Content Types

Cyber-Surveillance Bill to Move Forward, Secretly

The Senate Intelligence Committee is expected to consider the Cybersecurity Information Sharing Act (CISA) in a closed Committee meeting as soon as the week of March 9. While it will mark up the bill in secret and thereby deny the public an opportunity to better understand the risks the legislation poses, to its credit, the Committee has circulated for comment a discussion draft of the bill, and the draft…

Read More Read More

Letter to Senate Select Committee on Intelligence regarding CISA

March 2, 2015 Chairman Richard Burr Senate Select Committee on Intelligence United States Senate Vice Chairman Dianne Feinstein Senate Select Committee on Intelligence United States Senate   Dear Chairman Burr, Vice Chairman Feinstein, and Members of the Senate Select Committee on Intelligence, We the undersigned civil society organizations, security experts, and academics write to explain how the Cybersecurity Information Sharing Act of 2015 (CISA), would significantly undermine privacy and civil liberties. We now know that the National Security…

Read More Read More

Testimony of Justin Brookman before Senate Commerce on Internet of Things

Statement of Justin Brookman Director, Consumer Privacy Center for Democracy & Technology Before the Senate Committee on Commerce, Science, and Transportation The Connected World: Examining the Internet of Things February 11, 2015 The Center for Democracy & Technology (CDT) is pleased to submit testimony to the Senate Committee on Commerce, Science, and Transportation for today’s hearing on the privacy and security implications of the Internet of Things (IoT). CDT is a non-profit, public interest organization dedicated…

Read More Read More

Is Breaking Web Encryption Legal?

Companies finding ways to subvert Internet encryption have been in the news recently. Last month, in-flight Wifi provider Gogo was caught intercepting encrypted web sessions on YouTube and other video sites in order to throttle high-bandwidth users. And earlier this week, it was revealed that Lenovo was installing adware on laptops that intercepted all encrypted web requests in order to inject targeted ads into encryption-protected sites.

Read More Read More

Comments on the Use of Encryption and Anonymity in Digital Communications

Since the initial June 2013 revelations from Edward Snowden of mass government surveillance of global communications networks, engineers, mathematicians, and technology and telecommunications companies around the world have devoted significant time and effort to strengthening communications networks, services, and devices against overbroad government surveillance. In recent months, high-ranking officials from some of the worst perpetrators of government surveillance have challenged the use of strong encryption and have…

Read More Read More