I appeared on ABC’s “This Week” with privacy researcher Ashkan Soltani to discuss how indiscriminate surveillance both on- and offline is creating a world where it will be impossible not to be found.
I appeared on ABC’s “This Week” with privacy researcher Ashkan Soltani to discuss how indiscriminate surveillance both on- and offline is creating a world where it will be impossible not to be found.
I spoke with Jasmin Loerchner of Net Wars/Out of CTRL, a multimedia documentary project about cyber crime. I discussed how criminals make use of their victims’ personal data on the Web, whether I support an “Internet of Things,” and more. Read an excerpt below, or the full interview here.
When did you decide to write “Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance”? What drove you into your experiment?
For three years, I led a team of investigative reporters who researched privacy issues. During that time, I started to feel that the continuing revelations about how much personal data was being tracked was making people feel hopeless about privacy. So I decided investigate whether I could control my personal data: I sometimes call it an investigation into whether there is any hope for privacy.
Continue reading on netwars-project.com.
I visited my hometown of Palo Alto, CA to speak about Dragnet Nation at Stanford Law School’s Center for Internet and Society. Check out my lecture, followed by a Q&A with the audience:
In the course of writing my book, Dragnet Nation, I tried various strategies to protect my privacy. In this series of book excerpts and adaptations, I distill the lessons from my privacy experiments into tips for readers.
Ever since Edward Snowden revealed the inner secrets of the NSA, he has been urging Americans to use encryption to protect themselves from rampant spying.
“Encryption does work,” Snowden said, via a remote connection at the SXSW tech conference. “It is a defense against the dark arts for the digital realm.”
ProPublica has written about the NSA’s attempts to break encryption, but we don’t know for sure how successful the spy agency has been, and security experts still recommend using these techniques.
And besides, who doesn’t want to defend against the dark arts? But getting started with encryption can be daunting. Here are a few techniques that most people can use.
Encrypt the data you store. This protects your data from being read by people with access to your computer.
Encrypt the data you transmit. The Snowden revelations have revealed that U.S. and British spy agencies are grabbing as much unencrypted data as they can find as it passes over the Internet. Encrypting your data in transit can protect it against spy agencies, as well as commercial data gatherers.
I was included on Time.com’s “140 Best Twitter Feeds of 2014.”
“No one is better at tracking the twists and turns in the debate over privacy and surveillance than Julia Angwin,” writes Chris Wilson.
For more, follow me @JuliaAngwin.
Hear me discuss the game-changing rise in facial recognition technology and other privacy threats during my recent talk at the Shorenstein Center on Media, Politics and Public Policy at Harvard University’s Kennedy School of Government.
I gave a lecture at the New America Foundation’s Open Technology Institute in Washington D.C., followed by a roundtable discussion with Kevin Bankston and Lina Khan. I also fielded insightful questions from the audience, including one on a favorite topic: How I instill good privacy habits in my two children.
Watch the full video below.
Check out my Q&A with Lina Khan of the New America Foundation’s “Weekly Wonk.” I talk about commercial data dragnets, taking privacy-awareness to the voting booth, and more.
I spoke with Marketplace’s Ben Johnson about the wealth gap in the world of privacy: how “tech elites” utilize sophisticated (and expensive) tools to protect their privacy, while the majority of people remain vulnerable.
I was on Yahoo Finance’s “The Daily Ticker” to talk about Obama’s call to curtail the mass collection of phone record data by the NSA, and how tech companies have begun taking a more aggressive stance to protect their data. Read a summary, or watch below: