CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
So. The NSA and GCHQ piggyback on Angry Birds to spy on its 1.7 billion users. potential terrorists. Not only that, but everything on smartphones can be compromised: “if its on…
-
It matters what the NSA does
It seems axiomatic that if we want to have an informed conversation about the legality, ethics, and policy implications of the NSA’s actions, it is useful to know what the…
-
NSA call data analysis: inside or outside government?
Last week the President suggested that the NSA’s database of phone call data be stored outside the government, and he asked his Administration to study how this could be done.…
-
Can Washington re-architect the NSA phone data program?
In the President’s NSA reform speech last week, he called for a study of how to re-architect the NSA’s phone call data program, to change where the data is stored.…
-
Is There a Future for Net Neutrality after Verizon v. FCC?
In a decision that was widely predicted by those who have been following the case, the Court of Appeals for the D.C. Circuit has invalidated the FCC’s Open Internet Rules…
-
The Internet “Access Trap” in Developing Countries
Three of five people in the world still do not have access to the Internet. From the perspective of standard economic models, this is puzzling. The supply of international connectivity…
-
Signing Mass Surveillance Declarations and Petitions: Should Academics Take a Stance?
Quite often, especially since the Snowden revelations began, tech policy academics will be approached by NGO’s and colleagues to sign petitions ‘to end mass surveillance’. It’s not always easy to…
-
Information Facilitating Participation in Elections Must Be Readily Available – Principle #10 for Fostering Civic Engagement Through Digital Technologies
For the final installment of my series of blog posts outlining ten principles that governments and local communities should consider when evaluating whether they are using digital technology effectively to…
-
Top Tech Policy Stories of 2013
As the year draws to a close, it’s time to review the top tech policy stories of 2013. (1) NSA Surveillance. The most important story by far was the revelations…
-
RSA doesn't quite deny undermining customers' crypto
Reuters reported on Saturday that the NSA had secretly paid RSA Data Security $10 million to make a certain flawed algorithm the default in RSA’s BSAFE crypto toolkit, which many…