Related Posts

Vault 7: The CIA’s cyber capabilities escape from the lab

Reviewing the collection of documents from this week’s Wikileaks release, at times it feels as though one is reading through chat logs taken from a start-up. There are push-up competitions, exploits named after Pokemon, internet memes and supposedly “all the dankest trojans and collection tools for all your windows asset assist and QRC needs.” This is not what one might, at least initially, expect to see when reviewing internal documents from a department within the Central Intelligence Agency (CIA) tasked to develop tools with such damaging capabilities.

Read More

Sessions vs. Crypto: AG Nominee Supports Backdoors

This week, Senators will vote on the nomination of Jeff Sessions to lead the Department of Justice as Attorney General. But Senator Sessions’s response to a written question about encryption should give his colleagues great pause: Senator Leahy: Do you agree with NSA Director Rogers, Secretary Defense Carter, and other national security experts that strong encryption helps…

Read More

European Commission Strategy on Criminal Justice in Cyberspace Can Move the Debate Forward

As part of the European Agenda on Security, the European Commission committed to addressing, among many other things, the challenges law enforcement authorities face when obtaining digital evidence for cross-border criminal investigations. The Council of Europe’s Cybercrime Convention Committee’s progress report provides new and very relevant data that can help inform the efforts towards workable solutions

Read More

An Election Hacking Select Committee Carries Both Promise and Risk

Though not without risk, an independent select committee, that is not overly beholden to any stakeholder, and is as transparent in its deliberations as possible, may actually be a positive development as Congress and the country work to determine whether there was foreign interference in the U.S. election and how such interference in any democratic election can be prevented.

Read More

Tech Talk: Tech Policy Priorities for the New Administration

CDT’s Tech Talk is a podcast where we dish on tech and Internet policy, while also explaining what these policies mean to our daily lives. In this episode we’ll talk about CDT’s recommended priorities for the incoming Administration when it comes to tech and internet policy. We’ll also unpack the FCC broadband privacy rules, which are a win for consumers if they hold up.

Read More

Two Factors are Better Than One

You may have heard how important it is to have a strong password. However, passwords can still be stolen or an attacker can scam you into giving them your password. To guard against this threat, many websites now offer multi-factor authentication. While different sites may refer to this feature differently, such as two-step login or two-factor sign-in or even login approvals, it has the same goal: to keep you safer online.

Read More

U.S. Supreme Court Endorses Government Hacking

Last week, the Supreme Court expanded the FBI’s ability to hack into computers located anywhere in the world, giving its stamp of approval to a controversial rule change to the obscure Rule 41 of the Federal Rules of Criminal Procedure. The new authority the rule change gives to the federal government could be astoundingly dangerous. If Congress does not enact legislation to block or mitigate this rule change by its December 1st deadline, measures must be taken to ensure that law enforcement officials’ new powers are exercised responsibly and transparently.

Read More