Christopher Soghoian: Online Privacy Ninja
PGP keyblog twitter
consulting financial disclosure
Christopher Soghoian is a Washington, DC based Open Society Fellow, supported by the Open Society Foundations.
He is also a Graduate Fellow at the Center for Applied Cybersecurity Research, and a Ph.D. Candidate in the School of Informatics and Computing at Indiana University.
His research is generally focused on the topic of online privacy. This includes both consumer issues (such as online tracking) as well as government surveillance. His Ph.D dissertation is focused on the role that companies play in either resisting or facilitating surveillance of their customers.
He has used the Freedom of Information Act and several other investigative techniques to shed light on the scale of and the methods by which the US government spies on Internet communications and mobile telephones. This work has been cited by (pdf) the 9th Circuit Court of Appeals, and featured on the Colbert Report.
He was the first ever in-house technologist at the Federal Trade Commission (FTC)’s Division of Privacy and Identity Protection. Prior to his year in government, he created a privacy enhancing browser add-on that was downloaded more than 700,000 times in its first year before he sold it to Abine, Inc.
He has worked at or interned with the Berkman Center for Internet & Society at Harvard University, the American Civil Liberties Union (ACLU) of Northern California, NTT DoCoMo Euro Labs, Google, Apple and IBM Research Zurich.
- Can You See Me Now: Toward Reasonable Standards for Law Enforcement Access to Location Data that Congress Could Enact [pdf]
Stephanie K. Pell and Christopher Soghoian
- The Law Enforcement Surveillance Reporting Gap [pdf]
- An End to Privacy Theater:
Exposing and Discouraging Corporate Disclosure of User Data to the Government [pdf]
Minnesota Journal of Law, Science & Technology Vol. 12, No. 1, 2011.
- Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL [pdf]
Christopher Soghoian and Sid Stamm
Financial Cryptography and Data Security ’11 March 2011.
- Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era [pdf]
Journal on Telecommunications and High Technology Law, Vol. 8, No. 2, 2010.
- Manipulation and Abuse of the Consumer Credit Reporting Agencies [Website]
First Monday, Volume 14, Number 8, August 2009.
- The Human Factor in Phishing
Markus Jakobsson and Christopher Soghoian
Chapter in Information Assurance, Security and Privacy Services
H. Raghav Rao and Shambhu Upadhyaya, eds,
Emerald Group Publishing Limited, June 2009.
- Deep Packet Inspection — Bring It On [Website]
Invited contribution to Deep Packet Inspection, A Collection of Essays from Industry Experts,
Office of the Privacy Commissioner of Canada, April 2009.
- Merx: Secure and Privacy Preserving Delegated Payments
Christopher Soghoian and Imad Aad
Trust 2009, April 2009.
- Legal Risks For Phishing Researchers [pdf]
The Third Anti-Phishing Working Group eCrime Researchers Summit, October 2008.
- The Threat of Political Phishing [pdf]
Christopher Soghoian, Oliver Friedrichs and Markus Jakobsson
The International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), July 2008.
- Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them [pdf]
Northwestern Journal of Technology and Intellectual Property, Volume 6, Number 1, Fall 2007.
- Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists [pdf]
First IFIP WG 11.6 working conference on Policies & Research in Identity Management (IDMAN 07), October 2007.Republished as a chapter in Protecting Airline Passengers in the Age of Terrorism
Paul Seidenstat and Francis X. Splane, eds,
Praeger Publishers, August 2009.
- The Problem of Anonymous Vanity Searches [pdf]
I/S: A Journal of Law and Policy for the Information Society, Volume 3, Issue 2, 2007.
- Mantis: A High-Performance, Anonymity Preserving, P2P Network [pdf]
Steve Bono, Christopher Soghoian and Fabian Monrose
Johns Hopkins University Information Security Institute Technical Report, TR-2004-01-B-ISI-JHU. June