sapsf/sapsf.bib

465 lines
16 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

@online{panopti:about,
author = {Electric Frontier Foundation},
title = {Panopticlick | About},
url = {https://panopticlick.eff.org/about},
urldate = {2017-03-08},
}
@online{whonix:donot,
author = {Whonix},
title = {DoNot},
url = {https://www.whonix.org/wiki/DoNot},
urldate = {2017-03-05}
}
@online{tor,
author = {Tor Project},
title = {Tor Project: Anonymity Online},
url = {http://torproject.org/},
urldate = {2017-03-09},
}
@online{eff:nsa:timeline,
author = {Electronic Frontier Foundation},
title = {Timeline of NSA Domestic Spying},
url = {https://www.eff.org/nsa-spying/timeline},
urldate = {2017-03-09},
}
@online{mtg:uproar,
author = {Mike Gerwitz},
title = {National Uproar: A Comprehensive Overview of the
NSA Leaks and Revelations},
url = {https://mikegerwitz.com/2013/06/National-Uproar-A-Comprehensive-Overview-of-the-NSA-Leaks-and-Revelations},
month = 06,
year = 2013,
urldate = {2017-03-09},
}
@online{eff:bernstein:doj,
author = {Electronic Frontier Foundation},
title = {Bernstein v. US Department of Justice},
url = {https://www.eff.org/cases/bernstein-v-us-dept-justice},
urldate = {2017-03-09},
}
% TODO: figure out how to render the URL
@techreport{poodle:paper,
author = {Möller, Brodo and Duong, Thai and Kotowicz, Krzysztof},
title = {This POODLE Bites: Exploiting the SSL 3.0 Fallback},
institution = {Google},
year = 2014,
month = Sep,
url = {https://www.openssl.org/~bodo/ssl-poodle.pdf},
}
@online{w:crypto-wars,
author = {Wikipedia},
title = {Crypto Wars},
url = {https://en.wikipedia.org/wiki/Crypto_wars},
urldate = {2017-03-10},
}
@online{fedr:export-controls,
author = {Executive Office of the President},
title = {Administration of Export Controls on Encryption Products},
url = {https://www.gpo.gov/fdsys/pkg/FR-1996-11-19/pdf/96-29692.pdf},
urldate = {2017-03-10},
month = 11,
year = 1996,
note = {Federal Register, Vol. 61, No. 224, Executive Order 58767},
}
@online{doc:rev-export-reg,
author = {United States Department of Commerce},
title = {Revised U.S. Encryption Export Regulations},
url = {https://epic.org/crypto/export_controls/regs_1_00.html},
month = 01,
year = 2000,
urldate = {2017-03-10},
}
@online{arxiv:mac,
author = {Martin, Jeremy
and Mayberry, Travis
and Donahue, Collin
and Foppe, Lucas,
and Brown, Lamont
and Riggins, Chadwick
and Rye, Erik C.
and Brown, Dane},
title = {A Study of MAC Address Randomization in Mobile Devices and When it Fails},
year = 2017,
month = 03,
archivePrefix= {arXiv},
eprint = {1703.02874},
primaryClass = {cs.CR},
}
@online{aimsid,
author = {CellularPrivacy},
title = {Android IMSI-Catcher Detector},
url = {https://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/},
urldate = {2017-03-11},
}
@online{osmand,
title = {OsmAnd - Offline Mobile Maps and Navigation},
url = {http://osmand.net/},
urldate = {2017-03-11},
}
@online{mozilla:loc-services,
author = {MozillaWiki},
title = {CloudServices/Location - MozillaWiki},
url = {https://wiki.mozilla.org/CloudServices/Location},
urldate = {2017-03-11},
}
@online{openmobilenetwork,
title = {OpenMobileNetwork},
url = {http://www.openmobilenetwork.org/},
urldate = {2017-03-11},
}
@online{w:wps,
author = {Wikipedia},
title = {Wi-Fi positioning system},
url = {https://en.wikipedia.org/wiki/Wi-Fi_positioning_system},
urldate = {2017-03-11},
}
@online{w:trilateration,
author = {Wikipedia},
title = {Trilateration},
url = {https://en.wikipedia.org/wiki/Trilateration},
urldate = {2017-03-11},
}
@article{acm:spotfi,
author = {Kotaru, Manikanta
and Joshi, Kiran
and Bharadia, Dinesh
and Katti, Sachin},
title = {{SpotFi}: Decimeter Level Localization Using {WiFi}},
journal = {{ACM} {SIGCOMM} Computer Communication Review - {SIGCOMM'15}},
doi = {10.1145/2785956.2787487},
volume = 45,
pages = {269-282},
year = 2015,
}
@article{acm:lteye,
author = {Kumar, Swarun
and Hamed, Ezzeldin
and Katabi, Dina
and Li, Li Erran},
title = {{LTE} radio analytics made easy and accessible},
journal = {{S3 '14} Proceedings of the 6th annual workshop on Wireless of
the students, by the students, for the students},
doi = {10.1145/2645884.2645891},
pages = {29-30},
year = 2014,
}
@online{replicant,
author = {Replicant},
title = {Replicant},
url = {http://www.replicant.us},
urldate = {2017-03-11},
annotation = {A fully free Android distribution}
}
@online{replicant:sec,
author = {Replicant},
title = {Freedom and privacy/security issues},
url = {http://www.replicant.us/freedom-privacy-security-issues.php},
urldate = {2017-03-11},
}
@online{replicant:samsung-bd,
author = {Replicant},
title = {Samsung Galaxy back-door},
url = {http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor},
urldate = {2017-03-11},
annotation = {Backdoor in Samsung Galaxy phones closed by Replicant},
}
@online{gnu:malware-mobile,
author = {GNU Project},
title = {Malware in Mobile Devices},
url = {https://www.gnu.org/philosophy/malware-mobiles.html},
urldate = {2017-03-11},
annotation = {Numerous resources on privacy/security issues with mobile
devices}
}
@online{jots:mobile,
author = {Jinyan Zang
and Krysta Dummit
and James Graves
and Paul Lisker
and Latanya Sweeney},
title = {Who Knows What About Me? A Survey of Behind the Scenes Personal
Data Sharing to Third Parties by Mobile Apps},
url = {http://jots.pub/a/2015103001/index.php},
urldate = {2017-03-11},
}
@online{kryptowire:adups,
author = {Kryptowire},
title = {KRYPTOWIRE DISCOVERS MOBILE PHONE FIRMWARE THAT TRANSMITTED
PERSONALLY IDENTIFIABLE INFORMATION (PII) WITHOUT USER
CONSENT OR DISCLOSURE},
url = {http://www.kryptowire.com/adups_security_analysis.html},
urldate = {2017-03-11},
annotation = {BLU mobile phones transmitting SMS content, contacts, call
history, telephone numbers, IMEIs, etc to third-party
servers without users' knolwedge or censent}
}
@online{intercept:nyc-surveil,
author = {Currier, Cora},
title = {A Walking Tour of New York's Massive Surveillance Network},
organization = {The Intercept},
date = {2016-09-24},
url = {https://theintercept.com/2016/09/24/a-walking-tour-of-new-yorks-massive-surveillance-network/},
urldate = {2017-03-12},
}
@online{shodan,
title = {Shodan},
subtitle = {The search engine for the Internet of Things},
url = {https://shodan.io},
urldate = {2017-03-12},
}
@online{krebs:mongodb,
author = {Krebs, Brian},
title = {Extortionists Wipe Thousands of Databases,
Victims Who Pay Up Get Stiffed},
url = {https://krebsonsecurity.com/2017/01/extortionists-wipe-thousands-of-databases-victims-who-pay-up-get-stiffed/},
urldate = {2017-03-12},
}
@online{insecam,
title = {Insecam - World biggest online cameras directory},
url = {http://insecam.org},
urldate = {2017-03-12},
annotation = {Load the HTTP (non-HTTPS) site, otherwise mixed content is
blocked and thumbnails will not work.}
}
@article{ieee:gait,
author = {Rogez, Gr\'egory
and Rihan, Jonathan
and Guerrero, Jose J.},
title = {Monocular {3D} Gait Tracking in Surveillance Scenes},
journal = {IEEE Transactions on Cybernetics},
url = {http://vision.ics.uci.edu/papers/RogezRGO_Cybernetics_2013/RogezRGO_Cybernetics_2013.pdf}
}
@article{ijca:gait,
author = {Vaidya, Sonali
and Shah, Kamal},
title = {Real Time Video Surveillance System},
journal = {International Journal of Computer Applications},
volume = 86,
pages = {22-27},
year = 2014,
url = {http://research.ijcaonline.org/volume86/number14/pxc3893419.pdf},
annotation = {Discusses realtime gait analysis for video surveillance},
}
@online{newsci:fb-noface,
author = {Rutkin, Aviva},
title = {Facebook can recognize you in photos even if you're not looking},
organization = {New Scientist},
url = {https://www.newscientist.com/article/dn27761-facebook-can-recognise-you-in-photos-even-if-youre-not-looking/},
urldate = {2017-03-12},
}
@online{rms:facebook,
author = {Stallman, Richard},
title = {Reasons not to use (i.e., be used by) {Facebook}},
url = {https://stallman.org/facebook.html},
urldate = {2017-03-12},
}
@online{register:fb-scan,
author = {Chirgwin, Richard},
title = {Facebook conjures up a trap for the unwary: scanning your camera
for your friends},
subtitle = {Auto-spam your friends with Photo Magic},
organization = {The Register},
url = {https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/},
urldate = {2017-03-12},
annotation = {Archive.org link used because The~Register blocks
Tor~users unless they execute proprietary JavaScript.},
}
@online{guardian:fb-scan,
author = {Arthur, Charles},
title = {Facebook in new privacy row over facial recognition feature},
subtitle = {Social network turns on new feature to automatically identify
people in photos, raising questions about privacy
implications of the service},
organization = {The Guardian},
date = {2011-06-08},
url = {https://www.theguardian.com/technology/2011/jun/08/facebook-privacy-facial-recognition},
urldate = {2017-03-12},
}
@online{techcrunch:fb-baby,
author = {Constine, Josh},
title = {Facebooks New Photo “Scrapbook” Lets Parents Give Kids An
Official Presence},
organization = {TechCrunch},
date = {2016-03-31},
url = {https://techcrunch.com/2015/03/31/step-1-identify-baby-photo-step-2-hide-baby-photos/},
urldate = {2017-03-12},
annotation = {Facebook tricks users into violating their child's privacy
before they have any say in the matter.},
}
@online{eff:ios-photo-diff,
author = {Gebhart, Gennie
and Grant, Starchy
and Portnov, Erica},
title = {Facial Recognition, Differential Privacy, and Trade-Offs in
Apple's Latest OS Releases},
organization = {Electronic Frontier Foundation},
date = {2016-09-27},
url = {https://www.eff.org/deeplinks/2016/09/facial-recognition-differential-privacy-and-trade-offs-apples-latest-os-releases},
urldate = {2017-03-12},
}
@online{churchix,
title = {Churchix Facial Recognition Software},
subtitle = {Churchix Facial Recognition Software for Event Attendance},
url = {http://churchix.com/},
urldate = {2017-03-12},
annotation = {This software is cited for illustration; do~not use it.}
}
@online{facefirst,
title = {Face Recognition Software for Retail Stores: \#1~Biometric
Surveillance for Loss Prevention},
url = {https://www.facefirst.com/industry/retail-face-recognition/},
urldate = {2017-03-12},
annotation = {Full-page loading spinner does not remove itself without
running non-free JavaScript; remove it manually using a
web browser with a~debugger. This software is cited for
illustration; do~not use it.},
}
@online{bio:iris,
title = {Hacker extracts Merkel's iris image},
organization = {Planet Biometrics},
date = {2015-11-30},
url = {http://www.planetbiometrics.com/article-details/i/3644/},
urldate = {2017-03-12},
}
@online{eff:facial-tech,
author = {Schwartz, Adam},
title = {The Danger of Corporate Facial Recognition Tech},
subtitle = {The Illinois Biometric Privacy Statute Survived a Recent
Attack. But the Struggle Continues},
organization = {Electronic Frontier Foundation},
date = {2016-06-07},
url = {https://www.eff.org/deeplinks/2016/06/danger-corporate-facial-recognition-techgg},
urldate = {2017-03-12},
}
@online{eff:fbi-bio,
author = {Lynch, Jennifer},
title = {New Report: FBI Can Access Hundreds of Millions of Face
Recognition Photos},
organization = {Electronic Frontier Foundation},
date = {2016-06-15},
url = {https://www.eff.org/deeplinks/2016/06/fbi-can-search-400-million-face-recognition-photos},
urldate = {2017-03-12},
}
@online{cbs:sf-smile,
author = {Borba, Andria},
title = {Nowhere To Hide: Few Public Places Without Surveillance Cameras
In San Francisco},
organization = {CBS},
date = {2015-09-24},
url = {http://sanfrancisco.cbslocal.com/2015/09/24/san-francisco-surveillance-camera-tenderloin/},
urldate = {2017-03-12},
}
@online{pbs:nova:boston,
author = {O'Brien, Michael
and Cort, Julia},
title = {Manhunt---{Boston Bombers}},
subtitle = {Which technologies worked—and which didn't---in the race to
track down the men behind the marathon attack?},
organization = {WGBH Educational Foundation},
date = {2013-05-29},
url = {http://www.pbs.org/wgbh/nova/tech/manhunt-boston-bombers.html},
urldate = {2017-03-13},
annotation = {Specificall, pay attention to the Domain Awareness System
and other surveillance capabilities. Transcript
available.},
}
@online{reuters:nypd-das,
author = {Francescani, Chris},
title = {NYPD expands surveillance net to fight crime as well as terrorism},
organization = {Reuters},
date = {2013-06-21},
url = {http://www.reuters.com/article/usa-ny-surveillance-idUSL2N0EV0D220130621},
urldate = {2017-03-13},
}
@online{wired:pixel-face,
author = {Newman, Lily Hay},
title = {AI Can Recognize Your Face Even If Youre Pixelated},
organization = {Wired},
date = {2016-09-12},
url = {https://www.wired.com/2016/09/machine-learning-can-identify-pixelated-faces-researchers-show/},
urldate = {2017-03-13},
}
@online{arxiv:google-pixel-res,
author = {Dahl, Ryan
and Norouzi, Mohammad
and Shlens, Jonathan},
title = {Pixel Recursive Super Resolution},
organization = {Google Brain},
date = {2017-02-02},
archivePrefix= {arXiv},
eprint = {1702.00783},
primaryClass = {cs.CV},
}
@online{fast:das,
author = {Ungerleider, Neal},
title = {NYPD, Microsoft Launch All-Seeing “Domain Awareness System” With
Real-Time CCTV, License Plate Monitoring},
subtitle = {The New York Police Department has a new terrorism detection
system that will also generate profit for the city},
organization = {Fast Company},
date = {2012-08-08},
url = {https://www.fastcompany.com/3000272/nypd-microsoft-launch-all-seeing-domain-awareness-system-real-time-cctv-license-plate-monito},
urldate = {2017-03-13},
}
@online{nyc:pspg,
title = {Public Security Privacy Guidelines},
url = {http://www.nyc.gov/html/nypd/downloads/pdf/crime_prevention/public_security_privacy_guidelines.pdf},
urldate = {2017-03-13},
annotation = {Information about the NYPD's Domain Awareness System.}
}