The Tech in Tech Policy

Joseph Lorenzo Hall, Center for Democracy & Technology

The Tech in Tech Policy

Joseph Lorenzo Hall, Chief Technologist, CDT [ShmooCon, January 2015]


Outline

  1. Background
    • Who am I? What is CDT? What do we do?
  2. Selected War Stories
    • SOPA/PIPA, Backdoors, Mobile device privacy
  3. Coming Battles
    • Crypto, zero-days, Internet of Things, Hostility towards hacking!

Background

Who Am I?

What is CDT?

What do we do? What is Tech Policy?

Selected War Stories

1: SOPA and the DNS

Combatting Infringement

https://www.cdt.org/files/pdfs/Security-Concerns-DNS-Filtering-PIPA.pdf

https://www.scribd.com/doc/73106069/Napolitano-Response-Rep-Lofgren-11-16-11-c

2: Backdoors

FBI Wants Backdoors...

https://www.cdt.org/files/pdfs/paper-key-escrow.pdf

FBI Still Wants Backdoors...

https://www.cdt.org/files/pdfs/CALEAII-techreport.pdf

3: Mobile Device Privacy

Riley and Wurie cases

https://cdt.org/insight/riley-v-california-amicus-brief/

Arguments, implications

In a nutshell...

Our cell phones can contain more personal information than we carry in our briefcases, store in file cabinets or even have on personal computers. These are our personal papers and effects and should be fully protected under the Fourth Amendment. It's critical that private conversations, photos, and documents are protected from warrantless search whether they're stored inside your house or carried in your pocket

Jake Laperruque, CDT Fellow on Privacy, Surveillance and Security

Coming Battles

Encrypting the Net

http://www.ietf.org/proceedings/90/slides/slides-90-httpbis-6.pdf

Zero days, Hacking Back, Rule 41

Internet of Things, Digital Hygiene

Hostitlity Towards Hacking

Consider Working in Digital Rights!

Thank you!

josephhall.org