{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:11:30Z","timestamp":1729627890160,"version":"3.28.0"},"reference-count":121,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/istas.2013.6613118","type":"proceedings-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T18:31:24Z","timestamp":1380738684000},"page":"191-200","source":"Crossref","is-referenced-by-count":1,"title":["Beyond sunglasses and spray paint: A taxonomy of surveillance countermeasures"],"prefix":"10.1109","author":[{"given":"Lisa A.","family":"Shay","sequence":"first","affiliation":[]},{"given":"Gregory","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Woodrow","family":"Hartzog","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","article-title":"Newspaper hires armed security guards after backlash over gun-owner map","author":"wang","year":"2013","journal-title":"Time Newsfeed"},{"key":"36","article-title":"The unveiling of my next big project: Zphone","volume":"13","author":"zimmermann","year":"2005","journal-title":"DefCon"},{"key":"33","article-title":"Facebook to roll out http s by default to all users","author":"constantin","year":"2012","journal-title":"Computer World"},{"key":"34","article-title":"New online privacy rules for children","author":"singer","year":"2012","journal-title":"New York Times"},{"key":"39","article-title":"Bill would limit homeland security laptop searches","author":"condon","year":"2008","journal-title":"CNET News"},{"key":"37","article-title":"Upcoming eu data law will make europe tricky for facebook","author":"leach","year":"2011","journal-title":"The Register"},{"key":"38","article-title":"L. A. Traffic cameras may get the red light","author":"rubin","year":"2011","journal-title":"Los Angeles Times"},{"journal-title":"Science Daily","article-title":"World's highest-resolution commercial satellite","year":"2009","key":"43"},{"journal-title":"U S Committee on Homeland Security","article-title":"Transportation security subcommittee to hold hearing on tsa body scanners","year":"2012","key":"42"},{"key":"41","article-title":"TSA to commission independent study of x-ray body scanners","author":"grabell","year":"2012","journal-title":"ProPublica"},{"journal-title":"Federal Trade Commission","article-title":"FTC to study data broker industry's collection and use of consumer data","year":"2012","key":"40"},{"journal-title":"Huffmgton Post","article-title":"Andrea fomella abbott arrested for yelling at tsa over daughter's patdown","year":"2011","key":"22"},{"key":"23","article-title":"Pentagon swears it won't sell killer drones to afghanistan, just spy ones","author":"ackerman","year":"2013","journal-title":"Wired Danger Room Blog"},{"journal-title":"Electronic Privacy Information Center","year":"2013","key":"24"},{"key":"25","article-title":"Facebook sued over app center data sharing in germany","author":"essers","year":"2012","journal-title":"Techworld"},{"key":"26","article-title":"Sony to restore psn services, compensate customers","author":"ogg","year":"2011","journal-title":"CNET News"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"28","article-title":"'Reverse robocall' campaign lets citizens phone-blast sopa supporters","author":"gallagher","year":"2011","journal-title":"ARS Technica"},{"key":"29","article-title":"California state legislature approves location privacy act","author":"geuss","year":"2012","journal-title":"ARS Technica"},{"journal-title":"Merriam-Webster Dictionary Online","year":"0","key":"3"},{"key":"2","article-title":"Nineteen eighty-four","author":"orwell","year":"1949","journal-title":"Seeker and Warburg"},{"journal-title":"Total Information Awareness","year":"2002","author":"rosen","key":"1"},{"key":"30","article-title":"German privacy regulator orders facebook to end its real name policy","author":"essers","year":"2012","journal-title":"ITworld"},{"key":"7","article-title":"Countermeasures: Proactive self-defense against ubiquitous surveillance","author":"shay","year":"2012","journal-title":"Hope Number 9"},{"key":"6","article-title":"Our instrumented lives: Sensors, sensors, everywhere","author":"conti","year":"2010","journal-title":"DefCon 17"},{"key":"32","article-title":"Privacy group asks ftc to investigate google","author":"gralla","year":"2009","journal-title":"PC World"},{"journal-title":"Department of Defense Dictionary of Military and Associated Term' JointPublication","first-page":"1","year":"2010","key":"5"},{"key":"31","article-title":"California attorney general puts mobile app developers on notice","author":"saita","year":"2012","journal-title":"Threat Post Blog"},{"key":"4","article-title":"50 cyber questions every airman can answer","author":"jabbour","year":"2008","journal-title":"Air Force Research Lab"},{"key":"9","first-page":"477","volume":"154","year":"2006","journal-title":"Lawrence Lessig CODE Version 2 0 Basic Books"},{"journal-title":"The Twelfth Workshop on the Economics of Information Security (WEIS 2013)","year":"2013","key":"8"},{"key":"19","article-title":"Google balances privacy, reach","author":"mills","year":"2005","journal-title":"CNET News"},{"key":"17","article-title":"EU data protection: Proposed amendments written by us lobbyists","author":"moody","year":"2013","journal-title":"Computerworld UK"},{"key":"18","article-title":"Code is law: On liberty in cyberspace","author":"lessig","year":"2000","journal-title":"Harvard Magazine"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.328860"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2012.6393547"},{"key":"13","article-title":"A revised taxonomy of social networking data","author":"schneier","year":"2010","journal-title":"Schneier on Security"},{"journal-title":"Googling Security","year":"2009","author":"conti","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4607928"},{"key":"12","article-title":"Deception in war","author":"latimer","year":"2003","journal-title":"Overlook"},{"key":"21","article-title":"City issued speed camera ticket to motionless car","author":"calvert","year":"2012","journal-title":"Baltimore Sun"},{"key":"20","article-title":"How apple and amazon security flaws led to my epic hacking","author":"honan","year":"2012","journal-title":"Wired Gadget Lab Blog"},{"key":"109","article-title":"Are you following the NSA's 'Home Network Security Best Practices","author":"kingsley-hughes","year":"2011","journal-title":"ZDNet"},{"key":"108","article-title":"Go to trial: Crash the justice system","author":"alexander","year":"2012","journal-title":"New York Times"},{"journal-title":"Bill Summary and Status 1 Uth Congress","article-title":"Camera phone predator alert act","year":"0","key":"107"},{"key":"106","article-title":"Death by algorithm: WestPoint code shows which terrorists should disappear first","author":"noahshachtman","year":"2012","journal-title":"Wired Danger Room Blog"},{"key":"105","article-title":"'Smart' parking meter implementations, globalism, and you","volume":"17","author":"grand","year":"2009","journal-title":"DefCon"},{"key":"104","article-title":"Choice urges ip spoofmg for better it prices","author":"bender","year":"2012","journal-title":"ComputerWorld"},{"journal-title":"Why the Interest in Illegal Cell Phone Jammers?\" CNN News","year":"2012","author":"gross","key":"103"},{"journal-title":"ElectronicFrontier Foundation See","year":"2013","key":"102"},{"year":"2013","key":"99"},{"journal-title":"The Open Web Application Security Project","article-title":"LOS developer cheat sheet","year":"2013","key":"101"},{"journal-title":"Federal Trade Commission","article-title":"FTC staff issues privacy report, offers framework for consumers, businesses, and policymakers","year":"2010","key":"100"},{"journal-title":"Slashdot","article-title":"EU citizens warned not to use us cloud services over spying fears","year":"2013","key":"98"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.09.005"},{"journal-title":"BBC News","article-title":"NASA to encrypt data after its latest laptop loss","year":"2012","key":"96"},{"journal-title":"Tor Project","article-title":"Tor browser bundle","year":"2013","key":"95"},{"journal-title":"Security Week","article-title":"Russian Unveils Secure 'Almost Android' Tablet to Keep Data Away from Google","year":"2012","key":"94"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.74"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v16i5.3493"},{"key":"91","article-title":"How to detect apps leaking your data","author":"simonite","year":"2012","journal-title":"MIT Technology Review"},{"year":"0","key":"90"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2010.937030"},{"key":"88","article-title":"Did chinese officials copy U. S. Government laptop data and use it in hack","author":"mills","year":"2008","journal-title":"CNET"},{"key":"89","article-title":"ATM crime: More and more machines get withdrawn","author":"gandel","year":"2010","journal-title":"Time"},{"journal-title":"Speed Trap Sharing System","year":"2013","key":"116"},{"key":"117","article-title":"License plate frame foils irksome traffic-light cameras","author":"schiller","year":"2012","journal-title":"Wired Raw File Blog"},{"key":"79","article-title":"How to talk to the mainstream media","author":"cass","year":"2008","journal-title":"The Last HOPE"},{"key":"114","article-title":"Army PlotsNew Infrared 'Obscurants' to Thicken Fog of War","author":"plackett","year":"2012","journal-title":"Wired Danger Room Blog"},{"year":"0","key":"78"},{"key":"115","article-title":"Special ops wants commandos to have invisible faces","author":"drummond","year":"2011","journal-title":"Wired Danger Room Blog"},{"key":"77","article-title":"Don't be a petraeus: A tutorial on anonymous email accounts","author":"bauman","year":"2012","journal-title":"The Electronic Frontier Foundation"},{"key":"112","article-title":"Anti-Drone Camouflage: What to Wear inTotal Surveillance","author":"maly","year":"2013","journal-title":"Wired Design Blog"},{"year":"2013","key":"113"},{"journal-title":"CV Dazzle","article-title":"Camouflage from face detection","year":"2013","key":"110"},{"key":"111","article-title":"Facial recognition: Facts","volume":"18","author":"marpet","year":"2010","journal-title":"Fiction AndFsck-Ups!\" Defcon"},{"year":"2013","key":"118"},{"key":"119","article-title":"New Cameras to Watch Cameras that Watch You","author":"ashe","year":"2012","journal-title":"WTOP News"},{"key":"82","article-title":"The threatof silence","author":"gallagher","year":"2013","journal-title":"Slate"},{"year":"2013","key":"83"},{"journal-title":"The Mozilla","article-title":"Private browsing- browse the web without saving information about the sites you visit","year":"2012","key":"80"},{"journal-title":"DoNotTrackMe","year":"2013","key":"81"},{"journal-title":"U S Department of State Bureau of Diplomatic Security","year":"2012","key":"86"},{"key":"87","article-title":"Homeland security: We can seize laptops for an indefinite period","author":"mccullagh","year":"2008","journal-title":"CNET"},{"year":"2013","key":"84"},{"key":"85","article-title":"Can you erase yourself from the internet","author":"martin","year":"2013","journal-title":"PC PRO"},{"key":"67","article-title":"No-frills nbn provider aims for the tech savvy: Engineers from members-only utility","author":"hutchinson","year":"2012","journal-title":"ITU News"},{"key":"66","article-title":"Banned from google+, anonymous creates anonplus","author":"protalinski","year":"0","journal-title":"Techspot"},{"journal-title":"The Electronic Frontier Foundation","article-title":"EFF pioneer awards","year":"2012","key":"69"},{"key":"68","article-title":"Hate illegal robocalls? Ftc offers 50,000 to help stop them","author":"gahran","year":"2012","journal-title":"CNN Tech"},{"key":"121","article-title":"Give social networks fake details, advises whitehall web security official","author":"wheeler","year":"2012","journal-title":"BBC News"},{"journal-title":"Electronic Privacy Information Center","article-title":"EPIc gives 2012 privacy champion awards to canadian privacy commissioner, privacy technologist","year":"2012","key":"70"},{"key":"120","article-title":"Suicidal sensors: Darpa wants next-gen spy hardware to literally dissolve","author":"ackerman","year":"2013","journal-title":"Wired Danger Room Blog"},{"journal-title":"The Wall Street Journal","article-title":"The wall street journal data transparency weekend","year":"2012","key":"71"},{"journal-title":"Consumer Reports","article-title":"Facebook & your privacy","year":"2012","key":"72"},{"journal-title":"Wall Street Journal","article-title":"What they know","year":"2010","key":"73"},{"key":"74","article-title":"A trail of clicks, culminating in conflict","author":"singer","year":"2012","journal-title":"New York Times"},{"journal-title":"EECS 598-008","article-title":"Medical device security","year":"2013","key":"75"},{"key":"76","article-title":"4 Simple changes to stop online tracking","author":"auerbach","year":"2012","journal-title":"The Electronic Frontier Foundation"},{"key":"59","article-title":"Exploiting lawful intercept to wiretap the internet","author":"cross","year":"2010","journal-title":"Black Hat DC"},{"key":"58","article-title":"TSa to halt revealing body scans at airports","author":"nicas","year":"2013","journal-title":"Wall Street Journal"},{"key":"57","article-title":"German activists punch out big brothers eyes","author":"zetter","year":"2013","journal-title":"Wired Danger Room Blog"},{"key":"56","article-title":"Instagram: We won't sell your photos","author":"richmond","year":"2012","journal-title":"The Telegraph"},{"journal-title":"The Northern Echo","article-title":"Newcastle university students protest biometric scanner move","year":"2012","key":"55"},{"key":"64","article-title":"Your own private google: The quest for an open source search engine","author":"finley","year":"2012","journal-title":"Wired Enterprise Blog"},{"key":"65","article-title":"A social network built for two","author":"metz","year":"2012","journal-title":"MIT Technology Review"},{"key":"62","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14527-8_1","article-title":"How unique is your browser","author":"eckersley","year":"2010","journal-title":"Privacy Enhancing Technologies Symposium"},{"journal-title":"Take Action","year":"2013","key":"63"},{"key":"60","article-title":"Systems and methods for receiving infrared data with a camera designed to detect images based on visible light","author":"tiscareno","year":"2011","journal-title":"U S Patent Application 20110128384"},{"key":"61","first-page":"745772","article-title":"I've got nothing to hide and other misunderstandings of privacy","volume":"44","author":"solove","year":"2007","journal-title":"San Diego Law Review"},{"journal-title":"BBC","article-title":"Apple users launch privacy campaign against google","year":"2013","key":"49"},{"key":"48","article-title":"New study says traffic-light cameras cause accidents","author":"jerome","year":"2008","journal-title":"IVerf"},{"key":"45","article-title":"Google settles with ftc over tracking cookies, pays 22. 5m fine","author":"fisher","year":"2012","journal-title":"Threat Post Blog"},{"journal-title":"European Commission Press Release","article-title":"Aviation security: Commission adopts new rules on the use of security scanners at european airports","year":"2011","key":"44"},{"key":"47","article-title":"Some find pennsylvania's tax amnesty ads too scary","author":"toland","year":"2012","journal-title":"Pittsburgh Post Gazette"},{"journal-title":"U S Committee on Oversight and Government Reform","article-title":"TSA oversight part iii: Effective security or security theater?","year":"2012","key":"46"},{"key":"51","article-title":"Court casts a wary eye on tracking by gps","author":"liptak","year":"2011","journal-title":"New York Times"},{"key":"52","article-title":"Bemers-lee: Demand your data from internet companies","author":"scott","year":"2012","journal-title":"IT World"},{"key":"53","article-title":"School kicks out sophomore in rfid student-id flap","author":"kravets","year":"2013","journal-title":"Wired ThreatLevel Blog"},{"key":"54","article-title":"Wikipedia's jimmy wales is ready to fight snooper's charter","author":"smolaks","year":"2012","journal-title":"Tech Week Europe"},{"key":"50","article-title":"German state to sue facebook over facial recognitionfeature","author":"protalinski","year":"2011","journal-title":"ZDNet"}],"event":{"name":"2013 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2013,6,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2013,6,29]]}},"container-title":["2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596466\/6613092\/06613118.pdf?arnumber=6613118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T19:02:11Z","timestamp":1498071731000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6613118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":121,"URL":"https:\/\/doi.org\/10.1109\/istas.2013.6613118","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}