CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
The Center for Information Technology Policy (CITP) at Princeton University seeks candidates for positions as visiting faculty members or researchers, or postdoctoral research associates for the 2010-2011 academic year. About…
-
iPad to Test Zittrain's "Future of the Internet" Thesis
Jonathan Zittrain famously argued in his book “The Future of the Internet, and How to Stop It” that we were headed for a future in which general purpose computers would…
-
Census of Files Available via BitTorrent
BitTorrent is popular because it lets anyone distribute large files at low cost. Which kinds of files are available on BitTorrent? Sauhard Sahi, a Princeton senior, decided to find out.…
-
A Free Internet, If We Can Keep It
“We stand for a single internet where all of humanity has equal access to knowledge and ideas. And we recognize that the world’s information infrastructure will become what we and…
-
No Warrant Necessary to Seize Your Laptop
The U.S. Customs may search your laptop and copy your hard drive when you cross the border, according to their policy. They may do this even if they have no…
-
Information Technology Policy in the Obama Administration, One Year In
[Last year, I wrote an essay for Princeton’s Woodrow Wilson School, summarizing the technology policy challenges facing the incoming Obama Administration. This week they published my follow-up essay, looking back…
-
Software in dangerous places
Software increasingly manages the world around us, in subtle ways that are often hard to see. Software helps fly our airplanes (in some cases, particularly military fighter aircraft, software is…
-
Cyber Détente Part III: American Procedural Negotiation
The first post in this series rebutted the purported Russian motive for renewed cybersecurity negotiations and the second advanced more plausible self-interested rationales. This third and final post of the…
-
Cyber Détente Part II: Russian Diplomatic and Strategic Self-Interest
The first post in this series rebutted the purported Russian motive for negotiations, avoiding a security dilemma. This second post posits two alternative self-interested Russian inducements for rapprochement: legitimizing use…
-
Google Attacks Highlight the Importance of Surveillance Transparency
Ed posted yesterday about Google’s bombshell announcement that it is considering pulling out of China in the wake of a sophisticated attack on its infrastructure. People more knowledgeable than me…