Cybersecurity
Assessing the Vulnerabilities Equities Process, Three Years After the VEP Charter
The government has failed to deliver on its promises of greater transparency.
Andi Wilson Thompson is a senior policy analyst at New America’s Open Technology Institute where she focuses on issues including vulnerabilities equities, encryption, surveillance, and internet freedom. Before joining New America, Thompson received a master of global affairs degree through the Munk School at the University of Toronto. While there she conducted research on how revelations of increased internet surveillance have impacted the ability to identify global threats.
Subscribe to this Lawfare contributor via RSS.
The government has failed to deliver on its promises of greater transparency.
Last fall, Lawfare published a piece by Ian Levy and Crispin Robinson of GCHQ entitled Principles for a More Informed Exceptional Access Debate.
When the government discovers a bug in any computer hardware or software system, should it immediately inform the device or software manufacturer, so the company can create a patch and protect its customers’ cybersecurity? When should the government be permitted to keep the information to itself, and exploit the vulnerability to hack into devices in support of law enforcement and intelligence agency operations?