Events

CITP Luncheon Speaker Series: Vaibhav Garg – Threats, Facts, Bribery, and Beyond: All We Do to Stop a Click

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

https://www.youtube.com/watch?v=e44KLu3ryyg Lunch and discussion begin at 12:30 pm. No RSVP required from current Princeton faculty, staff, and students. Open to members of the public by invitation only. Please contact Jean Butcher at if you are interested in attending a particular lunch. This talk is about ‘Security Awareness’, the buzzword that is being used to […]

Law and Technology Lunch Time Series: Online Privacy in Europe Versus the United States

Robertson Hall, Bowl 001

Food and discussion begin at 12:15 pm. Open only to current Princeton faculty, fellows and students. Please RSVP here. Co-sponsored with the Woodrow Wilson School and the Program in Law and Public Affairs Panelists: Sharon Goldberg, Associate Professor of Computer Science, Boston University Joel Reidenberg, CITP Fellow, Stanley D. and Nikki Waxberg Chair and Professor […]

CITP Luncheon Speaker Series: Bart Gellman – Comsec for Journalists: The (Sorry) State of the Art

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

Please note: This talk will not be livestreamed or videotaped. Food and discussion begin at 12:30 pm. No RSVP required from current Princeton faculty, staff, and students. Open to members of the public by invitation only. Please contact Jean Butcher at if you are interested in attending a particular lunch. Journalists, like other non-technical […]

CITP/CDT Workshop in D.C.: Understanding Technical Aspects of Broadband Privacy

Center for Democracy & Technology 1401 K Street NW, Suite 200, Washington, DC, United States

CITP and the Center for Democracy & Technology invite you to attend "Understanding Technical Issues in Broadband Privacy," a lunch workshop on Tuesday, May 10, 2016, where technologists will discuss technical issues in broadband privacy alongside policy experts. There are a number of technical topics that are important for the policymaking community to understand in order to effectively weigh in on these issues. Key technical topics include the role of device, software, and network identifiers as personal information, the role of encryption in limiting what ISPs can access, and how network inspection technologies such as deep-packet inspection (DPI) may factor in.

Join a group of technical and policy experts to discuss these issues from a diverse set of perspectives in a mini-workshop environment, where we will first educate you about each technical topic and then offer perspectives from industry, academia and civil society.

CITP Luncheon Speaker Series: Damon McCoy – Framing Dependencies Introduced by Underground Commoditization

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

In this talk, McCoy will describe his work on understanding the economics, capabilities and limitations of cyberciminal enterprises and how this has led to the disruption of the counterfeit pharmaceutical spam payment processing ecosystem. He will then talk about a similar ongoing study in the counterfeit luxury goods space. These examples illustrate that, by understanding the socio-economic underpinnings of cybercrime, we can undermine cyberciminal ecosystems more efficiently than by using purely technical approaches.