths in light of our three focal issues.

Read More

Preserving Employee Wellness Programs Act

Privacy rights are facing enormous threats in the United States – from CBP asking for social media passwords at the border to the potential rollback of broadband privacy rules. The most recent danger to privacy advanced on Wednesday when the House Education and Workforce Committee moved H.R. 1313 forward, a bill that would strip away privacy protections for people…

Read More

A United Front Against Collecting Passwords at the Border

CDT a letter to the Secretary of Homeland Security. CDT, along with a powerful coalition of civil society groups, academics, technical experts, and tech trade associations, strongly opposes any attempt by the government to collect social media passwords as a condition of entry to the United States. Such an approach would undermine human rights and personal security.

Read More

DIY Digital Security: Self-Assessment Quizzes for All Levels

In preparation for our return to SXSW Interactive this weekend, CDT has developed three cybersecurity self-assessment quizzes tailored to three different audiences: the general public/activist community wishing to ease into effective cybersecurity strategies; businesspeople whose online practices affect not only their own digital security, but that of their company as well; and the “leet” community already well-versed in basic security tools and techniques.

Read More