Category: Uncategorized
-
An Introduction to My Project: Algorithmic Amplification and Society
This article was originally published on the Knight Institute website at Columbia University. The distribution of online speech today is almost wholly algorithm-mediated. To talk about speech, then, we have to talk about algorithms. In computer science, the algorithms driving social media are called recommendation systems, and they are the secret sauce behind Facebook and…
-
We’re Hiring CITP Fellows!
The Princeton Center for Information Technology Policy is happy to announce that applications for our in-residence Fellows Program are now open. CITP is seeking candidates for the following three Fellows tracks: Microsoft Visiting Research Scholar/Visiting Professor of Information Technology Policy Postdoctoral Research Associate, or More Senior Researcher Visiting Professional The Fellows Program is a competitive…
-
Is Internet Voting Secure? The Science and the Policy Battles
I will be presenting a similarly titled paper at the 2022 Symposium Contemporary Issues in Election Law run by the University of New Hampshire Law review, October 7th in Concord, NH. The paper will be published in the UNH Law Review in 2023 and is available now on SSRN. I have already serialized parts of…
-
Recommendations for Updating the FTC’s Disclosure Guidelines to Combat Dark Patterns
Last week, CITP’s Tech Policy Clinic, along with Dr. Jennifer King, brought leading interdisciplinary academic researchers together to provide recommendations to the Federal Trade Commission on how it should update the 2013 version of its online digital advertising guidelines (the “Disclosure Guidelines”). This post summarizes the comment’s main takeaways. We focus on how the FTC…
-
The anomaly of cheap complexity
Why are our computer systems so complex and so insecure? For years I’ve been trying to explain my understanding of this question. Here’s one explanation–which happens to be in the context of voting computers, but it’s a general phenomenon about all our computers: There are many layers between the application software that implements an electoral…
-
Magical thinking about Ballot-Marking-Device contingency plans
The Center for Democracy and Technology recently published a report, “No Simple Answers: A Primer on Ballot Marking Device Security”, by William T. Adler. Overall, it’s well-informed, clearly presents the problems as of 2022, and it’s definitely worth reading. After explaining the issues and controversies, the report presents recommendations, most of which make a lot…
-
New Study Analyzing Political Advertising on Facebook, Google, and TikTok
By Orestis Papakyriakopoulos, Christelle Tessono, Arvind Narayanan, Mihir Kshirsagar With the 2022 midterm elections in the United States fast approaching, political campaigns are poised to spend heavily to influence prospective voters through digital advertising. Online platforms such as Facebook, Google, and TikTok will play an important role in distributing that content. But our new study…
-
A PDF File Is Not Paper, So PDF Ballots Cannot Be Verified
A new paper by Henry Herrington, a computer science undergraduate at Princeton University, demonstrates that a hacked PDF ballot can display one set of votes to the voter, but different votes after it’s emailed – or uploaded – to election officials doing the counting. For overseas voters or voters with disabilities, many states provide “Remote Accessible Vote…
-
ES&S Uses Undergraduate Project to Lobby New York Legislature on Risky Voting Machines
The New York State Legislature is considering a bill that would ban all-in-one voting machines. That is, voting machines that can both print votes on a ballot and scan and count votes from a ballot – all in the same paper path. This is an important safeguard because such machines, if they are hacked by…
-
Will Web3 Follow in the Footsteps of the AI Hype Cycle?
For many, the global financial crisis of 2008 marked a turning point for trust in established institutions. It is unsurprising that during this same historical time period, Bitcoin, a decentralized cryptocurrency that aspired to operate independent from state manipulation, began gaining traction. Since the birth of Bitcoin, other decentralized technologies have been introduced that enable…
-
A Multi-pronged Strategy for Securing Internet Routing
By Henry Birge-Lee, Nick Feamster, Mihir Kshirsagar, Prateek Mittal, Jennifer Rexford The Federal Communications Commission (FCC) is conducting an inquiry into how it can help protect against security vulnerabilities in the internet routing infrastructure. A number of large communication companies have weighed in on the approach the FCC should take. CITP’s Tech Policy Clinic convened…