1713 lines
62 KiB
BibTeX
1713 lines
62 KiB
BibTeX
@online{panopti:about,
|
||
author = {Electric Frontier Foundation},
|
||
title = {Panopticlick | About},
|
||
url = {https://panopticlick.eff.org/about},
|
||
urldate = {2017-03-08},
|
||
}
|
||
|
||
@online{tor:tails,
|
||
title = {Tails - Privacy for anyone anywhere},
|
||
organization = {Tor Project},
|
||
url = {https://tails.boum.org/},
|
||
urldate = {2017-03-18},
|
||
}
|
||
|
||
@online{whonix,
|
||
title = {Whonix},
|
||
organization = {Whonix},
|
||
url = {https://www.whonix.org/},
|
||
urldate = {2017-03-18},
|
||
}
|
||
|
||
@online{whonix:donot,
|
||
author = {Whonix},
|
||
title = {DoNot},
|
||
url = {https://www.whonix.org/wiki/DoNot},
|
||
urldate = {2017-03-05}
|
||
}
|
||
|
||
@online{tor,
|
||
author = {Tor Project},
|
||
title = {Tor Project: Anonymity Online},
|
||
url = {http://torproject.org/},
|
||
urldate = {2017-03-09},
|
||
}
|
||
|
||
|
||
@online{eff:nsa:timeline,
|
||
author = {Electronic Frontier Foundation},
|
||
title = {Timeline of NSA Domestic Spying},
|
||
url = {https://www.eff.org/nsa-spying/timeline},
|
||
urldate = {2017-03-09},
|
||
}
|
||
|
||
@online{mtg:uproar,
|
||
author = {Mike Gerwitz},
|
||
title = {National Uproar: A Comprehensive Overview of the
|
||
NSA Leaks and Revelations},
|
||
url = {https://mikegerwitz.com/2013/06/National-Uproar-A-Comprehensive-Overview-of-the-NSA-Leaks-and-Revelations},
|
||
month = 06,
|
||
year = 2013,
|
||
urldate = {2017-03-09},
|
||
}
|
||
|
||
@online{eff:bernstein:doj,
|
||
author = {Electronic Frontier Foundation},
|
||
title = {Bernstein v. US Department of Justice},
|
||
url = {https://www.eff.org/cases/bernstein-v-us-dept-justice},
|
||
urldate = {2017-03-09},
|
||
}
|
||
|
||
% TODO: figure out how to render the URL
|
||
@techreport{poodle:paper,
|
||
author = {Möller, Brodo and Duong, Thai and Kotowicz, Krzysztof},
|
||
title = {This POODLE Bites: Exploiting the SSL 3.0 Fallback},
|
||
institution = {Google},
|
||
year = 2014,
|
||
month = Sep,
|
||
url = {https://www.openssl.org/~bodo/ssl-poodle.pdf},
|
||
}
|
||
|
||
@online{w:crypto-wars,
|
||
organization = {Wikipedia},
|
||
title = {Crypto Wars},
|
||
url = {https://en.wikipedia.org/wiki/Crypto_wars},
|
||
urldate = {2017-03-10},
|
||
}
|
||
|
||
|
||
@online{fedr:export-controls,
|
||
author = {Executive Office of the President},
|
||
title = {Administration of Export Controls on Encryption Products},
|
||
url = {https://www.gpo.gov/fdsys/pkg/FR-1996-11-19/pdf/96-29692.pdf},
|
||
urldate = {2017-03-10},
|
||
month = 11,
|
||
year = 1996,
|
||
note = {Federal Register, Vol. 61, No. 224, Executive Order 58767},
|
||
}
|
||
|
||
|
||
|
||
@online{doc:rev-export-reg,
|
||
author = {United States Department of Commerce},
|
||
title = {Revised U.S. Encryption Export Regulations},
|
||
url = {https://epic.org/crypto/export_controls/regs_1_00.html},
|
||
month = 01,
|
||
year = 2000,
|
||
urldate = {2017-03-10},
|
||
}
|
||
|
||
|
||
@online{arxiv:mac,
|
||
author = {Martin, Jeremy
|
||
and Mayberry, Travis
|
||
and Donahue, Collin
|
||
and Foppe, Lucas,
|
||
and Brown, Lamont
|
||
and Riggins, Chadwick
|
||
and Rye, Erik C.
|
||
and Brown, Dane},
|
||
title = {A Study of MAC Address Randomization in Mobile Devices and When it Fails},
|
||
year = 2017,
|
||
month = 03,
|
||
archivePrefix= {arXiv},
|
||
eprint = {1703.02874},
|
||
primaryClass = {cs.CR},
|
||
}
|
||
|
||
@online{aimsid,
|
||
author = {CellularPrivacy},
|
||
title = {Android IMSI-Catcher Detector},
|
||
url = {https://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@online{osmand,
|
||
title = {OsmAnd - Offline Mobile Maps and Navigation},
|
||
url = {http://osmand.net/},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@online{mozilla:loc-services,
|
||
author = {MozillaWiki},
|
||
title = {CloudServices/Location - MozillaWiki},
|
||
url = {https://wiki.mozilla.org/CloudServices/Location},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@online{openmobilenetwork,
|
||
title = {OpenMobileNetwork},
|
||
url = {http://www.openmobilenetwork.org/},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@online{w:wps,
|
||
organization = {Wikipedia},
|
||
title = {Wi-Fi positioning system},
|
||
url = {https://en.wikipedia.org/wiki/Wi-Fi_positioning_system},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@online{w:trilateration,
|
||
organization = {Wikipedia},
|
||
title = {Trilateration},
|
||
url = {https://en.wikipedia.org/wiki/Trilateration},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@article{acm:spotfi,
|
||
author = {Kotaru, Manikanta
|
||
and Joshi, Kiran
|
||
and Bharadia, Dinesh
|
||
and Katti, Sachin},
|
||
title = {{SpotFi}: Decimeter Level Localization Using {WiFi}},
|
||
journal = {{ACM} {SIGCOMM} Computer Communication Review - {SIGCOMM'15}},
|
||
doi = {10.1145/2785956.2787487},
|
||
volume = 45,
|
||
pages = {269-282},
|
||
year = 2015,
|
||
}
|
||
|
||
@article{acm:lteye,
|
||
author = {Kumar, Swarun
|
||
and Hamed, Ezzeldin
|
||
and Katabi, Dina
|
||
and Li, Li Erran},
|
||
title = {{LTE} radio analytics made easy and accessible},
|
||
journal = {{S3 '14} Proceedings of the 6th annual workshop on Wireless of
|
||
the students, by the students, for the students},
|
||
doi = {10.1145/2645884.2645891},
|
||
pages = {29-30},
|
||
year = 2014,
|
||
}
|
||
|
||
@online{replicant,
|
||
author = {Replicant},
|
||
title = {Replicant},
|
||
url = {http://www.replicant.us},
|
||
urldate = {2017-03-11},
|
||
annotation = {A fully free Android distribution}
|
||
}
|
||
|
||
@online{replicant:sec,
|
||
author = {Replicant},
|
||
title = {Freedom and privacy/security issues},
|
||
url = {http://www.replicant.us/freedom-privacy-security-issues.php},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@online{replicant:samsung-bd,
|
||
author = {Replicant},
|
||
title = {Samsung Galaxy back-door},
|
||
url = {http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor},
|
||
urldate = {2017-03-11},
|
||
annotation = {Backdoor in Samsung Galaxy phones closed by Replicant},
|
||
}
|
||
|
||
@online{gnu:malware-mobile,
|
||
author = {GNU Project},
|
||
title = {Malware in Mobile Devices},
|
||
url = {https://www.gnu.org/philosophy/malware-mobiles.html},
|
||
urldate = {2017-03-11},
|
||
annotation = {Numerous resources on privacy/security issues with mobile
|
||
devices}
|
||
}
|
||
|
||
@online{jots:mobile,
|
||
author = {Jinyan Zang
|
||
and Krysta Dummit
|
||
and James Graves
|
||
and Paul Lisker
|
||
and Latanya Sweeney},
|
||
title = {Who Knows What About Me? A Survey of Behind the Scenes Personal
|
||
Data Sharing to Third Parties by Mobile Apps},
|
||
url = {http://jots.pub/a/2015103001/index.php},
|
||
urldate = {2017-03-11},
|
||
}
|
||
|
||
@online{kryptowire:adups,
|
||
author = {Kryptowire},
|
||
title = {KRYPTOWIRE DISCOVERS MOBILE PHONE FIRMWARE THAT TRANSMITTED
|
||
PERSONALLY IDENTIFIABLE INFORMATION (PII) WITHOUT USER
|
||
CONSENT OR DISCLOSURE},
|
||
url = {http://www.kryptowire.com/adups_security_analysis.html},
|
||
urldate = {2017-03-11},
|
||
annotation = {BLU mobile phones transmitting SMS content, contacts, call
|
||
history, telephone numbers, IMEIs, etc to third-party
|
||
servers without users' knolwedge or censent}
|
||
}
|
||
|
||
@online{intercept:nyc-surveil,
|
||
author = {Currier, Cora},
|
||
title = {A Walking Tour of New York's Massive Surveillance Network},
|
||
organization = {The Intercept},
|
||
date = {2016-09-24},
|
||
url = {https://theintercept.com/2016/09/24/a-walking-tour-of-new-yorks-massive-surveillance-network/},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{shodan,
|
||
title = {Shodan},
|
||
subtitle = {The search engine for the Internet of Things},
|
||
url = {https://shodan.io},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{krebs:mongodb,
|
||
author = {Krebs, Brian},
|
||
title = {Extortionists Wipe Thousands of Databases,
|
||
Victims Who Pay Up Get Stiffed},
|
||
url = {https://krebsonsecurity.com/2017/01/extortionists-wipe-thousands-of-databases-victims-who-pay-up-get-stiffed/},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{insecam,
|
||
title = {Insecam - World biggest online cameras directory},
|
||
url = {http://insecam.org},
|
||
urldate = {2017-03-19},
|
||
annotation = {Load the HTTP (non-HTTPS) site, otherwise mixed content is
|
||
blocked and thumbnails will not work.}
|
||
}
|
||
|
||
@article{ieee:gait,
|
||
author = {Rogez, Gr\'egory
|
||
and Rihan, Jonathan
|
||
and Guerrero, Jose J.},
|
||
title = {Monocular {3D} Gait Tracking in Surveillance Scenes},
|
||
journal = {IEEE Transactions on Cybernetics},
|
||
url = {http://vision.ics.uci.edu/papers/RogezRGO_Cybernetics_2013/RogezRGO_Cybernetics_2013.pdf}
|
||
}
|
||
|
||
@article{ijca:gait,
|
||
author = {Vaidya, Sonali
|
||
and Shah, Kamal},
|
||
title = {Real Time Video Surveillance System},
|
||
journal = {International Journal of Computer Applications},
|
||
volume = 86,
|
||
pages = {22-27},
|
||
year = 2014,
|
||
url = {http://research.ijcaonline.org/volume86/number14/pxc3893419.pdf},
|
||
annotation = {Discusses realtime gait analysis for video surveillance},
|
||
}
|
||
|
||
|
||
@online{newsci:fb-noface,
|
||
author = {Rutkin, Aviva},
|
||
title = {Facebook can recognize you in photos even if you're not looking},
|
||
organization = {New Scientist},
|
||
url = {https://www.newscientist.com/article/dn27761-facebook-can-recognise-you-in-photos-even-if-youre-not-looking/},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{rms:facebook,
|
||
author = {Stallman, Richard},
|
||
title = {Reasons not to use (i.e., be used by) {Facebook}},
|
||
url = {https://stallman.org/facebook.html},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{register:fb-scan,
|
||
author = {Chirgwin, Richard},
|
||
title = {Facebook conjures up a trap for the unwary: scanning your camera
|
||
for your friends},
|
||
subtitle = {Auto-spam your friends with Photo Magic},
|
||
organization = {The Register},
|
||
url = {https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/},
|
||
urldate = {2017-03-12},
|
||
annotation = {Archive.org link used because The~Register blocks
|
||
Tor~users unless they execute proprietary JavaScript.},
|
||
}
|
||
|
||
@online{guardian:fb-scan,
|
||
author = {Arthur, Charles},
|
||
title = {Facebook in new privacy row over facial recognition feature},
|
||
subtitle = {Social network turns on new feature to automatically identify
|
||
people in photos, raising questions about privacy
|
||
implications of the service},
|
||
organization = {The Guardian},
|
||
date = {2011-06-08},
|
||
url = {https://www.theguardian.com/technology/2011/jun/08/facebook-privacy-facial-recognition},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{techcrunch:fb-baby,
|
||
author = {Constine, Josh},
|
||
title = {Facebook’s New Photo “Scrapbook” Lets Parents Give Kids An
|
||
Official Presence},
|
||
organization = {TechCrunch},
|
||
date = {2016-03-31},
|
||
url = {https://techcrunch.com/2015/03/31/step-1-identify-baby-photo-step-2-hide-baby-photos/},
|
||
urldate = {2017-03-12},
|
||
annotation = {Facebook tricks users into violating their child's privacy
|
||
before they have any say in the matter.},
|
||
}
|
||
|
||
@online{eff:ios-photo-diff,
|
||
author = {Gebhart, Gennie
|
||
and Grant, Starchy
|
||
and Portnov, Erica},
|
||
title = {Facial Recognition, Differential Privacy, and Trade-Offs in
|
||
Apple's Latest OS Releases},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2016-09-27},
|
||
url = {https://www.eff.org/deeplinks/2016/09/facial-recognition-differential-privacy-and-trade-offs-apples-latest-os-releases},
|
||
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{churchix,
|
||
title = {Churchix Facial Recognition Software},
|
||
subtitle = {Churchix Facial Recognition Software for Event Attendance},
|
||
url = {http://churchix.com/},
|
||
urldate = {2017-03-12},
|
||
annotation = {This software is cited for illustration; do~not use it.}
|
||
}
|
||
|
||
@online{facefirst,
|
||
title = {Face Recognition Software for Retail Stores: \#1~Biometric
|
||
Surveillance for Loss Prevention},
|
||
url = {https://www.facefirst.com/industry/retail-face-recognition/},
|
||
urldate = {2017-03-12},
|
||
annotation = {Full-page loading spinner does not remove itself without
|
||
running non-free JavaScript; remove it manually using a
|
||
web browser with a~debugger. This software is cited for
|
||
illustration; do~not use it.},
|
||
}
|
||
|
||
@online{bio:iris,
|
||
title = {Hacker extracts Merkel's iris image},
|
||
organization = {Planet Biometrics},
|
||
date = {2015-11-30},
|
||
url = {http://www.planetbiometrics.com/article-details/i/3644/},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{eff:facial-tech,
|
||
author = {Schwartz, Adam},
|
||
title = {The Danger of Corporate Facial Recognition Tech},
|
||
subtitle = {The Illinois Biometric Privacy Statute Survived a Recent
|
||
Attack. But the Struggle Continues},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2016-06-07},
|
||
url = {https://www.eff.org/deeplinks/2016/06/danger-corporate-facial-recognition-techgg},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{eff:fbi-bio,
|
||
author = {Lynch, Jennifer},
|
||
title = {New Report: FBI Can Access Hundreds of Millions of Face
|
||
Recognition Photos},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2016-06-15},
|
||
url = {https://www.eff.org/deeplinks/2016/06/fbi-can-search-400-million-face-recognition-photos},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{cbs:sf-smile,
|
||
author = {Borba, Andria},
|
||
title = {Nowhere To Hide: Few Public Places Without Surveillance Cameras
|
||
In San Francisco},
|
||
organization = {CBS},
|
||
date = {2015-09-24},
|
||
url = {http://sanfrancisco.cbslocal.com/2015/09/24/san-francisco-surveillance-camera-tenderloin/},
|
||
urldate = {2017-03-12},
|
||
}
|
||
|
||
@online{pbs:nova:boston,
|
||
author = {O'Brien, Michael
|
||
and Cort, Julia},
|
||
title = {Manhunt---{Boston Bombers}},
|
||
subtitle = {Which technologies worked—and which didn't---in the race to
|
||
track down the men behind the marathon attack?},
|
||
organization = {WGBH Educational Foundation},
|
||
date = {2013-05-29},
|
||
url = {http://www.pbs.org/wgbh/nova/tech/manhunt-boston-bombers.html},
|
||
urldate = {2017-03-13},
|
||
annotation = {Specificall, pay attention to the Domain Awareness System
|
||
and other surveillance capabilities. Transcript
|
||
available.},
|
||
}
|
||
|
||
@online{reuters:nypd-das,
|
||
author = {Francescani, Chris},
|
||
title = {NYPD expands surveillance net to fight crime as well as terrorism},
|
||
organization = {Reuters},
|
||
date = {2013-06-21},
|
||
url = {http://www.reuters.com/article/usa-ny-surveillance-idUSL2N0EV0D220130621},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{wired:pixel-face,
|
||
author = {Newman, Lily Hay},
|
||
title = {AI Can Recognize Your Face Even If You’re Pixelated},
|
||
organization = {Wired},
|
||
date = {2016-09-12},
|
||
url = {https://www.wired.com/2016/09/machine-learning-can-identify-pixelated-faces-researchers-show/},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{arxiv:google-pixel-res,
|
||
author = {Dahl, Ryan
|
||
and Norouzi, Mohammad
|
||
and Shlens, Jonathan},
|
||
title = {Pixel Recursive Super Resolution},
|
||
organization = {Google Brain},
|
||
date = {2017-02-02},
|
||
archivePrefix= {arXiv},
|
||
eprint = {1702.00783},
|
||
primaryClass = {cs.CV},
|
||
}
|
||
|
||
@online{fast:das,
|
||
author = {Ungerleider, Neal},
|
||
title = {NYPD, Microsoft Launch All-Seeing “Domain Awareness System” With
|
||
Real-Time CCTV, License Plate Monitoring},
|
||
subtitle = {The New York Police Department has a new terrorism detection
|
||
system that will also generate profit for the city},
|
||
organization = {Fast Company},
|
||
date = {2012-08-08},
|
||
url = {https://www.fastcompany.com/3000272/nypd-microsoft-launch-all-seeing-domain-awareness-system-real-time-cctv-license-plate-monito},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{nyc:pspg,
|
||
title = {Public Security Privacy Guidelines},
|
||
url = {http://www.nyc.gov/html/nypd/downloads/pdf/crime_prevention/public_security_privacy_guidelines.pdf},
|
||
urldate = {2017-03-13},
|
||
annotation = {Information about the NYPD's Domain Awareness System.},
|
||
}
|
||
|
||
|
||
@book{rosen:naked,
|
||
author = {Rosen, Jeffrey},
|
||
title = {The Naked Crowd: Reclaiming Security and Freedom In An Anxious
|
||
Age},
|
||
publisher = {Random House},
|
||
isbn = {978-0375508004},
|
||
date = 2004,
|
||
indextitle = {Naked Crowd: Reclaiming Security and Freedom In An Anxious
|
||
Age, The},
|
||
}
|
||
|
||
@article{solove:nothing-to-hide,
|
||
author = {Solove, Daniel J.},
|
||
title = {``I've got nothing to hide'' and Other Misunderstandings
|
||
of Privacy},
|
||
journaltitle = {San Diego Law Review},
|
||
volume = 44,
|
||
pages = {745--772},
|
||
date = {2007},
|
||
url = {https://ssrn.com/abstract=998565},
|
||
urldate = {2017-03-13},
|
||
annotation = {GWU Law School Public Law Research Paper No. 289},
|
||
}
|
||
|
||
@online{metro:goebbels,
|
||
author = {Nagesh, Ashitha},
|
||
title = {A Tory MP might have quoted Goebbels in defence of the
|
||
government’s surveillance bill},
|
||
organization = {Metro.co.uk},
|
||
url = {http://metro.co.uk/2015/11/05/a-tory-mp-might-have-quoted-goebbels-in-defence-of-the-governments-surveillance-bill-5481457/},
|
||
urldate = {2017-03-13},
|
||
annotation = {It's never good to be accused of quoting the Nazi propaganda
|
||
minister},
|
||
}
|
||
|
||
@online{eff:alpr,
|
||
title = {Automated License Plate Readers},
|
||
organization = {Electronic Frontier Foundation},
|
||
url = {https://www.eff.org/sls/tech/automated-license-plate-readers},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{aclu:tracked,
|
||
title = {You Are Being Tracked},
|
||
subtitle = {How License Plate Readers Are Being Used To Record Americans'
|
||
Movements},
|
||
url = {https://www.aclu.org/sites/default/files/field_document/071613-aclu-alprreport-opt-v05.pdf},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{eff:golden-gate-toll,
|
||
title = {The Golden Gate Bridge Is Watching You},
|
||
author = {Schoen, Seth},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2013-03-28},
|
||
url = {https://www.eff.org/deeplinks/2013/03/golden-gate-bridge-watching-you},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{goldengate:anon,
|
||
title = {I Want To Remain Anonymous},
|
||
organization = {Golden Gate Bridge, Highway and Transportation District},
|
||
url = {http://goldengate.org/tolls/iwanttoremainanonymous.php},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{baynews:fastack-data,
|
||
author = {Simerman, John},
|
||
title = {Lawyers dig into FasTrak data},
|
||
organization = {Bay Area News Group},
|
||
date = {2007-06-05},
|
||
url = {http://www.eastbaytimes.com/2007/06/05/lawyers-dig-into-fastrak-data/},
|
||
urldate = {2017-03-13},
|
||
annotation = {FasTrack data are used in civil disputes like divorce cases.},
|
||
}
|
||
|
||
@online{blackhat:toll-systems,
|
||
author = {Lawson, Nate},
|
||
title = {Highway To Hell: Hacking Toll Systems},
|
||
date = {2008-08-06},
|
||
location = {BlackHat USA},
|
||
url = {http://www.root.org/talks/BH2008_HackingTollSystems.pdf},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{w:ezpass,
|
||
organization = {Wikipedia},
|
||
title = {E-ZPass},
|
||
url = {https://en.wikipedia.org/wiki/E-ZPass},
|
||
urldate = {2017-03-13},
|
||
}
|
||
|
||
@online{register:rfid-clone,
|
||
author = {Goodin, Dan},
|
||
title = {Passport RFIDs cloned wholesale by \$250 eBay auction spree\$},
|
||
subtitle = {Video shows you how},
|
||
organization = {The Register},
|
||
url = {https://web.archive.org/web/20170127114339/http://www.theregister.co.uk/2009/02/02/low_cost_rfid_cloner/},
|
||
urldate = {2017-03-13},
|
||
annotation = {Archive.org link used because The~Register blocks
|
||
Tor~users unless they execute proprietary JavaScript.},
|
||
}
|
||
|
||
@online{w:us-v-jones,
|
||
organization = {Wikipedia},
|
||
title = {United States v. Jones},
|
||
url = {https://en.wikipedia.org/wiki/United_States_v._Antoine_Jones},
|
||
urldate = {2017-03-13},
|
||
annotation = {United States Supreme Court ruling that GPS~tracking
|
||
constitutes a~search under the Fourth~Amendment.}
|
||
}
|
||
|
||
@online{darius:alpr-telnet,
|
||
author = {Freamon, Darius},
|
||
title = {{PIPS} Technology {AUTOPLATE} Automatic License Plate Recognition
|
||
{(ALPR)} Multiple Vulnerabilities},
|
||
url = {https://dariusfreamon.wordpress.com/2014/02/19/pips-technology-autoplate-automatic-license-plate-recognition-alpr-multiple-vulnerabilities/},
|
||
urldate = {2017-03-14},
|
||
annotation = {Telnet right into certain ALPRs.}
|
||
}
|
||
|
||
@online{ftc:silver,
|
||
author = {Mithal, Maneesha},
|
||
title = {Sample Silverpush Letter},
|
||
organization = {United States Federal Trade Commission,
|
||
Bureau of Consumer Protection,
|
||
Divison of Privacy and Identity Protection},
|
||
url = {https://www.ftc.gov/system/files/attachments/press-releases/ftc-issues-warning-letters-app-developers-using-silverpush-code/160317samplesilverpushltr.pdf},
|
||
urldate = {2017-03-14},
|
||
annotate = {Sample letter template for Android developers using software
|
||
created by the company Silvepush.}
|
||
}
|
||
|
||
@online{wired:ultrasonic,
|
||
author = {Newman, Lily Hay},
|
||
title = {How to Block the Ultrasonic Signals You Didn’t Know Were Tracking
|
||
You},
|
||
organization = {Wired},
|
||
date = {2016-11-03},
|
||
url = {https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/},
|
||
urldate = {2017-03-14},
|
||
}
|
||
|
||
@online{ubeacsec:paper,
|
||
author = {Mavroudis, V.
|
||
and Hao, S.
|
||
and Fratantonio, Y.
|
||
and Maggi, F.
|
||
and Kruegel, C.
|
||
and Vigna, G.},
|
||
title = {The Ultrasound Tracking Ecosystem},
|
||
indextitle = {Ultrasound Tracking Ecosystem, The},
|
||
url = {http://ubeacsec.org/downloads/report.pdf},
|
||
urldate = {2017-03-14},
|
||
annotation = {Claims to be ``the first comprehensive security analysis''
|
||
of this type of tracking.},
|
||
}
|
||
|
||
@online{bleep:ultrasound-tor,
|
||
author = {Cimpanu, Catalin},
|
||
title = {Ultrasound Tracking Could Be Used To Deanonymize Tor Users},
|
||
organization = {Bleeping Computer},
|
||
date = {2017-01-03},
|
||
url = {https://www.bleepingcomputer.com/news/security/ultrasound-tracking-could-be-used-to-deanonymize-tor-users/},
|
||
urldate = {2017-03-14},
|
||
}
|
||
|
||
@online{33c3:talk-behind,
|
||
author = {Mavroudis, Vasillios
|
||
and Maggi, Federico},
|
||
title = {Talking Behind Your Back},
|
||
subtitle = {On the Privacy \& Security of the Ultrasound Tracking
|
||
Ecosystem},
|
||
location = {33^{rd} Chaos Communication Congress},
|
||
date = {2016-12-29},
|
||
url = {https://media.ccc.de/v/33c3-8336-talking_behind_your_back},
|
||
urldate = {2017-03-14},
|
||
}
|
||
|
||
@online{ftc:xdt,
|
||
title = {Cross-Device Tracking},
|
||
organization = {Federal Trade Commission},
|
||
location = {Constitution Center, 400 7^{th}~St~SW, Washington~DC 20024},
|
||
date = {2015-11-16},
|
||
url = {https://www.ftc.gov/news-events/events-calendar/2015/11/cross-device-tracking},
|
||
urldate = {2017-03-15},
|
||
}
|
||
|
||
@online{google:ga:features,
|
||
title = {Marketing Data Analysis \& Reporting Features},
|
||
organization = {Google},
|
||
url = {https://www.google.com/analytics/analytics/features/},
|
||
urldate = {2017-03-15},
|
||
}
|
||
|
||
@online{w3techs:analytics,
|
||
title = {Usage Stastics and Market Share of Traffic Analysis Tools for
|
||
Websites},
|
||
organization = {W3Techs},
|
||
url = {https://w3techs.com/technologies/overview/traffic_analysis/all},
|
||
urldate = {2017-03-15},
|
||
}
|
||
|
||
@online{w3techs:google,
|
||
author = {Gelbmann, Matthias},
|
||
title = {Google can't track every click of your web surfing. Only most of
|
||
them.},
|
||
organization = {W3Techs},
|
||
date = {2012-02-27},
|
||
url = {https://w3techs.com/blog/entry/google_cant_track_every_single_click_of_your_web_surfing_only_most_of_them},
|
||
urldate = {2017-03-15},
|
||
}
|
||
|
||
@online{piwik,
|
||
title = {Free Web Analytics Software},
|
||
organization = {Piwik},
|
||
url = {https://piwik.org/},
|
||
urldate = {2017-03-15},
|
||
}
|
||
|
||
@online{piwik:privacy,
|
||
title = {Web Analytics Privacy in Piwik},
|
||
organization = {Piwik},
|
||
url = {https://piwik.org/privacy/},
|
||
urldate = {2017-03-15},
|
||
}
|
||
|
||
@online{mtg:gitlab-piwik,
|
||
author = {Gerwitz, Mike},
|
||
title = {Google Analytics Removed From GitLab.com Instance},
|
||
date = {2016-01-24},
|
||
url = {https://mikegerwitz.com/2016/01/Google-Analytics-Removed-from-GitLab.com-Instance},
|
||
urldate = {2017-03-16},
|
||
}
|
||
|
||
@online{w:fb-like-img,
|
||
author = {Vt, Enoc},
|
||
title = {File:Botón Me gusta.svg},
|
||
date = {2011-10-09},
|
||
url = {https://en.wikipedia.org/wiki/File:Bot\%C3\%B3n_Me_gusta.svg},
|
||
urldate = {2017-03-16},
|
||
}
|
||
|
||
@article{pnas:predict,
|
||
author = {Kosinski, Michal
|
||
and Stillwell, David
|
||
and Graepel, Thore},
|
||
title = {Private traits and attributes are predictable from digital
|
||
records of human behavior},
|
||
journal = {PNAS},
|
||
volume = {110},
|
||
pages = {5802-5805},
|
||
doi = {10.1073/pnas.1218772110},
|
||
date = {2013-02-12},
|
||
url = {http://www.pnas.org/content/110/15/5802.full.pdf},
|
||
urldate = {2017-03-16},
|
||
}
|
||
|
||
@online{bloomberg:belgum-fb,
|
||
author = {Bodoni, Stephanie
|
||
and Martens, John},
|
||
title = {Belgium Tells Facebook to Stop Storing Personal Data From
|
||
Non-Users},
|
||
organization = {Bloomberg},
|
||
date = {2015-11-09},
|
||
url = {https://www.bloomberg.com/news/articles/2015-11-09/facebook-told-to-stop-storing-personal-data-from-belgian-surfers},
|
||
urldate = {2017-03-16},
|
||
annotation = {Surely Facebook isn't doing such a thing. Wait: ``Facebook
|
||
says it will appeal Belgian ruling to higher court''. Imagine that.}
|
||
}
|
||
|
||
@online{w:behavioral-targeting,
|
||
title = {Behavorial Tracking},
|
||
organization = {Wikipedia},
|
||
url = {https://en.wikipedia.org/wiki/Behavioral_targeting},
|
||
urldate = {2017-03-16},
|
||
}
|
||
|
||
@article{roosendaal:fb-like,
|
||
author = {Roosendaal, Arnold},
|
||
title = {Facebook Tracks and Traces Everyone: Like This!},
|
||
journaltitle = {Tilburg Law School Legal Studies Research Paper Series},
|
||
date = {2010},
|
||
doi = {10.2139/ssrn.1717563},
|
||
url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1717563},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{uld:fb,
|
||
title = {ULD to website owners: ``Deactivate Facebook web analytics''},
|
||
organization = {Unabh{\:a}ngiges Landeszentrum f{\:u}r Datenschutz
|
||
Schleswig-Holstein},
|
||
date = {2011-08-19},
|
||
url = {https://www.datenschutzzentrum.de/presse/20110819-facebook-en.htm},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{eff:browser-uniqueness-blog,
|
||
authors = {Eckersley, Peter},
|
||
title = {Is Every Browser Unique? Results Fom The Panopticlick Experiment},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2010-05-17},
|
||
url = {https://www.eff.org/deeplinks/2010/05/every-browser-unique-results-fom-panopticlick},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{eff:browser-uniqueness,
|
||
authors = {Eckersley, Peter},
|
||
title = {How Unique Is Your Web Browser?},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2010-05-17},
|
||
url = {https://panopticlick.eff.org/static/browser-uniqueness.pdf},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{eff:panopti2,
|
||
author = {Budington, Bill},
|
||
title = {Panopticlick 2.0 Launches, Featuring New Tracker Protection and
|
||
Fingerprinting Tests},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2015-12-17},
|
||
url = {https://www.eff.org/deeplinks/2015/12/panopticlick-20-launches-featuring-new-tracker-protection-and-fingerprinting-tests},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{mozilla:fingerprinting,
|
||
title = {Fingerprinting - {MozillaWiki}},
|
||
organization = {Mozilla},
|
||
url = {https://wiki.mozilla.org/Fingerprinting},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{chromium:identification,
|
||
author = {Janc, Artur
|
||
and Zalewski, Michal},
|
||
title = {Technical analysis of client identification mechanisms},
|
||
organization = {Google},
|
||
url = {https://sites.google.com/a/chromium.org/dev/Home/chromium-security/client-identification-mechanisms},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{tor:browser-design,
|
||
author = {Perry, Mike
|
||
and Clark, Erin
|
||
and Murdoch, Steven
|
||
and Koppen, Georg},
|
||
title = {The Design and Implementation of the {Tor Browser}},
|
||
organization = {Tor Project},
|
||
date = {2017-03-10},
|
||
url = {https://www.torproject.org/projects/torbrowser/design/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{stanford:private-browsing,
|
||
author = {Aggarwal, Gaurav,
|
||
and Bursztein, Elie
|
||
and Jackson, Collin
|
||
and Boneh, Dan},
|
||
title = {An Analysis of Private Browsing Modes in Modern Browsers},
|
||
organization = {Stanford University},
|
||
url = {https://crypto.stanford.edu/~dabo/pubs/papers/privatebrowsing.pdf},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{norte:tor-fingerprint,
|
||
author = {Norte, Jose Carlos},
|
||
title = {Advanced Tor Browser Fingerprinting},
|
||
date = {2016-03-06},
|
||
url = {http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{browserleaks,
|
||
title = {{BrowserLeaks.com} - Web Browser Security Checklist for Identity
|
||
Theft Protection},
|
||
url = {https://browserleaks.com/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@article{hardware-fingerprint,
|
||
author = {Cao, Yinshi
|
||
and Li, Song
|
||
and Wijmans, Erik},
|
||
title = {(Cross-)Browser Fingerprinting via OS and Hardware Level Features},
|
||
date = {2017},
|
||
doi = {10.14722/ndss.2017.23152},
|
||
url = {http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@article{ijcseit:biometric,
|
||
author = {Mudholkar, Smita S.
|
||
and Shende, Pradnya M.
|
||
and Sarode, Milind V.},
|
||
title = {Biometrics Authentication Technique for Intrustion Detection
|
||
Systems Using Fingerprint Recognition},
|
||
journal = {International Journal of Computer Science, Engineering and
|
||
Information Technology},
|
||
volume = 2,
|
||
number = 4,
|
||
doi = {10.5121/ijcseit.2012.2106},
|
||
date = {2012-02},
|
||
url = {http://airccse.org/journal/ijcseit/papers/2112ijcseit06.pdf},
|
||
urldate = {2017-03-19},
|
||
}
|
||
|
||
@online{ars:fingerprint,
|
||
author = {Goodwin, Dan},
|
||
title = {Now sites can fingerprint you online even when you use multiple
|
||
browsers},
|
||
subtitle = {Online tracking gets more accurate and harder to evade},
|
||
organization = {Ars Technica},
|
||
url = {https://arstechnica.co.uk/security/2017/02/now-sites-can-fingerprint-you-online-even-when-you-use-multiple-browsers/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{mtg:rof,
|
||
author = {Gerwitz, Mike},
|
||
title = {Restore Online Freedom!},
|
||
date = {2016-03-20},
|
||
url = {https://media.libreplanet.org/u/libreplanet/collection/restore-online-freedom/},
|
||
urldate = {2017-03-17},
|
||
annotate = {My LibrePlanet 2017 talk about issues with an increasing
|
||
non-free Web, as well as privacy and security implications
|
||
of running untrusted, unsigned, ephemeral JavaScript
|
||
code.}
|
||
}
|
||
|
||
@online{noscript,
|
||
title = {NoScript - {JavaScript}/{Java}/{Flash} blocker for a safer
|
||
Firefox experience!},
|
||
url = {https://noscript.net/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{eff:privacy-badger,
|
||
title = {Privacy Badger},
|
||
organization = {Electronic Frontier Foundation},
|
||
url = {https://www.eff.org/privacybadger},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{gh:ublock-origin,
|
||
title = {uBlock Origin},
|
||
subtitle = {An efficient blocker for {Chromium} and {Firefox}. Fast and
|
||
lean.},
|
||
url = {https://github.com/gorhill/uBlock},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{moz:sd-cookies,
|
||
title = {Self-Destructing Cookies},
|
||
url = {https://addons.mozilla.org/en-US/android/addon/self-destructing-cookies/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{lp:2016:privacy-badger,
|
||
author = {Quintin, Cooper},
|
||
title = {Ending Online Tracking! Privacy Badger and Beyond!},
|
||
organization = {Electronic Frontier Foundation},
|
||
url = {https://media.libreplanet.org/u/libreplanet/m/ending-online-tracking-privacy-badger-and-beyond/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{moz:lightbeam,
|
||
title = {Lightbeam for Firefox},
|
||
subtitle = {Shine a Light on Who's Watching You},
|
||
organization = {Mozilla},
|
||
url = {https://www.mozilla.org/en-US/lightbeam/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{tor:browser,
|
||
title = {Tor Browser},
|
||
organization = {Tor Project},
|
||
url = {https://www.torproject.org/projects/torbrowser.html.en},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{tor:overview,
|
||
title = {Tor Project: Overview},
|
||
organization = {Tor Project},
|
||
url = {https://www.torproject.org/about/overview.html.en},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{ghostery:companies,
|
||
title = {Company Database},
|
||
organization = {Ghostery Enterprise},
|
||
url = {http://www.ghosteryenterprise.com/company-database/},
|
||
urldate = {2017-03-17},
|
||
}
|
||
|
||
@online{networks-of-control,
|
||
author = {Christl, Wolfie,
|
||
and Spiekermann, Sarah},
|
||
title = {Networks of Control},
|
||
date = {2016},
|
||
url = {http://crackedlabs.org/en/networksofcontrol},
|
||
urldate = {2017-03-18},
|
||
}
|
||
|
||
@online{33c3:surveil,
|
||
author = {Christl, Wolfie},
|
||
title = {Corporare surveillance, digital tracking, big data~\&~privacy},
|
||
subtitle = {How thousands of companies are profiling, categorizing, rating
|
||
and affecting the lives of billions},
|
||
location = {33^{rd} Chaos Communication Congress},
|
||
date = {2016-12-30},
|
||
url = {https://media.ccc.de/v/33c3-8414-corporate_surveillance_digital_tracking_big_data_privacy},
|
||
urldate = {2017-03-18},
|
||
annotation = {See also \cite{networks-of-control}}
|
||
}
|
||
|
||
@online{oracle:datalogix-acq,
|
||
title = {Oracle Buys Datalogix},
|
||
subtitle = {Creates the World's Most Valuable Data Cloud to Maximize the
|
||
Power of Digital Marketing},
|
||
organization = {Oracle},
|
||
url = {http://www.oracle.com/us/corporate/acquisitions/datalogix/general-presentation-2395307.pdf},
|
||
urldate = {2017-03-18},
|
||
}
|
||
|
||
@online{lexisnexis:trueid,
|
||
title = {LexisNexis TrueID},
|
||
organization = {LexisNexis},
|
||
url = {http://www.lexisnexis.com/risk/downloads/literature/trueid.pdf},
|
||
urldate = {2017-03-18},
|
||
}
|
||
|
||
@online{techcrunch:palantir,
|
||
author = {Burns, Matt},
|
||
title = {Leaked Palantir Doc Reveals Uses, Specific Functions And Key Clients},
|
||
organization = {TechCrunch},
|
||
date = {2015-01-11},
|
||
url = {https://techcrunch.com/2015/01/11/leaked-palantir-doc-reveals-uses-specific-functions-and-key-clients/},
|
||
urldate = {2017-03-19},
|
||
}
|
||
|
||
@online{nyt:learn-secrets,
|
||
author = {Duhigg, Charles},
|
||
title = {How Companies Learn Your Secrets},
|
||
organization = {The New York Times},
|
||
date = {2016-02-16},
|
||
url = {http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html},
|
||
urldate = {2017-03-19},
|
||
}
|
||
|
||
@online{trustev:tech,
|
||
title = {TransUnion | Trustev -- Technology},
|
||
organization = {TransUnion},
|
||
url = {http://www.trustev.com/technology},
|
||
urldate = {2017-03-19},
|
||
}
|
||
|
||
@online{w:file:cell-tower,
|
||
author = {Appel, Thomas},
|
||
title = {File:T-mobile cell site},
|
||
organization = {Wikipedia},
|
||
date = {2015-09-23},
|
||
url = {https://en.wikipedia.org/wiki/File:T-Mobile_cell_site.jpg},
|
||
urldate = {2017-03-19},
|
||
}
|
||
|
||
@online{w:file:stingray,
|
||
title = {File:Stingray Harris handle side.jpg},
|
||
date = {2013-04},
|
||
organization = {Harris Corporation},
|
||
url = {https://en.wikipedia.org/wiki/File:Stingray_Harris_handle_side.jpg},
|
||
urldate = {2017-03-19},
|
||
}
|
||
|
||
@online{w:file:gps,
|
||
title = {File:GPS Satellite NASA art-iif.jpg},
|
||
date = {2006-02-09},
|
||
organization = {NASA},
|
||
url = {https://en.wikipedia.org/wiki/File:GPS_Satellite_NASA_art-iif.jpg},
|
||
urldate = {2017-03-19},
|
||
}
|
||
|
||
@online{wsj:app-loc,
|
||
title = {What They Know - Mobile - WSJ},
|
||
organization = {The Wall Street Journal},
|
||
url = {http://blogs.wsj.com/wtk-mobile/},
|
||
urldate = {2017-03-19},
|
||
annotation = {Popular apps that transmit location information in~2010},
|
||
}
|
||
|
||
@online{archive:fisa-verizon,
|
||
author = {Vinson, Roger},
|
||
title = {Foreign Intelligence Surveillance Court Ruling- Verizon},
|
||
organization = {United States Foreign Intelligence Surveillance Court},
|
||
date = {2013-04-25},
|
||
url = {https://archive.org/details/FBI-Verizon-FISA-2013},
|
||
urldate = {2017-03-20},
|
||
annotation = {The first Snowden leak showing that the United States is
|
||
performing dragnet surveillance on its citizens},
|
||
}
|
||
|
||
@online{dni:business-provs,
|
||
author = {Clapper, James R.},
|
||
title = {DNI Statement on Recent Unauthorized Disclosures of Classified
|
||
Information},
|
||
organization = {Office of the Director of National Intelligence},
|
||
date = {2013-06-06},
|
||
url = {https://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/868-dni-statement-on-recent-unauthorized-disclosures-of-classified-information},
|
||
urldate = {2017-03-20},
|
||
annotation = {Partial declassification of the ``business records'' provision of FISA.},
|
||
}
|
||
|
||
@online{guardian:verizon,
|
||
author = {Greenwald, Glenn},
|
||
title = {NSA collecting phone records of millions of Verizon customers daily},
|
||
subtitle = {Exclusive: Top secret court order requiring Verizon to hand
|
||
over all call data shows scale of domestic surveillance
|
||
under Obama},
|
||
date = {2013-06-06},
|
||
url = {https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order},
|
||
urldate = {2017-03-20},
|
||
annotation = {The original article exposing the first Snowden document.},
|
||
}
|
||
|
||
@online{eff:jewel:evidence,
|
||
title = {Summary of Voluminous Evidence, Jewel v. NSA, Case
|
||
No. 08-CV-4373-JSW},
|
||
date = {2012-12-14},
|
||
url = {https://www.eff.org/files/filenode/jewel_conformed_summary_of_evidence.pdf},
|
||
urldate = {2017-03-20},
|
||
}
|
||
|
||
@online{eff:metadata,
|
||
author = {Opsahl, Kurt},
|
||
title = {Why Metadata Matters},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2013-06-07},
|
||
url = {https://www.eff.org/deeplinks/2013/06/why-metadata-matters},
|
||
urldate = {2017-03-20},
|
||
}
|
||
|
||
@online{eff:nsa-spying,
|
||
title = {NSA Spying},
|
||
organization = {Electronic Frontier Foundation},
|
||
url = {https://www.eff.org/nsa-spying},
|
||
urldate = {2017-03-20},
|
||
}
|
||
|
||
@online{eff:samsung-tv-policy,
|
||
author = {Higgins, Parker},
|
||
title = {Big Brother Is Listening: Users Need the Ability To Teach Smart
|
||
TVs New Lessons},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2015-02-11},
|
||
url = {https://www.eff.org/deeplinks/2015/02/big-brother-listening-users-need-ability-teach-smart-tvs-new-lessons},
|
||
urldate = {2017-03-20},
|
||
}
|
||
|
||
@online{vault7:y0,
|
||
title = {Vault 7: CIA Hacking Tools Revealed},
|
||
organization = {Wikileaks},
|
||
url = {https://wikileaks.org/ciav7p1/index.html},
|
||
urldate = {2017-03-21},
|
||
}
|
||
|
||
@online{vault7:weeping,
|
||
title = {Weeping Angel (Extending) Engineering Notes,
|
||
SECRET~// REL~USA,UK},
|
||
organization = {Central Intelligence Agency},
|
||
url = {https://wikileaks.org/ciav7p1/cms/page_12353643.html},
|
||
urldate = {2017-03-20},
|
||
annotation = {Covert surveillance through Samsung Smart TVs.},
|
||
}
|
||
|
||
@online{bleep:lgtv-ransom,
|
||
author = {Cimpanu, Catalin},
|
||
title = {Android Ransomware Infects LG Smart TV},
|
||
organization = {Bleeping Computer},
|
||
url = {https://www.bleepingcomputer.com/news/security/android-ransomware-infects-lg-smart-tv/},
|
||
urldate = {2017-03-20},
|
||
annotation = {Android ransomware on an LG Smart TV.}
|
||
}
|
||
|
||
@online{engadget:murder-echo,
|
||
author = {Steele, Billy},
|
||
title = {Policy seek Amazon Echo data in murder case},
|
||
organization = {Engadget},
|
||
date = {2016-12-27},
|
||
url = {https://www.engadget.com/2016/12/27/amazon-echo-audio-data-murder-case/},
|
||
urldate = {2017-03-21},
|
||
}
|
||
|
||
@online{guardian:murder-echo,
|
||
title = {Amazon refuses to let police access US murder suspect's Echo
|
||
recordings},
|
||
subtitle = {Company has declined to provide audio recordings by smart
|
||
speaker system at house where man died, according to a
|
||
report},
|
||
organization = {The Guardian},
|
||
date = {2016-12-28},
|
||
url = {https://www.theguardian.com/technology/2016/dec/28/amazon-refuses-to-let-police-access-suspects-echo-recordings},
|
||
urldate = {2017-03-21},
|
||
}
|
||
|
||
@online{gizmodo:echo-wiretap,
|
||
author = {Novak, Matt},
|
||
title = {The FBI Can Neither Confirm Nor Deny Wiretapping Your Amazon
|
||
Echo},
|
||
organization = {Gizmodo},
|
||
date = {2016-05-11},
|
||
url = {https://paleofuture.gizmodo.com/the-fbi-can-neither-confirm-nor-deny-wiretapping-your-a-1776092971},
|
||
urldate = {2017-03-21},
|
||
}
|
||
|
||
@online{w:file:echo,
|
||
author = {Morrison, Frank},
|
||
title = {File:Amazon Echo.jpg},
|
||
organization = {Wikipedia},
|
||
date = {2014-10-17},
|
||
url = {https://en.wikipedia.org/wiki/File:Amazon_Echo.jpg},
|
||
urldate = {2017-03-21},
|
||
}
|
||
|
||
@online{guardian:doll-spy,
|
||
author = {Oltermann, Philip},
|
||
title = {German parents told to destroy doll that can spy on children},
|
||
subtitle = {German watchdog classifies My Friend Cayla doll as
|
||
`illegal espionage apparatus' and says shop owners could
|
||
face fines},
|
||
date = {2017-02-17},
|
||
organization = {The Guardian},
|
||
url = {https://www.theguardian.com/world/2017/feb/17/german-parents-told-to-destroy-my-friend-cayla-doll-spy-on-children},
|
||
urldate = {2017-03-22},
|
||
}
|
||
|
||
% I archived to Wayback Machine in case this URL vanishes
|
||
@online{onstar:privacy-policy,
|
||
title = {Privacy Statement},
|
||
organization = {OnStar},
|
||
date = {2017-01-01},
|
||
url = {https://www2.onstar.com/tunnel-web/webdav/portal/document_library/tcps/us/ps/web/20140601/en/html/privacy_statement.html},
|
||
urldate = {2017-03-21},
|
||
}
|
||
|
||
@online{binsider:ford-gps,
|
||
author = {Edwards, Jim},
|
||
title = {Ford Exec: `We Know Everyone Who Breaks The Law' Thanks To Our
|
||
GPS In Your Car},
|
||
organization = {Business Insider},
|
||
date = {2014-01-08},
|
||
url = {http://www.businessinsider.com/ford-exec-gps-2014-1},
|
||
urldate = {2017-03-21},
|
||
}
|
||
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
%%%% POST-PRESENTATION %%%%%%%%%%%%%%%%
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
@online{verizon-spyware,
|
||
author = {Budington, Bill
|
||
and Gillula, Jeremy
|
||
and Tummarello, Kate},
|
||
title = {The {First Horseman} of the Privacy Apocalypse Has Already Arrived:
|
||
{Verizon} Announces Plans to Install Spyware on All Its
|
||
{Android} Phones},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2017-03-30},
|
||
url = {https://www.eff.org/deeplinks/2017/03/first-horseman-privacy-apocalypse-has-already-arrived-verizon-announces-plans},
|
||
urldate = {2017-03-30},
|
||
tags = {advertising, appflash, geolocation, location, mobile, privacy,
|
||
spyware, tracking, verizon},
|
||
annotation = {Less than 48~hours after Congress recended Internet privacy
|
||
protections, Verizon intends to install spyware on users'
|
||
Android devices},
|
||
}
|
||
|
||
@online{sec-https-mitm,
|
||
author = {Durumeric, Zakir
|
||
and Ma, Zane
|
||
and Springall, Drew
|
||
and Barnes, Richard
|
||
and Sullivan, Nick
|
||
and Bursztein, Elie
|
||
and Bailey, Michael
|
||
and Halderman, J.~Alex
|
||
and Paxson, Vern},
|
||
title = {The Security Impact of HTTPS Interception},
|
||
doi = {10.14722/ndss.2017.23456},
|
||
date = {2017},
|
||
organization = {University of Michigan
|
||
and University of Illinois Urbana-Champaig,
|
||
and Mozilla
|
||
and Cloudflare
|
||
and Google
|
||
and University of California Berkeley
|
||
and International Computer Science Institute},
|
||
url = {https://zakird.com/papers/https_interception.pdf},
|
||
urldate = {2017-04-02},
|
||
tags = {https, mitm, security, privacy, antivirus, detection,
|
||
cryptography},
|
||
}
|
||
|
||
@online{eff:smart-meter,
|
||
author = {Gullo, Karen
|
||
and Williams, Jamie},
|
||
title = {An {Illinois} Court Just Didn’t Get It: We Are Entitled to Expect
|
||
Privacy In Our Smart Meter Data, Which Reveals What’s
|
||
Going On Inside Our Homes},
|
||
organization = {Electronic Frontier Foundation},
|
||
date = {2017-03-01},
|
||
url = {https://www.eff.org/deeplinks/2017/03/illinois-court-just-didnt-get-it-we-are-entitled-expect-privacy-our-smart},
|
||
urldate = {2017-04-02},
|
||
tags = {iot, personal data, privacy, fourth amendment, court,
|
||
illinois, district court, naperville, court of appeals,
|
||
seventh circuit, privacy international}
|
||
}
|
||
|
||
@online{register:w10-privacy,
|
||
author = {Thomson, Lain},
|
||
title = {Put down your coffee and admire the sheer amount of data
|
||
{Windows 10 Creators Update} will slurp from your {PC}},
|
||
subtitle = {Official list of phoned-home info revealed by {Microsoft}},
|
||
organization = {The Register},
|
||
date = {2017-04-06},
|
||
url = {https://web.archive.org/save/https://www.theregister.co.uk/2017/04/06/microsoft_windows_10_creators_update/},
|
||
urldate = {2017-04-07},
|
||
annotation = {Archive.org link used because The~Register blocks
|
||
Tor~users unless they execute proprietary JavaScript.},
|
||
}
|
||
|
||
@online{nsa:windows-0day,
|
||
author = {Biddle, Sam},
|
||
title = {Leaked {NSA} Malware Threatens {Windows} Users Around the World},
|
||
organization = {The Intercept},
|
||
date = {2017-04-14},
|
||
url = {https://theintercept.com/2017/04/14/leaked-nsa-malware-threatens-windows-users-around-the-world/},
|
||
urldate = {2017-04-15},
|
||
tags = {0day, esteemaudit, fuzzbunch, malware, nsa, oddjob, security,
|
||
shadow brokers, tailored access operations, tao, windows,
|
||
zippybeer},
|
||
}
|
||
|
||
@online{bk-not-ok-google,
|
||
author = {Titcomb, James},
|
||
title = {Not OK, Google: Burger King advert designed to hijack Google Home
|
||
speakers backfires},
|
||
organization = {Yahoo!},
|
||
date = {2017-04-13}
|
||
url = {https://m.yahoo.com/w/legobpengine/finance/news/not-ok-google-burger-king-084506757.html?.intl=us&.lang=en-us},
|
||
urldate = {2017-04-16},
|
||
tags = {burger king, comercial, google, google home, privacy, security,
|
||
whopper, wikipedia},
|
||
}
|
||
|
||
@online{ms:windows-diagnostic,
|
||
author = {Lich, Brian},
|
||
title = {Windows 10, version~1703 Diagnostic Data},
|
||
organization = {Microsoft},
|
||
date = {2017-04-05},
|
||
url = {https://technet.microsoft.com/itpro/windows/configure/windows-diagnostic-data},
|
||
urldate = {2017-04-20},
|
||
tags = {privacy, security, windows, what the fuck, surveillance,
|
||
exfiltrate},
|
||
}
|
||
|
||
@online{guardian:uber-godview,
|
||
author = {Hern, Alex},
|
||
title = {Uber employees `spied on ex-partners, politicians
|
||
and {Beyoncé}'},
|
||
subtitle = {Cab startup’s former forensic investigator Samuel Ward
|
||
Spangenberg claims he was fired from the company after
|
||
blowing whistle on lack of security},
|
||
organization = {The Guardian},
|
||
date = {2016-12-13},
|
||
url = {https://www.theguardian.com/technology/2016/dec/13/uber-employees-spying-ex-partners-politicians-beyonce},
|
||
urldate = {2017-04-26},
|
||
}
|
||
|
||
@online{fpcentral,
|
||
url = {https://fpcentral.irisa.fr/},
|
||
}
|
||
|
||
@online{sensor-side-channel,
|
||
url = {https://blogs.ncl.ac.uk/security/author/b2031864/},
|
||
}
|
||
|
||
@online{ambient-light,
|
||
url = {https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/},
|
||
}
|
||
|
||
@online{arixv:airgap-scanner,
|
||
url = {https://arxiv.org/abs/1703.07751},
|
||
}
|
||
|
||
@online{bloomberg:pacemaker-st-jude,
|
||
url = {https://www.bloomberg.com/news/articles/2016-08-25/carson-block-takes-on-st-jude-medical-with-claim-of-hack-risk},
|
||
}
|
||
|
||
@online{silverpush-unmasked,
|
||
url = {https://github.com/MAVProxyUser/SilverPushUnmasked},
|
||
}
|
||
|
||
% specifically, see references
|
||
@online{ss7,
|
||
url = {https://en.wikipedia.org/wiki/Signalling_System_No._7#Protocol_security_vulnerabilities},
|
||
}
|
||
|
||
@online{ars:hajime-botnet,
|
||
url = {https://arstechnica.com/security/2017/04/a-vigilante-is-putting-huge-amount-of-work-into-infecting-iot-devices/},
|
||
}
|
||
|
||
% oh, imagine that
|
||
@online{intel:me-priv-escal,
|
||
url = {https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr},
|
||
}
|
||
|
||
% no password needed!
|
||
@online{ars:intel-amt,
|
||
url = {https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/},
|
||
}
|
||
|
||
@online{eff:intel-amt,
|
||
url = {https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it},
|
||
}
|
||
|
||
@online{eff:nhtsa-v2v,
|
||
url = {https://www.eff.org/deeplinks/2017/05/danger-ahead-governments-plan-vehicle-vehicle-communication-threatens-privacy},
|
||
}
|
||
|
||
@online{nyt:ransom-world,
|
||
url = {https://mobile.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html?smprod=nytcore-iphone&smid=nytcore-iphone-share&_r=1&referer=https://www.rt.com/news/388153-thousands-ransomeware-attacks-worldwide/},
|
||
}
|
||
|
||
@online{lat:google-offline,
|
||
url = {http://www.latimes.com/business/technology/la-fi-tn-google-ads-tracking-20170523-story.html},
|
||
}
|
||
|
||
@online{giz:ice-imsi,
|
||
url = {https://gizmodo.com/ice-agents-are-using-stingray-surveillance-tech-to-capt-1795377902},
|
||
}
|
||
|
||
@online{eff:vep-patch,
|
||
url = {https://www.eff.org/deeplinks/2017/05/congress-imperfect-start-addressing-vulnerabilities},
|
||
}
|
||
|
||
@online{xato:windows-spying,
|
||
url = {https://xato.net/windows-spying-and-a-twitter-rant-19203babb2e7},
|
||
}
|
||
|
||
@online{insider-surveillance,
|
||
url = {https://insidersurveillance.com/about-us/},
|
||
}
|
||
|
||
@online{ccc:iris,
|
||
url = {https://www.ccc.de/en/updates/2017/iriden},
|
||
}
|
||
|
||
@online{eff:aadhaar,
|
||
url = https://www.eff.org/deeplinks/2017/05/aadhaar-ushering-commercialized-era-surveillance-india,
|
||
}
|
||
|
||
@online{twitter:theresa-may-human-rights,
|
||
url = {https://twitter.com/theresa_may/status/872181737933217794},
|
||
}
|
||
|
||
@online{ars:uk-afr,
|
||
url = {https://arstechnica.com/tech-policy/2017/06/police-automatic-face-recognition/},
|
||
}
|
||
|
||
@online{theage:turnball-crypto-war,
|
||
url = {http://www.theage.com.au/federal-politics/political-news/how-the-turnbull-government-plans-to-access-encrypted-messages-20170609-gwoge0.html},
|
||
}
|
||
|
||
@online{tfreak:russia-tor-vpn,
|
||
url = {https://torrentfreak.com/bill-to-ban-vpns-unmask-operators-submitted-to-russias-parliament-170609/},
|
||
}
|
||
|
||
@online{bleep:malware-intel-me,
|
||
url = {https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/},
|
||
}
|
||
|
||
@online{guardian:brandis-hw-backdoor,
|
||
url = {https://www.theguardian.com/technology/2017/jun/12/george-brandiss-salvo-in-cryptowars-could-blow-a-hole-in-architecture-of-the-internet},
|
||
}
|
||
|
||
@online{p1sec:volte,
|
||
url = {https://www.sstic.org/media/SSTIC2017/SSTIC-actes/remote_geolocation_and_tracing_of_subscribers_usin/SSTIC2017-Article-remote_geolocation_and_tracing_of_subscribers_using_4g_volte_android_phone-le-moal_ventuzelo_coudray.pdf}
|
||
}
|
||
|
||
@online{ucsd:getoffmycloud,
|
||
url = {https://cseweb.ucsd.edu/~hovav/dist/cloudsec.pdf},
|
||
}
|
||
|
||
@online{ncc:time-trial,
|
||
url = {https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/TimeTrial.pdf},
|
||
}
|
||
|
||
@online{upguard:rnc-analytics,
|
||
url = {https://www.upguard.com/breaches/the-rnc-files}
|
||
}
|
||
|
||
@online{bbc:eu-e2e-enc,
|
||
url = {http://www.bbc.com/news/technology-40326544}
|
||
}
|
||
|
||
@online{krebs:petya,
|
||
url = {https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/}
|
||
}
|
||
|
||
@online{threatpost:petya,
|
||
url = {https://threatpost.com/complex-petya-like-ransomware-outbreak-worse-than-wannacry/126561/}
|
||
}
|
||
|
||
@online{securelist:petya,
|
||
url = {https://securelist.com/schroedingers-petya/78870/}
|
||
}
|
||
|
||
@online{wired:cia-wifi-tracking,
|
||
url = {https://www.wired.com/story/wikileaks-cia-wifi-location-tracking}
|
||
}
|
||
|
||
@online{china-apple-user-data,
|
||
url = {https://www.hongkongfp.com/2017/06/08/china-uncovers-massive-underground-network-apple-employees-selling-customers-personal-data/}
|
||
}
|
||
|
||
@online{sat-observation,
|
||
url = {https://satelliteobservation.wordpress.com/2017/06/04/signal-intelligence-101-sigint-targets/}
|
||
}
|
||
|
||
@online{aclu:student-spy-laptops,
|
||
url = {https://www.aclu.org/blog/speak-freely/rhode-island-some-schools-think-they-have-right-spy-students-school-laptops}
|
||
}
|
||
|
||
@online{eff:student-spy-report-2017,
|
||
url = {https://www.eff.org/wp/school-issued-devices-and-student-privacy}
|
||
}
|
||
|
||
@online{aclu:school-privacy-report,
|
||
url = {http://riaclu.org/images/uploads/ACLU_1-1_School_Privacy_Report_Final.pdf}
|
||
}
|
||
|
||
@online{ars:cia-cherryblossom,
|
||
url = {https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/}
|
||
}
|
||
|
||
@online{vault7:cherryblossom,
|
||
url = {https://wikileaks.org/vault7/document/SRI-SLO-FF-2012-177-CherryBlossom_UsersManual_CDRL-12_SLO-FF-2012-171/}
|
||
}
|
||
|
||
@online{aes-tempest,
|
||
url = {https://www.fox-it.com/nl/wp-content/uploads/sites/12/Tempest_attacks_against_AES.pdf}
|
||
}
|
||
|
||
@online{brennan:foreign-interfere,
|
||
url = {https://www.brennancenter.org/sites/default/files/publications/Foreign\%20Interference_0629_1030_AM.pdf},
|
||
}
|
||
|
||
@online{myshadow,
|
||
url = {https://myshadow.org/},
|
||
}
|
||
|
||
@online{motherboard:apple-bug-bounty,
|
||
url = {https://motherboard.vice.com/en_us/article/gybppx/iphone-bugs-are-too-valuable-to-report-to-apple},
|
||
}
|
||
|
||
@online{eff:australia-pm-e2e-ban,
|
||
url = {https://www.eff.org/deeplinks/2017/07/australian-pm-calls-end-end-encryption-ban-says-laws-mathematics-dont-apply-down},
|
||
}
|
||
|
||
@online{eff:cbp-remote-content,
|
||
url = {https://www.eff.org/deeplinks/2017/07/cbp-responds-sen-wyden-border-agents-may-not-search-travelers-cloud-content},
|
||
}
|
||
|
||
@online{engadget:roomba-map,
|
||
url = {https://www.engadget.com/2017/07/24/roomba-irobot-sell-digital-maps-home/},
|
||
}
|
||
|
||
@online{nytimes:sweden-ibm-breach,
|
||
url = {https://www.nytimes.com/2017/07/25/world/europe/ibm-sweden-data-outsourcing.html},
|
||
}
|
||
|
||
@online{cell-tracking-how,
|
||
url = {https://thehftguy.com/2017/07/19/what-does-it-really-take-to-track-100-million-cell-phones/},
|
||
}
|
||
|
||
@online{threatpost:adups,
|
||
url = {https://threatpost.com/android-sypware-still-collects-pii-despite-outcry/127042/},
|
||
}
|
||
|
||
@online{threatpost:rad-mon-nopatch,
|
||
url = {https://threatpost.com/vulnerable-radiation-monitoring-devices-wont-be-patched/126967/},
|
||
}
|
||
|
||
@online{ars:lipizzan,
|
||
url = {https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/},
|
||
}
|
||
|
||
@online{sophos:sms-exfiltrate,
|
||
url = {https://nakedsecurity.sophos.com/2017/07/27/dont-want-your-smss-stolen-dont-download-these-android-apps/},
|
||
}
|
||
|
||
@online{psmag:resturaunt-surveil,
|
||
url = {https://psmag.com/economics/your-favorite-restaurants-are-surveilling-you},
|
||
}
|
||
|
||
@online{wapo:google-shop-track,
|
||
url = {https://www.washingtonpost.com/news/the-switch/wp/2017/05/23/google-now-knows-when-you-are-at-a-cash-register-and-how-much-you-are-spending/?utm_term=.5959c4d7b4f0},
|
||
}
|
||
|
||
@online{wapo:google-shop-track-fed,
|
||
url = {https://www.washingtonpost.com/news/the-switch/wp/2017/07/30/googles-new-program-to-track-shoppers-sparks-a-federal-privacy-complaint/},
|
||
}
|
||
|
||
@online{voting-crack-defcon,
|
||
url = {https://blog.horner.tj/post/hacking-voting-machines-def-con-25},
|
||
}
|
||
|
||
@online{electrek:keenlab-tesla-again,
|
||
url = {https://electrek.co/2017/07/28/tesla-hack-keen-lab/},
|
||
tags = {vehicle},
|
||
}
|
||
|
||
@online{keenlab:tesla-again,
|
||
url = {http://keenlab.tencent.com/en/2017/07/27/New-Car-Hacking-Research-2017-Remote-Attack-Tesla-Motors-Again/},
|
||
tags = {vehicle},
|
||
}
|
||
|
||
@online{ars:zerodium-mobile,
|
||
url = {https://arstechnica.com/information-technology/2017/08/wanted-weaponized-exploits-that-hack-phones-will-pay-top-dollar/},
|
||
}
|
||
|
||
@online{zdnet:accuweather-spy,
|
||
url = {http://www.zdnet.com/article/accuweather-still-shares-precise-location-with-advertisers-tests-reveal/},
|
||
}
|
||
|
||
@online{delete-fb,
|
||
url = {http://www.deletefacebook.com/},
|
||
}
|
||
|
||
@online{techcrunch:voting-dre-decommission,
|
||
url = {https://techcrunch.com/2017/09/08/virginia-dre-voting-machines-hack/},
|
||
}
|
||
|
||
@online{eff:dhs-lawsuit,
|
||
url = {https://www.eff.org/press/releases/eff-aclu-media-conference-call-today-announce-lawsuit-over-warrantless-phone-and},
|
||
}
|
||
|
||
@online{dolphinattack,
|
||
title = {DolphinAttack: Inaudible Voice Commands},
|
||
url = {https://endchan.xyz/.media/50cf379143925a3926298f881d3c19ab-applicationpdf.pdf},
|
||
}
|
||
|
||
@online{vice:facial-obscured,
|
||
title = {{AI} Will Soon Identify Protesters With Their Faces Partly Concealed},
|
||
url = {https://motherboard.vice.com/en_us/article/mbby88/ai-will-soon-identify-protesters-with-their-faces-partly-concealed},
|
||
}
|
||
|
||
@online{eff:ios-wifi-off,
|
||
title = {{iOS} 11’s Misleading “Off-ish” Setting for {Bluetooth} and {Wi-Fi} is Bad for User Security},
|
||
url = {https://www.eff.org/deeplinks/2017/10/ios-11s-misleading-ish-setting-bluetooth-and-wi-fi-bad-user-security},
|
||
}
|
||
|
||
@online{apolice:google-home-mini,
|
||
title = {Google is nerfing all {Home Minis} because mine spied on everything I said 24/7},
|
||
url = {http://www.androidpolice.com/2017/10/10/google-nerfing-home-minis-mine-spied-everything-said-247/},
|
||
notes = {It does not matter whether these types of devices have bugs,
|
||
deliberate or not: the point is that such things are
|
||
possible, and then can indeed be used as surveillance devices.}
|
||
}
|
||
|
||
@online{reuters:symantic-code-review,
|
||
title = {Exclusive: {Symantec} {CEO} says source code reviews pose unacceptable risk},
|
||
url = {http://www.reuters.com/article/us-usa-cyber-russia-symantec/exclusive-symantec-ceo-says-source-code-reviews-pose-unacceptable-risk-idUSKBN1CF2SB},
|
||
}
|
||
|
||
@online{oneplus-spyware,
|
||
url = {https://www.chrisdcmoore.co.uk/post/oneplus-analytics/},
|
||
}
|
||
|
||
@online{reuters:equifax-tp-scripts,
|
||
title = {Equifax says systems not compromised in latest cyber scare},
|
||
url = {http://www.reuters.com/article/us-equifax-breach/equifax-takes-down-web-page-after-reports-of-new-hack-idUSKBN1CH2F3},
|
||
notes = {Surprise, you can't trust third-party scripts.}
|
||
}
|
||
|
||
% ethics
|
||
@online{motherboard:pornhub-ai,
|
||
title = {Facial Recognition for Porn Stars Is a Privacy Nightmare Waiting to Happen},
|
||
subtitle = {The underlying tech being used by Pornhub could one day be
|
||
used by more nefarious actors to identify amateur and
|
||
unwitting porn models},
|
||
url = {https://motherboard.vice.com/en_us/article/a3kmpb/facial-recognition-for-porn-stars-is-a-privacy-nightmare-waiting-to-happen},
|
||
}
|
||
|
||
% ethics
|
||
@online{gizmodo:facebook-sex-workers,
|
||
title = {How Facebook Outs Sex Workers},
|
||
url = {https://gizmodo.com/how-facebook-outs-sex-workers-1818861596},
|
||
}
|
||
|
||
% ethics
|
||
@online{pew:automation,
|
||
title = {Automation in Everyday Life},
|
||
subtitle = {Americans express more worry than enthusiasm about coming
|
||
developments in automation---from driverless vehicles to a
|
||
world in which machines perform many jobs currently done by
|
||
humans},
|
||
url = {http://www.pewinternet.org/2017/10/04/automation-in-everyday-life/},
|
||
}
|
||
|
||
@online{techcrunch:uk-social-media,
|
||
title = {UK spies using social media data for mass surveillance},
|
||
author = {Lomas, Natasha},
|
||
url = {https://techcrunch.com/2017/10/17/uk-spies-using-social-media-data-for-mass-surveillance/},
|
||
urldate = {2017-10-18},
|
||
archive = {https://web.archive.org/web/20171018053036/},
|
||
}
|
||
|
||
@online{medium:telco-tracking,
|
||
title = {Want to see something crazy? Open this link on your phone with WiFi turned off.},
|
||
author = {philipn},
|
||
url = {https://medium.com/@philipn/want-to-see-something-crazy-open-this-link-on-your-phone-with-wifi-turned-off-9e0adb00d024},
|
||
urldate = {2017-10-18},
|
||
archive = {https://web.archive.org/web/20171018053425/},
|
||
}
|
||
|
||
@online{krackattacks,
|
||
title = {Key Reinstallation Attacks},
|
||
subtitle = {Breaking {WPA2} by forcing nonce reuse},
|
||
url = {https://www.krackattacks.com/},
|
||
urldate = {2017-10-18},
|
||
archive = {https://web.archive.org/web/20171018050741/},
|
||
}
|