*** Welcome to piglix ***

Christopher Soghoian

Christopher Soghoian
2013-12-29 30C3 - Christopher Soghoian 3145.JPG
Born 1981 (age 35–36)
San Francisco, California, U.S.
Residence Washington, DC, United States
Alma mater James Madison University ('02)
Johns Hopkins University ('05)
Indiana University ('12)
Occupation Researcher and activist
Known for Security and privacy activism
Website www.dubfire.net
External video
Government surveillance — this is just the beginning on YouTube, Christopher Soghoian, TED talks, March 5, 2014

Christopher Soghoian (born 1981) is a privacy researcher and activist. He is currently working for Senator Ron Wyden as a TechCongress Fellow. From 2012 to 2016, he was the principal technologist at the American Civil Liberties Union.


Soghoian is the nephew of Sal Soghoian, the Automation Product Manager at Apple Inc., responsible for AppleScript and Automator.

Soghoian, who holds British and US nationality, received a B.S. from James Madison University (Computer Science; 2002), a Masters from Johns Hopkins University (Security Informatics; 2005), and a PhD from Indiana University (Informatics; 2012). His dissertation focused on the role that third-party internet and telecommunications service providers play in facilitating law enforcement surveillance of their customers.

Soghoian is a Visiting Fellow at Yale Law School's Information Society Project and a TED Senior Fellow. He was previously an Open Society Foundations Fellow and a Student Fellow at the Berkman Center for Internet & Society at Harvard University.

Soghoian's research and advocacy is largely focused on government surveillance. His research has shed significant light on the use of sophisticated surveillance technologies by US law enforcement agencies, exposing such techniques to public debate and criticism.

In an August, 2013 presentation at the hacker conference DEF CON, Soghoian highlighted the existence of a dedicated FBI team that delivers malware to the computers and mobile devices of surveillance targets. In his presentation, Soghoian stated that he discovered the team by reading heavily-redacted government documents and by looking at the profiles of ex-FBI contractors on the social network website LinkedIn. In October, 2014, Soghoian called attention to the fact that the FBI had, in 2007, impersonated the Associated Press in an effort to deliver malware to a teenager in Washington State who had threatened to bomb his high school. This act of deception was strongly condemned by leading news organizations, including by the General Counsel of the Associated Press.


...
Wikipedia

...