Related Posts

Inspector General: FBI Chomping at the Bit for Backdoors to Encryption

For years, the Federal Bureau of Investigation has been lobbying for backdoor access to the communications of every American. The Bureau has long argued it is “going dark” and can’t access communications protected by encryption. This concern was the basis of the famous Apple v. FBI case, where the FBI attempted to force Apple to break the encryption protecting the iPhone of San Bernardino, CA terrorist Syed Rizwan Farook. Now, a damning report released by the Department of Justice Inspector General casts significant doubt on that argument and the FBI’s honesty in making it.

Read More

Opposing the Mandating of Kill Switches to Address Contraband Cell Phones

Citing the potential threat to law enforcement and the general public, correctional facility officials have pushed for the FCC to address the issue of contraband phone use in prisons. Now, the FCC is considering a mandate for hard kill switches on all wireless devices. This proposal would provide correctional facility officers with the ability to permanently disable (or “brick”) a phone upon request. CDT has joined our colleagues at the EFF in opposing this proposal and expressing our concerns in an ex parte filing to the FCC.

Read More

Vault 7: The CIA’s cyber capabilities escape from the lab

Reviewing the collection of documents from this week’s Wikileaks release, at times it feels as though one is reading through chat logs taken from a start-up. There are push-up competitions, exploits named after Pokemon, internet memes and supposedly “all the dankest trojans and collection tools for all your windows asset assist and QRC needs.” This is not what one might, at least initially, expect to see when reviewing internal documents from a department within the Central Intelligence Agency (CIA) tasked to develop tools with such damaging capabilities.

Read More

Sessions vs. Crypto: AG Nominee Supports Backdoors

This week, Senators will vote on the nomination of Jeff Sessions to lead the Department of Justice as Attorney General. But Senator Sessions’s response to a written question about encryption should give his colleagues great pause: Senator Leahy: Do you agree with NSA Director Rogers, Secretary Defense Carter, and other national security experts that strong encryption helps…

Read More

European Commission Strategy on Criminal Justice in Cyberspace Can Move the Debate Forward

As part of the European Agenda on Security, the European Commission committed to addressing, among many other things, the challenges law enforcement authorities face when obtaining digital evidence for cross-border criminal investigations. The Council of Europe’s Cybercrime Convention Committee’s progress report provides new and very relevant data that can help inform the efforts towards workable solutions

Read More

An Election Hacking Select Committee Carries Both Promise and Risk

Though not without risk, an independent select committee, that is not overly beholden to any stakeholder, and is as transparent in its deliberations as possible, may actually be a positive development as Congress and the country work to determine whether there was foreign interference in the U.S. election and how such interference in any democratic election can be prevented.

Read More

Tech Talk: Tech Policy Priorities for the New Administration

CDT’s Tech Talk is a podcast where we dish on tech and Internet policy, while also explaining what these policies mean to our daily lives. In this episode we’ll talk about CDT’s recommended priorities for the incoming Administration when it comes to tech and internet policy. We’ll also unpack the FCC broadband privacy rules, which are a win for consumers if they hold up.

Read More

Two Factors are Better Than One

You may have heard how important it is to have a strong password. However, passwords can still be stolen or an attacker can scam you into giving them your password. To guard against this threat, many websites now offer multi-factor authentication. While different sites may refer to this feature differently, such as two-step login or two-factor sign-in or even login approvals, it has the same goal: to keep you safer online.

Read More
  • 1
  • 2