Last Week in Tech Policy: #45 Inspection of Electronic Devices and Passwords

(By Gabrielle Daley, Colorado Law 2L)

NASA scientist and U.S citizen Sidd Bikkannavar flew back into the United States on January 30th, 2017 and was detained by U.S customs and border patrol agents.  Mr. Bikkannavar was detained upon his arrival at the Houston airport by agents who stated the reason for the detention was to ensure that he was not bringing anything dangerous into the country. However the agents never searched Mr. Bikkannavar’s luggage. Instead he was handed a document entitled “Inspection of Electronic Devices” and asked for his cell phone and cell phone password.

Mr. Bikkannavar was reluctant to hand over the phone because as it belonged to his employer, the NASA Jet Propulsion Laboratories. However, agents insisted on access to the phone and password, and eventually Mr. Bikkannavar gave an agent both. The agent then left the room with the device. Mr. Bikkannavar has no idea what the agent did with the phone outside of his presence, but in a Tweet last week confirmed that JPL is running digital forensics on the phone to try and determine what may have been taken—or left—on the phone.

Continue reading “Last Week in Tech Policy: #45 Inspection of Electronic Devices and Passwords”

Autonomous Vehicle Cybersecurity Threats: Physical Layer Jamming and Spoofing Attacks

(by Zach Goldberg, TLPC Student Attorney)

Over the past month, the TLPC has researched autonomous vehicle technology and its susceptibility to physical layer cyber attacks, with the aim of encouraging research and development efforts to counteract such threats. We sought to gain deeper understanding of the communication systems that enable autonomous vehicle technology, the vulnerabilities of these systems to jamming and spoofing attacks, and possible defenses against such attacks. We explore these issues in the attached comment, filed in the National Highway Traffic Safety Administration’s latest proceedings relating to autonomous vehicle safety and vehicular cyber security.

Autonomous Vehicle Jamming and Spoofing Comment