Bolstering Data Privacy and Mobile Security: An Assessment of IMSI Catcher Threats

United States House of Representatives, Committee on Science, Space, and Technology, Subcommittee on Oversight

Washington, DC

June 27, 2018

Tech Policy Startup Nation

Tel Aviv University, Cyber Week

Tel Aviv, Israel

June 18, 2018

Cold War 2.0: Russian Hacking and Election Interference

Princeton University, Reunions

Princeton, NJ

June 1, 2018

Adventures in Bureaucracy

Princeton Center for Information Technology Policy

Princeton, NJ

April 3, 2018

The Regulators’ Perspective: Engineering Mitigation Efforts

International Association of Privacy Professionals, Privacy Engineering Section Forum

Washington, DC

March 29, 2018

Trending Technology Issues in Data Security and Privacy Law

Practicing Law Institute

San Francisco, CA

January 26, 2018

Encryption and the Law

Federal Judicial Center, Court Web

Washington, DC

June 28, 2017

What Judges Should Know About Surveillance Technology

Federal Judicial Center, Fourth Circuit Workshop

Baltimore, MD

June 15, 2017

Technology and the Law

Federal Judicial Center, Sixth Circuit Workshop

Cleveland, OH

May 10, 2017

Constitutional Malware

Northwestern University Pritzker School of Law

Chicago, IL

February 16, 2017

Regulating Security and Privacy

Data & Society

New York, NY

February 1, 2017

Recurring Technology Issues in Data Security and Privacy Litigation

Practicing Law Institute

San Francisco, CA

January 20, 2017

The Fourth Amendment and Surveillance

Federal Judicial Center, Ninth Circuit Workshop

Tucson, AZ

January 30, 2017

Constitutional Malware

Duke University School of Law

Durham, NC

January 12, 2017

Constitutional Malware

Stanford Law School

Stanford, CA

December 7, 2016

Constitutional Malware

Columbia Law School

New York, NY

November 30, 2016

Constitutional Malware

University of Utah S.J. Quinney College of Law

Salt Lake City, UT

November 17, 2016

Constitutional Malware

Louisiana State University Paul M. Hebert Law Center

Baton Rouge, LA

November 16, 2016

Constitutional Malware

Boston College Law School

Newton, MA

November 10, 2016

Constitutional Malware

Indiana University Maurer School of Law

Bloomington, IN

November 7, 2016

Constitutional Malware

Princeton Center for Information Technology Policy

Princeton, NJ

October 25, 2016

Privacy, Security, and Connectivity

Stanford University, Reunions

Stanford, CA

October 21, 2016

Regulation and Cybersecurity

Computational Cybersecurity in Compromised Environments

Atlanta, GA

October 19, 2016

Constitutional Malware

Harvard Law School

Cambridge, MA

October 3, 2016

Third-Party Privacy for Government Websites

General Services Administration

Washington, DC

August 25, 2016

Meet the Feds

DEF CON 24

Las Vegas, NV

August 5, 2016

Crumbling the Supercookie, and Other Ways the FCC Protects Your Internet Traffic

Black Hat

Las Vegas, NV

August 4, 2016

Electronic Surveillance

Federal Judicial Center, National Workshop for United States Magistrate Judges

San Francisco, CA

July 18, 2016

Combating Robocalls with Technology

Indiana Attorney General and Missouri Attorney General, No-Call Law Enforcement Summit

Indianapolis, IN

April 21, 2016

Electronic Surveillance

Federal Judicial Center, National Workshop for United States Magistrate Judges

Charleston, SC

April 11, 2016

Bulk Data Privacy Implications

Journal of Business and Technology Law, Bulk Data and Personal Privacy

Baltimore, MD

April 1, 2016

The Privacy Properties of Telephone Metadata

Princeton Center for Information Technology Policy

Princeton, NJ

March 7, 2016

Anatomy of a Security Breach Suit

Practicing Law Institute

San Francisco, CA

January 28, 2016

Innovations in Commerce and Cybercrime

University of Oxford, Arcs in Internet Regulation

Oxford, UK

November 24, 2015

The Debate Over United States v. Nosal

George Washington Law Review, Hacking into the CFAA

Washington, DC

November 6, 2015

The Privacy Properties of Telephone Metadata

Carnegie Mellon School of Computer Science, Privacy Seminar

Pittsburgh, PA

October 29, 2015

Passcode for Liberty

Competitive Enterprise Institute

Washington, DC

October 20, 2015

The Going Dark Debate

Georgetown Law and Just Security

Washington, DC

September 21, 2015

Surveillance Law for Computer Scientists

Workshop on Surveillance and Technology

Philadelphia, PA

June 29, 2015

Data Mining, Bulk Collection, and Section 215

Federal Judicial Center

Washington, DC

June 2, 2015

Preparing for the Next Round in Net Neutrality

Media Law Resource Center, Legal Frontiers in Digital Media

Mountain View, CA

May 14, 2015

Determining the Role of Technology

Woodrow Wilson School, Technology, Law, and Policy After Snowden

Princeton, NJ

May 2, 2015

Redacting PDF Documents: Harder Than It Looks

Stanford Security Lab, Security Workshop

Stanford, CA

April 27, 2015

From DNT to NSA

International Association of Privacy Professionals, Global Privacy Summit

Washington, DC

March 5, 2015

Privacy Regulation in the Internet of Things

The National Security Agency

Fort Meade, MD

February 2015

Technology and Privacy

Stanford Public Policy Program

Stanford, CA

February 24, 2015

Securing the Industrial Internet of Things

Fujitsu North America Technology Forum

Santa Clara, CA

February 11, 2015

The Ethics of Encryption

Santa Clara University

Santa Clara, CA

February 3, 2015

Anatomy of a Security Breach Suit

Practicing Law Institute

San Francisco, CA

January 23, 2015

The Impact of Emerging Technologies on Civil Liberties

Privacy Identity Innovation

Palo Alto, CA

November 13, 2014

Saving Privacy

Stanford Center for Ethics in Society

Stanford, CA

November 11, 2014

The Science of Surveillance

Stanford+Connects

San Diego, CA

November 8, 2014

A Head-to-Head on the Junction of Data and Privacy

Privacy XChange Forum

Scottsdale, AZ

November 3, 2014

Measuring Online Tracking and Data Collection

Princeton Center for Information Technology Policy, Web Privacy and Transparency Conference

Princeton, NJ

October 24, 2014

Economic, Psychological, and Organizational Dimensions of Cybersecurity

Stanford Center for International Security and Cooperation, Cybersecurity Boot Camp

Stanford, CA

August 19, 2014

The Science of Surveillance

Vienna University of Technology, Computer Security Foundations

Vienna, Austria

July 22, 2014

The Science of Surveillance

Hackers on Planet Earth (HOPE) X

New York, NY

July 20, 2014

Terms of Abuse

The George Washington School of Law, Privacy Law Scholars Conference

Washington, DC

June 5, 2014

The Science of Surveillance

Stanford Computer Science Department, Faculty Lunch

Stanford, CA

May 13, 2014

Terms of Abuse

Stanford Security Lab, Security Lunch

Stanford, CA

April 30, 2014

The Science of Surveillance

Stanford Security Lab, Security Workshop

Stanford, CA

April 14, 2014

Privacy Solutions: Law and Technology

University of California Hastings College of Law, The Value of Privacy

San Francisco, CA

April 7, 2014

The Science of Surveillance

Princeton Center for Information Technology Policy

Princeton, NJ

February 13, 2014

Measuring NSA Surveillance

Stanford Center for International Security and Cooperation, Science Seminar

Stanford, CA

December 9, 2013

Terms of Abuse

University of Michigan, SUMIT

Ann Arbor, MI

October 15, 2013

Technology as a Challenge and a Solution

FPF and Stanford CIS, Workshop on Big Data and Privacy

Washington, DC

September 10, 2013

CFAA Reform Strategy

Black Hat

Las Vegas, NV

July 31, 2013

Aaron’s Law and the Future of CFAA Reform

CNET

San Francisco, CA

July 22, 2013

What Is Do Not Track? Where Does It Stand Now?

National Press Club, Do Not Track Conference

Washington, DC

June 27, 2013

Web Privacy: What Comes Next?

TruEffect Partner Summit

Boulder, CO

June 18, 2013

Nudging Security and Privacy

Stanford Center for International Security and Cooperation, Science Seminar

Stanford, CA

May 13, 2013

Measuring Privacy

Princeton Center for Information Technology Policy, Big Privacy

Princeton, NJ

April 26, 2013

Are we criminals? How a 1980s hacking law undermines computer security.

Stanford Security Lab, Security Workshop

Stanford, CA

April 15, 2013

This Conversation Is Being Recorded

Free Press, National Conference for Media Reform

Denver, CO

April 6, 2013

Do Not Track: Technology, Policy, and Politics

University of San Francisco Law School

San Francisco, CA

April 2, 2013

Evaluating Reform Proposals

University of California Hastings Law School, Symposium on the Computer Fraud and Abuse Act

San Francisco, CA

March 22, 2013

Introduction

Stanford CIS/CISAC and Princeton CITP, Innovation or Exploitation? The Limits of Computer Trespass Law

Stanford, CA

February 19, 2013

Behavioral Advertising and Privacy Law Reboot

Stanford Center for E-Commerce

Stanford, CA

October 10, 2012

Tracking Not Required

Dutch Data Protection Authority

The Hague, Netherlands

September 20, 2012

Google’s Safari Tracking

London School of Economics

London, UK

September 16, 2012

Tracking Not Required

Mozilla

Mountain View, CA

July 25, 2012

Third-Party Web Tracking: Policy and Technology

Berkeley Center for Law and Technology, Conference on Web Privacy Measurement

Berkeley, CA

June 1, 2012

FourthParty

Berkeley Center for Law and Technology, Conference on Web Privacy Measurement

Berkeley, CA

June 1, 2012

Third-Party Web Tracking: Policy and Technology

Stanford Computer Science Department, Faculty Lunch

Stanford, CA

May 29, 2012

Third-Party Web Tracking: Policy and Technology

IEEE Symposium on Security and Privacy

San Francisco, CA

May 22, 2012

Increasing Transparency for Consumers

Privacy Identity Innovation

Seattle, CA

May 22, 2012

Do Not Track: Technology, Policy, and Politics

Adobe, Developer Seminar

San Jose, CA

May 3, 2012

Do Not Track: Technology, Policy, and Politics

Stanford Law and Technology Association

Stanford, CA

May 1, 2012

Do Not Track: Technology, Policy, and Politics

Symantec Research Labs

Mountain View, CA

April 20, 2012

Third-Party Web Tracking: Policy and Technology

Stanford Security Lab, Security Workshop

Stanford, CA

April 2, 2012

Do Not Track: Technology, Policy, and Politics

University of Illinois College of Law

Champaign, IL

February 23, 2012

Third-Party Cookie Blocking

Stanford Security Lab, Security Lunch

Stanford, CA

February 15, 2012

Do Not Track: Technology, Policy, and Politics

Stanford Center for Internet and Society

Stanford, CA

November 29, 2011

Tracking the Trackers

TRUST Conference

Washington, DC

November 3, 2011

Do Not Track: Technology, Policy, and Politics

Microsoft Research

Redmond, WA

October 27, 2011

Do Not Track: Technology, Policy, and Politics

Stanford Center for International Security and Cooperation, Science Seminar

Stanford, CA

October 17, 2011

What Dropbox Got Wrong

Stanford Security Lab, Security Lunch

Stanford, CA

October 12, 2011

Where Everybody Knows Your Username

National Press Club, Third-Party Web Trackers and Consumer Privacy

Washington, DC

October 11, 2011

Do Not Track: Technology, Policy, and Politics

Stanford Security Lab, Workshop on Internet Tracking, Advertising, and Privacy

Stanford, CA

July 22, 2011

Do Not Track: Technology, Policy, and Politics

The Security Confab

Monterey, CA

July 22, 2011

Do Not Track: Technology, Policy, and Politics

Stanford Security Lab, Security Lunch

Stanford, CA

May 18, 2011

Do Not Track Header and Tracking Protection Lists

Princeton Center for Information Technology Policy, W3C Workshop on Web Tracking and User Privacy

Princeton, NJ

April 28, 2011

Online Advertising and Privacy

Yale Law Information Society Project, From Mad Men to Mad Bots

New Haven, CT

April 28, 2011

Technical Approaches

Berkeley Center for Law and Technology, Browser Privacy Roundtable

Berkeley, CA

February 9, 2011

Do Not Track: Technology, Policy, and Politics

TRUST, Security Seminar

Berkeley, CA

February 3, 2011

Do Not Track: Technology, Policy, and Politics

Stanford Security Lab, Security Lunch

Stanford, CA

February 2, 2011