Events

CITP Luncheon Speaker Series: Ron Hedges – The Supreme Court, Electronic Information and the Fourth Amendment

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

Electronic information is ubiquitous and is, unsurprisingly, an increasingly common feature in criminal investigations and proceedings. While law enforcement at both the federal and state levels must search for and make use of such information to investigate and prosecute crimes government investigations must be consistent with the Fourth Amendment and its state equivalents. The United States Supreme Court has had several opportunities to opine on the applicability of the Fourth Amendment to electronic information. This luncheon presentation will explore what the Supreme Court has done and what issues it might be presented with in the near future.

Society 3.0+: Can Liberty Survive the Digital Age?

NJ, United States

This forum will explore digital technologies in the information age, with a careful eye to how different countries and sectors approach the balance between risks, benefits and fundamental rights. Topics include privacy and human rights vs. security; vulnerabilities vs. efficiencies posed by the Internet of Things; communication silos vs. unfiltered information; access (denied) to information; and a vision for global cooperation.

Internet Privacy Technology and Policy: What Lies Ahead?

Sherrerd Hall, 3rd Floor Open Space

Last November, the Federal Communications Commission (FCC) issued a landmark privacy rule governing how Internet service providers (ISPs) could collect and share customer data. On April 4, 2017, President Trump signed a joint resolution that repealed this rule before it could ever take effect.

This panel will discuss how we arrived at this juncture and how the Internet privacy landscape may evolve in light of these developments. We will also explore the roles (and shortcomings) of both policy and technical mechanisms in protecting user privacy on the Internet.

CITP Luncheon Speaker Series: Alex Glaser – How to Keep a Secret While Dismantling an Atomic Bomb: Information Security in Nuclear Arms Control and Verification

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

Future nuclear arms-control agreements are likely to place numerical limits on the total number of warheads in the arsenals of the weapon states. Verifying these agreements would face at least two fundamentally new challenges. First, inspectors would have to confirm that the number of declared items does not exceed the agreed limit; and, second, inspectors would also have to confirm the authenticity of nuclear warheads prior to dismantlement. Both tasks may involve procedures that put at risk classified or otherwise sensitive information. A viable verification regime needs to protect this information or, even better, use procedures and technologies that do not acquire the sensitive information in the first place. This presentation reviews the emerging challenges for nuclear verification and proposes elements of verification approaches that build in information security from the outset.

CITP Lecture Series: Sharon Goldberg – Routing Around the Legal Restrictions on Internet Surveillance

101 Sherrerd Hall

Internet surveillance for national-security purposes is largely regulated by two legal authorities. The Foreign Intelligence Surveillance Act (FISA) largely regulates surveillance on US territory, while Executive Order (EO) 12333 largely regulates surveillance abroad. Surveillance programs conducted under FISA are subject to legal restrictions imposed by Congress and the courts, while surveillance programs under EO 12333 are conducted solely under the authority of the President.

The talk considers that possibility that the legal protections built into in FISA can be circumvented by exploiting the Internet’s routing protocols. Specifically, we consider the possibility that routing hijacks can be used to deliberately divert American traffic abroad, where it can be collected under EO 12333. We analyze the lawfulness of using routing hijacks to circumvent FISA, and discuss how several newly-developed secure routing protocols might (or might not) prevent these hijacks. We conclude with a policy recommendation: Congress should expand FISA to cover the surveillance of any and all Internet traffic collected abroad.

CITP Luncheon Speaker Series: Ed Felten – So You Want to Design an Encryption Backdoor

Sherrerd Hall, 3rd Floor Open Space

Law enforcement officials have often called for regulation of encryption technology, to improve their ability to access data when they have a valid court order. This has generated a lot of debate and controversy, but surprisingly little public discussion has been devoted to the details of how an encryption regulation might actually work. This talk will dig into the details of encryption regulation, to consider specific options for how a regulation might be written, how companies might change product designs and users might change their behavior as a result, and how these changes might affect equities such as public safety, cybersecurity, privacy, civil liberties, and economic competitiveness. No recommendation for or against regulation will be offered. Instead, the goal will be to explore the decision space and point toward a more substantive public debate.