Dubbed the "Ralph Nader of the Internet" by
Wired and one of
Politico's top "thinkers, doers and visionaries transforming American politics," Christopher Soghoian is "the most prominent of a new breed of activist technology researchers" (
The Economist), "who have risen to prominence by showing how tedious technical flaws can affect ordinary people."
Soghoian is the Principal Technologist with the Speech, Privacy, and Technology Project at the American Civil Liberties Union. He is also a
Visiting Fellow at Yale Law School's Information Society Project and a
TED Senior Fellow.
Soghoian completed
his Ph.D. at Indiana University in 2012, which focused on the role that Internet and telephone companies play in enabling government surveillance of their customers.
- Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly Over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy
[pdf]
Stephanie K. Pell and Christopher Soghoian
Harvard Journal of Law and Technology, Volume 28, Number 1 Fall 2014.
-
A Lot More Than A Pen Register, And Less Than A Wiretap: What The StingRay Teaches Us About How Congress Should Approach The Reform Of Law Enforcement Surveillance Authorities
[pdf]
Stephanie K. Pell and Christopher Soghoian
Yale Journal of Law & Technology, Vol. 16, 2013.
- The Spies We Trust:
Third Party Service Providers and Law Enforcement Surveillance
[pdf]
Christopher Soghoian
Ph.D. Dissertation, August 2012.
- Can You See Me Now: Toward Reasonable Standards for Law Enforcement Access to
Location Data that Congress Could Enact
[pdf]
Stephanie K. Pell and Christopher Soghoian
Berkeley Technology Law Journal, Vol. 27, 2012.
- The Law Enforcement Surveillance Reporting Gap
[pdf]
Christopher Soghoian
Unpublished Draft
- An End to Privacy Theater:
Exposing and Discouraging Corporate Disclosure of User Data to the Government
[pdf]
Christopher Soghoian
Minnesota Journal of Law, Science & Technology
Vol. 12, No. 1, 2011.
- Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL
[pdf]
Christopher Soghoian and
Sid Stamm
Financial Cryptography and Data Security '11
March 2011.
- Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era
[pdf]
Christopher Soghoian
Journal on Telecommunications and High Technology Law,
Vol. 8, No. 2, 2010.
- Manipulation and Abuse of the Consumer Credit Reporting Agencies
[Website]
Christopher Soghoian
First Monday,
Volume 14, Number 8, August 2009.
- The Human Factor in Phishing
Markus Jakobsson and Christopher Soghoian
Chapter in Information Assurance,
Security and Privacy Services
H. Raghav Rao and Shambhu Upadhyaya, eds,
Emerald Group Publishing Limited,
June 2009.
- Merx: Secure and Privacy Preserving Delegated Payments
Christopher Soghoian and Imad Aad
Trust 2009,
April 2009.
- Legal Risks For Phishing Researchers
[pdf]
Christopher Soghoian
The Third Anti-Phishing Working Group eCrime Researchers Summit,
October 2008.
- The Threat of Political Phishing
[pdf]
Christopher Soghoian, Oliver Friedrichs and Markus Jakobsson
The International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008),
July 2008.
- Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them
[pdf]
Christopher Soghoian
Northwestern Journal of Technology and Intellectual Property,
Volume 6, Number 1, Fall 2007.
- Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists
[pdf]
Christopher Soghoian
First
IFIP WG 11.6 working conference on Policies & Research in Identity Management (IDMAN 07),
October 2007.
Republished as a chapter in Protecting Airline Passengers in the Age of Terrorism
Paul Seidenstat and Francis X. Splane, eds,
Praeger Publishers,
August 2009.
- The Problem of Anonymous Vanity Searches
[pdf]
Christopher Soghoian
I/S: A Journal of Law and Policy for the Information Society,
Volume 3, Issue 2, 2007.
- Mantis: A High-Performance, Anonymity Preserving, P2P Network
[pdf]
Steve Bono, Christopher Soghoian and Fabian Monrose
Johns Hopkins University Information Security Institute Technical Report,
TR-2004-01-B-ISI-JHU. June 17, 2004.