Events

Designing an Inclusive Digital World

004 Friend Center

As digital technologies evolve and become more prevalent, their impact on people with disabilities becomes increasingly critical. Design choices can hinder use (for example, failure to include alt text for images can make a page incomprehensible to a blind user), can seek to improve accessibility, or can increase the number of possible users inadvertently (for example, improvements in video conferencing can help deaf users communicate). This panel will explore various issues in this area: human-computer interaction, the (im)possibility of universal design, corporate decisionmaking by tech companies, and legal and policy contexts.

CITP Lecture Series: Nick Weaver – NSA inna Box: Implementing Internet Surveillance

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

The NSA’s technology for Internet surveillance and attack is remarkably mundane, a combination of network intrusion detection, big-data analytics, and packet-injection based exploitation. But the result is impressive: “Capture All, Identify All, Attack by Name”. Far from being “Nobody But Us”, off the shelf software and some modest programming can provide anyone with these capabilities assuming they can arrange a suitable network vantage point, ranging from a ~$150 installation at a Foggy Bottom Starbucks to cluster-taps on 10-gigabit links.

As a proof of concept demonstration, I’ve constructed an “NSA inna Box” demo, a <$1000, ~100 Mbps class Internet wiretap, running NSA-style full-content capture, NSA-derived "metadata" extraction, a basic web interface for searching, and packet-injection based targeting. This demo required roughly 45 hours to create. (Although due to Hurricane Joaquin, my demo hardware is at home, but demo interface will be presented in software on my laptop).

CITP Lecture Series: David Clark – Defining Cyber-security: The First Step

Sherrerd Hall, 3rd Floor Open Space

In this talk, Clark looks at a number of ways to define security, and propose two approaches to map out the landscape of the cyber-security problems we face today. This exercise, which is often omitted in discussions of cyber-security, is in fact a necessary first step if we are to make overall progress in improving our security posture.

CITP Lecture Series: Yochai Benkler – Dimensions of Power in Networked Society: New Sources, New Forces

Sherrerd Hall, 3rd Floor Open Space

The original Internet design combined technical, organizational, and cultural characteristics that decentralized power along diverse dimensions. Decentralized institutional, technical, and market power maximized freedom to operate and innovate at the expense of control. Market developments and the politics of security have introduced new points of control. Mobile and cloud computing, connected devices, fiber transition, big data, surveillance, and behavioral marketing introduce new control points and dimensions of power into the Internet as a social-cultural-economic platform. These all have affordances that could centralize or decentralize various kinds of power; and which of these affordances will be salient for life in networked society is up for grabs. The actors and battles are different than they were in the first decade and a half of the public Internet, and unlike in the Internet's first generation, companies and governments are well aware of the significance of technical and institutional design choices and are jostling to acquire power over, and appropriate value from, networked activity. If we are to preserve the democratic and creative promise of the Internet, we must continuously diagnose control points as they emerge and devise mechanisms of recreating diversity of constraint and degrees of freedom in the network to work around these forms of reconcentrated power.

CITP Lecture Series: Jonathan Mayer – The Privacy Properties of Telephone Metadata

Sherrerd Hall, 3rd Floor Open Space

Since 2013, a stream of disclosures have prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a novel crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be re-identified, and can be used to draw sensitive inferences.

CITP Lecture Series: Douglas Sicker – Rethinking the Use of Radio Spectrum: The Interplay of Technology, Policy and Economics in Emerging Radio Systems

Sherrerd Hall, 3rd Floor Open Space

Headlines like "Spectrum auction nets $44.9 billion" demonstrate that radio spectrum is a valuable resource, but you might ask - why is this thing that no one can see and few can comprehend, worth so much? Not surprisingly, it has to do with the huge demand for a scarce resource - the set of useful […]