Christopher Soghoian’s research while affiliated with Yale University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (19)


A Lot More than a Pen Register, and Less than a Wiretap: What the Stingray Teaches Us About How Congress Should Approach the Reform of Law Enforcement Surveillance Authorities
  • Preprint

May 2017

·

18 Reads

·

1 Citation

Christopher Soghoian

·

Stephanie K. Pell

In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, the public learned that the NSA, since 2006, had been collecting nearly all domestic phone call detail records and other telephony metadata pursuant to a controversial, classified interpretation of Section 215 of the USA PATRIOT Act. Prior to the Snowden disclosure, the existence of this intelligence program had been kept secret from the general public, though some members of Congress knew both of its existence and of the statutory interpretation the government was using to justify the bulk collection. Unfortunately, the classified nature of the Section 215 metadata program prevented them from alerting the public directly, so they were left to convey their criticisms of the program directly to certain federal agencies as part of a non-public oversight process. The efficacy of an oversight regime burdened by such strict secrecy is now the subject of justifiably intense debate. In the context of that debate, this Article examines a very different surveillance technology — one that has been used by federal, state and local law enforcement agencies for more than two decades without invoking even the muted scrutiny Congress applied to the Section 215 metadata program. During that time, this technology has steadily and significantly expanded the government’s surveillance capabilities in a manner and to a degree to date largely unnoticed and unregulated. Indeed, it has never been explicitly authorized by Congress for law enforcement use. This technology, commonly called the StingRay, the most well-known brand name of a family of surveillance devices, enables the government, directly and in real-time, to intercept communications data and detailed location information of cellular phones — data that it would otherwise be unable to obtain without the assistance of a wireless carrier. Drawing from the lessons of the StingRay, this Article argues that if statutory authorities regulating law enforcement surveillance technologies and methods are to have any hope of keeping pace with technology, some formalized mechanism must be established through which complete, reliable and timely information about new government surveillance methods and technologies can be brought to the attention of Congress.


Can You See Me Now?: Toward Reasonable Standards for Law Enforcement Access to Location Data that Congress Could Enact

May 2017

·

1 Read

The use of location information by law enforcement agencies is common and becoming more so as technological improvements enable collection of more accurate, precise location data. The legal mystery surrounding the proper law enforcement access standard for prospective location data remains unsolved. This mystery, along with conflicting rulings over the appropriate law enforcement access standards for both prospective and historical location data, has created a messy, inconsistent legal landscape where even judges in the same district may require law enforcement to meet different standards to compel location data. As courts struggle with these intertwined technology, privacy, and legal issues, some judges are expressing concern over the scope of the harms, from specific and personal to general and social, presented by unfettered government collection and use of location data and how to respond to them. Judges have sought to communicate the scope and gravity of these concerns through direct references to Orwell’s dystopia in 1984, as well as suggestive allusions to the “panoptic effect” observed by Jeremy Bentham and his later interpreters like Michel Foucault. Some have gone on to suggest that privacy issues raised by law enforcement access to location data might be addressed more effectively by the legislature.This Article proposes a legislative model for law enforcement access standards and downstream privacy protections for location information. This proposal attempts to (1) articulate clear rules for courts to apply and law enforcement agents and industry to follow; and (2) strike a reasonable balance among the interests of law enforcement, privacy, and industry with the ultimate goal of improving the position of all concerned when measured against the current state of the law.


Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy

May 2017

·

76 Reads

·

1 Citation

In the early 1990s, off-the-shelf radio scanners allowed any snoop or criminal to eavesdrop on the calls of nearby cell phone users. These radio scanners could intercept calls due to a significant security vulnerability inherent in then widely used analog cellular phone networks: calls were not encrypted as they traveled over the air. In response to this problem, Congress, rather than exploring options for improving the security of cellular networks, merely outlawed the sale of new radio scanners capable of intercepting cellular signals, which did nothing to prevent the potential use of millions of existing interception-capable radio scanners. Now, nearly two decades after Congress passed legislation intended to protect analog phones from interception by radio scanners, we are rapidly approaching a future with a widespread interception threat to cellular communications very reminiscent of the one scanners posed in the 1990s, but with a much larger range of public and private actors with access to a much more powerful cellular interception technology that exploits security vulnerabilities in our digital cellular networks.This Article illustrates how cellular interception capabilities and technology have become, for better or worse, globalized and democratized, placing Americans’ cellular communications at risk of interception from foreign governments, criminals, the tabloid press and virtually anyone else with sufficient motive to capture cellular content in transmission. Notwithstanding this risk, US government agencies continue to treat practically everything about this cellular interception technology, as a closely guarded, necessarily secret “source and method,” shrouding the technical capabilities and limitations of the equipment from public discussion, even keeping its very name from public disclosure. This “source and method” argument, although questionable in its efficacy, is invoked to protect law enforcement agencies’ own use of this technology while allegedly preventing criminal suspects from learning how to evade surveillance.This Article argues that current policy makers should not follow the worn path of attempting to outlaw technology while ignoring, and thus perpetuating, the significant vulnerabilities in cellular communications networks on which it depends. Moreover, lawmakers must resist the reflexive temptation to elevate the sustainability of a particular surveillance technology over the need to curtail the general threat that technology poses to the security of cellular networks. Instead, with regard to this destabilizing, unmediated technology and its increasing general availability at decreasing prices, Congress and appropriate regulators should address these network vulnerabilities directly and thoroughly as part of the larger cyber security policy debates and solutions now under consideration. This Article concludes by offering the beginnings of a way forward for legislators to address digital cellular network vulnerabilities with a new sense of urgency appropriate to the current communications security environment.


How things Work and Fail

July 2012

·

27 Reads

·

·

Andy Steingruebl

·

[...]

·

Sid Stamm

Online Advertising: With Secret Security Web Security Remediation Efforts Content-Sniffing XSS Attacks: XSS with Non-HTML Content Our Internet Infrastructure at Risk Social Spam Understanding CAPTCHAs and Their Weaknesses Security Questions Folk Models of Home Computer Security Detecting and Defeating Interception Attacks Against SSL


Can You See Me Now?: Toward Reasonable Standards for Law Enforcement Access to Location Data that Congress Could Enact

April 2012

·

21 Reads

·

6 Citations

SSRN Electronic Journal

The use of location information by law enforcement agencies is common and becoming more so as technological improvements enable collection of more accurate, precise location data. The legal mystery surrounding the proper law enforcement access standard for prospective location data remains unsolved. This mystery, along with conflicting rulings over the appropriate law enforcement access standards for both prospective and historical location data, has created a messy, inconsistent legal landscape where even judges in the same district may require law enforcement to meet different standards to compel location data. As courts struggle with these intertwined technology, privacy, and legal issues, some judges are expressing concern over the scope of the harms, from specific and personal to general and social, presented by unfettered government collection and use of location data and how to respond to them. Judges have sought to communicate the scope and gravity of these concerns through direct references to Orwell’s dystopia in 1984, as well as suggestive allusions to the “panoptic effect” observed by Jeremy Bentham and his later interpreters like Michel Foucault. Some have gone on to suggest that privacy issues raised by law enforcement access to location data might be addressed more effectively by the legislature.This Article proposes a legislative model for law enforcement access standards and downstream privacy protections for location information. This proposal attempts to (1) articulate clear rules for courts to apply and law enforcement agents and industry to follow; and (2) strike a reasonable balance among the interests of law enforcement, privacy, and industry with the ultimate goal of improving the position of all concerned when measured against the current state of the law.


The Law Enforcement Surveillance Reporting Gap

April 2011

·

36 Reads

·

6 Citations

SSRN Electronic Journal

Third party facilitated surveillance has become a routine tool for law enforcement agencies. There are likely hundreds of thousands of such requests per year. Unfortunately there are few detailed statistics documenting the use of many modern surveillance methods. As such, the true scale of law enforcement surveillance, although widespread, remains largely shielded from public view.Prior to the widespread adoption of the Internet and mobile phones, law enforcement agencies’ use of third party facilitated electronic surveillance was largely limited to real-time interception of communications content ("wiretapping") and non-content data (through the use of "pen register" and "trap and trace" orders). In order to increase its ability to perform effective oversight, Congress mandated that annual reports be created documenting the use of these surveillance powers. These reports are intended to enable policy makers as well as the general public to determine the extent to which such surveillance methods are used, and in the words of Senator Patrick Leahy, provide a "far more reliable basis than anecdotal evidence on which to assess law enforcement needs and make sensible policy in this area."The existing surveillance statistics might be sufficient if law enforcement agencies’ surveillance activities were limited to wiretaps and pen registers. However, over the last decade, law enforcement agencies have enthusiastically embraced many new sources of investigative and surveillance data for which there are no mandatory reporting requirements. As a result, most modern surveillance now takes place entirely off the books and the true scale of such activities, which vastly outnumber traditional wiretaps and pen registers, remains unknown. In this article, I examine the existing electronic surveillance reporting requirements and the reports that have been created as a result. Some of these have been released to public, but many have only come to light as a result of Freedom of Information Act requests or leaks by government insiders. I also also examine several law enforcement surveillance methods for which there are no existing legally mandated surveillance reports. Finally, I propose specific legislative reporting requirements in order to enable some reasonable degree of oversight and transparency over all forms of law enforcement electronic surveillance.


Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL

February 2011

·

200 Reads

·

138 Citations

SSRN Electronic Journal

This paper introduces the compelled certificate creation attack, in which government agencies may compel a certificate authority to issue false SSL certificates that can be used by intelligence agencies to covertly intercept and hijack individuals' secure Web-based communications. Although we do not have direct evidence that this form of active surveillance is taking place in the wild, we show how products already on the market are geared and marketed towards this kind of use - suggesting such attacks may occur in the future, if they are not already occurring. Finally, we introduce a lightweight browser add-on that detects and thwarts such attacks.


Enforced Community Standards for Research on Users of the Tor Anonymity Network

February 2011

·

29 Reads

·

24 Citations

Lecture Notes in Computer Science

Security and privacy researchers are increasingly taking an interest in the Tor network, and have even performed studies that involved intercepting the network communications of Tor users. There are currently no generally agreed upon community norms for research on Tor users, and so unfortunately, several projects have engaged in problematic behavior --- not because the researchers had malicious intent, but because they simply did not see the ethical or legal issues associated with their data gathering. This paper proposes a set of four bright-line rules for researchers conducting privacy invading research on the Tor network. The author hopes that it will spark a debate, and hopefully lead to responsible program committees taking some action to embrace these, or similar rules.


An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government

August 2010

·

18 Reads

·

14 Citations

Today, when consumers evaluate potential telecommunications, Internet service or application providers – they are likely to consider several differentiating factors: The cost of service, the features offered as well as the providers’ reputation for network quality and customer service. The firms’ divergent approaches to privacy, and in particular, their policies regarding law enforcement and intelligence agencies’ access to their customers’ private data are not considered by consumers during the purchasing process – perhaps because it is practically impossible for anyone to discover this information. A naïve reader might simply assume that the law gives companies very little wiggle room – when they are required to provide data, they must do so. This is true. However, companies have a huge amount of flexibility in the way they design their networks, in the amount of data they retain by default, the exigent circumstances in which they share data without a court order, and the degree to which they fight unreasonable requests. As such, there are substantial differences in the privacy practices of the major players in the telecommunications and Internet applications market: Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide government agencies access to user data - one carrier even argued in court that its 1st amendment free speech rights guarantee it the right to do so, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. As such, a consumer’s decision to use a particular carrier or provider can significantly impact their privacy, and in some cases, their freedom. Many companies profess their commitment to protecting their customers’ privacy, with some even arguing that they compete on their respective privacy practices. However, none seem to be willing to disclose, let alone compete on the extent to which they assist or resist government agencies’ surveillance activities. Because information about each firm’s practices is not publicly known, consumers cannot vote with their dollars, and pick service providers that best protect their privacy. In this article, I focus on this lack of information and on the policy changes necessary to create market pressure for companies to put their customers’ privacy first. I outline the numerous ways in which companies currently assist the government, often going out of their way to provide easy access to their customers’ private communications and documents. I also highlight several ways in which some companies have opted to protect user privacy, and the specific product design decisions that firms can make that either protect their customers’ private data by default, or make it trivial for the government to engage in large scale surveillance. Finally, I make specific policy recommendations that, if implemented, will lead to the public disclosure of these privacy differences between companies, and hopefully, create further market incentives for firms to embrace privacy by design.


Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era

August 2009

·

165 Reads

·

70 Citations

Over the last few years, consumers, corporations and governments have rushed to move their data to “the cloud,” adopting web-based applications and storage solutions provided by companies that include Amazon, Google, Microsoft and Yahoo. Unfortunately the shift to cloud computing needlessly exposes users to privacy invasion and fraud by hackers. Cloud based services also leave end users vulnerable to significant invasions of privacy by the government, resulting in the evisceration of traditional Fourth Amendment protections of a person’s private files and documents. These very real risks associated with the cloud computing model are not communicated to consumers, who are thus unable to make an informed decision when evaluating cloud based services. This paper will argue that the increased risk that users face from hackers is primarily a result of cost-motivated design decisions on the part of the cloud providers, who have repeatedly opted to forgo strong security solutions already used in other Internet based industries. With regard to the intrusion upon user privacy performed by government agencies, fault for this privacy harm does not lie with the service providers; but the inherently coercive powers the government can flex at will. The third party doctrine, which permits government agents to obtain users’ private files from service providers with a mere subpoena, is frequently criticized by privacy scholars. However, this paper will argue that this doctrine becomes moot once encryption is in use and companies no longer have access to their customers’ private data. The real threat to privacy lies with the fact that corporations can and have repeatedly been forced to modify their own products in ways that harm end user privacy, such as by circumventing encryption.


Citations (17)


... The roll-out of non-standard software images should be considered cautiously when nationwide images are served, because some countries have restrictions on how encryption is used [39]. In 2017, Pell and Soghoian [68] described the impact of deliberately employed security downgrades for the purpose of cellphone surveillance on national security and consumer privacy, and argue that such policies are counterproductive towards strengthening security. Of course, non-standard software images can also be used for valid purposes such as split testing, but we argue that the CSA will play an important role in then future in terms of preventing the abuse of non-standard software images for the purpose of surveillance. ...

Reference:

Security Analysis of the Matter Protocol
Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy
  • Citing Preprint
  • May 2017

... Applications of sCCTV range from automatic detection of criminal behavior, to identification of search-listed criminals or unwanted individuals, to the prosecution of traffic offenders (Möllers and Hälterlein 2013). Security agencies use SLT, which can be performed through carrier-assisted surveillance, among other things (Pell and Soghoian 2013), to locate, follow, monitor, and gather evidence on suspects. SLT is used by security services and law enforcement agencies to glean information about the location and movements of the phone user over time. ...

A Lot More than a Pen Register, and Less than a Wiretap: What the Stingray Teaches Us About How Congress Should Approach the Reform of Law Enforcement Surveillance Authorities
  • Citing Preprint
  • May 2017

... Diffie and Landau (2007) also highlight the influence of commercial companies which resisted privacy infringements on behalf of national security and insisted on strong encryption and privacy protections for their customers. Other scholars who study privacy and national security in crime-related issues (Bevier, 1999;Dempsey, 1997;Gidari, 2006;Nylund, 2000;Soghoian, 2012) or in both the crime and foreign intelligence arenas (Birnhack & Elkin-Koren, 2003;Kleinig, Mameli, Miller, Salane, & Schqartz, 2011;Logan, 2009;Regan, 2004) also find detriments to privacy on behalf of national security, but they study a limited time frame and specific policy measures, and they do not provide additional explanations for the policy process. ...

THE SPIES WE TRUST: THIRD PARTY SERVICE PROVIDERS AND LAW ENFORCEMENT SURVEILLANCE
  • Citing Article

... In a privacy-preserving distributed system, such as an anonymity network, measurement is complicated by the system's privacy requirements. Storing records of system activity can pose significant risks to the system's users, and consequently the ethics of such techniques [51] have been widely debated [57,61]. Ideally, the measurements produced should satisfy strong privacy definitions, and during the measurement process the system should protect sensitive intermediate data. ...

Enforced Community Standards for Research on Users of the Tor Anonymity Network
  • Citing Conference Paper
  • February 2011

Lecture Notes in Computer Science

... Although it is beyond the scope of this chapter, it is worth noting that in many jurisdictions there is lesser protection for remotely stored data than for data which is in the course of transmission, suggesting that hash value scanning of files stored remotely might be legally permissible even if blocking of those files in the course of communication would not be. On this point see Soghoian (2010b). 14 A variant of this argument is that blocking can prevent the accidental or casual viewer from developing a latent sexual interest in children, and can thereby prevent a progression to contact sexual offending (see e.g. ...

Privacy And Law Enforcement: Caught In The Cloud: Privacy, Encryption, And Government Back Doors In The Web 2.0 Era
  • Citing Article
  • Full-text available

... ple execute a wide range of different applications without running into computational restrictions. Second, gaming consoles are often sold at a subsidised price as manufacturers anticipate significant revenue streams from complementary products such as software, games or controllers (Soghoian 2007). In many cases, purchases of hardware with similar technical specifications would be possible only at higher prices. ...

Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them
  • Citing Article
  • June 2007

SSRN Electronic Journal

... Likewise, information technology is used to identify the likelihood of a terrorist attack or a serious violent event occurring at certain places, including schools, airports or train stations among others [12]. Another application where information technology has been adopted to prevent crime is in the development of computer software to track individuals' interactions on various social media sites [65]. The monitoring of such suspect's interactions is then used to identify abnormal behaviours which can potentially be related to crime intentions. ...

The Law Enforcement Surveillance Reporting Gap
  • Citing Article
  • April 2011

SSRN Electronic Journal

... As DP is increasingly applied to protecting people's privacy, it is vital that organizations deploying DP effectively communicate the privacy implications of implementation details that govern the strength of systems' privacy protections. Without such transparency, organizations risk engaging in "privacy theater," [19,71,72] which may result in people falsely believing they are well-protected [14,75]. ...

An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government
  • Citing Article
  • August 2010

... Cancellation utilizes various strategies like Clearing, in this strategy we erase the media before the reuse of these media and simultaneously give insurance to tolerating the information that contained in the media previously erased. Disinfection, here the insurance for tolerating past information isn't given and this sort of information is ,consistently coursed for lower level of order [27] [28]. ...

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era
  • Citing Article
  • August 2009

... Este fenómeno ha conducido a la proliferación de formatos publicitarios variados y a la implementación de técnicas de segmentación más refinadas, como la orientación basada en el comportamiento del usuario (Iyer et al., 2005). No obstante, esta evolución ha conllevado desafíos significativos; la saturación de anuncios en línea ha originado la aparición de bloqueadores de anuncios, lo que ha suscitado inquietudes respecto a la eficacia de las estrategias publicitarias digitales y su influencia en la experiencia del usuario (Soghoian, 2007). Estos bloqueadores han emergido en respuesta a la proliferación de publicidad intrusiva y a la percepción de que la experiencia del usuario se ve comprometida por la omnipresencia de anuncios en línea (Redondo y Aznar, 2018). ...

The Problem of Anonymous Vanity Searches
  • Citing Article
  • January 2007

SSRN Electronic Journal