August 20, 2018

Archives for December 2014

CITP Call for Fellows, Postdocs, and Visiting Professor for 2015-16

The Center for Information Technology Policy is an interdisciplinary research center at Princeton that sits at the crossroads of engineering, the social sciences, law, and policy.

CITP seeks Visiting Fellows and Postdoctoral Research Associates for the 2015-2016 year who work at the intersection of digital technology and public life, with backgrounds in fields including computer science, sociology, public policy, engineering, economics, law, and civil service. Visiting Fellow appointments are typically for nine months, commencing on September 1; postdoctoral appointments are for one to two years, normally commencing on July 1. Applicants may be appointed as a Visiting Fellow, Visiting Researcher, or Postdoctoral Research Associate.

CITP also seeks candidates for our Microsoft Visiting Professor of Information and Technology Policy position. Applicants must be currently appointed faculty members at an academic institution and must be on leave from such an appointment during their time at CITP. The successful applicant is expected to be appointed to a term between ten months and two years old based on their individual circumstances.

For full consideration, applications should be submitted by February 1, 2015 through

Click for details on the Postdoctoral Research Associate application
Click for details on the Visiting Fellow application
Click for details on the Microsoft Visiting Professor of Information and Technology Policy application

"Information Sharing" Should Include the Public

The FBI recently issued a warning to U.S. businesses about the possibility of foreign-based malware attacks. According to a Reuters story by Jim Finkle:

The five-page, confidential “flash” FBI warning issued to businesses late on Monday provided some technical details about the malicious software used in the attack. It provided advice on how to respond to the malware and asked businesses to contact the FBI if they identified similar malware.

The report said the malware overrides all data on hard drives of computers, including the master boot record, which prevents them from booting up.

“The overwriting of the data files will make it extremely difficult and costly, if not impossible, to recover the data using standard forensic methods,” the report said.

The document was sent to security staff at some U.S. companies in an email that asked them not to share the information.

The information found its way to the press, as one would expect of widely-shared information that is of public interest.

My question is this: Why didn’t they inform the public?
[Read more…]