November 4, 2015
Most Americans own a smartphone and use cloud computing services such as Gmail, Dropbox, and Facebook. Increasingly, we store sensitive data on our devices and in the cloud—but is it safe?
On Tuesday, October 20, 2015, the Competitive Enterprise Institute held a briefing to discuss the current debate over data encryption. It was moderated by CEI Associate Director of Technology Studies Ryan Radia. Watch the video below:
October 26, 2015
This week, the U.S. Senate will vote on the Cybersecurity Information Sharing Act. Also known as “CISA,” the bill aims to improve cybersecurity by making it easier for companies and the government to share information about potential cyber threats with each other. (The latest version of CISA is here; a package of amendments slated to be voted on is here.) But CISA suffers from a serious flaw that Senate lawmakers have repeatedly ignored: the bill doesn’t put agencies on the hook if they misuse information shared with them in the name of cybersecurity.
CISA’s basic premise—...
August 31, 2015
On Friday, the U.S. Court of Appeals for the District of Columbia Circuit handed down its much-awaited ruling in Obama v. Klayman, one of several lawsuits challenging the legality of the NSA’s bulk collection of Americans’ telephone records. In 2013, the District Court for D.C. issued a preliminary injunction after it found the plaintiffs were “substantially likely” to show that the NSA was collecting their telephone records in violation of the Fourth Amendment to the U.S. Constitution. The D.C. Circuit disagreed with this conclusion, reversing the preliminary injunction and sending the case back to the lower court for further proceedings.
Although the D.C. Circuit’s...
August 27, 2015
The Daily Beast’s Justin Glawe has written an article about a North Dakota law aimed at limiting law enforcement use of unmanned aircraft systems (UAS), or drones. He claims that the law was watered down by police interests and corporate lobbyists, and that the weakened protections now authorize law enforcement’s use of non-lethal UAS-mounted weapons:
With all the concern over the militarization of police in the past year, no one noticed that the state became the first in the union to allow police to equip drones with “less than lethal” weapons. House Bill 1328 wasn’t drafted that way, but then a lobbyist representing law enforcement—tight with a booming drone industry—got his hands on it....
August 5, 2015
Today, the U.S. Senate is scheduled to vote on the Cybersecurity Information Sharing Act (CISA), which is a serious threat to civil liberties and privacy.
CEI’s Ryan Radia offered these thoughts:
CISA doesn’t provide any meaningful deterrent against government agencies using information they receive from companies in ways that exceed the uses authorized by the Act. Although CISA requires agencies to issue guidelines that are supposed to prevent the misuse of information shared under the Act, this is hardly reassuring. Agencies violate their own internal procedures and guidelines all the time with impunity, from the IRS to the State Department.
That’s why it’s critical that any cyber information sharing legislation include a provision...
April 21, 2015
The Competitive Enterprise Institute, TechFreedom and a coalition of free-market groups issued an open letter to Members of Congress, urging them to consider amendments to the National Cybersecurity Protection Advancement Act (NCPAA) of 2015. The NCPAA intends to increase cyber security by facilitating greater sharing of potential cyber threats by private companies with each other and with government. But it also raises real privacy concerns because potential Cyber Threat Indicators could include private information like email content or Internet usage history.
“Congress must ensure that agencies can’t strongarm companies into sharing information involuntarily, and that agencies can be held liable for recklessly misusing private data they might...
June 2, 2014At a recent event titled “A Statesman Forum on Cybersecurity Policy and Diplomacy” at George Washington University, House Intelligence Committee Chairman Mike Rogers (R-Mich.) stated:
Every investigation, every group that review it found no illegal activity, no abuses, and that it was lawful. It’s hard to say that there was some horrible rogue agency when all the groups that investigated it came to the same conclusion.Rep. Rogers is wrong. His statement, which referred to the National Security Agency’s data collection programs under Section 215 of the USA PATRIOT Act (50 U.S.C. § 1861), ignores the report...
May 19, 2014
In the electric power industry, if you run an extension cord across the street to serve another, you go to jail. The local utility has a protected monopoly. We’ve put most of that "public utility" vision behind us in communications. Wired and wireless and satellite options abound for Internet service; we'll likely see blimps and communications drones, and who knows what else.
Yet special interests still want the Federal Communications Commission (FCC) to regulate the content flows and grid infrastructure, the prices and services of the Internet via something called net neutrality. They actually are quite open about wanting government regulated monopoly power.
The Internet as a utility, like the power company....
February 3, 2014The U.S. Department of Transportation (DOT) announced today it would chart a regulatory path that would require all new automobiles to be equipped with vehicle-to-vehicle (V2V) communications systems sometime in the next several years. This follows a National Transportation Safety Board recommendation that connected vehicle technology be mandated on all new vehicles. V2V and vehicle-to-infrastructure (V2I) safety systems could provide large safety benefits in the future. Unfortunately, DOT has jumped the gun, requiring systems while large challenges remain, particularly issues related to data privacy and security. A...
January 22, 2014Chutzpah, thy name is the National Retail Federation! In the wake of the recent credit and debit card breach at Target that may have compromised the data of up to 110 million consumers, the leading retail trade association argued in federal court on Friday that it should pay even less for fraud prevention and cleanup after fraud losses. Joined by the National Association of Convenience Stores and the National Restaurant Association, the NRF claimed to the court that it is actually against the law for banks and credit unions to charge retailers for fraud losses in debit card processing fees. "The inclusion of fraud losses in the allowable costs recoverable ... cannot be justified," the groups maintained in a...