CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Last week the President suggested that the NSA’s database of phone call data be stored outside the government, and he asked his Administration to study how this could be done.…
-
Can Washington re-architect the NSA phone data program?
In the President’s NSA reform speech last week, he called for a study of how to re-architect the NSA’s phone call data program, to change where the data is stored.…
-
Is There a Future for Net Neutrality after Verizon v. FCC?
In a decision that was widely predicted by those who have been following the case, the Court of Appeals for the D.C. Circuit has invalidated the FCC’s Open Internet Rules…
-
The Internet “Access Trap” in Developing Countries
Three of five people in the world still do not have access to the Internet. From the perspective of standard economic models, this is puzzling. The supply of international connectivity…
-
Signing Mass Surveillance Declarations and Petitions: Should Academics Take a Stance?
Quite often, especially since the Snowden revelations began, tech policy academics will be approached by NGO’s and colleagues to sign petitions ‘to end mass surveillance’. It’s not always easy to…
-
Information Facilitating Participation in Elections Must Be Readily Available – Principle #10 for Fostering Civic Engagement Through Digital Technologies
For the final installment of my series of blog posts outlining ten principles that governments and local communities should consider when evaluating whether they are using digital technology effectively to…
-
Top Tech Policy Stories of 2013
As the year draws to a close, it’s time to review the top tech policy stories of 2013. (1) NSA Surveillance. The most important story by far was the revelations…
-
RSA doesn't quite deny undermining customers' crypto
Reuters reported on Saturday that the NSA had secretly paid RSA Data Security $10 million to make a certain flawed algorithm the default in RSA’s BSAFE crypto toolkit, which many…
-
Software backdoors and the White House NSA panel report
Yesterday the five-member panel appointed by the President to review “Intelligence and Communications Technologies” issued its report. The report is serious and substantial, and makes 46 specific recommendations for change.…
-
Judge Leon explains why the NSA uses everyone's metadata
There are many interesting things to discuss in Judge Leon’s opinion from yesterday, finding the NSA’s phone metadata program likely unconstitutional. In this post, I’ll focus on an interesting bit…