Blog

Author

Issue

CDT @ RightsCon 2017

This year, RightsCon is taking place in Brussels, and CDT is planning to be out in full force. RightsCon, organized by our friends at Access Now, is the can’t-miss event for the digital rights community. The EU-based CDT team is pleased to welcome a number of our colleagues from Washington to town for this important event, 29-31 March 2017. Take a look at all the events we’re a part of.

Read More

Meanwhile in India… the TRAI Continues Progress Toward Net Neutrality Regulation

India continues its efforts to develop a thoughtful and effective regulatory approach to the concept of net neutrality. CDT’s most recent filing focuses on three issues: the scope of regulatory coverage, the type of regulatory approach, and reasonable traffic management. The TRAI’s consultation paper referred extensively to the US and EU net neutrality regulations and, although neither the FCC’s Open Internet Order nor the EU’s Telecom Single Market regulation may fit perfectly in the Indian context, both offer many strong points for regulators considering a new regime. CDT’s comments highlight those strengths in light of our three focal issues.

Read More

Preserving Employee Wellness Programs Act

Privacy rights are facing enormous threats in the United States – from CBP asking for social media passwords at the border to the potential rollback of broadband privacy rules. The most recent danger to privacy advanced on Wednesday when the House Education and Workforce Committee moved H.R. 1313 forward, a bill that would strip away privacy protections for people…

Read More

A United Front Against Collecting Passwords at the Border

CDT a letter to the Secretary of Homeland Security. CDT, along with a powerful coalition of civil society groups, academics, technical experts, and tech trade associations, strongly opposes any attempt by the government to collect social media passwords as a condition of entry to the United States. Such an approach would undermine human rights and personal security.

Read More

Vault 7: The CIA’s cyber capabilities escape from the lab

Reviewing the collection of documents from this week’s Wikileaks release, at times it feels as though one is reading through chat logs taken from a start-up. There are push-up competitions, exploits named after Pokemon, internet memes and supposedly “all the dankest trojans and collection tools for all your windows asset assist and QRC needs.” This is not what one might, at least initially, expect to see when reviewing internal documents from a department within the Central Intelligence Agency (CIA) tasked to develop tools with such damaging capabilities.

Read More

DIY Digital Security: Self-Assessment Quizzes for All Levels

In preparation for our return to SXSW Interactive this weekend, CDT has developed three cybersecurity self-assessment quizzes tailored to three different audiences: the general public/activist community wishing to ease into effective cybersecurity strategies; businesspeople whose online practices affect not only their own digital security, but that of their company as well; and the “leet” community already well-versed in basic security tools and techniques.

Read More

Smart Condoms Suggest More than a Day Without Women

Sex and technology both raise challenging questions about privacy and personal autonomy, and the magnitude of these challenges only increases when the two intersect. Last week, for instance, British Condoms announced the world’s first “smart condom.” The i.Con Smart Condom is a wearable ring that promises to track sexual performance and potentially detect sexually transmitted infections. The iCon is just the latest example of a wearable that appeals to the baser desires of men. For instance, the product description references the ability to track how many positions have been “conquered.” It essentially gamifies sex, and while that needn’t be a bad thing, the i.Con portrays sexuality exclusively from a male’s perspective. This seems especially important to consider given today’s “Day Without a Woman,” where CDT coincidentally finds itself under(wo)manned. I find myself not in the best position to ask my female colleagues what their thoughts are, and I have to wonder whether British Condoms did any focus testing using women.

Read More

Demanding Passwords at the Border Would Undermine Human Rights and Personal Security

Based on remarks by the Homeland Security Secretary John Kelly, the U.S. government is considering taking advantage of the vulnerable moment when someone passes through border control to collect social media account passwords of non-citizens. The government cannot have access to people’s passwords simply because they cross the border. Full stop.

Read More