sapsf/sapsf.bib

1232 lines
44 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

@online{panopti:about,
author = {Electric Frontier Foundation},
title = {Panopticlick | About},
url = {https://panopticlick.eff.org/about},
urldate = {2017-03-08},
}
@online{tor:tails,
title = {Tails - Privacy for anyone anywhere},
organization = {Tor Project},
url = {https://tails.boum.org/},
urldate = {2017-03-18},
}
@online{whonix,
title = {Whonix},
organization = {Whonix},
url = {https://www.whonix.org/},
urldate = {2017-03-18},
}
@online{whonix:donot,
author = {Whonix},
title = {DoNot},
url = {https://www.whonix.org/wiki/DoNot},
urldate = {2017-03-05}
}
@online{tor,
author = {Tor Project},
title = {Tor Project: Anonymity Online},
url = {http://torproject.org/},
urldate = {2017-03-09},
}
@online{eff:nsa:timeline,
author = {Electronic Frontier Foundation},
title = {Timeline of NSA Domestic Spying},
url = {https://www.eff.org/nsa-spying/timeline},
urldate = {2017-03-09},
}
@online{mtg:uproar,
author = {Mike Gerwitz},
title = {National Uproar: A Comprehensive Overview of the
NSA Leaks and Revelations},
url = {https://mikegerwitz.com/2013/06/National-Uproar-A-Comprehensive-Overview-of-the-NSA-Leaks-and-Revelations},
month = 06,
year = 2013,
urldate = {2017-03-09},
}
@online{eff:bernstein:doj,
author = {Electronic Frontier Foundation},
title = {Bernstein v. US Department of Justice},
url = {https://www.eff.org/cases/bernstein-v-us-dept-justice},
urldate = {2017-03-09},
}
% TODO: figure out how to render the URL
@techreport{poodle:paper,
author = {Möller, Brodo and Duong, Thai and Kotowicz, Krzysztof},
title = {This POODLE Bites: Exploiting the SSL 3.0 Fallback},
institution = {Google},
year = 2014,
month = Sep,
url = {https://www.openssl.org/~bodo/ssl-poodle.pdf},
}
@online{w:crypto-wars,
organization = {Wikipedia},
title = {Crypto Wars},
url = {https://en.wikipedia.org/wiki/Crypto_wars},
urldate = {2017-03-10},
}
@online{fedr:export-controls,
author = {Executive Office of the President},
title = {Administration of Export Controls on Encryption Products},
url = {https://www.gpo.gov/fdsys/pkg/FR-1996-11-19/pdf/96-29692.pdf},
urldate = {2017-03-10},
month = 11,
year = 1996,
note = {Federal Register, Vol. 61, No. 224, Executive Order 58767},
}
@online{doc:rev-export-reg,
author = {United States Department of Commerce},
title = {Revised U.S. Encryption Export Regulations},
url = {https://epic.org/crypto/export_controls/regs_1_00.html},
month = 01,
year = 2000,
urldate = {2017-03-10},
}
@online{arxiv:mac,
author = {Martin, Jeremy
and Mayberry, Travis
and Donahue, Collin
and Foppe, Lucas,
and Brown, Lamont
and Riggins, Chadwick
and Rye, Erik C.
and Brown, Dane},
title = {A Study of MAC Address Randomization in Mobile Devices and When it Fails},
year = 2017,
month = 03,
archivePrefix= {arXiv},
eprint = {1703.02874},
primaryClass = {cs.CR},
}
@online{aimsid,
author = {CellularPrivacy},
title = {Android IMSI-Catcher Detector},
url = {https://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/},
urldate = {2017-03-11},
}
@online{osmand,
title = {OsmAnd - Offline Mobile Maps and Navigation},
url = {http://osmand.net/},
urldate = {2017-03-11},
}
@online{mozilla:loc-services,
author = {MozillaWiki},
title = {CloudServices/Location - MozillaWiki},
url = {https://wiki.mozilla.org/CloudServices/Location},
urldate = {2017-03-11},
}
@online{openmobilenetwork,
title = {OpenMobileNetwork},
url = {http://www.openmobilenetwork.org/},
urldate = {2017-03-11},
}
@online{w:wps,
organization = {Wikipedia},
title = {Wi-Fi positioning system},
url = {https://en.wikipedia.org/wiki/Wi-Fi_positioning_system},
urldate = {2017-03-11},
}
@online{w:trilateration,
organization = {Wikipedia},
title = {Trilateration},
url = {https://en.wikipedia.org/wiki/Trilateration},
urldate = {2017-03-11},
}
@article{acm:spotfi,
author = {Kotaru, Manikanta
and Joshi, Kiran
and Bharadia, Dinesh
and Katti, Sachin},
title = {{SpotFi}: Decimeter Level Localization Using {WiFi}},
journal = {{ACM} {SIGCOMM} Computer Communication Review - {SIGCOMM'15}},
doi = {10.1145/2785956.2787487},
volume = 45,
pages = {269-282},
year = 2015,
}
@article{acm:lteye,
author = {Kumar, Swarun
and Hamed, Ezzeldin
and Katabi, Dina
and Li, Li Erran},
title = {{LTE} radio analytics made easy and accessible},
journal = {{S3 '14} Proceedings of the 6th annual workshop on Wireless of
the students, by the students, for the students},
doi = {10.1145/2645884.2645891},
pages = {29-30},
year = 2014,
}
@online{replicant,
author = {Replicant},
title = {Replicant},
url = {http://www.replicant.us},
urldate = {2017-03-11},
annotation = {A fully free Android distribution}
}
@online{replicant:sec,
author = {Replicant},
title = {Freedom and privacy/security issues},
url = {http://www.replicant.us/freedom-privacy-security-issues.php},
urldate = {2017-03-11},
}
@online{replicant:samsung-bd,
author = {Replicant},
title = {Samsung Galaxy back-door},
url = {http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor},
urldate = {2017-03-11},
annotation = {Backdoor in Samsung Galaxy phones closed by Replicant},
}
@online{gnu:malware-mobile,
author = {GNU Project},
title = {Malware in Mobile Devices},
url = {https://www.gnu.org/philosophy/malware-mobiles.html},
urldate = {2017-03-11},
annotation = {Numerous resources on privacy/security issues with mobile
devices}
}
@online{jots:mobile,
author = {Jinyan Zang
and Krysta Dummit
and James Graves
and Paul Lisker
and Latanya Sweeney},
title = {Who Knows What About Me? A Survey of Behind the Scenes Personal
Data Sharing to Third Parties by Mobile Apps},
url = {http://jots.pub/a/2015103001/index.php},
urldate = {2017-03-11},
}
@online{kryptowire:adups,
author = {Kryptowire},
title = {KRYPTOWIRE DISCOVERS MOBILE PHONE FIRMWARE THAT TRANSMITTED
PERSONALLY IDENTIFIABLE INFORMATION (PII) WITHOUT USER
CONSENT OR DISCLOSURE},
url = {http://www.kryptowire.com/adups_security_analysis.html},
urldate = {2017-03-11},
annotation = {BLU mobile phones transmitting SMS content, contacts, call
history, telephone numbers, IMEIs, etc to third-party
servers without users' knolwedge or censent}
}
@online{intercept:nyc-surveil,
author = {Currier, Cora},
title = {A Walking Tour of New York's Massive Surveillance Network},
organization = {The Intercept},
date = {2016-09-24},
url = {https://theintercept.com/2016/09/24/a-walking-tour-of-new-yorks-massive-surveillance-network/},
urldate = {2017-03-12},
}
@online{shodan,
title = {Shodan},
subtitle = {The search engine for the Internet of Things},
url = {https://shodan.io},
urldate = {2017-03-12},
}
@online{krebs:mongodb,
author = {Krebs, Brian},
title = {Extortionists Wipe Thousands of Databases,
Victims Who Pay Up Get Stiffed},
url = {https://krebsonsecurity.com/2017/01/extortionists-wipe-thousands-of-databases-victims-who-pay-up-get-stiffed/},
urldate = {2017-03-12},
}
@online{insecam,
title = {Insecam - World biggest online cameras directory},
url = {http://insecam.org},
urldate = {2017-03-19},
annotation = {Load the HTTP (non-HTTPS) site, otherwise mixed content is
blocked and thumbnails will not work.}
}
@article{ieee:gait,
author = {Rogez, Gr\'egory
and Rihan, Jonathan
and Guerrero, Jose J.},
title = {Monocular {3D} Gait Tracking in Surveillance Scenes},
journal = {IEEE Transactions on Cybernetics},
url = {http://vision.ics.uci.edu/papers/RogezRGO_Cybernetics_2013/RogezRGO_Cybernetics_2013.pdf}
}
@article{ijca:gait,
author = {Vaidya, Sonali
and Shah, Kamal},
title = {Real Time Video Surveillance System},
journal = {International Journal of Computer Applications},
volume = 86,
pages = {22-27},
year = 2014,
url = {http://research.ijcaonline.org/volume86/number14/pxc3893419.pdf},
annotation = {Discusses realtime gait analysis for video surveillance},
}
@online{newsci:fb-noface,
author = {Rutkin, Aviva},
title = {Facebook can recognize you in photos even if you're not looking},
organization = {New Scientist},
url = {https://www.newscientist.com/article/dn27761-facebook-can-recognise-you-in-photos-even-if-youre-not-looking/},
urldate = {2017-03-12},
}
@online{rms:facebook,
author = {Stallman, Richard},
title = {Reasons not to use (i.e., be used by) {Facebook}},
url = {https://stallman.org/facebook.html},
urldate = {2017-03-12},
}
@online{register:fb-scan,
author = {Chirgwin, Richard},
title = {Facebook conjures up a trap for the unwary: scanning your camera
for your friends},
subtitle = {Auto-spam your friends with Photo Magic},
organization = {The Register},
url = {https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/},
urldate = {2017-03-12},
annotation = {Archive.org link used because The~Register blocks
Tor~users unless they execute proprietary JavaScript.},
}
@online{guardian:fb-scan,
author = {Arthur, Charles},
title = {Facebook in new privacy row over facial recognition feature},
subtitle = {Social network turns on new feature to automatically identify
people in photos, raising questions about privacy
implications of the service},
organization = {The Guardian},
date = {2011-06-08},
url = {https://www.theguardian.com/technology/2011/jun/08/facebook-privacy-facial-recognition},
urldate = {2017-03-12},
}
@online{techcrunch:fb-baby,
author = {Constine, Josh},
title = {Facebooks New Photo “Scrapbook” Lets Parents Give Kids An
Official Presence},
organization = {TechCrunch},
date = {2016-03-31},
url = {https://techcrunch.com/2015/03/31/step-1-identify-baby-photo-step-2-hide-baby-photos/},
urldate = {2017-03-12},
annotation = {Facebook tricks users into violating their child's privacy
before they have any say in the matter.},
}
@online{eff:ios-photo-diff,
author = {Gebhart, Gennie
and Grant, Starchy
and Portnov, Erica},
title = {Facial Recognition, Differential Privacy, and Trade-Offs in
Apple's Latest OS Releases},
organization = {Electronic Frontier Foundation},
date = {2016-09-27},
url = {https://www.eff.org/deeplinks/2016/09/facial-recognition-differential-privacy-and-trade-offs-apples-latest-os-releases},
urldate = {2017-03-12},
}
@online{churchix,
title = {Churchix Facial Recognition Software},
subtitle = {Churchix Facial Recognition Software for Event Attendance},
url = {http://churchix.com/},
urldate = {2017-03-12},
annotation = {This software is cited for illustration; do~not use it.}
}
@online{facefirst,
title = {Face Recognition Software for Retail Stores: \#1~Biometric
Surveillance for Loss Prevention},
url = {https://www.facefirst.com/industry/retail-face-recognition/},
urldate = {2017-03-12},
annotation = {Full-page loading spinner does not remove itself without
running non-free JavaScript; remove it manually using a
web browser with a~debugger. This software is cited for
illustration; do~not use it.},
}
@online{bio:iris,
title = {Hacker extracts Merkel's iris image},
organization = {Planet Biometrics},
date = {2015-11-30},
url = {http://www.planetbiometrics.com/article-details/i/3644/},
urldate = {2017-03-12},
}
@online{eff:facial-tech,
author = {Schwartz, Adam},
title = {The Danger of Corporate Facial Recognition Tech},
subtitle = {The Illinois Biometric Privacy Statute Survived a Recent
Attack. But the Struggle Continues},
organization = {Electronic Frontier Foundation},
date = {2016-06-07},
url = {https://www.eff.org/deeplinks/2016/06/danger-corporate-facial-recognition-techgg},
urldate = {2017-03-12},
}
@online{eff:fbi-bio,
author = {Lynch, Jennifer},
title = {New Report: FBI Can Access Hundreds of Millions of Face
Recognition Photos},
organization = {Electronic Frontier Foundation},
date = {2016-06-15},
url = {https://www.eff.org/deeplinks/2016/06/fbi-can-search-400-million-face-recognition-photos},
urldate = {2017-03-12},
}
@online{cbs:sf-smile,
author = {Borba, Andria},
title = {Nowhere To Hide: Few Public Places Without Surveillance Cameras
In San Francisco},
organization = {CBS},
date = {2015-09-24},
url = {http://sanfrancisco.cbslocal.com/2015/09/24/san-francisco-surveillance-camera-tenderloin/},
urldate = {2017-03-12},
}
@online{pbs:nova:boston,
author = {O'Brien, Michael
and Cort, Julia},
title = {Manhunt---{Boston Bombers}},
subtitle = {Which technologies worked—and which didn't---in the race to
track down the men behind the marathon attack?},
organization = {WGBH Educational Foundation},
date = {2013-05-29},
url = {http://www.pbs.org/wgbh/nova/tech/manhunt-boston-bombers.html},
urldate = {2017-03-13},
annotation = {Specificall, pay attention to the Domain Awareness System
and other surveillance capabilities. Transcript
available.},
}
@online{reuters:nypd-das,
author = {Francescani, Chris},
title = {NYPD expands surveillance net to fight crime as well as terrorism},
organization = {Reuters},
date = {2013-06-21},
url = {http://www.reuters.com/article/usa-ny-surveillance-idUSL2N0EV0D220130621},
urldate = {2017-03-13},
}
@online{wired:pixel-face,
author = {Newman, Lily Hay},
title = {AI Can Recognize Your Face Even If Youre Pixelated},
organization = {Wired},
date = {2016-09-12},
url = {https://www.wired.com/2016/09/machine-learning-can-identify-pixelated-faces-researchers-show/},
urldate = {2017-03-13},
}
@online{arxiv:google-pixel-res,
author = {Dahl, Ryan
and Norouzi, Mohammad
and Shlens, Jonathan},
title = {Pixel Recursive Super Resolution},
organization = {Google Brain},
date = {2017-02-02},
archivePrefix= {arXiv},
eprint = {1702.00783},
primaryClass = {cs.CV},
}
@online{fast:das,
author = {Ungerleider, Neal},
title = {NYPD, Microsoft Launch All-Seeing “Domain Awareness System” With
Real-Time CCTV, License Plate Monitoring},
subtitle = {The New York Police Department has a new terrorism detection
system that will also generate profit for the city},
organization = {Fast Company},
date = {2012-08-08},
url = {https://www.fastcompany.com/3000272/nypd-microsoft-launch-all-seeing-domain-awareness-system-real-time-cctv-license-plate-monito},
urldate = {2017-03-13},
}
@online{nyc:pspg,
title = {Public Security Privacy Guidelines},
url = {http://www.nyc.gov/html/nypd/downloads/pdf/crime_prevention/public_security_privacy_guidelines.pdf},
urldate = {2017-03-13},
annotation = {Information about the NYPD's Domain Awareness System.},
}
@book{rosen:naked,
author = {Rosen, Jeffrey},
title = {The Naked Crowd: Reclaiming Security and Freedom In An Anxious
Age},
publisher = {Random House},
isbn = {978-0375508004},
date = 2004,
indextitle = {Naked Crowd: Reclaiming Security and Freedom In An Anxious
Age, The},
}
@article{solove:nothing-to-hide,
author = {Solove, Daniel J.},
title = {``I've got nothing to hide'' and Other Misunderstandings
of Privacy},
journaltitle = {San Diego Law Review},
volume = 44,
pages = {745--772},
date = {2007},
url = {https://ssrn.com/abstract=998565},
urldate = {2017-03-13},
annotation = {GWU Law School Public Law Research Paper No. 289},
}
@online{metro:goebbels,
author = {Nagesh, Ashitha},
title = {A Tory MP might have quoted Goebbels in defence of the
governments surveillance bill},
organization = {Metro.co.uk},
url = {http://metro.co.uk/2015/11/05/a-tory-mp-might-have-quoted-goebbels-in-defence-of-the-governments-surveillance-bill-5481457/},
urldate = {2017-03-13},
annotation = {It's never good to be accused of quoting the Nazi propaganda
minister},
}
@online{eff:alpr,
title = {Automated License Plate Readers},
organization = {Electronic Frontier Foundation},
url = {https://www.eff.org/sls/tech/automated-license-plate-readers},
urldate = {2017-03-13},
}
@online{aclu:tracked,
title = {You Are Being Tracked},
subtitle = {How License Plate Readers Are Being Used To Record Americans'
Movements},
url = {https://www.aclu.org/sites/default/files/field_document/071613-aclu-alprreport-opt-v05.pdf},
urldate = {2017-03-13},
}
@online{eff:golden-gate-toll,
title = {The Golden Gate Bridge Is Watching You},
author = {Schoen, Seth},
organization = {Electronic Frontier Foundation},
date = {2013-03-28},
url = {https://www.eff.org/deeplinks/2013/03/golden-gate-bridge-watching-you},
urldate = {2017-03-13},
}
@online{goldengate:anon,
title = {I Want To Remain Anonymous},
organization = {Golden Gate Bridge, Highway and Transportation District},
url = {http://goldengate.org/tolls/iwanttoremainanonymous.php},
urldate = {2017-03-13},
}
@online{baynews:fastack-data,
author = {Simerman, John},
title = {Lawyers dig into FasTrak data},
organization = {Bay Area News Group},
date = {2007-06-05},
url = {http://www.eastbaytimes.com/2007/06/05/lawyers-dig-into-fastrak-data/},
urldate = {2017-03-13},
annotation = {FasTrack data are used in civil disputes like divorce cases.},
}
@online{blackhat:toll-systems,
author = {Lawson, Nate},
title = {Highway To Hell: Hacking Toll Systems},
date = {2008-08-06},
location = {BlackHat USA},
url = {http://www.root.org/talks/BH2008_HackingTollSystems.pdf},
urldate = {2017-03-13},
}
@online{w:ezpass,
organization = {Wikipedia},
title = {E-ZPass},
url = {https://en.wikipedia.org/wiki/E-ZPass},
urldate = {2017-03-13},
}
@online{register:rfid-clone,
author = {Goodin, Dan},
title = {Passport RFIDs cloned wholesale by \$250 eBay auction spree\$},
subtitle = {Video shows you how},
organization = {The Register},
url = {https://web.archive.org/web/20170127114339/http://www.theregister.co.uk/2009/02/02/low_cost_rfid_cloner/},
urldate = {2017-03-13},
annotation = {Archive.org link used because The~Register blocks
Tor~users unless they execute proprietary JavaScript.},
}
@online{w:us-v-jones,
organization = {Wikipedia},
title = {United States v. Jones},
url = {https://en.wikipedia.org/wiki/United_States_v._Antoine_Jones},
urldate = {2017-03-13},
annotation = {United States Supreme Court ruling that GPS~tracking
constitutes a~search under the Fourth~Amendment.}
}
@online{darius:alpr-telnet,
author = {Freamon, Darius},
title = {{PIPS} Technology {AUTOPLATE} Automatic License Plate Recognition
{(ALPR)} Multiple Vulnerabilities},
url = {https://dariusfreamon.wordpress.com/2014/02/19/pips-technology-autoplate-automatic-license-plate-recognition-alpr-multiple-vulnerabilities/},
urldate = {2017-03-14},
annotation = {Telnet right into certain ALPRs.}
}
@online{ftc:silver,
author = {Mithal, Maneesha},
title = {Sample Silverpush Letter},
organization = {United States Federal Trade Commission,
Bureau of Consumer Protection,
Divison of Privacy and Identity Protection},
url = {https://www.ftc.gov/system/files/attachments/press-releases/ftc-issues-warning-letters-app-developers-using-silverpush-code/160317samplesilverpushltr.pdf},
urldate = {2017-03-14},
annotate = {Sample letter template for Android developers using software
created by the company Silvepush.}
}
@online{wired:ultrasonic,
author = {Newman, Lily Hay},
title = {How to Block the Ultrasonic Signals You Didnt Know Were Tracking
You},
organization = {Wired},
date = {2016-11-03},
url = {https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/},
urldate = {2017-03-14},
}
@online{ubeacsec:paper,
author = {Mavroudis, V.
and Hao, S.
and Fratantonio, Y.
and Maggi, F.
and Kruegel, C.
and Vigna, G.},
title = {The Ultrasound Tracking Ecosystem},
indextitle = {Ultrasound Tracking Ecosystem, The},
url = {http://ubeacsec.org/downloads/report.pdf},
urldate = {2017-03-14},
annotation = {Claims to be ``the first comprehensive security analysis''
of this type of tracking.},
}
@online{bleep:ultrasound-tor,
author = {Cimpanu, Catalin},
title = {Ultrasound Tracking Could Be Used To Deanonymize Tor Users},
organization = {Bleeping Computer},
date = {2017-01-03},
url = {https://www.bleepingcomputer.com/news/security/ultrasound-tracking-could-be-used-to-deanonymize-tor-users/},
urldate = {2017-03-14},
}
@online{33c3:talk-behind,
author = {Mavroudis, Vasillios
and Maggi, Federico},
title = {Talking Behind Your Back},
subtitle = {On the Privacy \& Security of the Ultrasound Tracking
Ecosystem},
location = {33^{rd} Chaos Communication Congress},
date = {2016-12-29},
url = {https://media.ccc.de/v/33c3-8336-talking_behind_your_back},
urldate = {2017-03-14},
}
@online{ftc:xdt,
title = {Cross-Device Tracking},
organization = {Federal Trade Commission},
location = {Constitution Center, 400 7^{th}~St~SW, Washington~DC 20024},
date = {2015-11-16},
url = {https://www.ftc.gov/news-events/events-calendar/2015/11/cross-device-tracking},
urldate = {2017-03-15},
}
@online{google:ga:features,
title = {Marketing Data Analysis \& Reporting Features},
organization = {Google},
url = {https://www.google.com/analytics/analytics/features/},
urldate = {2017-03-15},
}
@online{w3techs:analytics,
title = {Usage Stastics and Market Share of Traffic Analysis Tools for
Websites},
organization = {W3Techs},
url = {https://w3techs.com/technologies/overview/traffic_analysis/all},
urldate = {2017-03-15},
}
@online{w3techs:google,
author = {Gelbmann, Matthias},
title = {Google can't track every click of your web surfing. Only most of
them.},
organization = {W3Techs},
date = {2012-02-27},
url = {https://w3techs.com/blog/entry/google_cant_track_every_single_click_of_your_web_surfing_only_most_of_them},
urldate = {2017-03-15},
}
@online{piwik,
title = {Free Web Analytics Software},
organization = {Piwik},
url = {https://piwik.org/},
urldate = {2017-03-15},
}
@online{piwik:privacy,
title = {Web Analytics Privacy in Piwik},
organization = {Piwik},
url = {https://piwik.org/privacy/},
urldate = {2017-03-15},
}
@online{mtg:gitlab-piwik,
author = {Gerwitz, Mike},
title = {Google Analytics Removed From GitLab.com Instance},
date = {2016-01-24},
url = {https://mikegerwitz.com/2016/01/Google-Analytics-Removed-from-GitLab.com-Instance},
urldate = {2017-03-16},
}
@online{w:fb-like-img,
author = {Vt, Enoc},
title = {File:Botón Me gusta.svg},
date = {2011-10-09},
url = {https://en.wikipedia.org/wiki/File:Bot\%C3\%B3n_Me_gusta.svg},
urldate = {2017-03-16},
}
@article{pnas:predict,
author = {Kosinski, Michal
and Stillwell, David
and Graepel, Thore},
title = {Private traits and attributes are predictable from digital
records of human behavior},
journal = {PNAS},
volume = {110},
pages = {5802-5805},
doi = {10.1073/pnas.1218772110},
date = {2013-02-12},
url = {http://www.pnas.org/content/110/15/5802.full.pdf},
urldate = {2017-03-16},
}
@online{bloomberg:belgum-fb,
author = {Bodoni, Stephanie
and Martens, John},
title = {Belgium Tells Facebook to Stop Storing Personal Data From
Non-Users},
organization = {Bloomberg},
date = {2015-11-09},
url = {https://www.bloomberg.com/news/articles/2015-11-09/facebook-told-to-stop-storing-personal-data-from-belgian-surfers},
urldate = {2017-03-16},
annotation = {Surely Facebook isn't doing such a thing. Wait: ``Facebook
says it will appeal Belgian ruling to higher court''. Imagine that.}
}
@online{w:behavioral-targeting,
title = {Behavorial Tracking},
organization = {Wikipedia},
url = {https://en.wikipedia.org/wiki/Behavioral_targeting},
urldate = {2017-03-16},
}
@article{roosendaal:fb-like,
author = {Roosendaal, Arnold},
title = {Facebook Tracks and Traces Everyone: Like This!},
journaltitle = {Tilburg Law School Legal Studies Research Paper Series},
date = {2010},
doi = {10.2139/ssrn.1717563},
url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1717563},
urldate = {2017-03-17},
}
@online{uld:fb,
title = {ULD to website owners: ``Deactivate Facebook web analytics''},
organization = {Unabh{\:a}ngiges Landeszentrum f{\:u}r Datenschutz
Schleswig-Holstein},
date = {2011-08-19},
url = {https://www.datenschutzzentrum.de/presse/20110819-facebook-en.htm},
urldate = {2017-03-17},
}
@online{eff:browser-uniqueness-blog,
authors = {Eckersley, Peter},
title = {Is Every Browser Unique? Results Fom The Panopticlick Experiment},
organization = {Electronic Frontier Foundation},
date = {2010-05-17},
url = {https://www.eff.org/deeplinks/2010/05/every-browser-unique-results-fom-panopticlick},
urldate = {2017-03-17},
}
@online{eff:browser-uniqueness,
authors = {Eckersley, Peter},
title = {How Unique Is Your Web Browser?},
organization = {Electronic Frontier Foundation},
date = {2010-05-17},
url = {https://panopticlick.eff.org/static/browser-uniqueness.pdf},
urldate = {2017-03-17},
}
@online{eff:panopti2,
author = {Budington, Bill},
title = {Panopticlick 2.0 Launches, Featuring New Tracker Protection and
Fingerprinting Tests},
organization = {Electronic Frontier Foundation},
date = {2015-12-17},
url = {https://www.eff.org/deeplinks/2015/12/panopticlick-20-launches-featuring-new-tracker-protection-and-fingerprinting-tests},
urldate = {2017-03-17},
}
@online{mozilla:fingerprinting,
title = {Fingerprinting - {MozillaWiki}},
organization = {Mozilla},
url = {https://wiki.mozilla.org/Fingerprinting},
urldate = {2017-03-17},
}
@online{chromium:identification,
author = {Janc, Artur
and Zalewski, Michal},
title = {Technical analysis of client identification mechanisms},
organization = {Google},
url = {https://sites.google.com/a/chromium.org/dev/Home/chromium-security/client-identification-mechanisms},
urldate = {2017-03-17},
}
@online{tor:browser-design,
author = {Perry, Mike
and Clark, Erin
and Murdoch, Steven
and Koppen, Georg},
title = {The Design and Implementation of the {Tor Browser}},
organization = {Tor Project},
date = {2017-03-10},
url = {https://www.torproject.org/projects/torbrowser/design/},
urldate = {2017-03-17},
}
@online{stanford:private-browsing,
author = {Aggarwal, Gaurav,
and Bursztein, Elie
and Jackson, Collin
and Boneh, Dan},
title = {An Analysis of Private Browsing Modes in Modern Browsers},
organization = {Stanford University},
url = {https://crypto.stanford.edu/~dabo/pubs/papers/privatebrowsing.pdf},
urldate = {2017-03-17},
}
@online{norte:tor-fingerprint,
author = {Norte, Jose Carlos},
title = {Advanced Tor Browser Fingerprinting},
date = {2016-03-06},
url = {http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html},
urldate = {2017-03-17},
}
@online{browserleaks,
title = {{BrowserLeaks.com} - Web Browser Security Checklist for Identity
Theft Protection},
url = {https://browserleaks.com/},
urldate = {2017-03-17},
}
@article{hardware-fingerprint,
author = {Cao, Yinshi
and Li, Song
and Wijmans, Erik},
title = {(Cross-)Browser Fingerprinting via OS and Hardware Level Features},
date = {2017},
doi = {10.14722/ndss.2017.23152},
url = {http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf},
urldate = {2017-03-17},
}
@article{ijcseit:biometric,
author = {Mudholkar, Smita S.
and Shende, Pradnya M.
and Sarode, Milind V.},
title = {Biometrics Authentication Technique for Intrustion Detection
Systems Using Fingerprint Recognition},
journal = {International Journal of Computer Science, Engineering and
Information Technology},
volume = 2,
number = 4,
doi = {10.5121/ijcseit.2012.2106},
date = {2012-02},
url = {http://airccse.org/journal/ijcseit/papers/2112ijcseit06.pdf},
urldate = {2017-03-19},
}
@online{ars:fingerprint,
author = {Goodwin, Dan},
title = {Now sites can fingerprint you online even when you use multiple
browsers},
subtitle = {Online tracking gets more accurate and harder to evade},
organization = {Ars Technica},
url = {https://arstechnica.co.uk/security/2017/02/now-sites-can-fingerprint-you-online-even-when-you-use-multiple-browsers/},
urldate = {2017-03-17},
}
@online{mtg:rof,
author = {Gerwitz, Mike},
title = {Restore Online Freedom!},
date = {2016-03-20},
url = {https://media.libreplanet.org/u/libreplanet/collection/restore-online-freedom/},
urldate = {2017-03-17},
annotate = {My LibrePlanet 2017 talk about issues with an increasing
non-free Web, as well as privacy and security implications
of running untrusted, unsigned, ephemeral JavaScript
code.}
}
@online{noscript,
title = {NoScript - {JavaScript}/{Java}/{Flash} blocker for a safer
Firefox experience!},
url = {https://noscript.net/},
urldate = {2017-03-17},
}
@online{eff:privacy-badger,
title = {Privacy Badger},
organization = {Electronic Frontier Foundation},
url = {https://www.eff.org/privacybadger},
urldate = {2017-03-17},
}
@online{gh:ublock-origin,
title = {uBlock Origin},
subtitle = {An efficient blocker for {Chromium} and {Firefox}. Fast and
lean.},
url = {https://github.com/gorhill/uBlock},
urldate = {2017-03-17},
}
@online{moz:sd-cookies,
title = {Self-Destructing Cookies},
url = {https://addons.mozilla.org/en-US/android/addon/self-destructing-cookies/},
urldate = {2017-03-17},
}
@online{lp:2016:privacy-badger,
author = {Quintin, Cooper},
title = {Ending Online Tracking! Privacy Badger and Beyond!},
organization = {Electronic Frontier Foundation},
url = {https://media.libreplanet.org/u/libreplanet/m/ending-online-tracking-privacy-badger-and-beyond/},
urldate = {2017-03-17},
}
@online{moz:lightbeam,
title = {Lightbeam for Firefox},
subtitle = {Shine a Light on Who's Watching You},
organization = {Mozilla},
url = {https://www.mozilla.org/en-US/lightbeam/},
urldate = {2017-03-17},
}
@online{tor:browser,
title = {Tor Browser},
organization = {Tor Project},
url = {https://www.torproject.org/projects/torbrowser.html.en},
urldate = {2017-03-17},
}
@online{tor:overview,
title = {Tor Project: Overview},
organization = {Tor Project},
url = {https://www.torproject.org/about/overview.html.en},
urldate = {2017-03-17},
}
@online{ghostery:companies,
title = {Company Database},
organization = {Ghostery Enterprise},
url = {http://www.ghosteryenterprise.com/company-database/},
urldate = {2017-03-17},
}
@online{networks-of-control,
author = {Christl, Wolfie,
and Spiekermann, Sarah},
title = {Networks of Control},
date = {2016},
url = {http://crackedlabs.org/en/networksofcontrol},
urldate = {2017-03-18},
}
@online{33c3:surveil,
author = {Christl, Wolfie},
title = {Corporare surveillance, digital tracking, big data~\&~privacy},
subtitle = {How thousands of companies are profiling, categorizing, rating
and affecting the lives of billions},
location = {33^{rd} Chaos Communication Congress},
date = {2016-12-30},
url = {https://media.ccc.de/v/33c3-8414-corporate_surveillance_digital_tracking_big_data_privacy},
urldate = {2017-03-18},
annotation = {See also \cite{networks-of-control}}
}
@online{oracle:datalogix-acq,
title = {Oracle Buys Datalogix},
subtitle = {Creates the World's Most Valuable Data Cloud to Maximize the
Power of Digital Marketing},
organization = {Oracle},
url = {http://www.oracle.com/us/corporate/acquisitions/datalogix/general-presentation-2395307.pdf},
urldate = {2017-03-18},
}
@online{lexisnexis:trueid,
title = {LexisNexis TrueID},
organization = {LexisNexis},
url = {http://www.lexisnexis.com/risk/downloads/literature/trueid.pdf},
urldate = {2017-03-18},
}
@online{techcrunch:palantir,
author = {Burns, Matt},
title = {Leaked Palantir Doc Reveals Uses, Specific Functions And Key Clients},
organization = {TechCrunch},
date = {2015-01-11},
url = {https://techcrunch.com/2015/01/11/leaked-palantir-doc-reveals-uses-specific-functions-and-key-clients/},
urldate = {2017-03-19},
}
@online{nyt:learn-secrets,
author = {Duhigg, Charles},
title = {How Companies Learn Your Secrets},
organization = {The New York Times},
date = {2016-02-16},
url = {http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html},
urldate = {2017-03-19},
}
@online{trustev:tech,
title = {TransUnion | Trustev -- Technology},
organization = {TransUnion},
url = {http://www.trustev.com/technology},
urldate = {2017-03-19},
}
@online{w:file:cell-tower,
author = {Appel, Thomas},
title = {File:T-mobile cell site},
organization = {Wikipedia},
date = {2015-09-23},
url = {https://en.wikipedia.org/wiki/File:T-Mobile_cell_site.jpg},
urldate = {2017-03-19},
}
@online{w:file:stingray,
title = {File:Stingray Harris handle side.jpg},
date = {2013-04},
organization = {Harris Corporation},
url = {https://en.wikipedia.org/wiki/File:Stingray_Harris_handle_side.jpg},
urldate = {2017-03-19},
}
@online{w:file:gps,
title = {File:GPS Satellite NASA art-iif.jpg},
date = {2006-02-09},
organization = {NASA},
url = {https://en.wikipedia.org/wiki/File:GPS_Satellite_NASA_art-iif.jpg},
urldate = {2017-03-19},
}
@online{wsj:app-loc,
title = {What They Know - Mobile - WSJ},
organization = {The Wall Street Journal},
url = {http://blogs.wsj.com/wtk-mobile/},
urldate = {2017-03-19},
annotation = {Popular apps that transmit location information in~2010},
}
@online{archive:fisa-verizon,
author = {Vinson, Roger},
title = {Foreign Intelligence Surveillance Court Ruling- Verizon},
organization = {United States Foreign Intelligence Surveillance Court},
date = {2013-04-25},
url = {https://archive.org/details/FBI-Verizon-FISA-2013},
urldate = {2017-03-20},
annotation = {The first Snowden leak showing that the United States is
performing dragnet surveillance on its citizens},
}
@online{dni:business-provs,
author = {Clapper, James R.},
title = {DNI Statement on Recent Unauthorized Disclosures of Classified
Information},
organization = {Office of the Director of National Intelligence},
date = {2013-06-06},
url = {https://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/868-dni-statement-on-recent-unauthorized-disclosures-of-classified-information},
urldate = {2017-03-20},
annotation = {Partial declassification of the ``business records'' provision of FISA.},
}
@online{guardian:verizon,
author = {Greenwald, Glenn},
title = {NSA collecting phone records of millions of Verizon customers daily},
subtitle = {Exclusive: Top secret court order requiring Verizon to hand
over all call data shows scale of domestic surveillance
under Obama},
date = {2013-06-06},
url = {https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order},
urldate = {2017-03-20},
annotation = {The original article exposing the first Snowden document.},
}
@online{eff:jewel:evidence,
title = {Summary of Voluminous Evidence, Jewel v. NSA, Case
No. 08-CV-4373-JSW},
date = {2012-12-14},
url = {https://www.eff.org/files/filenode/jewel_conformed_summary_of_evidence.pdf},
urldate = {2017-03-20},
}
@online{eff:metadata,
author = {Opsahl, Kurt},
title = {Why Metadata Matters},
organization = {Electronic Frontier Foundation},
date = {2013-06-07},
url = {https://www.eff.org/deeplinks/2013/06/why-metadata-matters},
urldate = {2017-03-20},
}
@online{eff:nsa-spying,
title = {NSA Spying},
organization = {Electronic Frontier Foundation},
url = {https://www.eff.org/nsa-spying},
urldate = {2017-03-20},
}
@online{eff:samsung-tv-policy,
author = {Higgins, Parker},
title = {Big Brother Is Listening: Users Need the Ability To Teach Smart
TVs New Lessons},
organization = {Electronic Frontier Foundation},
date = {2015-02-11},
url = {https://www.eff.org/deeplinks/2015/02/big-brother-listening-users-need-ability-teach-smart-tvs-new-lessons},
urldate = {2017-03-20},
}
@online{vault7:y0,
title = {Vault 7: CIA Hacking Tools Revealed},
organization = {Wikileaks},
url = {https://wikileaks.org/ciav7p1/index.html},
urldate = {2017-03-21},
}
@online{vault7:weeping,
title = {Weeping Angel (Extending) Engineering Notes,
SECRET~// REL~USA,UK},
organization = {Central Intelligence Agency},
url = {https://wikileaks.org/ciav7p1/cms/page_12353643.html},
urldate = {2017-03-20},
annotation = {Covert surveillance through Samsung Smart TVs.},
}
@online{bleep:lgtv-ransom,
author = {Cimpanu, Catalin},
title = {Android Ransomware Infects LG Smart TV},
organization = {Bleeping Computer},
url = {https://www.bleepingcomputer.com/news/security/android-ransomware-infects-lg-smart-tv/},
urldate = {2017-03-20},
annotation = {Android ransomware on an LG Smart TV.}
}
@online{engadget:murder-echo,
author = {Steele, Billy},
title = {Policy seek Amazon Echo data in murder case},
organization = {Engadget},
date = {2016-12-27},
url = {https://www.engadget.com/2016/12/27/amazon-echo-audio-data-murder-case/},
urldate = {2017-03-21},
}
@online{guardian:murder-echo,
title = {Amazon refuses to let police access US murder suspect's Echo
recordings},
subtitle = {Company has declined to provide audio recordings by smart
speaker system at house where man died, according to a
report},
organization = {The Guardian},
date = {2016-12-28},
url = {https://www.theguardian.com/technology/2016/dec/28/amazon-refuses-to-let-police-access-suspects-echo-recordings},
urldate = {2017-03-21},
}
@online{gizmodo:echo-wiretap,
author = {Novak, Matt},
title = {The FBI Can Neither Confirm Nor Deny Wiretapping Your Amazon
Echo},
organization = {Gizmodo},
date = {2016-05-11},
url = {https://paleofuture.gizmodo.com/the-fbi-can-neither-confirm-nor-deny-wiretapping-your-a-1776092971},
urldate = {2017-03-21},
}
@online{w:file:echo,
author = {Morrison, Frank},
title = {File:Amazon Echo.jpg},
organization = {Wikipedia},
date = {2014-10-17},
url = {https://en.wikipedia.org/wiki/File:Amazon_Echo.jpg},
urldate = {2017-03-21},
}
@online{guardian:doll-spy,
author = {Oltermann, Philip},
title = {German parents told to destroy doll that can spy on children},
subtitle = {German watchdog classifies My Friend Cayla doll as
`illegal espionage apparatus' and says shop owners could
face fines},
date = {2017-02-17},
organization = {The Guardian},
url = {https://www.theguardian.com/world/2017/feb/17/german-parents-told-to-destroy-my-friend-cayla-doll-spy-on-children},
urldate = {2017-03-22},
}
% I archived to Wayback Machine in case this URL vanishes
@online{onstar:privacy-policy,
title = {Privacy Statement},
organization = {OnStar},
date = {2017-01-01},
url = {https://www2.onstar.com/tunnel-web/webdav/portal/document_library/tcps/us/ps/web/20140601/en/html/privacy_statement.html},
urldate = {2017-03-21},
}
@online{binsider:ford-gps,
author = {Edwards, Jim},
title = {Ford Exec: `We Know Everyone Who Breaks The Law' Thanks To Our
GPS In Your Car},
organization = {Business Insider},
date = {2014-01-08},
url = {http://www.businessinsider.com/ford-exec-gps-2014-1},
urldate = {2017-03-21},
}