http://www.itif.org/issues/8 en Surveillance Costs: The NSA's Impact on The Economy, Information Security, and Internet Freedom http://www.itif.org/publications/surveillance-costs-nsas-impact-economy-information-security-and-internet-freedom <div> </div> <div> Daniel Castro will speak about the NSA’s impact on the economy, information security, and Internet freedom at a New America Foundation event. </div> http://www.itif.org/publications/surveillance-costs-nsas-impact-economy-information-security-and-internet-freedom#comments Cybersecurity Presentations Tue, 25 Feb 2014 05:00:00 +0000 akey 5372 at http://www.itif.org NSA Reforms Are a Step in the Right Direction but Do Not Go Far Enough http://www.itif.org/pressrelease/nsa-reforms-are-step-right-direction-do-not-go-far-enough Press Releases Cybersecurity Fri, 17 Jan 2014 05:00:00 +0000 akey 5293 at http://www.itif.org The Continued Impact of Spam on the Digital Economy http://www.itif.org/pressrelease/continued-impact-spam-digital-economy Press Releases Cybersecurity Privacy Tue, 10 Dec 2013 05:00:00 +0000 akey 5210 at http://www.itif.org ITIF Amicus Brief in the matter of Joffe v. Google http://www.itif.org/publications/itif-amicus-brief-matter-joffe-v-google <div> </div> <div> The Court’s ruling imperils standard practices in the IT industry and is based on incorrect factual assumptions about Wi-Fi technology. </div> http://www.itif.org/publications/itif-amicus-brief-matter-joffe-v-google#comments Cybersecurity Privacy Testimony and Filings Fri, 04 Oct 2013 04:00:00 +0000 akey 4994 at http://www.itif.org Have the NSA's Actions Made America Less Secure? http://www.itif.org/pressrelease/have-nsas-actions-made-america-less-secure Staff Press Releases Cybersecurity Tue, 24 Sep 2013 04:00:00 +0000 akey 4940 at http://www.itif.org Security, Freedom and Privacy in the Digital Age http://www.itif.org/publications/security-freedom-and-privacy-digital-age <div> </div> <div> Daniel Castro spoke about security, freedom, and privacy at a panel discussion hosted by the Knight Foundation. </div> http://www.itif.org/publications/security-freedom-and-privacy-digital-age#comments Cybersecurity Privacy Presentations Tue, 17 Sep 2013 04:00:00 +0000 akey 5560 at http://www.itif.org Has the US government learned nothing from the Clipper Chip? http://www.itif.org/publications/has-us-government-learned-nothing-clipper-chip <div> </div> <div> The policy of the U.S. government should be to strengthen, not weaken, online security. </div> http://www.itif.org/publications/has-us-government-learned-nothing-clipper-chip#comments Staff Cybersecurity Privacy Blogs & Op-eds Thu, 12 Sep 2013 04:00:00 +0000 akey 4899 at http://www.itif.org Privacy Advocates Set Their Sights On The Wrong G-Men http://www.itif.org/publications/privacy-advocates-set-their-sights-wrong-g-men <div> </div> <div> The post-PRISM push for voluntary collection of personal data by the private sector has the potential to disrupt economic and social benefits of the data-driven economy as well as harm real reform in government. </div> http://www.itif.org/publications/privacy-advocates-set-their-sights-wrong-g-men#comments Staff Cybersecurity Trade Blogs & Op-eds Fri, 23 Aug 2013 04:00:00 +0000 akey 4850 at http://www.itif.org How Much Will PRISM Cost the U.S. Cloud Computing Industry? http://www.itif.org/publications/how-much-will-prism-cost-us-cloud-computing-industry <div> </div> <div> The U.S. cloud computing industry could lose $22 to $35 billion over the next three years due to PRISM. </div> http://www.itif.org/publications/how-much-will-prism-cost-us-cloud-computing-industry#comments Staff Cybersecurity Trade Reports Mon, 05 Aug 2013 04:00:00 +0000 akey 4777 at http://www.itif.org Congress Can Help Get the Spam Out of Your Inbox http://www.itif.org/pressrelease/congress-can-help-get-spam-out-your-inbox <p></p><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">WASHINGTON (July 22, 2013) - Almost 10 years after the CAN-SPAM Act, email spam is still a worldwide concern, wasting valuable network bandwidth, lowering productivity, and costing businesses and consumers billions of dollars per year. While there have been many attempts at addressing the issue, spam still remains an ever-present problem on the Internet. Moreover, spam is the symptom of a much larger disease-a flourishing underground Internet economy designed to meet the needs of cybercriminals by exploiting computer security vulnerabilities.</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">A new report by the Information Technology and Innovation Foundation (ITIF) presents a set of comprehensive policy proposals to reduce the use of spam and properly address related cybersecurity issues. How to Stop the Billions Wasted Annually on Email Spam outlines the scope of the spam problem today, analyzes the challenges involved in stopping it, and presents a series of policy recommendations designed to improve enforcement of current laws and expand the cyber legal framework internationally.</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">"Email spam costs Internet users in the United States between $18 and $26 billion annually, and is only a component of a larger cybercrime economy that continues to outpace the laws and enforcement mechanisms designed to stop it," notes ITIF Senior Analyst Daniel Castro. "We should spend fewer resources stopping spam and more resources stopping spammers."</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">The report calls for a series of reforms including: the development and deployment of stronger cybersecurity countermeasures by public sector agencies based on private sector best practices, such as those designed to combat botnets, bulletproof hosting, and abuses of affiliate marketing programs; increased resources for law enforcement activities and more engagement with the private sector through a "cyber-deputy" program; the implementation of strict cybersecurity measures in current trade negotiations such as the Transatlantic Trade and Investment Partnership; and the creation of a "name and shame" program to discourage legitimate companies such as banks from providing services to spammers and other cybercriminals.</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">"Spam is an issue without an easy solution, but there is more that government can and should do to address the problem," Castro adds. "These recommendations seek to improve anti-spam and cybercrime enforcement, promote international cooperation and reduce incentives for both cybercriminals and legitimate businesses that assist them."</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">Read the report.&nbsp;</div><p></p> Press Releases Cybersecurity Mon, 22 Jul 2013 04:00:00 +0000 akey 4731 at http://www.itif.org How to Stop the Billions Wasted Annually on Email Spam http://www.itif.org/publications/how-stop-billions-wasted-annually-email-spam <div> </div> <div> Policymakers should take measures to reduce spam and improve cybersecurity on the Internet. </div> http://www.itif.org/publications/how-stop-billions-wasted-annually-email-spam#comments Staff Cybersecurity Reports Mon, 22 Jul 2013 04:00:00 +0000 akey 4727 at http://www.itif.org The Future of Digital Trade in a "Post-PRISM" World http://www.itif.org/pressrelease/future-digital-trade-post-prism-world <p>&nbsp;</p><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">The Future of Digital Trade in a "Post-PRISM" World &nbsp; &nbsp; &nbsp;</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">Contact:</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">William Dube</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">wdube@itif.org</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">202-626-5744</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">Washington, D.C. (July 19, 2013) - The recent revelations that the United States (and some other countries) are engaging in widespread clandestine surveillance of digital communications challenges many prior assumptions about the privacy and security of electronic data. These national security efforts will likely have a substantial impact on the ability of the U.S. government and the tech sector to fight back against anti-competitive policies that impede the global free flow of information, while potentially legitimizing countries who wish to engage in such practices.</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">On July 24, The Information Technology and Innovation Foundation (ITIF) will host a panel discussion, "The Impact of PRISM on Digital Trade," featuring Ambassador Philip Verveer, the former U.S. Coordinator for International Communications and Information Policy. It will explore both the short-term and long-term impacts of PRISM on digital trade issues and how policymakers should respond to protect both U.S. economic interests and free trade in digital goods and services. The event will be held from 12:00 PM to 1:30 PM at ITIF, 1101 K Street, NW, suite 610A.</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">"PRISM has received significant and warranted attention for its impact on privacy, civil liberties and national security," notes Daniel Castro, Senior Analyst with ITIF and moderator of the event. "However, its effect on the free flow of digital goods and services may also have lasting consequences for U.S. companies and the overall economy."</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">The panel will also feature Jake Colvin, Vice President for Global Trade Issues at the National Foreign Trade Council and Joshua Meltzer, a Global Economy and Development Fellow at the Brookings Institution. The event is free and open to the public.</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">&nbsp;</div><div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">Register for the event.</div> Press Releases Cybersecurity E-Government Privacy Mon, 22 Jul 2013 04:00:00 +0000 akey 4729 at http://www.itif.org Using Data to Fight Counterfeiting http://www.itif.org/publications/using-data-fight-counterfeiting <div> </div> <div> Counterfeit goods remain a serious problem for U.S. businesses and consumers, but new advances in data innovation are providing better tools to address this challenge. </div> http://www.itif.org/publications/using-data-fight-counterfeiting#comments Staff Cybersecurity Blogs & Op-eds Fri, 19 Jul 2013 04:00:00 +0000 akey 4728 at http://www.itif.org ITIF Unveils “The Declaration of the Interdependence of Cyberspace” http://www.itif.org/pressrelease/itif-unveils-%E2%80%9C-declaration-interdependence-cyberspace%E2%80%9D <p>WASHINGTON (February 8, 2013) – The Information Technology and Innovation Foundation (ITIF) today released <em>The Declaration of the Interdependence of Cyberspace</em>, which highlights the symbiotic relationship between government and the Internet and the need for reasonable oversight of cyberspace.</p> <p>ITIF’s declaration comes 17 years to the day after Grateful Dead lyricist and Electronic Freedom Foundation (EFF) board member John Perry Barlow released his <em>Declaration of the Independence of Cyberspace</em>. Despite its age, the earlier declaration remains an almost sacred text of the numerous anti-government voices on the Internet, from extreme groups like Anonymous to other Internet policy organizations like EFF and the Free Software Foundation, and blogs like TechDirt and the Tech Liberation Front. Moreover, many of the protests surrounding net neutrality, the Stop Online Piracy Act (SOPA), and the Anti-Counterfeiting Trade Agreement (ACTA), are fundamentally driven by a deeply held belief that government should not be involved in the Internet.</p> <p>ITIF’s Declaration states “The Internet is ruled, as are all technologies, not only by the norms and beliefs of its users, but also by the laws and values of the societies in which they live… We do not want an Internet controlled by the nations of the world, but neither do we want an Internet divorced from government. We seek a balance that recognizes both the rights of the individual and the benefits to the community of well-ordered systems.”</p> <p>&nbsp;“The idea that the Internet is ungovernable or should not be governed has been proven time and again to be flat out wrong,” notes Daniel Castro, senior analyst for ITIF and principal author of <em>The</em> <em>Declaration of the Interdependence of Cyberspace</em>. “Even John Perry Barlow has backed away from his statements as the potential negative consequences of online anarchy have become clear. It’s time to recognize that all stakeholders on the Internet, including government, should work together to protect the rights, privacy and property of individuals in our society.”</p> <p><a href="http://www.computerworld.com/s/article/9236603/A_Declaration_of_the_Interdependence_of_Cyberspace">View the full text of </a><em><a href="http://www.computerworld.com/s/article/9236603/A_Declaration_of_the_Interdependence_of_Cyberspace">The Declaration of the Interdependence of Cyberspace</a>.</em></p> Cybersecurity Fri, 08 Feb 2013 05:00:00 +0000 afearon 3746 at http://www.itif.org Cybersecurity: Public Sector Threats and Responses http://www.itif.org/publications/cybersecurity-public-sector-threats-and-responses <div> </div> <div> Daniel Castro contributed a chapter titled “U.S. Federal Cybersecurity Policy” in the book &quot;Cybersecurity: Public Sector Threats and Responses.&quot; </div> http://www.itif.org/publications/cybersecurity-public-sector-threats-and-responses#comments Cybersecurity Books Fri, 20 Jul 2012 04:00:00 +0000 akey 5853 at http://www.itif.org Internet Governance Should Not be Taken Over by the ITU http://www.itif.org/pressrelease/internet-governance-should-not-be-taken-over-itu <p>WASHINGTON - In response to the Internet Governance Hearing, ITIF Senior Analyst Daniel Castro released the following statement:</p><p>“Internet governance should not be taken over by the ITU. The multi-stakeholder, consensus-driven process, which draws on the experience, and participation of all sectors of society around the world, has allowed for constant innovation, the creation of multi-billion dollar commercial opportunities, and indeed, the advance of freedom. Government actors are an important part of this process, but they are not the only players. To make nation-states the primary players would compromise the essence of the Internet governance model which has served us well over the past decades.”</p><p>&nbsp;</p> Cybersecurity Internet Thu, 31 May 2012 04:00:00 +0000 afearon 3131 at http://www.itif.org We Need More than a “Good Samaritan” Law for Cybersecurity Information Sharing http://www.itif.org/publications/we-need-more-%E2%80%9Cgood-samaritan%E2%80%9D-law-cybersecurity-information-sharing <div> </div> <div> Understanding the facts on sharing information is critical as Congress gets down to business on cybersecurity legislation. </div> http://www.itif.org/publications/we-need-more-%E2%80%9Cgood-samaritan%E2%80%9D-law-cybersecurity-information-sharing#comments Cybersecurity Blogs & Op-eds Sat, 26 May 2012 04:00:00 +0000 afearon 3116 at http://www.itif.org Improved Metrics Should be Primary Goal of FISMA Reform http://www.itif.org/publications/improved-metrics-should-be-primary-goal-fisma-reform <div> </div> <div> Congress should modify FISMA to require federal agencies to use continuously-monitored, performance-based security metrics. </div> http://www.itif.org/publications/improved-metrics-should-be-primary-goal-fisma-reform#comments Cybersecurity Blogs & Op-eds Wed, 16 May 2012 04:00:00 +0000 afearon 3096 at http://www.itif.org FTC Settlement with Facebook Highlights Importance of Self-Regulation http://www.itif.org/pressrelease/ftc-settlement-facebook-highlights-importance-self-regulation <p>WASHINGTON- In response to the FTC <a href="http://r20.rs6.net/tn.jsp?llr=tvgmjbdab&amp;et=1108865647674&amp;s=0&amp;e=001nrTVP_8ez_3s0JeDN_uOZflRV2kj1h72IAPwcPJZqON99_wtqRY1s070zxOyqUv8rMB_j7JSgyDkonAowgtX7DjwDLFh0TnSEdU2IHb_KY_erhQHmlq5ta8QjAqUtvdW7TJ-VDFBimojvEzLVXedux0zxuenfQ36" target="_blank">settlement</a> with Facebook, ITIF Senior Analyst Daniel Castro issued the following statement:</p><p>&nbsp;<br />"The latest action from the FTC highlights the fact the U.S. has a healthy self-regulatory system in place that protects consumers while still allowing for innovation. Most of the concerns presented to the FTC in this inquiry have long since been resolved to the satisfaction of all parties. Moreover, Facebook has developed a consistent track record of responding to privacy concerns by users and regulators and it continues to release new features to give consumers more control over their data. Rather than impose heavy-handed regulations or engage in expensive and unproductive litigation, policymakers should continue to work in partnership with the private sector to balance privacy with innovation."</p><p><strong>For more background, see the following ITIF publications:</strong></p><ul><li><a href="http://r20.rs6.net/tn.jsp?llr=tvgmjbdab&amp;et=1108865647674&amp;s=0&amp;e=001nrTVP_8ez_3s0JeDN_uOZflRV2kj1h72IAPwcPJZqON99_wtqRY1s070zxOyqUv8rMB_j7JSgyDkonAowgtX7CpxVjVzoJYHPj9Labl9WYk7-v7zt-DVEhYIsRj9xtz52HgZY5jC7NgrBlH6XgOfi_3zgCOsW-IR" target="_blank">Data Privacy Principles for Spurring Innovation</a></li><li><a href="http://r20.rs6.net/tn.jsp?llr=tvgmjbdab&amp;et=1108865647674&amp;s=0&amp;e=001nrTVP_8ez_3s0JeDN_uOZflRV2kj1h72IAPwcPJZqON99_wtqRY1s070zxOyqUv8rMB_j7JSgyDkonAowgtX7GIBeNNPZ70uRmyWQhP5qF_TPmqzbrXrndBTvM9ZMC_-hViu85b3gQlA9WTq8MqA9vAc2krJlS8Hv-VYUH-cmx6a4hm6ZoA6FQ==" target="_blank">No Longer a Nameless Face in the Crowd</a></li><li><a href="http://r20.rs6.net/tn.jsp?llr=tvgmjbdab&amp;et=1108865647674&amp;s=0&amp;e=001nrTVP_8ez_3s0JeDN_uOZflRV2kj1h72IAPwcPJZqON99_wtqRY1s070zxOyqUv8rMB_j7JSgyAK5OGmTFGDkjAs-0LRGSCe3xeuRQ_O8t3qtlFinzTL78T39UEoExm1kmNfg_jv6I32zq08JXELpQ==" target="_blank">The Right to Privacy is Not a Right to Facebook</a></li><li><a href="http://r20.rs6.net/tn.jsp?llr=tvgmjbdab&amp;et=1108865647674&amp;s=0&amp;e=001nrTVP_8ez_3s0JeDN_uOZflRV2kj1h72IAPwcPJZqON99_wtqRY1s070zxOyqUv8rMB_j7JSgyAK5OGmTFGDkjAs-0LRGSCe3xeuRQ_O8t3qtlFinzTL78T39UEoExm1vI1AdWmwIdUOM2p6vm-5Qg==" target="_blank">Facebook is Not the Enemy</a></li><li><a href="http://r20.rs6.net/tn.jsp?llr=tvgmjbdab&amp;et=1108865647674&amp;s=0&amp;e=001nrTVP_8ez_3s0JeDN_uOZflRV2kj1h72IAPwcPJZqON99_wtqRY1s070zxOyqUv8rMB_j7JSgyDkonAowgtX7GIBeNNPZ70uRmyWQhP5qF_TPmqzbrXrnes4GCcQ1tWCJSXhjGbWVrWtWdyTMjCgTKzxNFErOHsbSE5AK4_z-mAEDICqxD7PjA==" target="_blank">The Anti-Choice Privacy Fundamentalists</a></li></ul><p>&nbsp;</p><p><a href="http://r20.rs6.net/tn.jsp?llr=tvgmjbdab&amp;et=1108865647674&amp;s=0&amp;e=001nrTVP_8ez_3s0JeDN_uOZflRV2kj1h72IAPwcPJZqON99_wtqRY1s070zxOyqUv8rMB_j7JSgyDkonAowgtX7GIBeNNPZ70uRmyWQhP5qF_TPmqzbrXrndBTvM9ZMC_-hViu85b3gQlA9WTq8MqA9vAc2krJlS8Hv-VYUH-cmx6a4hm6ZoA6FQ==" target="_blank"></a></p> Cybersecurity Tue, 29 Nov 2011 05:00:00 +0000 afearon 2702 at http://www.itif.org Explaining International IT Application Leadership: Electronic Identification Systems http://www.itif.org/publications/explaining-international-it-application-leadership-electronic-identification-systems <div> </div> <div> An assessment of what the U.S. can learn from early adopters of national e-ID systems. </div> http://www.itif.org/publications/explaining-international-it-application-leadership-electronic-identification-systems#comments Cybersecurity Internet Reports Thu, 15 Sep 2011 04:00:00 +0000 afearon 2580 at http://www.itif.org Whack-A-Mole Security: Bad Policy, Bad Legislation http://www.itif.org/publications/whack-mole-security-bad-policy-bad-legislation <div> </div> <div> Recent efforts to ban peer-to-peer (P2P) file sharing software in government offices to reduce security breaches would merely be treating the symptoms, not the disease. </div> http://www.itif.org/publications/whack-mole-security-bad-policy-bad-legislation#comments Cybersecurity Reports Sun, 20 Dec 2009 05:00:00 +0000 1017 at http://www.itif.org Certifications Are Not a Panacea for Cybersecurity Woes http://www.itif.org/publications/certifications-are-not-panacea-cybersecurity-woes <div> </div> <div> An op-ed in Federal Computer Weekly discussing the problems with relying on professional certification to improve the security outlook of government agencies. </div> http://www.itif.org/publications/certifications-are-not-panacea-cybersecurity-woes#comments Cybersecurity Blogs & Op-eds Tue, 01 Dec 2009 05:00:00 +0000 admin 491 at http://www.itif.org The Role of Professional Certification in Securing Information Systems http://www.itif.org/publications/role-professional-certification-securing-information-systems <div> </div> <div> A proposal on cybersecurity certification will offer few benefits, introduce burdensome costs to the government and the private sector, and not address the root cause of most cybersecurity vulnerabilities. </div> http://www.itif.org/publications/role-professional-certification-securing-information-systems#comments Cybersecurity Reports Wed, 14 Oct 2009 04:00:00 +0000 admin 490 at http://www.itif.org Understanding the 4th of July Cyber Attacks http://www.itif.org/publications/understanding-4th-july-cyber-attacks <div> </div> <div> Cybersecurity legislation should emphasize strong partnerships with the private sector and effective international coordination to respond to online attacks. </div> http://www.itif.org/publications/understanding-4th-july-cyber-attacks#comments Cybersecurity Blogs & Op-eds Thu, 09 Jul 2009 04:00:00 +0000 admin 1399 at http://www.itif.org Group Effort Needed to Secure Cyberspace http://www.itif.org/publications/group-effort-needed-secure-cyberspace <div> </div> <div> An op-ed in the &quot;Houston Chronicle&quot; arguing that improving cybersecurity will require effort by a broad range of actors from government, academia and the private sector. </div> http://www.itif.org/publications/group-effort-needed-secure-cyberspace#comments Cybersecurity Blogs & Op-eds Sun, 14 Jun 2009 04:00:00 +0000 admin 1403 at http://www.itif.org