CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
- 
Testimony of Jack Valenti Motion Picture Association of America Before the Senate Commerce Committee April 1, 2004 Mister Chairman, Last year I appeared before this committee to urge your support… 
- 
Remixing PoliticsSomebody over at the Bush-Cheney campaign had better figure out this Internet thingy pretty soon, or it’s going to be a long, unpleasant online campaign for them. The first evidence… 
- 
Study: Filesharing Doesn't Affect Record SalesFelix Oberholzer and Koleman Strumpf, of Harvard and the University of North Carolina, respectively, have published an interesting study on the effect of file sharing on record sales. They looked… 
- 
Improving the PIRATE ActSenators Orrin Hatch and Patrick Leahy have introduced a new bill, the PIRATE Act, that would authorize the U.S. government to bring civil lawsuits against copyright infringers, and would create… 
- 
Witty Worm AnalysisPeter Harsha at CRA points to an interesting analysis, by Colleen Shannon and David Moore of CAIDA, of the recent Witty worm. 
- 
Light WeightDerek Slater discusses Fraunhofer’s new Light Weight DRM system. Derek is skeptical but states his opinion cautiously, not being a technologist. In any case, Derek gets it right. It’s hard… 
- 
Utah Anti-Spyware Bill Becomes LawBen Edelman reports that Utah’s governor signed HB323 into law yesterday. That’s the anti-spyware law I discussed two weeks ago. I guess we’ll find out whether the bill’s opponents were… 
- 
Used Hard Disks Packed with Confidential InformationSimson Garfinkel has an eye-opening piece in CSO magazine about the contents of used hard drives. Simson bought a pile of used hard drives and systematically examined them to see… 
- 
Lawyers, Lawyers EverywhereFrank Field points to an upcoming symposium at Seton Hall on “Peer to Peer at the Crossroads: New Developments and New Directions for the Law and Business of Peer-to-Peer Networking”.… 
- 
Security Attacks on Security SoftwareA new computer worm infects PCs by attacking security software, according to a Brian Krebs story in Saturday’s Washington Post. The worm exploits flaws in two personal firewall products, made… 

