White Papers and Reports

The Ethical Use of Personal Data to Build Artificial Intelligence Technologies: A Case Study on Remote Biometric Identity Verification

Author(s): 
Neal Cohen
Publication Date: 
April 26, 2020
Publication Type: 
White Paper / Report

ABSTRACT: Artificial Intelligence (AI) technologies have the capacity to do a great deal of good in the world, but whether they do so is not only dependent upon how we use those AI technologies but also how we build those AI technologies in the first place. The unfortunate truth is that personal data has become the bricks and mortar used to build many AI technologies and more must be done to protect and safeguard the humans whose personal data is being used. Read more about The Ethical Use of Personal Data to Build Artificial Intelligence Technologies: A Case Study on Remote Biometric Identity Verification

Apple and Google Announced a Coronavirus Tracking System. How Worried Should We Be?

Author(s): 
Jennifer Granick
Publication Date: 
April 16, 2020
Publication Type: 
White Paper / Report

Apple and Google last week announced a joint contact tracing effort that would use Bluetooth technology to help alert people who have been in close proximity to someone who tested positive for COVID-19. Similar proposals have been put forward by an MIT-associated effort called PACT as well as by multiple European groups.
Read more about Apple and Google Announced a Coronavirus Tracking System. How Worried Should We Be?

The Limits of Location Tracking in an Epidemic

Author(s): 
Jennifer Granick
Publication Date: 
April 8, 2020
Publication Type: 
White Paper / Report

As Americans struggle to confront the COVID-19 outbreak, some have suggested that cell phone location tracking technology can help in the effort to contain the disease. The tech industry and the White House are reportedly having conversations over how information technology might be deployed, and there is increasing discussion about how foreign countries are using technology. The governor of Florida has even floated the idea of using an app to track visitors from COVID-19 hotspot New York. Read more about The Limits of Location Tracking in an Epidemic

Three Constitutional Thickets: Why Regulating Online Violent Extremism is Hard

Author(s): 
Daphne Keller
Publication Date: 
September 12, 2019
Publication Type: 
White Paper / Report

The Program on Extremism Policy Paper series combines analysis on extremism-related issues by our researchers and guest contributors with tailored recommendations for policymakers.

Full paper available for download here

Introduction Read more about Three Constitutional Thickets: Why Regulating Online Violent Extremism is Hard

New EU Proposal on the Prevention of Terrorist Content Online: An Important Mutation of the E-Commerce Intermediaries' Regime

Author(s): 
Joan Barata
Publication Date: 
October 12, 2018
Publication Type: 
White Paper / Report

Prevention of terrorism is undeniably an important and legitimate aim in many countries of the world. In the course of the last years, the European Union (EU) institutions, and the Commission (EC) in particular, have shown a growing concern regarding the potential use of online intermediary platforms for the dissemination of illegal content, particularly content of terrorist nature, based on the assumption that this content can reasonably increase the danger of new terrorist attacks being committed on European soil. Read more about New EU Proposal on the Prevention of Terrorist Content Online: An Important Mutation of the E-Commerce Intermediaries' Regime

Security Risks of Government Hacking

Author(s): 
Riana Pfefferkorn
Publication Date: 
September 5, 2018
Publication Type: 
White Paper / Report

Abstract: As the use of encryption and other privacy-enhancing technologies has increased, government officials in the United States have sought ways to ensure law enforcement’s capability to access communications and other data in plaintext. One of those methods is government hacking, also called “equipment interference.” Government hacking allows investigators to exploit hardware and software vulnerabilities to gain remote access to target computers. Read more about Security Risks of Government Hacking

Cybersecurity for the States: Lessons from Across America

Author(s): 
Brian Nussbaum
Publication Date: 
May 31, 2018
Publication Type: 
White Paper / Report

Authors

Natasha Cohen
Cybersecurity Policy Fellow

Brian Nussbaum
Cybersecurity Policy Fellow
 

Executive Summary

This study examines states’ efforts to advance cybersecurity efforts, enumerating lessons learned from an in-depth focus on three case studies of states that have seen demonstrable successes.

Read more about Cybersecurity for the States: Lessons from Across America

The Risks of “Responsible Encryption”

Author(s): 
Riana Pfefferkorn
Publication Date: 
February 5, 2018
Publication Type: 
White Paper / Report

Abstract. Federal law enforcement officials in the United States have recently renewed their periodic demands for legislation to regulate encryption. While they offer few technical specifics, their general proposal—that vendors must retain the ability to decrypt for law enforcement the devices they manufacture or communications their services transmit—presents intractable problems that would-be regulators must not ignore.  Read more about The Risks of “Responsible Encryption”

Pages