Computers Freedom and Privacy Conference
Washington DC | June 25, 2013 My panel focused on PRISM. We discussed what the program might look like based on publicly available information as well as whether the intelligence gained through the...
View ArticleAs Technology Changes, So Should Law
Improved technology enabled the NSA’s mass surveillance programs and future improvements will make collecting data on citizens easier and easier. Recent revelations about the extent of surveillance by...
View ArticleComments for the Privacy and Civil Liberties Oversight Board
I am speaking today at the PCLOB meeting on Sections 215 and 702 of the PATRIOT Act. My panel begins at 12:30 and you can watch it live here. I will be commenting on the role of technology in these...
View ArticlePrivacy and Civil Liberties Oversight Board
Washington DC | July 9, 2013 On July 9, I joined a few technical experts on a panel to field questions from the Privacy and Civil Liberties Oversight Board. The panel footage is available from CSPAN...
View ArticleIs Electronic Surveillance Out of Control? KCRW’s To The Point
KCRW | July 10, 2013 On July 10, I was a guest on KRCW’s daily show, To The Point. Reacting to recent revelations of NSA surveillance issues and comments made by witnesses at the Privacy and Civil...
View ArticleBits of Freedom: The Dutch Perspective
I was recently invited to be a visiting fellow at Bits of Freedom in Amsterdam. This was a great opportunity to gain insight into the European privacy debate, not to mention escape the DC summer and...
View ArticleCIR/NPR Collaboration – Your Data and Who Has Access to It
I collaborated with NPR and the Center for Investigative Reporting to develop this script describing who is tracking you throughout your day. The video shows how your digital trail can be assembled...
View ArticleA Group of Geeks Submitted Questions on NSA Activities
I recently submitted comments to the President’s Review Group on Intelligence and Communications Technologies along with 46 other leading technologists. The mission of this Review Group is to assess...
View ArticleWhy Apple’s claim that it can’t intercept iMessages is largely semantics
This op-ed originally appeared in the Washington Post last Saturday in response to Apple’s claims about the security of iMessage. A lively debate is brewing over the security of Apples iMessages. I was...
View ArticleTLS – A simple step to improve cloud email security
The Washington Post published a new piece by Barton Gellman and myself on Wednesday that revealed new insights into how the NSA conducts surveillance on US technology companies. Specifically, we...
View ArticlePostTV: Reporter explains NSA collection of cellphone data
In this video I discuss the NSA’s ability to use massive numbers of cell location records to determine if anyone, including US citizens, are co-traveling with targets of surveillance. You can read more...
View ArticlePostTV: For NSA, Google cookies allow ‘laser-guided’ targeting
Intelligence agencies follow targets using cookies installed by Google, typically to track users for commercial advertising purposes, to follow suspects online and target them with malware. You can...
View ArticleApple’s #gotofail weekend
In case you spent your weekend watching closing ceremonies and not reading tech news, there was a lot of buzz around a security problem in Apple products. On Friday, Apple released an emergency update...
View Article
More Pages to Explore .....