@online{panopti:about, author = {Electric Frontier Foundation}, title = {Panopticlick | About}, url = {https://panopticlick.eff.org/about}, urldate = {2017-03-08}, } @online{tor:tails, title = {Tails - Privacy for anyone anywhere}, organization = {Tor Project}, url = {https://tails.boum.org/}, urldate = {2017-03-18}, } @online{whonix, title = {Whonix}, organization = {Whonix}, url = {https://www.whonix.org/}, urldate = {2017-03-18}, } @online{whonix:donot, author = {Whonix}, title = {DoNot}, url = {https://www.whonix.org/wiki/DoNot}, urldate = {2017-03-05} } @online{tor, author = {Tor Project}, title = {Tor Project: Anonymity Online}, url = {http://torproject.org/}, urldate = {2017-03-09}, } @online{eff:nsa:timeline, author = {Electronic Frontier Foundation}, title = {Timeline of NSA Domestic Spying}, url = {https://www.eff.org/nsa-spying/timeline}, urldate = {2017-03-09}, } @online{mtg:uproar, author = {Mike Gerwitz}, title = {National Uproar: A Comprehensive Overview of the NSA Leaks and Revelations}, url = {https://mikegerwitz.com/2013/06/National-Uproar-A-Comprehensive-Overview-of-the-NSA-Leaks-and-Revelations}, month = 06, year = 2013, urldate = {2017-03-09}, } @online{eff:bernstein:doj, author = {Electronic Frontier Foundation}, title = {Bernstein v. US Department of Justice}, url = {https://www.eff.org/cases/bernstein-v-us-dept-justice}, urldate = {2017-03-09}, } % TODO: figure out how to render the URL @techreport{poodle:paper, author = {Möller, Brodo and Duong, Thai and Kotowicz, Krzysztof}, title = {This POODLE Bites: Exploiting the SSL 3.0 Fallback}, institution = {Google}, year = 2014, month = Sep, url = {https://www.openssl.org/~bodo/ssl-poodle.pdf}, } @online{w:crypto-wars, organization = {Wikipedia}, title = {Crypto Wars}, url = {https://en.wikipedia.org/wiki/Crypto_wars}, urldate = {2017-03-10}, } @online{fedr:export-controls, author = {Executive Office of the President}, title = {Administration of Export Controls on Encryption Products}, url = {https://www.gpo.gov/fdsys/pkg/FR-1996-11-19/pdf/96-29692.pdf}, urldate = {2017-03-10}, month = 11, year = 1996, note = {Federal Register, Vol. 61, No. 224, Executive Order 58767}, } @online{doc:rev-export-reg, author = {United States Department of Commerce}, title = {Revised U.S. Encryption Export Regulations}, url = {https://epic.org/crypto/export_controls/regs_1_00.html}, month = 01, year = 2000, urldate = {2017-03-10}, } @online{arxiv:mac, author = {Martin, Jeremy and Mayberry, Travis and Donahue, Collin and Foppe, Lucas, and Brown, Lamont and Riggins, Chadwick and Rye, Erik C. and Brown, Dane}, title = {A Study of MAC Address Randomization in Mobile Devices and When it Fails}, year = 2017, month = 03, archivePrefix= {arXiv}, eprint = {1703.02874}, primaryClass = {cs.CR}, } @online{aimsid, author = {CellularPrivacy}, title = {Android IMSI-Catcher Detector}, url = {https://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/}, urldate = {2017-03-11}, } @online{osmand, title = {OsmAnd - Offline Mobile Maps and Navigation}, url = {http://osmand.net/}, urldate = {2017-03-11}, } @online{mozilla:loc-services, author = {MozillaWiki}, title = {CloudServices/Location - MozillaWiki}, url = {https://wiki.mozilla.org/CloudServices/Location}, urldate = {2017-03-11}, } @online{openmobilenetwork, title = {OpenMobileNetwork}, url = {http://www.openmobilenetwork.org/}, urldate = {2017-03-11}, } @online{w:wps, organization = {Wikipedia}, title = {Wi-Fi positioning system}, url = {https://en.wikipedia.org/wiki/Wi-Fi_positioning_system}, urldate = {2017-03-11}, } @online{w:trilateration, organization = {Wikipedia}, title = {Trilateration}, url = {https://en.wikipedia.org/wiki/Trilateration}, urldate = {2017-03-11}, } @article{acm:spotfi, author = {Kotaru, Manikanta and Joshi, Kiran and Bharadia, Dinesh and Katti, Sachin}, title = {{SpotFi}: Decimeter Level Localization Using {WiFi}}, journal = {{ACM} {SIGCOMM} Computer Communication Review - {SIGCOMM'15}}, doi = {10.1145/2785956.2787487}, volume = 45, pages = {269-282}, year = 2015, } @article{acm:lteye, author = {Kumar, Swarun and Hamed, Ezzeldin and Katabi, Dina and Li, Li Erran}, title = {{LTE} radio analytics made easy and accessible}, journal = {{S3 '14} Proceedings of the 6th annual workshop on Wireless of the students, by the students, for the students}, doi = {10.1145/2645884.2645891}, pages = {29-30}, year = 2014, } @online{replicant, author = {Replicant}, title = {Replicant}, url = {http://www.replicant.us}, urldate = {2017-03-11}, annotation = {A fully free Android distribution} } @online{replicant:sec, author = {Replicant}, title = {Freedom and privacy/security issues}, url = {http://www.replicant.us/freedom-privacy-security-issues.php}, urldate = {2017-03-11}, } @online{replicant:samsung-bd, author = {Replicant}, title = {Samsung Galaxy back-door}, url = {http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor}, urldate = {2017-03-11}, annotation = {Backdoor in Samsung Galaxy phones closed by Replicant}, } @online{gnu:malware-mobile, author = {GNU Project}, title = {Malware in Mobile Devices}, url = {https://www.gnu.org/philosophy/malware-mobiles.html}, urldate = {2017-03-11}, annotation = {Numerous resources on privacy/security issues with mobile devices} } @online{jots:mobile, author = {Jinyan Zang and Krysta Dummit and James Graves and Paul Lisker and Latanya Sweeney}, title = {Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps}, url = {http://jots.pub/a/2015103001/index.php}, urldate = {2017-03-11}, } @online{kryptowire:adups, author = {Kryptowire}, title = {KRYPTOWIRE DISCOVERS MOBILE PHONE FIRMWARE THAT TRANSMITTED PERSONALLY IDENTIFIABLE INFORMATION (PII) WITHOUT USER CONSENT OR DISCLOSURE}, url = {http://www.kryptowire.com/adups_security_analysis.html}, urldate = {2017-03-11}, annotation = {BLU mobile phones transmitting SMS content, contacts, call history, telephone numbers, IMEIs, etc to third-party servers without users' knolwedge or censent} } @online{intercept:nyc-surveil, author = {Currier, Cora}, title = {A Walking Tour of New York's Massive Surveillance Network}, organization = {The Intercept}, date = {2016-09-24}, url = {https://theintercept.com/2016/09/24/a-walking-tour-of-new-yorks-massive-surveillance-network/}, urldate = {2017-03-12}, } @online{shodan, title = {Shodan}, subtitle = {The search engine for the Internet of Things}, url = {https://shodan.io}, urldate = {2017-03-12}, } @online{krebs:mongodb, author = {Krebs, Brian}, title = {Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed}, url = {https://krebsonsecurity.com/2017/01/extortionists-wipe-thousands-of-databases-victims-who-pay-up-get-stiffed/}, urldate = {2017-03-12}, } @online{insecam, title = {Insecam - World biggest online cameras directory}, url = {http://insecam.org}, urldate = {2017-03-19}, annotation = {Load the HTTP (non-HTTPS) site, otherwise mixed content is blocked and thumbnails will not work.} } @article{ieee:gait, author = {Rogez, Gr\'egory and Rihan, Jonathan and Guerrero, Jose J.}, title = {Monocular {3D} Gait Tracking in Surveillance Scenes}, journal = {IEEE Transactions on Cybernetics}, url = {http://vision.ics.uci.edu/papers/RogezRGO_Cybernetics_2013/RogezRGO_Cybernetics_2013.pdf} } @article{ijca:gait, author = {Vaidya, Sonali and Shah, Kamal}, title = {Real Time Video Surveillance System}, journal = {International Journal of Computer Applications}, volume = 86, pages = {22-27}, year = 2014, url = {http://research.ijcaonline.org/volume86/number14/pxc3893419.pdf}, annotation = {Discusses realtime gait analysis for video surveillance}, } @online{newsci:fb-noface, author = {Rutkin, Aviva}, title = {Facebook can recognize you in photos even if you're not looking}, organization = {New Scientist}, url = {https://www.newscientist.com/article/dn27761-facebook-can-recognise-you-in-photos-even-if-youre-not-looking/}, urldate = {2017-03-12}, } @online{rms:facebook, author = {Stallman, Richard}, title = {Reasons not to use (i.e., be used by) {Facebook}}, url = {https://stallman.org/facebook.html}, urldate = {2017-03-12}, } @online{register:fb-scan, author = {Chirgwin, Richard}, title = {Facebook conjures up a trap for the unwary: scanning your camera for your friends}, subtitle = {Auto-spam your friends with Photo Magic}, organization = {The Register}, url = {https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/}, urldate = {2017-03-12}, annotation = {Archive.org link used because The~Register blocks Tor~users unless they execute proprietary JavaScript.}, } @online{guardian:fb-scan, author = {Arthur, Charles}, title = {Facebook in new privacy row over facial recognition feature}, subtitle = {Social network turns on new feature to automatically identify people in photos, raising questions about privacy implications of the service}, organization = {The Guardian}, date = {2011-06-08}, url = {https://www.theguardian.com/technology/2011/jun/08/facebook-privacy-facial-recognition}, urldate = {2017-03-12}, } @online{techcrunch:fb-baby, author = {Constine, Josh}, title = {Facebook’s New Photo “Scrapbook” Lets Parents Give Kids An Official Presence}, organization = {TechCrunch}, date = {2016-03-31}, url = {https://techcrunch.com/2015/03/31/step-1-identify-baby-photo-step-2-hide-baby-photos/}, urldate = {2017-03-12}, annotation = {Facebook tricks users into violating their child's privacy before they have any say in the matter.}, } @online{eff:ios-photo-diff, author = {Gebhart, Gennie and Grant, Starchy and Portnov, Erica}, title = {Facial Recognition, Differential Privacy, and Trade-Offs in Apple's Latest OS Releases}, organization = {Electronic Frontier Foundation}, date = {2016-09-27}, url = {https://www.eff.org/deeplinks/2016/09/facial-recognition-differential-privacy-and-trade-offs-apples-latest-os-releases}, urldate = {2017-03-12}, } @online{churchix, title = {Churchix Facial Recognition Software}, subtitle = {Churchix Facial Recognition Software for Event Attendance}, url = {http://churchix.com/}, urldate = {2017-03-12}, annotation = {This software is cited for illustration; do~not use it.} } @online{facefirst, title = {Face Recognition Software for Retail Stores: \#1~Biometric Surveillance for Loss Prevention}, url = {https://www.facefirst.com/industry/retail-face-recognition/}, urldate = {2017-03-12}, annotation = {Full-page loading spinner does not remove itself without running non-free JavaScript; remove it manually using a web browser with a~debugger. This software is cited for illustration; do~not use it.}, } @online{bio:iris, title = {Hacker extracts Merkel's iris image}, organization = {Planet Biometrics}, date = {2015-11-30}, url = {http://www.planetbiometrics.com/article-details/i/3644/}, urldate = {2017-03-12}, } @online{eff:facial-tech, author = {Schwartz, Adam}, title = {The Danger of Corporate Facial Recognition Tech}, subtitle = {The Illinois Biometric Privacy Statute Survived a Recent Attack. But the Struggle Continues}, organization = {Electronic Frontier Foundation}, date = {2016-06-07}, url = {https://www.eff.org/deeplinks/2016/06/danger-corporate-facial-recognition-techgg}, urldate = {2017-03-12}, } @online{eff:fbi-bio, author = {Lynch, Jennifer}, title = {New Report: FBI Can Access Hundreds of Millions of Face Recognition Photos}, organization = {Electronic Frontier Foundation}, date = {2016-06-15}, url = {https://www.eff.org/deeplinks/2016/06/fbi-can-search-400-million-face-recognition-photos}, urldate = {2017-03-12}, } @online{cbs:sf-smile, author = {Borba, Andria}, title = {Nowhere To Hide: Few Public Places Without Surveillance Cameras In San Francisco}, organization = {CBS}, date = {2015-09-24}, url = {http://sanfrancisco.cbslocal.com/2015/09/24/san-francisco-surveillance-camera-tenderloin/}, urldate = {2017-03-12}, } @online{pbs:nova:boston, author = {O'Brien, Michael and Cort, Julia}, title = {Manhunt---{Boston Bombers}}, subtitle = {Which technologies worked—and which didn't---in the race to track down the men behind the marathon attack?}, organization = {WGBH Educational Foundation}, date = {2013-05-29}, url = {http://www.pbs.org/wgbh/nova/tech/manhunt-boston-bombers.html}, urldate = {2017-03-13}, annotation = {Specificall, pay attention to the Domain Awareness System and other surveillance capabilities. Transcript available.}, } @online{reuters:nypd-das, author = {Francescani, Chris}, title = {NYPD expands surveillance net to fight crime as well as terrorism}, organization = {Reuters}, date = {2013-06-21}, url = {http://www.reuters.com/article/usa-ny-surveillance-idUSL2N0EV0D220130621}, urldate = {2017-03-13}, } @online{wired:pixel-face, author = {Newman, Lily Hay}, title = {AI Can Recognize Your Face Even If You’re Pixelated}, organization = {Wired}, date = {2016-09-12}, url = {https://www.wired.com/2016/09/machine-learning-can-identify-pixelated-faces-researchers-show/}, urldate = {2017-03-13}, } @online{arxiv:google-pixel-res, author = {Dahl, Ryan and Norouzi, Mohammad and Shlens, Jonathan}, title = {Pixel Recursive Super Resolution}, organization = {Google Brain}, date = {2017-02-02}, archivePrefix= {arXiv}, eprint = {1702.00783}, primaryClass = {cs.CV}, } @online{fast:das, author = {Ungerleider, Neal}, title = {NYPD, Microsoft Launch All-Seeing “Domain Awareness System” With Real-Time CCTV, License Plate Monitoring}, subtitle = {The New York Police Department has a new terrorism detection system that will also generate profit for the city}, organization = {Fast Company}, date = {2012-08-08}, url = {https://www.fastcompany.com/3000272/nypd-microsoft-launch-all-seeing-domain-awareness-system-real-time-cctv-license-plate-monito}, urldate = {2017-03-13}, } @online{nyc:pspg, title = {Public Security Privacy Guidelines}, url = {http://www.nyc.gov/html/nypd/downloads/pdf/crime_prevention/public_security_privacy_guidelines.pdf}, urldate = {2017-03-13}, annotation = {Information about the NYPD's Domain Awareness System.}, } @book{rosen:naked, author = {Rosen, Jeffrey}, title = {The Naked Crowd: Reclaiming Security and Freedom In An Anxious Age}, publisher = {Random House}, isbn = {978-0375508004}, date = 2004, indextitle = {Naked Crowd: Reclaiming Security and Freedom In An Anxious Age, The}, } @article{solove:nothing-to-hide, author = {Solove, Daniel J.}, title = {``I've got nothing to hide'' and Other Misunderstandings of Privacy}, journaltitle = {San Diego Law Review}, volume = 44, pages = {745--772}, date = {2007}, url = {https://ssrn.com/abstract=998565}, urldate = {2017-03-13}, annotation = {GWU Law School Public Law Research Paper No. 289}, } @online{metro:goebbels, author = {Nagesh, Ashitha}, title = {A Tory MP might have quoted Goebbels in defence of the government’s surveillance bill}, organization = {Metro.co.uk}, url = {http://metro.co.uk/2015/11/05/a-tory-mp-might-have-quoted-goebbels-in-defence-of-the-governments-surveillance-bill-5481457/}, urldate = {2017-03-13}, annotation = {It's never good to be accused of quoting the Nazi propaganda minister}, } @online{eff:alpr, title = {Automated License Plate Readers}, organization = {Electronic Frontier Foundation}, url = {https://www.eff.org/sls/tech/automated-license-plate-readers}, urldate = {2017-03-13}, } @online{aclu:tracked, title = {You Are Being Tracked}, subtitle = {How License Plate Readers Are Being Used To Record Americans' Movements}, url = {https://www.aclu.org/sites/default/files/field_document/071613-aclu-alprreport-opt-v05.pdf}, urldate = {2017-03-13}, } @online{eff:golden-gate-toll, title = {The Golden Gate Bridge Is Watching You}, author = {Schoen, Seth}, organization = {Electronic Frontier Foundation}, date = {2013-03-28}, url = {https://www.eff.org/deeplinks/2013/03/golden-gate-bridge-watching-you}, urldate = {2017-03-13}, } @online{goldengate:anon, title = {I Want To Remain Anonymous}, organization = {Golden Gate Bridge, Highway and Transportation District}, url = {http://goldengate.org/tolls/iwanttoremainanonymous.php}, urldate = {2017-03-13}, } @online{baynews:fastack-data, author = {Simerman, John}, title = {Lawyers dig into FasTrak data}, organization = {Bay Area News Group}, date = {2007-06-05}, url = {http://www.eastbaytimes.com/2007/06/05/lawyers-dig-into-fastrak-data/}, urldate = {2017-03-13}, annotation = {FasTrack data are used in civil disputes like divorce cases.}, } @online{blackhat:toll-systems, author = {Lawson, Nate}, title = {Highway To Hell: Hacking Toll Systems}, date = {2008-08-06}, location = {BlackHat USA}, url = {http://www.root.org/talks/BH2008_HackingTollSystems.pdf}, urldate = {2017-03-13}, } @online{w:ezpass, organization = {Wikipedia}, title = {E-ZPass}, url = {https://en.wikipedia.org/wiki/E-ZPass}, urldate = {2017-03-13}, } @online{register:rfid-clone, author = {Goodin, Dan}, title = {Passport RFIDs cloned wholesale by \$250 eBay auction spree\$}, subtitle = {Video shows you how}, organization = {The Register}, url = {https://web.archive.org/web/20170127114339/http://www.theregister.co.uk/2009/02/02/low_cost_rfid_cloner/}, urldate = {2017-03-13}, annotation = {Archive.org link used because The~Register blocks Tor~users unless they execute proprietary JavaScript.}, } @online{w:us-v-jones, organization = {Wikipedia}, title = {United States v. Jones}, url = {https://en.wikipedia.org/wiki/United_States_v._Antoine_Jones}, urldate = {2017-03-13}, annotation = {United States Supreme Court ruling that GPS~tracking constitutes a~search under the Fourth~Amendment.} } @online{darius:alpr-telnet, author = {Freamon, Darius}, title = {{PIPS} Technology {AUTOPLATE} Automatic License Plate Recognition {(ALPR)} Multiple Vulnerabilities}, url = {https://dariusfreamon.wordpress.com/2014/02/19/pips-technology-autoplate-automatic-license-plate-recognition-alpr-multiple-vulnerabilities/}, urldate = {2017-03-14}, annotation = {Telnet right into certain ALPRs.} } @online{ftc:silver, author = {Mithal, Maneesha}, title = {Sample Silverpush Letter}, organization = {United States Federal Trade Commission, Bureau of Consumer Protection, Divison of Privacy and Identity Protection}, url = {https://www.ftc.gov/system/files/attachments/press-releases/ftc-issues-warning-letters-app-developers-using-silverpush-code/160317samplesilverpushltr.pdf}, urldate = {2017-03-14}, annotate = {Sample letter template for Android developers using software created by the company Silvepush.} } @online{wired:ultrasonic, author = {Newman, Lily Hay}, title = {How to Block the Ultrasonic Signals You Didn’t Know Were Tracking You}, organization = {Wired}, date = {2016-11-03}, url = {https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/}, urldate = {2017-03-14}, } @online{ubeacsec:paper, author = {Mavroudis, V. and Hao, S. and Fratantonio, Y. and Maggi, F. and Kruegel, C. and Vigna, G.}, title = {The Ultrasound Tracking Ecosystem}, indextitle = {Ultrasound Tracking Ecosystem, The}, url = {http://ubeacsec.org/downloads/report.pdf}, urldate = {2017-03-14}, annotation = {Claims to be ``the first comprehensive security analysis'' of this type of tracking.}, } @online{bleep:ultrasound-tor, author = {Cimpanu, Catalin}, title = {Ultrasound Tracking Could Be Used To Deanonymize Tor Users}, organization = {Bleeping Computer}, date = {2017-01-03}, url = {https://www.bleepingcomputer.com/news/security/ultrasound-tracking-could-be-used-to-deanonymize-tor-users/}, urldate = {2017-03-14}, } @online{33c3:talk-behind, author = {Mavroudis, Vasillios and Maggi, Federico}, title = {Talking Behind Your Back}, subtitle = {On the Privacy \& Security of the Ultrasound Tracking Ecosystem}, location = {33^{rd} Chaos Communication Congress}, date = {2016-12-29}, url = {https://media.ccc.de/v/33c3-8336-talking_behind_your_back}, urldate = {2017-03-14}, } @online{ftc:xdt, title = {Cross-Device Tracking}, organization = {Federal Trade Commission}, location = {Constitution Center, 400 7^{th}~St~SW, Washington~DC 20024}, date = {2015-11-16}, url = {https://www.ftc.gov/news-events/events-calendar/2015/11/cross-device-tracking}, urldate = {2017-03-15}, } @online{google:ga:features, title = {Marketing Data Analysis \& Reporting Features}, organization = {Google}, url = {https://www.google.com/analytics/analytics/features/}, urldate = {2017-03-15}, } @online{w3techs:analytics, title = {Usage Stastics and Market Share of Traffic Analysis Tools for Websites}, organization = {W3Techs}, url = {https://w3techs.com/technologies/overview/traffic_analysis/all}, urldate = {2017-03-15}, } @online{w3techs:google, author = {Gelbmann, Matthias}, title = {Google can't track every click of your web surfing. Only most of them.}, organization = {W3Techs}, date = {2012-02-27}, url = {https://w3techs.com/blog/entry/google_cant_track_every_single_click_of_your_web_surfing_only_most_of_them}, urldate = {2017-03-15}, } @online{piwik, title = {Free Web Analytics Software}, organization = {Piwik}, url = {https://piwik.org/}, urldate = {2017-03-15}, } @online{piwik:privacy, title = {Web Analytics Privacy in Piwik}, organization = {Piwik}, url = {https://piwik.org/privacy/}, urldate = {2017-03-15}, } @online{mtg:gitlab-piwik, author = {Gerwitz, Mike}, title = {Google Analytics Removed From GitLab.com Instance}, date = {2016-01-24}, url = {https://mikegerwitz.com/2016/01/Google-Analytics-Removed-from-GitLab.com-Instance}, urldate = {2017-03-16}, } @online{w:fb-like-img, author = {Vt, Enoc}, title = {File:Botón Me gusta.svg}, date = {2011-10-09}, url = {https://en.wikipedia.org/wiki/File:Bot\%C3\%B3n_Me_gusta.svg}, urldate = {2017-03-16}, } @article{pnas:predict, author = {Kosinski, Michal and Stillwell, David and Graepel, Thore}, title = {Private traits and attributes are predictable from digital records of human behavior}, journal = {PNAS}, volume = {110}, pages = {5802-5805}, doi = {10.1073/pnas.1218772110}, date = {2013-02-12}, url = {http://www.pnas.org/content/110/15/5802.full.pdf}, urldate = {2017-03-16}, } @online{bloomberg:belgum-fb, author = {Bodoni, Stephanie and Martens, John}, title = {Belgium Tells Facebook to Stop Storing Personal Data From Non-Users}, organization = {Bloomberg}, date = {2015-11-09}, url = {https://www.bloomberg.com/news/articles/2015-11-09/facebook-told-to-stop-storing-personal-data-from-belgian-surfers}, urldate = {2017-03-16}, annotation = {Surely Facebook isn't doing such a thing. Wait: ``Facebook says it will appeal Belgian ruling to higher court''. Imagine that.} } @online{w:behavioral-targeting, title = {Behavorial Tracking}, organization = {Wikipedia}, url = {https://en.wikipedia.org/wiki/Behavioral_targeting}, urldate = {2017-03-16}, } @article{roosendaal:fb-like, author = {Roosendaal, Arnold}, title = {Facebook Tracks and Traces Everyone: Like This!}, journaltitle = {Tilburg Law School Legal Studies Research Paper Series}, date = {2010}, doi = {10.2139/ssrn.1717563}, url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1717563}, urldate = {2017-03-17}, } @online{uld:fb, title = {ULD to website owners: ``Deactivate Facebook web analytics''}, organization = {Unabh{\:a}ngiges Landeszentrum f{\:u}r Datenschutz Schleswig-Holstein}, date = {2011-08-19}, url = {https://www.datenschutzzentrum.de/presse/20110819-facebook-en.htm}, urldate = {2017-03-17}, } @online{eff:browser-uniqueness-blog, authors = {Eckersley, Peter}, title = {Is Every Browser Unique? Results Fom The Panopticlick Experiment}, organization = {Electronic Frontier Foundation}, date = {2010-05-17}, url = {https://www.eff.org/deeplinks/2010/05/every-browser-unique-results-fom-panopticlick}, urldate = {2017-03-17}, } @online{eff:browser-uniqueness, authors = {Eckersley, Peter}, title = {How Unique Is Your Web Browser?}, organization = {Electronic Frontier Foundation}, date = {2010-05-17}, url = {https://panopticlick.eff.org/static/browser-uniqueness.pdf}, urldate = {2017-03-17}, } @online{eff:panopti2, author = {Budington, Bill}, title = {Panopticlick 2.0 Launches, Featuring New Tracker Protection and Fingerprinting Tests}, organization = {Electronic Frontier Foundation}, date = {2015-12-17}, url = {https://www.eff.org/deeplinks/2015/12/panopticlick-20-launches-featuring-new-tracker-protection-and-fingerprinting-tests}, urldate = {2017-03-17}, } @online{mozilla:fingerprinting, title = {Fingerprinting - {MozillaWiki}}, organization = {Mozilla}, url = {https://wiki.mozilla.org/Fingerprinting}, urldate = {2017-03-17}, } @online{chromium:identification, author = {Janc, Artur and Zalewski, Michal}, title = {Technical analysis of client identification mechanisms}, organization = {Google}, url = {https://sites.google.com/a/chromium.org/dev/Home/chromium-security/client-identification-mechanisms}, urldate = {2017-03-17}, } @online{tor:browser-design, author = {Perry, Mike and Clark, Erin and Murdoch, Steven and Koppen, Georg}, title = {The Design and Implementation of the {Tor Browser}}, organization = {Tor Project}, date = {2017-03-10}, url = {https://www.torproject.org/projects/torbrowser/design/}, urldate = {2017-03-17}, } @online{stanford:private-browsing, author = {Aggarwal, Gaurav, and Bursztein, Elie and Jackson, Collin and Boneh, Dan}, title = {An Analysis of Private Browsing Modes in Modern Browsers}, organization = {Stanford University}, url = {https://crypto.stanford.edu/~dabo/pubs/papers/privatebrowsing.pdf}, urldate = {2017-03-17}, } @online{norte:tor-fingerprint, author = {Norte, Jose Carlos}, title = {Advanced Tor Browser Fingerprinting}, date = {2016-03-06}, url = {http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html}, urldate = {2017-03-17}, } @online{browserleaks, title = {{BrowserLeaks.com} - Web Browser Security Checklist for Identity Theft Protection}, url = {https://browserleaks.com/}, urldate = {2017-03-17}, } @article{hardware-fingerprint, author = {Cao, Yinshi and Li, Song and Wijmans, Erik}, title = {(Cross-)Browser Fingerprinting via OS and Hardware Level Features}, date = {2017}, doi = {10.14722/ndss.2017.23152}, url = {http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf}, urldate = {2017-03-17}, } @article{ijcseit:biometric, author = {Mudholkar, Smita S. and Shende, Pradnya M. and Sarode, Milind V.}, title = {Biometrics Authentication Technique for Intrustion Detection Systems Using Fingerprint Recognition}, journal = {International Journal of Computer Science, Engineering and Information Technology}, volume = 2, number = 4, doi = {10.5121/ijcseit.2012.2106}, date = {2012-02}, url = {http://airccse.org/journal/ijcseit/papers/2112ijcseit06.pdf}, urldate = {2017-03-19}, } @online{ars:fingerprint, author = {Goodwin, Dan}, title = {Now sites can fingerprint you online even when you use multiple browsers}, subtitle = {Online tracking gets more accurate and harder to evade}, organization = {Ars Technica}, url = {https://arstechnica.co.uk/security/2017/02/now-sites-can-fingerprint-you-online-even-when-you-use-multiple-browsers/}, urldate = {2017-03-17}, } @online{mtg:rof, author = {Gerwitz, Mike}, title = {Restore Online Freedom!}, date = {2016-03-20}, url = {https://media.libreplanet.org/u/libreplanet/collection/restore-online-freedom/}, urldate = {2017-03-17}, annotate = {My LibrePlanet 2017 talk about issues with an increasing non-free Web, as well as privacy and security implications of running untrusted, unsigned, ephemeral JavaScript code.} } @online{noscript, title = {NoScript - {JavaScript}/{Java}/{Flash} blocker for a safer Firefox experience!}, url = {https://noscript.net/}, urldate = {2017-03-17}, } @online{eff:privacy-badger, title = {Privacy Badger}, organization = {Electronic Frontier Foundation}, url = {https://www.eff.org/privacybadger}, urldate = {2017-03-17}, } @online{gh:ublock-origin, title = {uBlock Origin}, subtitle = {An efficient blocker for {Chromium} and {Firefox}. Fast and lean.}, url = {https://github.com/gorhill/uBlock}, urldate = {2017-03-17}, } @online{moz:sd-cookies, title = {Self-Destructing Cookies}, url = {https://addons.mozilla.org/en-US/android/addon/self-destructing-cookies/}, urldate = {2017-03-17}, } @online{lp:2016:privacy-badger, author = {Quintin, Cooper}, title = {Ending Online Tracking! Privacy Badger and Beyond!}, organization = {Electronic Frontier Foundation}, url = {https://media.libreplanet.org/u/libreplanet/m/ending-online-tracking-privacy-badger-and-beyond/}, urldate = {2017-03-17}, } @online{moz:lightbeam, title = {Lightbeam for Firefox}, subtitle = {Shine a Light on Who's Watching You}, organization = {Mozilla}, url = {https://www.mozilla.org/en-US/lightbeam/}, urldate = {2017-03-17}, } @online{tor:browser, title = {Tor Browser}, organization = {Tor Project}, url = {https://www.torproject.org/projects/torbrowser.html.en}, urldate = {2017-03-17}, } @online{tor:overview, title = {Tor Project: Overview}, organization = {Tor Project}, url = {https://www.torproject.org/about/overview.html.en}, urldate = {2017-03-17}, } @online{ghostery:companies, title = {Company Database}, organization = {Ghostery Enterprise}, url = {http://www.ghosteryenterprise.com/company-database/}, urldate = {2017-03-17}, } @online{networks-of-control, author = {Christl, Wolfie, and Spiekermann, Sarah}, title = {Networks of Control}, date = {2016}, url = {http://crackedlabs.org/en/networksofcontrol}, urldate = {2017-03-18}, } @online{33c3:surveil, author = {Christl, Wolfie}, title = {Corporare surveillance, digital tracking, big data~\&~privacy}, subtitle = {How thousands of companies are profiling, categorizing, rating and affecting the lives of billions}, location = {33^{rd} Chaos Communication Congress}, date = {2016-12-30}, url = {https://media.ccc.de/v/33c3-8414-corporate_surveillance_digital_tracking_big_data_privacy}, urldate = {2017-03-18}, annotation = {See also \cite{networks-of-control}} } @online{oracle:datalogix-acq, title = {Oracle Buys Datalogix}, subtitle = {Creates the World's Most Valuable Data Cloud to Maximize the Power of Digital Marketing}, organization = {Oracle}, url = {http://www.oracle.com/us/corporate/acquisitions/datalogix/general-presentation-2395307.pdf}, urldate = {2017-03-18}, } @online{lexisnexis:trueid, title = {LexisNexis TrueID}, organization = {LexisNexis}, url = {http://www.lexisnexis.com/risk/downloads/literature/trueid.pdf}, urldate = {2017-03-18}, } @online{techcrunch:palantir, author = {Burns, Matt}, title = {Leaked Palantir Doc Reveals Uses, Specific Functions And Key Clients}, organization = {TechCrunch}, date = {2015-01-11}, url = {https://techcrunch.com/2015/01/11/leaked-palantir-doc-reveals-uses-specific-functions-and-key-clients/}, urldate = {2017-03-19}, } @online{nyt:learn-secrets, author = {Duhigg, Charles}, title = {How Companies Learn Your Secrets}, organization = {The New York Times}, date = {2016-02-16}, url = {http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html}, urldate = {2017-03-19}, } @online{trustev:tech, title = {TransUnion | Trustev -- Technology}, organization = {TransUnion}, url = {http://www.trustev.com/technology}, urldate = {2017-03-19}, } @online{w:file:cell-tower, author = {Appel, Thomas}, title = {File:T-mobile cell site}, organization = {Wikipedia}, date = {2015-09-23}, url = {https://en.wikipedia.org/wiki/File:T-Mobile_cell_site.jpg}, urldate = {2017-03-19}, } @online{w:file:stingray, title = {File:Stingray Harris handle side.jpg}, date = {2013-04}, organization = {Harris Corporation}, url = {https://en.wikipedia.org/wiki/File:Stingray_Harris_handle_side.jpg}, urldate = {2017-03-19}, } @online{w:file:gps, title = {File:GPS Satellite NASA art-iif.jpg}, date = {2006-02-09}, organization = {NASA}, url = {https://en.wikipedia.org/wiki/File:GPS_Satellite_NASA_art-iif.jpg}, urldate = {2017-03-19}, } @online{wsj:app-loc, title = {What They Know - Mobile - WSJ}, organization = {The Wall Street Journal}, url = {http://blogs.wsj.com/wtk-mobile/}, urldate = {2017-03-19}, annotation = {Popular apps that transmit location information in~2010}, } @online{archive:fisa-verizon, author = {Vinson, Roger}, title = {Foreign Intelligence Surveillance Court Ruling- Verizon}, organization = {United States Foreign Intelligence Surveillance Court}, date = {2013-04-25}, url = {https://archive.org/details/FBI-Verizon-FISA-2013}, urldate = {2017-03-20}, annotation = {The first Snowden leak showing that the United States is performing dragnet surveillance on its citizens}, } @online{dni:business-provs, author = {Clapper, James R.}, title = {DNI Statement on Recent Unauthorized Disclosures of Classified Information}, organization = {Office of the Director of National Intelligence}, date = {2013-06-06}, url = {https://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/868-dni-statement-on-recent-unauthorized-disclosures-of-classified-information}, urldate = {2017-03-20}, annotation = {Partial declassification of the ``business records'' provision of FISA.}, } @online{guardian:verizon, author = {Greenwald, Glenn}, title = {NSA collecting phone records of millions of Verizon customers daily}, subtitle = {Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama}, date = {2013-06-06}, url = {https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order}, urldate = {2017-03-20}, annotation = {The original article exposing the first Snowden document.}, } @online{eff:jewel:evidence, title = {Summary of Voluminous Evidence, Jewel v. NSA, Case No. 08-CV-4373-JSW}, date = {2012-12-14}, url = {https://www.eff.org/files/filenode/jewel_conformed_summary_of_evidence.pdf}, urldate = {2017-03-20}, } @online{eff:metadata, author = {Opsahl, Kurt}, title = {Why Metadata Matters}, organization = {Electronic Frontier Foundation}, date = {2013-06-07}, url = {https://www.eff.org/deeplinks/2013/06/why-metadata-matters}, urldate = {2017-03-20}, } @online{eff:nsa-spying, title = {NSA Spying}, organization = {Electronic Frontier Foundation}, url = {https://www.eff.org/nsa-spying}, urldate = {2017-03-20}, } @online{eff:samsung-tv-policy, author = {Higgins, Parker}, title = {Big Brother Is Listening: Users Need the Ability To Teach Smart TVs New Lessons}, organization = {Electronic Frontier Foundation}, date = {2015-02-11}, url = {https://www.eff.org/deeplinks/2015/02/big-brother-listening-users-need-ability-teach-smart-tvs-new-lessons}, urldate = {2017-03-20}, } @online{vault7:y0, title = {Vault 7: CIA Hacking Tools Revealed}, organization = {Wikileaks}, url = {https://wikileaks.org/ciav7p1/index.html}, urldate = {2017-03-21}, } @online{vault7:weeping, title = {Weeping Angel (Extending) Engineering Notes, SECRET~// REL~USA,UK}, organization = {Central Intelligence Agency}, url = {https://wikileaks.org/ciav7p1/cms/page_12353643.html}, urldate = {2017-03-20}, annotation = {Covert surveillance through Samsung Smart TVs.}, } @online{bleep:lgtv-ransom, author = {Cimpanu, Catalin}, title = {Android Ransomware Infects LG Smart TV}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/android-ransomware-infects-lg-smart-tv/}, urldate = {2017-03-20}, annotation = {Android ransomware on an LG Smart TV.} } @online{engadget:murder-echo, author = {Steele, Billy}, title = {Policy seek Amazon Echo data in murder case}, organization = {Engadget}, date = {2016-12-27}, url = {https://www.engadget.com/2016/12/27/amazon-echo-audio-data-murder-case/}, urldate = {2017-03-21}, } @online{guardian:murder-echo, title = {Amazon refuses to let police access US murder suspect's Echo recordings}, subtitle = {Company has declined to provide audio recordings by smart speaker system at house where man died, according to a report}, organization = {The Guardian}, date = {2016-12-28}, url = {https://www.theguardian.com/technology/2016/dec/28/amazon-refuses-to-let-police-access-suspects-echo-recordings}, urldate = {2017-03-21}, } @online{gizmodo:echo-wiretap, author = {Novak, Matt}, title = {The FBI Can Neither Confirm Nor Deny Wiretapping Your Amazon Echo}, organization = {Gizmodo}, date = {2016-05-11}, url = {https://paleofuture.gizmodo.com/the-fbi-can-neither-confirm-nor-deny-wiretapping-your-a-1776092971}, urldate = {2017-03-21}, } @online{w:file:echo, author = {Morrison, Frank}, title = {File:Amazon Echo.jpg}, organization = {Wikipedia}, date = {2014-10-17}, url = {https://en.wikipedia.org/wiki/File:Amazon_Echo.jpg}, urldate = {2017-03-21}, } @online{guardian:doll-spy, author = {Oltermann, Philip}, title = {German parents told to destroy doll that can spy on children}, subtitle = {German watchdog classifies My Friend Cayla doll as `illegal espionage apparatus' and says shop owners could face fines}, date = {2017-02-17}, organization = {The Guardian}, url = {https://www.theguardian.com/world/2017/feb/17/german-parents-told-to-destroy-my-friend-cayla-doll-spy-on-children}, urldate = {2017-03-22}, } % I archived to Wayback Machine in case this URL vanishes @online{onstar:privacy-policy, title = {Privacy Statement}, organization = {OnStar}, date = {2017-01-01}, url = {https://www2.onstar.com/tunnel-web/webdav/portal/document_library/tcps/us/ps/web/20140601/en/html/privacy_statement.html}, urldate = {2017-03-21}, } @online{binsider:ford-gps, author = {Edwards, Jim}, title = {Ford Exec: `We Know Everyone Who Breaks The Law' Thanks To Our GPS In Your Car}, organization = {Business Insider}, date = {2014-01-08}, url = {http://www.businessinsider.com/ford-exec-gps-2014-1}, urldate = {2017-03-21}, }