Lorrie Cranor's Press Clippings

See also my videos page for videos of talks and press appearances

News articles that mention me or my work


Your Home Internet Bill Can Be Deceptively Confusing. Now It’s (Slightly) Easier to Understand. by Rob Pegoraro, New York Times Worecutter, May 1, 2023.

Broadband "nutrition labels" help you comparison shop for cable by Meghan McCarty Carino, Marketplace, April 11, 2024.

Make Methodologies for Broadband Performance Publicly Available: Panelists by Jericho Casper, BroadbandBreakfast, March 8, 2024.

Anyone can be a victim as fraud losses hit record high by Jack Troy, Trib Live, March 8, 2024.


Former FTC Chief Technologist outlines better user privacy policies by Neel Kulkarni, Student Life, November 1, 2023.

How to tell if a gadget is secure? Look for this new governmen t seal. by Geoffrey A. Fowler, The Washington Post, July 19, 2023.

Annoying Password Rules Actually Make Us Less Secure by Christopher Mims, The Wall Street Journal, March 11, 2023.

Twitter's Two-Factor Authentication Change 'Doesn't Make Sense' by Lily Hay Newman, February 18, 2023.

IoT manufacturers should embrace privacy "nutrition labels" by John Donegan, ManageEngine Insights, February 9, 2023.


'Fortnite' maker Epic Games to pay $520 million in record-breaking FTC settlement interview with Sheldon Ingram, Pittsburgh's Action News 4 WTAE, December 19, 2022.

Faces of Security: Dr. Lorrie Faith Cranor from Carnegie Mellon University By Joe Bebon, Editor, Total Security Advisor, Nov 28, 2022.

Google Settings Still Confusing After $85 Million Lawsuit Over How Confusing They Were by Thomas Germain, Gizmodo, October 5, 2022.

Personalities of Pittsburgh: Lorrie Cranor is securing privacy in the digital age by Nate Doughty, Pittsburgh Business Times, September 30, 2022.

Mandatory password updates are passe by Tim Starkes, The Washington Post, August 18, 2022.

Period-Tracking Apps Are Just the Beginning of Post-Roe Data Concerns by Bree Fowler, CNET, June 30, 2022.

I tried to read all my app privacy policies. It was 1 million words. by Geoffrey A. Fowler, The Washington Post, May 31, 2022. [I also participated in accompanying 40-minute Twitter Space audio discussion]

What your Android phone's new "data safety" labels mean by Chris Valazco, The Washington Post, May 5, 2022.

Google Adds Privacy Labels to Apps. But Will They Help? by Thomas Germain, Consumer Reports, April 26, 2022.

Broadband Labels Must Be Simple, Have Comparable Data, Say Industry Observers by Benjamin Kahn, Broadband Breakfast, April 7, 2022.

Universities Tackle Cybersecurity Workforce Shortage by Rebecca Kelliher, Diverse Issues in Higher Education, April 4, 2022.

Swipe Right When You See a Conference Room You Like by Julie Weed, The New York Times, Jan 18, 2022.


Hyundai simplifies customers' control of data collection, sharing by Dave LaChance, RDN Repairer Driven News, December 15, 2021

How Can You Safely Store Your Vaccine Status on Your Phone? by Malena Carollo, The Markup, October 5, 2021.

The Case Against Tracking Your Kid's Phone by Parmy Olson, Bloomberg, September 8, 2021.

Fraud Alert: Malicious QR Codes Now Used by Online Scammers by Herb Weisbaum, The ConsumerMan, Consumer Checkbook, August 25, 2021.

Privacy and efficacy concerns remain for New York's vaccine passport apps by Cyrus Farivar, NBC News, 5 August 2021.

Q&A: Lorrie Cranor of Carnegie Mellon University by C.J. Thompson, Digital Privacy News, April 19, 2021.

Pitt and Carnegie Mellon University Partner to Create Extremist Hate Research Center by Sarah Wood, Diverse Issues in Higher Education. March 29, 2021.

The larger fight against hate is ours by the editorial board, Pittsburgh Post-Gazette, March 28, 2021.

CMU And Pitt Are Collaborating To Fight Extremist Hate by Kevin Gavin, Marylee Williams, Laura Tsutsui, and Isabelle Schmeler. The Confluence, 90.5 WESA, March 18, 2021.

Pitt And CMU Launching New Center To Fight Extremist Hate by Bryant Reed, KDKA 2 CBS Pittsburgh, March 18, 2021.

Local Asian rights advocates on alert after Atlanta shootings by Ryan Houston, WPXI-TV, March 18, 2021

'Love needs a helping hand': Pitt, Carnegie Mellon launch joint center to combat extremist hate by Deb Erdley, TribLIVE, March 17, 2021.

Turning hate, violence and grief into solutions after Tree of Life synagogue massacre by Bill Schackner, Pittsburgh Post-Gazette, March 17, 2021.

Pitt, CMU Launch Center to Research Extremist Hate by Julia Mericle, Pittsburgh Business Times, March 17, 2021.

LastPass to limit its free password manager. Here are other options, including Apple, Google by Rob Pegararo, USA Today, February 18, 2021.

Building Your Personal Privacy Risk Tolerance Profile by Seth Rosenblatt, DarkReading, January 28, 2021


Relentless Hacking Is Turning All of Us Into Data Nihilists by Joshua Brustein, Businessweek, December 24, 2020.

How to Use Apple's Privacy Labels for Apps by Thomas Germain, Consumer Reports, December 18, 2020.

Apple's App 'Privacy Labels' Are Here -- and They're a Big Step Forward by Lily Hay Newman, Wired, 14 December 2020.

Imagine a Nutrition Label -- for Cybersecurity by Cheryl Winokur Munk, The Wall Street Journal, December 8, 2020. [PDF reprint]

Rules for strong passwords don't work, researchers find. Here's what does by Laura Hautula, CNET News, November 12, 2020

How science selects a password policy by Joe Uchill, SC Magazine, October 26, 2020.

Neural Networks Help Users Pick More-Secure Passwords by Robert Lemos, DarkReading, October 26, 2020.

Digital Hygiene in the Zoom Era by Valeriya Safronova, The New York Times, October 22, 2020.

IoT security: University creates new labels for devices to increase awareness for consumers - interview with Karen Roby, TechRepublic, October 14, 2020.

The Importance of Teaching Cybersecurity to a 5-Year-Old by Adam Stone, EdTech, 5 October 2020.

CMU professor: Hackers in online classrooms can be prevented by Marcie Cipriani, WTAE PIttsburgh Action News 4.

Makers Use Facial Coverings as Creative Outlets by Heidi Opdyke, The Piper: CMU Community News, August 31, 2020.

Privacy concerns shadow popular voter registration website by Sherman Smith, Kansas Reflector, August 2, 2020.

What the New iPhone Privacy Features Will Really Do by Thomas Germain, Consumer Reports, June 24, 2020.

IoT Security Is a Mess. Privacy 'Nutrition' Labels Could Help by Lily Hay Newman, Wired, 9 June 2020.

Podcast: Surveillance scares and a nutrition-label for IoT security by Stacey Higginbotham, Stacey on IoT, 4 June 2020. [last 20 minutes of podcast, starting around minute 35]

Now's The Perfect Time to Start Using a Password Manager by Alan Henry, Wired, May 24, 2020.

Phishing Is Surging. Here's How To Spot Online Scams by Jeremy Hobson and Serena McMahon, Here & Now, May 22, 2020.

Here's why you need to talk to your aging parents about 'sextortion' scams by Meghan Holohan, TODAY Parents, May 14, 2020.

Contact tracing by app: life-saving or invasion of privacy? by Julian routh, Pittsburgh Post-Gazette, 4/10/2020.

User-Friendly Cybersecurity: Is a Better UX the Key to a Better Defense? by Ericka Chickowski, Dark Reading, 4/30/2020.

Agencies Lead Big Tech by Double Digits on Trust in Contact-Tracing Data Security by Sam Sabin, Morning Consult, April 27, 2020.

Can universities boost student experience without invading privacy? by Betsy Foresman, edscoop, February 18, 2020.

CMU hosts its seventh annual International Data Privacy Day event The Tartan, 2 February, 2020.


Alexa, Are You Spying On Me? How To Prevent Your Smart Devices From Listening To You by David Highfield, KDKA CBS Pittsburgh, November 18, 2019.

5 Cool Jobs in Cybersecurity (that you might have someday!). Scholastic. October 2019.

How Much Do You Know About Password Security? Take This Quiz by Chris Kornelia, The Wall Street Journal, September 17, 2019.

Apple, Google, WhatsApp condemn British spy agency proposal to access encrypted messages by Taylor Telford, The Washington Post, 30 May 2019.

CMU's CyLab director recalls first learning about 'mobile hijacking' -- after it happened to her by Courtney Linder, Pittsburgh Post-Gazette, March 28, 2019.

Women in Cybersecurity Conference brings three days of networking & career insight to Pittsburgh by Bill O'Toole, NEXT Pittsburgh, March 21, 2019.

You've been breached: Hackers stole nearly half a billion personal records in 2018 By Herb Weisbaum, NBC News, February 4, 2019.

Former FTC chief technologist named director of CMU's CyLab by Courtney Linder, Pittsburgh Post-Gazette, January 17, 2019.


Facebook emails show us again that profits come before privacy by Laura Hautala, CNET, December 5, 2018

Is the FBI's Fitness App a Cop? by Tom McKay, Gizmodo, 29 September 2018

FBI fitness app asks users to agree to 'all of their activities monitored and recorded' by Jaden Urbi, CNBC, September 28, 2018 [video]

How to Secure Your Accounts with Better Two-Factor Authentication by Brian Barrett, WIRED, July 22, 2018.

Why you should consider a password manager by Katherine Bindley, The Wall Street Journal, May 28, 2018

Why it's meaningless to accept a privacy policy by Laura Hautala, CNET, May 25, 2018

New privacy rules could spell the end of legalese - or create a lot more fine print by Elizabeth Dwoskin, The Washington Post, May 24, 2018.

How privacy is moving data security to the top of corporate agendas by Maria Korolov, CSO, May 16, 2018.

Why So Many People Make Their Password 'Dragon by Louise Matsakis, WIRED, April 22, 2018

Privacy imported: US weighs EU-style regulations to protect your data by Laura Hautala, CNET, April 11, 2018

Can Facebook's new hires take on troll farms and data privacy? by Laura Hautala, CNET, April 11, 2018

Policy experts trade ideas for intelligent ways to regulate artificial intelligence by Alan Boyle, April 10, 2018

A better, smarter way to use Venmo by Nicole Spector, NBCNews, April 9, 2018

Facebook makes its privacy controls simpler as company faces data reckoning by Elizabeth Dwoskin and Tony Romm, The Washington Post, March 28, 2018

How hackers are hijacking your cell phone account by Herb Weisbaum, March 27, 2018

How to create a genuinely strong password for your digital life by K.G. Orphanides, Wired, February 22, 2018.


Be Wary Of Tech Support Scams, 'Companies Like Microsoft Are Not Actually Going To Call You' by Sarah Boden, 90.5 WESA

What is two-factor authentication (2FA)? How to enable it and why you should by JR Raphael, CSO, November 30, 2017.

Brookings Report Finds Women Have Sharper Tech Skills Than Men by Janet Burns, Forbes, November 29, 2017

Scammers Hijacking Cellphone Accounts, Racking Up Big Bills In Victim's Name by David Highfield, CBS Pittsburgh, November 10, 2017

Expert Commends Facebook For Taking On Revenge Porn, Says Plan Needs Tweaking By David Highfield, CBS Pittsburgh, November 9, 2017

Security experts warn of account risks after Verizon customer data leak By Zack Whittaker, ZDNet, July 12, 2017.

The psychology of privacy in the era of the Internet of Things by Susan Scutti, CNN, March 2, 2017.

Everything You Need to Know About Password Managers by Andrew Chaikivsky, Consumer Reports, February 07, 2017.

Ramirez Leaves FTC Urging Continued Tech Focus By Alexei Alexis, Bloomberg BNA, February 8, 2017. Carnegie Mellon privacy clinic aims to help protect you from hackers by Aaron Aupperlee, Pittsburgh Tribune-Review, January 26, 2017.


Tech Law and Policy Podcast, Season 3 Episode 4: Lorrie Cranor, interview by Andrew Manley, December 2016.

P@$sword protector by Christopher Tritto, Washington University Engineering Momentum Magazine, Fall 2016.

Q&A with FTC Chief Technologist Lorrie Cranor by Alina Simone, Medium Practically Unhackable, September 1, 2016.

Regular password changes make things worse by Taylor Armerding, CSO, September 1, 2016.

New Bank Privacy Tool Exposes Opaque, Possibly Illegal Sharing Policies ny Michael Byrne, Motherboard, August 28, 2016.

A Life or Death Case of Identity Theft? by Peter Krebs, Krebs on Security, August 23, 2016.

There's a new way to make strong passwords, and it's way easier By Todd C. Frankel and Andrea Peterson, August 11, 2016, The Washington Post, p. 1.

Do we all really need to keep changing our passwords? By Lucy Schouten, August 9, 2016, The Christian Science Monitor

Password changes for the sake of it don't improve security, says FTC technologist by David Bisson, August 3, 2016, GrahamCluley

Carnegie Mellon university professor reveals why enforced password changes are a security risk by Jason Murdock, International Business Times, August 3, 2016.

Frequent password changes are the enemy of security, FTC technologist says by Dan Goodin, Ars Technica, August 2, 2016

Growing scam hijacks mobile phone accounts by Paul Muschick, Allentown Morning Call, July 6, 2016.

Thieves can steal your identity using just your phone number by Joe Fryer, TODAY Show, June 28 2016.

Fraud Alert: ID Thieves Hijack Mobile Phone Accounts by Herb Weisbaum, NBC News, June 27, 2016.

@Deray's twitter hack reminds us even two-factor isn't enough by Emily Dreyfuss, Wired, June 10, 2016.

Here's An Unexpected Way To Protect Yourself From Getting Hacked by Nicole Nguyen, BuzzFeed, june 10, 2016.

How even the FTC's lead technologist can get hacked by Brian Barrett, Wired, June 9, 2016.

FTC tech chief's phone hijacked, identity stolen, but who is to blame? by Charlie Osborne, ZDNet, June 8, 2016.

Burned by ID thief, FTC's chief technologist urges mobile customers, carriers to bolster security by Bradley Barth, SC Magazine, June 8, 2016.

FTC's chief technologist gets her mobile phone number hijacked by ID thief by Dan Goodin, Ars Technica, June 7, 2016.

FTC chief technologist had phone account hijacked by Joe Uchill, The Hill, June 7, 2016.

FTC To Examine Privacy Policies, AdChoices Icon by Wendy Davis, MediaPost, 25 March 2016.

Want a better password? Pretend you eat kale. We won't tell anyone by Richard Chirgwin, The Register, 24 May 2016.

How to hack the hackers: The human side of cybercrime M. Mitchell Waldrop, Nature, 11 May 2016.

7 Password Experts on How to Lock Down Your Online Security by Brian Barrett, Wired, May 15, 2016.

Why the names of six people who complained of sexual assault were published online by Dallas police By Andrea Peterson, The Washington Post, April 29, 2016.

People of ACM - Lorrie Faith Cranor, ACM, April 19, 2016.

Changing your password regularly is a terrible idea, and here's why by Steve Ranger, ZDNet, April 18, 2016.

Want Safer Passwords? Don't Change Them So Often by Brian Barrett. Wired. March 10, 2016.

From email accounts to Netflix queues, passing on passwords By Doug McIntyre, Los Angeles Daily News, March 5, 2016.

Forcing People to Change Their Passwords Isn't Just Annoying. It's Counterproductive. By Lily Hay Newman, Future Tense, March 3, 2016.

Why changing your password regularly may do more harm than good By Andrea Peterson, The Washington Post, March 2, 2016.


Privacy Pioneer Lorrie Cranor named CTO at FTC by Al Urbanski, Direct Marketing News, December 8, 2015.

The FTC's next chief technologist is on a quest for better passwords By Katherine Noyes, CIO, December 4, 2015.

Meet the FTC's new chief technologist by Steve Dent, Engadget, December 4, 2015

The FTC is getting a new chief technologist: Carnegie Mellon's Lorrie Cranor by Andrea Peterson, The Washington Post, December 3, 2015

CMU professor to become FTC's chief technologist by Rick Wills, Pittsburgh Tribune-Review, December 3, 2015

CMU professor tapped to be FTC's chief technologist Pittsburgh Post-Gazette, December 3, 2015.

FTC Hires Online Privacy Guru Lorrie Cranor by Wendy Davis, MediaPost, December 3, 2015

EU court invalidated agreement with U.S., Pittsburgh Post-Gazette, October 10, 2015.

Sale of drivers' data reaps tens of millions a year for Pennsylvania by Melissa Daniels, Pittsburgh Tribune-Review, July 14, 2015.

CMU experiment aspires to make Pittsburgh world's first 'smart city', By Deborah M. Todd, Pittsburgh Post-Gazette, July 9, 2015

Millions of webcams open to prying eyes on Internet by Paul Van Osdol, WTAE News 4, Jul 06, 2015

Emoji Passwords Could Be Coming Your Way. Is That A Good Thing? by Sam Sanders, NPR All Tech Considered, 15 June 2015.

Who's watching you surf the web? by Rich Lord, Pittsburgh Post-Gazette, June 14, 2015. [includes videos]

How cookies on computers put consumers in digital buckets by Deborah M. Todd, Pittsburgh Post-Gazette, June 14, 2015.

Why Apple's new security features set high bar for tech industry by Malena Carollo, The Christian Science Monitor, 10 June 2015.

Uber Broadens Rider Privacy Policy, Asks for New Permissions by Eric Newcomer, 28 May 2015, Bloomberg Business

Lorrie Faith Cranor: Digital Privacy is out of Control by Marguerite McNeal, 14 May 2015, Wired.com

This pa$$w0rd is not very secure: CMU studies reveal best and worst in passwords By Rich Lord, Pittsburgh Post-Gazette, May 4, 2015.

House bill slashes research critical to cybersecurity by Patrick Thibodeau, Computerworld, Apr 22, 2015.

New Technology Cracks 'Strong' Passwords -- What You Need To Know by Joseph Steinberg, Forbes.com, April 21, 2015.

One of the biggest threats to student privacy? Failure to communicate by Nichole Dobo, The Hechinger Report, March 27, 2015.

Should We Put Safety Labels on Software? by Lily Hay Newman, Slate, March 19 2015.

White House privacy bill of rights gets mixed reviews By Rich Lord, Chris Potter and Deborah M. Todd, Pittsburgh Post-Gazette, March 8, 2015

Is your phone leaking personal data? The Naked Scientists, February 17, 2015 [radio broadcast on BBC in UK and Australia]

Moving beyond passwords By Yuqing Pan, Peninsula Press, February 14, 2015

Wolverton: Putting the password problem in perspective By Troy Wolverton, San Jose Mercury News, February 6, 2015.

Cyberfeminists Go Deep on Big Data, Privacy, and Surveillance by Ben Valentine, Hyperallergic, February 3, 2015

Do you know where your data are? Privacy issues raised at CMU By Rich Lord, Pittsburgh Post-Gazette February 2, 2015

Your Private Data Isn't Yours - Maybe It Never Was: A gang of bad-ass cyberfeminists tear into the big question: Is there life after Snowden? By Hakan Tanriverdi, January 23, 2014.

What Does Privacy 'Look' Like? Carnegie Mellon Project Seeks Drawings By Dian Schaffhauser, Campus Technology, 01/22/15

Weak passwords persist despite recurring hacks by Rianna Hidalgo, The VIN News Service, January 15, 2015.

CMU hosts portraits of privacy by Rich Lord, Pittsburgh Post-Gazette, January 12, 2014.


What Connects Your Doctor With Your Credit Card? by Kimberly Rotter, Credit Card Insider, November 4, 2014.

A Physical Key to Your Google Account By Tom Simonite, MIT Technology Review, October 21, 2014.

Data Threats: Hackers, Government Agencies, and Defending Data Online by Julia Taylor Kennedy, Impact podcast from the Carnegie Council, September 29, 2014.

What makes a good password? The Naked Scientists, September 16, 2014 [radio broadcast on BBC in UK and Australia]

This dress is a steal By Eric Heyl, Pittsburgh Tribune-Review, July 29, 2014.

How to build the ultimate hack-proof password: Tips from Lorrie Faith Cranor, Return On Ideas, July 23, 2014.

Facebook's Emotional Manipulation Study Is Just the Latest Effort to Prod Users By David Talbot, MIT Technology Review, July 1, 2014

Online Security Is a Total Pain, But That May Soon Change by Klint Finley, Wired, 06.30.14

Kissing my privacy goodbye: How confidential is your personal data? by Tom Imerito, Pittsburgh Quarterly, Summer 2014

She Made Bad Passwords Fashionable: "Security Blanket" And Dress Promote Importance Of Using Good Passwords Online, Women You Should Know, June 10, 2014.

Password dress: A frock covered in security faux pas, by Leslie Katz, CNET, June 5, 2014.

California Wants to Make Online Privacy Policies a Little More Understandable By Ariel Bogle, Slate, May 22, 2014.

Heyl: Soccer moms just kickin' it by Eric Heyl, Pittsburgh Tribune-Review May 20, 2014.

The best defense against hackers is...paper? by Timothy B. Lee, Vox, April 16, 2014.

2013 International Science & Engineering Visualization Challenge, Science, February 7, 2014.

A Computational Security Blanket by Jim Austin, Science Careers, February 7, 2014

Usable Privacy: Lorrie Faith Cranor '89 by Xinyi Zhou, Blair Magnet Foundation Newsletter, Winter 2014.


Google And Facebook Get A Thumbs Down From This New Site That Reviews Privacy Policies by Adam Tanner, Forbes, October 28, 2013.

What Chase And Other Banks Won't Tell You About Selling Your Data by Adam Tanner, Forbes, October 17, 2013.

Army Wants Computer That Defends Against Human-Exploit Attacks by Kevin Fogarty, Slashdot, October 9, 2013

Study: Commerce Department App Privacy Proposal Confuses Consumers by Wendy Davis, July 18, 2013

When Social Sharing Goes Wrong: Regretting The Facebook Post by Elise Hu, NPR All Tech Considered, July 08, 2013.

Poll: Majority Of Americans Comfortable With Surveillance by Yuki Noguchi, NPR All things considered, June 12, 2013.

A guide to Facebook's privacy options by Lorrie Faith Cranor, The Wall Street Journal, March 11, 2013.

This Dopey, Decade-Old Tech Privacy Video Actually Got A Lot Of Things Right by John Pavlus, MIT Technology Review, February 8, 2013.

Electronic devices and services monitor us 24/7, but there are few ways to block them By Deborah M. Todd, Pittsburgh Post-Gazette, January 29, 2013.

Proposal before Congress on text messages stirs debate on rights, police work By Jeremy Boren Pittsburgh Tribune-Review, January 2, 2013.


Q&A: Privacy engineers could hold the key, by Eric Heyl, Pittsburgh Tribune-Review, December 15, 2012.

Advocates: Free market doesn't work for online privacy, By Grant Gross, ComputerWorld, December 6, 2012.

Professor: Do-Not-Track Won't Work Without New Laws by Wendy Davis, MediaPost, December 6, 2012.

CMU introduces new masters program for technological privacy certification by Deborah M. Todd, Pittsburgh Post-Gazette, October 16, 2012.

Password length is more beneficial than complexity by Deborah M. Todd, Pittsburgh Post-Gazette, August 30, 2012.

New Rules on Kids' Web Ads by Anton Troianovski, The Wall Street Journal, August 1, 2012.

CHI 2012 conference Q&A with Lorrie Cranor and Pedro Leon by Brad Stenger, beta620, July 17, 2012.

Are you checking privacy policies frequently? by Michael Kassner, TechRepublic, July 9, 2012.

MSKCC Patient Data Leak Related to Information Inadvertently Hidden in PowerPoint Presentations by Eric Rosenthal, Oncology Times, June 23, 2012.

Admen Spot an Enemy: W3C by Tom Simonite, Technology Review, June 19, 2012.

Mobile App Privacy and the Consumer: Cranor Offers Insight into the Strained Relationship, Technology, Academics, Policy, June 7, 2012.

Microsoft makes 'Do Not Track' the default by Jeff Horwich, Marketplace Tech Report, June 4, 2012.

Reading online privacy policies cost us $781 billion per year By Michael Kassner, TechRepublic, May 21, 2012.

To Read All Those Web Privacy Policies, Just Take A Month Off Work by Shankar Vedantam, NPR Morning Edition, April 19, 2012.

Bomb Threats Spread to More Colleges in Pittsburgh by James Hagerty, The Wall Street Journal, April 13, 2012.

Pitt suffers more threats, other schools targeted, Associated Press, April 12, 2012.

Experts say Pitt bomb threats suspect is nearly impossible to trace, profile, interview with Alan Jennings, WPXI Channel 11 news, April 10, 2012.

Experts say threatening Pitt emails are virtually impossible to trace by Liz Navratil, Pittsburgh Post-Gazette, April 6, 2012.

How Much Is Your Data Worth? Mmm, Somewhere Between Half a Cent and $1,200 by Alexis Madrigal, The Atlantic, March 19, 2012.

Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days by Alexis Madrigal, The Atlantic, March 1, 2012.

Google's New Privacy Settings Concern Some Users interview with Jon Delano, KDKA, March 1, 2012.

Can Do Not Track starve the Web's Cookie Monster? By Jon Brodkin, ars technica, February 28, 2012.

Google To Ramp Up Online Tracking by Steve Henn, NPR Morning Edition, February 28, 2012.

Dr. Cranor on "Do Not Track" & the Improbability of Complete Privacy By Scott M. Fulton, III, ReadWriteWeb, February 24, 2012.

Weaving Around Web Privacy Controls interview with Ira Flatow, produced by Charles Bergquist, NPR Science Friday, February 24, 2012.

Will online privacy laws actually make a difference? by John Moe, Marketplace, February 24, 2012.

Expert: Microsoft's P3P "Ineffective," Google's Privacy Bypass Unhelpful By Scott M. Fulton, III, ReadWriteWeb, February 23, 2012.

Firms embrace Do Not Track for targeted ads only by Elinor Mills, CNET News, February 23, 2012.

Web privacy standards: easy to break, hard to enforce By Jon Brodkin, ars technica, February 22, 2012.

Expert: Microsoft has itself to blame in browser-privacy flap by Tim Greene, Network World, February 22, 2012.

Google, Microsoft Butt Heads Over IE Privacy Skirting By Gregg Keizer, Computerworld, February 21, 2012.

Google, Microsoft tangle over tracking, online privacy By Byron Acohido, USA TODAY, February 21, 2012.

Google defense cites study arguing for stronger privacy regulation By Ed Bott, ZDNet, February 21, 2012.

Microsoft claims Google foils IE's privacy policies as well by Lee Kaelin, TechSport, February 21, 2012.

Microsoft: Google violates our users' privacy too by David Goldman @CNNMoneyTech, February 21, 2012

Google says IE privacy policy is impractical in modern Web by John Ribeiro, IDG News, February 21, 2012.

Google and Microsoft spar over user tracking by David Meyer, ZDNet UK, February 21, 2012.

It's Microsoft vs. Google in a Web-Tracking Battle by Jennifer Valentino-DeVries, The Wall Street Journal, February 20, 2012.

Microsoft says Google circumvents IE privacy policies too by Nancy Gohring, IDG News, February 20, 2012.

Google tricks Internet Explorer into accepting tracking cookies, Microsoft claims By Jon Brodkin, Ars Technica, February 20, 2012.

Not just Google: Facebook also bypasses privacy settings in IE by Emil Protalinski, ZDNet, February 20, 2012.

Could Google's data hoarding be good for you? by Kate Dailey, BBC News Magazine, 26 January 2012.

Do Not Track Legislation: What Small Businesses Need to Know, OPEN Forum, by Susan Kuchinskas, 11 January 2012


Consumers turn to do-not-track software to maintain privacy By Byron Acohido, USA TODAY, December 30, 2011.

Safeguarding Privacy and Improving Web Security, Cyber Law and Business Report Podcast interview with Bennet Kelley, November 23, 2011

As more advertisers monitor every click of your mouse, should someone monitor the monitoring? By Deborah M. Todd, Pittsburgh Post-Gazette, November 21, 2011.

Behavioral marketing: Why Johnny can't opt-out by Michael Kassner, TechRepublic. November 21, 2011.

Online Privacy Tools Don't Work Well, CMU Researchers Find by Fahmida Y. Rashid, eWeek, November 8, 2011.

Study Finds Online Privacy Tools Ineffective By John Wagley, Security Management, November 7, 2011.

Research finds that privacy tools don't work by Lisa Vaas, Naked Security, November 7, 2011.

Internet Privacy Tools Miss the Mark, Study Suggests By Dian Schaffhauser, The Journal, November 7, 2011.

Carnegie Mellon Research: Internet Privacy is Hard to Find By Dian Schaffhauser, Campus Technology, November 7, 2011.

Internet privacy tools too confusing for most users by Angela Moscaritolo, SC Magazine, November 3, 2011

Consumers Don't Understand Opt-Out Tools by Wendy Davis, Online Media Daily, October 31, 2011.

If you tried to opt out of online tracking, it probably didn't work by John Moe, Marketplace Tech Report, November 1, 2011.

Study: Usability Issues Plague Tools that Limit Online Behavioral Advertising by Tom Loftus, The Wall Street Journal, October 31, 2011.

The Default Choice, So Hard to Resist by Steve Lohr, The New York Times, October 15, 2011

Consumers are willing to pay more to protect their privacy online by Steve Henn, Marketplace Morning Report, July 14, 2011.

Don't Let These Happen to You by Kashmir Hill, Forbes.com, June 24, 2011.

Privacy on Social Networks: American, Chinese, and Indian Perspectives by Eliza Strickland,IEEE Spectrum Tech Talk, May 23, 2011.

Web Standards Group To Tackle Do-Not-Track by Wendy Davis, MediaPost, April 23, 2011.

Study shows lagging compliance with an online ad privacy program by Allison Enright, Internet Retailer, April 4, 2011.

Is It Time For Privacy Nutrition Labels? by Kashmir Hill, Forbes.com, March 23, 2011

Is the Internet destroying privacy? by Cristen Conger, Discovery News, March 22, 2011

Privacy suit takes aim at Amazon by Allison Enright, Internet Retailer, March 4, 2011.

Hack-Proof Your Life, Men's Health, March 2011, p. 57.

New Study Shows Persistence Of 'Flash Cookies' by Joe Mullin, paidContent.org, February 1, 2011.

Forum targets online privacy by Erich Schwartzel, Pittsburgh Post-Gazette, January 27, 2011.

Online privacy, the consumer and do not track lists, hour-long discussion with Marty Moss-Coane on WHYY Radio Times, January 6, 2011.


Microsoft will upgrade web browser privacy options in next release by Allison Enright, Internet Retailer, December 9, 2010.

FTC Considers 'Do Not Track' List For Internet Users By Jon Delano, KDKA, December 2, 2010.

Rule targets computer privacy: FTC report recommends 'Do Not Track' tool on Internet By Dan Majors, Pittsburgh Post-Gazette, December 02, 2010.

Manhunt Policy Change Raises Questions Anew About Internet Privacy by Peter Cassels, Edge, November 22, 2010.

Posting gripes about job a risky practice by Jeremy Boren, Pittsburgh Tribune-Review, Saturday, November 13, 2010.

Facebook Snafu Highlights Growing Privacy Concerns by Laura Sydell, NPR Morning Edition, October 19, 2010.

Internet anonymity at risk as real costs of free speech weighed By Mike Cronin, Pittsburgh Tribune-Review, Saturday, October 16, 2010.

Major sites are violating consumers privacy preferences, says a new study by Allison Enright, Internet Retailer, September 28, 2010.

A Loophole Big Enough for a Cookie to Fit Through By Riva Richmond, The New York Times, September 17, 2010.

Cyber security may depend on getting employees on board with best practices by Malia Spencer, Pittsburgh Business Times, May 28, 2010, p. 13,16.

Protect Yourself with Facebook Privacy Settings interview with Andrew Stockey on Pittsburgh Channel 4 news, March 16, 2010 (see also Andrew Stockey's blog post).

BBC Newshour interview with Claire Bolderson about privacy and location-sharing applications, March 12, 2010.

As Location-Sharing Services Grow, Privacy Concerns Do Too by Jennifer Valentino-DeVries, WSJ Blogs, March 10, 2010.

Location Privacy Goes to Washington by Deane Rimerman, ReadWriteWeb, March 8, 2010.

Redrawing the Route to Online Privacy by Steve Lohr, The New York Times, February 28, 2010, p. BU4 of the New York edition.

Web scams up; ID thefts in W.Pa. below average by Brian Bowling, Pittsburgh Tribune-Review, February 26, 2010.

Congress hears testimony on location-based services and online privacy by Alexander B. Howard, Compliance Management News, February 25, 2010.

CMU prof to testify in D.C. about location-sharing by Mike Cronin, Pittsburgh Tribune-Review, February 24, 2010.

Focused Research Awards grant professors $2 million for study by Sabrina Porter, The Tartan, February 15, 2010.

Experts warn: Be careful opening those electronic greetings by Teresa F. Lindeman, Pittsburgh Post-Gazette, February 9, 2010.

CMU lands three Google research grants by Malia Spencer, Pittsburgh Business Times, February 2, 2010.

Google gives millions of dollars in research awards by Lance Whitney, CNET News, February 2, 2010.

Mozilla weighs privacy warnings for Web pages by Declan McCullagh, CNET News, February 2, 2010.

Google Puts New Focus on Outside Research By Steve Lohr, The New York Times, February 1, 2010.

It's been 10 years: Why won't people pay for privacy? by Declan McCullagh, CNET News, January 28, 2010.

Staying connected a status (update) symbol By Erich Schwartzel, Pittsburgh Post-Gazette, January 06, 2010.


Spam e-mail growing because it works by Tim Barker, St. Louis Post-Dispatch, December 28, 2009.

Show 045 - An Interview with Lorrie Cranor, The Silver Bullet Security Podcast interview by Gary McGraw.

The Big Question: Does the latest online technology pose an unacceptable threat to our privacy? By Rhodri Marsden, 15 December 2009, The Independent.

Working to increase Internet security by Wayne Yoshioka, Hawaii Public Radio, December 10, 2009.

Groups Far Apart on Online Privacy Oversight by Stephanie Clifford, The New York Times, December 7, 2009

FTC to Consider Stricter Online Privacy Rules by Grant Gross, IDG News Service, Dec 7, 2009.

Does Using The Internet Mean Giving Up Privacy? by Laurie Burkitt, Forbes, 12.07.09.

FTC Takes On Online Privacy by Amy Schatz, December 7, 2009.

At F.T.C. Conference, Concerns About Advertising and Privacy by Stephanie Clifford, NYTimes.com, December 7, 2009.

Building a Better Password by Nick Summers, NEWSWEEK published Oct 9, 2009 from the magazine issue dated Oct 19, 2009.

The user is not the enemy: How to increase information security usability by Wendy M. Grossman, Info Security, 03 August 2009.

Crying Wolf: Do Security Warnings Help? Study: Internet Users Immune to Pop-Up Security Warnings by Ki Mae Heussner, ABC News.com, 30 July 2009.

Browser SSL warnings shown to be ineffective by Angela Moscaritolo, SC Magazine, July 28, 2009.

Research: Security certificate warnings are not working by Steve Ragan, The Tech Herald Jul 28 2009.

Security certificate warnings don't work, researchers say by Robert McMillan, Computerworld July 24, 2009.

Online life can be convenient as well as dangerous by Allison M. Heinrichs, Pittsburgh Tribune-Review, 18 May 2009.

ISO carries out phishing study by Edmund Huber, The Tartan, 6 April 2009.

Don't just talk about security - do something! by M.E. Kabay, Network Wold Security Strategies Alert, January 22, 2009.


Call 4 Action: Avoid Online Shopping Scams During Holiday Season, WTAE TV 4, December 1, 2008.

The Cost of Reading Privacy Policies, interview with Aleecia McDonald on Freepress Media Minutes, October 17, 2008.

How Safe Is That Web App? Researchers Want Online Privacy Policies Regulated by Sarah Perez, October 10, 2008.

Online Execs Object To Privacy Statement Report by Wendy Davis, Online Media Daily, October 9, 2008.

Reading privacy policies "would take 20 hours a month" by Barry Collins, PC Pro, October 9, 2008.

Study: Reading online privacy policies could cost $365 billion a year by Nate Anderson, ars technica, October 8, 2008.

Users, Enterprises Pay for Poor Privacy Policies, Study Says by Tim Wilson, Dark Reading, October 7, 2008.

Average privacy policy takes 10 minutes to read, research finds, OUT-LAW News, October 6, 2008.

Allegedly illegal Democratic e-mails 'waste' of taxes by Brad Bumsted and Debra Erdley, Pittsburgh Tribune-Review, August 2, 2008.

Do you agree not to read our privacy policy? by Wendy M. Grossman, The Guardian, January 10, 2008.


Web tool detects something phishy by Bonnie Pfister, Pittsburgh Tribune-Review 12/11/07.

Online privacy policies need work, advocates say by Grant Gross, NetworkWorld, 11/02/07.

Researchers: Current education inadequate to fight phishing by Elizabeth Montalbano, Computerworld, 10 October 2007.

Online game teaches users about the threats of phishing by Kun Xian Leong, The Tartan, 8 October 2007.

Phishing victims learn online security lesson by Robert Jacques, vnunet.com, 3 October 2007.

Fighting Phish, Dr. Dobb's Journal, 2 October 2007.

Coolest Security Tool Ever! - Online game to teach cyber-security by Alexandru Dumitru, Softpedia, 2 October 2007.

Anti-Phishing Game To Help Raise Awarness, Portalit.net, 1 October 2007.

Scientists develop Anti-Phishing game to educate Web users by Ruben Francia, BLORGE.com, 29 September 2007.

Carnegie Mellon's Online Game Helps People Recognize Internet Scams, Phishing by Regina Sass, Associated Press, 28 September 2007.

A new game developed at Carnegie Mellon University educates users on phishing threats. by Christopher Nickson, Digital Trends, 27 September 2007.

Phishers caught hook, line and sinker by Stuart Turton, PC Pro, 26 September 2007.

Carnegie Mellon floats anti-phishing game by Robert Jaques, PC Magazine, 26 September 2007.

CMU's Anti-Phishing Phil helps users identify Internet scams--try it! by Deb Smit, POP City, 26 September 2007.

Fish named Phil helps foil phishers, CBC News, 26 September 2007.

CNET News.com
Court rules against TorrentSpy in hacking case
By Greg Sandoval
28 August 2007

CNET News.com
E-voting predicament: Not-so-secret ballots
By Declan McCullagh
20 August 2007

DM News
Enhanced privacy measures might produce bigger profits
By Robert Gellman
11 August 2007

Associated Press School Conducts Anti-Phishing Research
22 July 2007

Dark Reading
Picture your password
By Kelly Jackson Higgins
23 July 2007

The San Diego Union-Tribune
Bye-bye, ballot box?
By Jennifer Davies
22 June 2007

The Register
Better privacy policies can make money, finds P3P study
12 June 2007

Pittsburgh Post-Gazette
Online Shoppers will Pay for Security
By Theresa F. Lindeman
8 June 2007

Dark Reading
Privacy Premium Doesn't Faze Buyers
By Tim Wilson
7 June 2007

Cnet News.com
Study: Shoppers will pay for privacy
By Candace Lombardi
7 June 2007

BBC News
Good privacy pays for web stores
7 June 2007

Shoppers willing to pay extra for privacy confidence, study finds
By Jon Brodkin
6 June 2007

Ars Technica
Americans willing to pay (a little) more for privacy
By Nate Anderson
7 June 2007

Filters will do just fine
By Pat Loeb
22 March 2007

Cnet news.com
Net porn ban faces another legal setback
By Declan McCullagh
22 March 2007

Santa Rosa Press Democrat
Swamped by passwords
By Derek J. Moore
15 January 2007


Beaver County Times & Allegheny Times
Rule for internet: Reader beware
By Tom Fontaine
6 August 2006

Pittsburgh Post-Gazette
Researchers work to thwart cleverer cyber scammers
By Corilyn Shropshire
12 July 2006

Pittsburgh Tribune-Review
Don't Click anything!
By Thomas Olson
12 July 2006

Pittsburgh Post-Gazette
Bits & Bytes
By Corilyn Shropshire
8 July 2006


Globe and Mail
The truth about security
By Mary Kirwan
31 August 2005

Pittsburgh Post-Gazette
Cybersecurity experts to gather at Carnegie Mellon
By Corilyn Shropshire
6 July 2005
p. E1


The Miami Herald
Touch-screen danger: slow voting, long lines
By Joe Mozingo, Evan S. Benn, and Tim Henderson
24 October 2004

Gadgets Needed - Tell Your Mayor
By Greg Gazin
21 October 2004

Washington University in St. Louis Magazine
Under Wraps
By David Linzee
Spring 2004

The Dallas Morning News
Ballot-tampering charges fly in S. Texas recount
By Pete Slover
2 April 2004

The Star-Ledger
Talent leak drains AT&T think tank By Kevin Coughlin
21 March 2004

The Star-Ledger
If a check's in the e-mail, maybe spam won't be
By Kevin Coughlin
23 February 2004
p. 1, 8

Federal Computing Week
Privacy safeguard proves elusive
By Sara Michael
23 February 2004

NPR Talk of the Nation
Geeks Versus Non-Geeks
Host: Joe Palca
9 February 2004

Associated Press
Michigan Democrats Proceed with Online Voting Despite Security Issues
By Anick Jesdanun
6 February 2004

Federal Computing Week
Agencies on the path to P3P
By Sara Michael
21 January 2004


Houston Chronicle
DVD black marketers grow bolder, police say: Some film rip-offs offered pre-release
By Andrew Tilghman
26 December 2003

Information Week
Q&A with Richard Purcell
by Parry Aftab
17 November 2003
(see last question)

Technology Reviw
October 2003
Go directly to my profile: http://www.technologyreview.com/articles/tr10003_lcranor.asp

Lorrie Cranor on CNNfn - 16 September 2003

CNN Financial News: The Biz
Movie Piracy: An Inside Job?
Interview by David Haffenreffer
16 September 2003

The New York Times
Hollywood Faces Online Piracy, but It Looks Like an Inside Job
By John Schwartz
15 September 2003
p. C1,C3

Insiders blamed for most online movie piracy
By Will Knight

Most P2P movies leaked by studio: Study
17 September 2003

Movie industry faces music-style downloads battle
By Simon Aughton
15 September 2003

FTC forum: Internet users want cheap privacy
People don't want complexity or high prices
By Grant Gross
14 May 2003

At the Crossroads of Technology and Policy: Lorrie Cranor on privacy, online voting and Internet censorship
18 February 2003

High Impact: What is technology's ultimate contribution to the world? Here are four people working to shape its social consequences
By Mary Hayes
10 Feburary 2003

Privacy Laws & Business International Newsletter
P3P -- problems, progress, potential
by Alan Pedersen
February 2003
p. 20-21


Let's Talk Computers
Web Privacy with P3P
Interview by Alan Ashendorf and Sandra Ashendorf
7 December 2002

Federal Computer Week
Privacy made simple for high-tech minds: New books make difficult issue more manageable
By Ari Schwartz
2 December 2002

DM News
New Book May Be the Bible on P3P
by Robert Gellman
2 December 2002
p. 14

CNET News.com
Turning up the heat on Web privacy
By Paul Festa
19 November 2002

P3P Supporters Struggle to Increase Adoption of Data Privacy Standard
By Patrick Thibideau
18 November 2002

Meeting to mull privacy standard's next step
By Patrick Thibideau
11 November 2002

Toronto Star
Will we, should we e-Vote?
By Tyler Hamilton
4 November 2002
p. D1

Privacy Watch: A Little Bird That Guards Your Online Privacy
by Andrew Brandt
December 2002 (posted online 23 October 2002)

CNET News.com
Promise of P3P stalls as backers regroup
By Paul Festa
29 October 2002

Dayton Daily News
Anti-porn law aimed at Net argued: U.S. judge’s ruling due Friday
By Wes Hills
1 August 2002

Privacy on the Web: Will New Standards and Laws Help Protect Sensitive User Data?
By Paul Eng
30 July 2002

The Star-Ledger
You've got porn, and guardians of e-mail can't help
by Kevin Coughlin
21 July 2002
p. 1, 10

The Institute
Spam: Not Funny Anymore
by Helen Horowitz
July 2002
p. 1-2

South Florida Sun-Sentinel
A bird on the screen's worth two ...
by Christine Winter
12 May 2002
p. 3G

San Francisco Chronicle
Conference on privacy opens in S.F.
by Carrie Kirby
17 April 2002
[CFP2002 conference]

NPR All Things Considered
Online Privacy
by Larry Abramson
16 April 2002

Finally, Agreement on P3P
By Beth Cox
16 April 2002

W3C Give Blessing To New Privacy Standard
By Kevin Featherly
16 April 2002

Associated Press
Group OKs Web Site Privacy System
By Anick Jesdanun
16 April 2002

Minnesota Public Radio: Future tense
Privacy Bird
10 April 2002
Interview by Jon Gordon

IBM, AT& T Release Free Internet Privacy Tools
By Elinor Mills Abreu
4 April 2002

Computer User
Privacy's new platform: Finally, users have control over how sites use their personal information
By James Mathewson
April 2002

Associated Press
Sites wary of automatic privacy disclosure
By Anick Jesdanun
16 March 2002

CNET Radio Morning Show
Interview with Brian Cooley about P3P
7 February 2002
10:15 am Eastern


The Plain Dealer
Taking control online: Surfers may soon choose what personal data goes out to Web sites
By Chris Seper
29 October 2001
p. C1

Companies moving slowly on P3P adoption
By Patrick Thibodeau
19 October 2001

Radio Parallax
Interview with Dr. Lorrie Faith Cranor
(in English and German)
October 2001

The New York Times
The Browser as a Cookie-Control Key
By John Schwartz
5 September 2001
p. C6

Giving Users Back Their Privacy
By Deborah Radcliff
9 July 2001

IEEE News & Views
Electronic Voting: Not Ready for Prime Time?
By Robert Bellinger
May 2001

The Wall Street Journal
The Battle Over Web Privacy: As Congress Mulls New Laws, Microsoft Pushes a System That's Tied to Its Browser
By Glenn R. Simpson
21 March 2001
p. B1, B4

NPR Morning Edition
The Next Napster
By Larry Abramson
15 February 2000

Scientific American
No E(asy) Cure: Electronic voting won't fix butterfly ballots, dimpled chads or W.'s presidency
By Wendy M. Grossman
February 2001
p. 36


Tallahassee Democrat
Big Lie: Every vote counts
By Paige St. John
17 December 2000

ABC News Nightline
Is the Voting System Broken?
By Dave Marash
14 December 2000

U.S. 1
Internet Privacy? New P3P Guidelines
By Caroline Calogero
13 December 2000

San Francisco Chronicle
Time to Digitize Elections: State has certified digitized election equipment from 4 manufacturers
By Henry Norr
27 November 2000

San Jose Mercury News
ATM-like ballots seen as best answer in California
By Ken McLaughlin, Mary Anne Ostrom and Cheryl Devall
24 November 2000
[online voting]

Experts Warn About Security as Internet Voting Gains Ground
By Paul Horvitz
17 November 2000
[online voting]

The Orlando Sentinel
Internet Voting Gets Harder Look
By Nancy Imperiale Wellons
12 November 2000
p. A15
[online votin]

Los Angeles Times
Fiasco Reveals a Ballot System Full of Holes
Election: Punch-card voting has many drawbacks, but high-tech alternatives have their own problems
By Michael A. Hiltzik and Greg Miller
11 November 2000

Ventura County Star
Casting votes via Internet coming, but still years off
By T.J.Sullivan
11 November 2000
[online voting]

The Wall Street Journal
Local Governments Lack the Money To Replace Old Machines, Pay Staff
By Glenn Simpson, Ted Bridis and Michael Orey
9 November 2000
p. A1, A18
[online voting]

Critical Florida votes cast online
By George A. Chidi Hr.
8 November 2000
[online voting]

Inter@ctive Week
Trials and Tribulations In The W3C
By James E. Gaskin
5 November 2000

Associated Press
Online voting still meets resistance
By Anick Jesdanun
27 October 2000
[online voting]

Le Monde
L'anonymat contre la censure
By Guillaume Fraissard
24 October 24 2000

Scientific American
Speech without Accountability
By W. Wayt Gibbs
October 2000

AT&T Divides and Conquers
By Amy Larsen DeCarlo
2 October 2000

Scientific American
How Publius Thwarts Censors
By W. Wayt Gibbs
October 2000

Investor's Business Daily
Microsoft Can't Lock Up All Online Security Issues
By Donna Howell
22 September 2000

Online Privacy Tools Are Within Reach
By Mary Mosquera
20 September 2000

Stop, Thief! Master of Your Domain
11 September 2000
p. 102-103

The Industry Standard
Peer-to-Peer - We've Only Just Begun
By Elinore Abreu
21 August 2000

The Industry Standard
The Nasruddin Model
By Richard Martin
21 August 21 2000>br> http://www.thestandard.com/article/display/0,1151,17780,00.html

Upside Today
Corporate coders confined
By Ryan Tate
11 August 2000

The New York Times
Divided Data Can Elude the Censor
By Daniel Sorid
26 July 2000
p. G10

Science Magazine
A Censor-Proof Internet?
By Jocelyn Kaiser
14 July 2000

USA Today
Privacy plug-in will ask: 'Do you want to go there?'
By Elizabeth Weise
11 July 2000
p. 3D

ZDNet News
P3P: A green light for privacy on the Web?
By Robert Lemos
5 July 2000

The Washington Post
Online and Unidentifiable
by John Schwartz
30 June 2000
p. E1, E11

AT&T developing Web anonymity, anti-censorship tool
By John Borland
30 June 30 2000

Associated Press
AT&T Announces Web Speech Invention
30 June 2000

Internet News Radio
Publius, a censorship- resistant Web publishing system
by Brian McWilliams
30 June 2000

The New York Times
New Technology Is Aimed at Increasing Web Privacy
by Jeri Clausing
22 June 2000
[P3P interop]

Vendors huddle over privacy
by Jennifer Jones
21 June 2000
[P3P interop]

Microsoft, others unveil tools to protect online privacy
by Linda Rosencrance
21 June 2000
[P3P interop]

NPR All Things Considered
Privacy Software
by Larry Abramson
21 June 2000
[P3P interop]

The Star-Ledger
Software in works boosts Net privacy
By Kevin Coughlin
19 June 2000
[P3P interop]

W3C updates online privacy proposal
By Carol Sliwa
17 May 2000

The New York Times
Efforts to Keep the Web From Getting Too Personal
By Catherine Greenman
27 April 2000
[Infomediaries, P3P]

Inter@ctive Week
Privacy Standard Bows To Some Boos
By Doug Brown
17 April 2000

Inter@ctive Week
FTC Mulls Net Privacy Policy
By Doug Brown
13 April 2000
[FTC Advisory Committee on Online Access and Security]

Microsoft backs P3P Net privacy standard
By Ann Harrison
12 April 2000

Associated Press
Microsoft Announces Internet Tools to Control Web Privacy
7 April 2000

Microsoft, AOL Become Privacy Gatekeepers
By Marius Meland
7 April 2000

USA Today
A weird path to the wired future
By Elizabeth Weise
4 April 2000
[CFP2000 conference]

More articles about CFP2000

BusinessWeek Online Daily Briefing
Newsmaker Q&A: No Quick Fixes for Protecting Privacy Online
14 March 2000
[online privacy, P3P]

Online Privacy: It's Time for Rules in Wonderland
By Heather Green, Mike France, Marcia Stepanek, and Amy Borrus
20 March 2000
p. 83-94
[online privacy]

Associated Press
Arizona Set for Online Primary Vote
By Anick Jesdanun
6 March 2000
[electronic voting, Arizona election]

National Public Radio, All Things Considered
Internet Security
By Larry Abramson
15 February 2000
[Internet security]


W3C Releases Last Privacy-Standard Draft
By Mo Krochmal
5 November 1999

Wired News
W3C: Privacy Spec Safe
by Chris Oakes
29 October 1999

South China Morning Post
Airport chaos could last until weekend:
Thousands of travellers left waiting for flights
by Felix Chan
17 September 1999
[quotes me as a stranded traveller at the Hong Kong airport during Typhoon York]

Red Herring
Is there a privacy time bomb?
by Kenneth Neil Cukier
September 1999
p. 90-98
[privacy, cites 'Beyond Concern' study, P3P]

Wired News
Big Brother, Big Fun at Amazon
by Declan McCullagh
25 August 1999

The Star-Ledger
E-votes spur election debate
by J. Scott Orr
16 August 1999
p. 1,8
[electronic voting]

The New York Times - Cybertimes
Study Warns of Risks in Internet Voting
by Rebecca Fairley Raney
14 August 1999
[electronic voting]

The Washington Times
Voting marches forward: Troops get limited on-line balloting
by William Glanz
5 August 1999
[electronic voting]

The Star-Ledger
Speedy delivery: System targets consumers for advertising e-mail
by Allan Hoffman
21 June 1999
p. 27,28
[spam, cites 'Beyond Concern' study]

USA Weekend
Ideas for a better America
by John F. Kennedy Jr.
11 June 1999
[electronic voting, mentions AT&T voting work and paraphrases my comments from an interview, but does not mention me by name]

NPR Weekend Edition - Sunday
Online Anonymity
by Larry Abramson
16 May 1999

The New York Times - Circuits
Web Surfers' Fears Prompt Privacy Seals
by Lisa Guernsey
29 April 1999
[cites 'Beyond Concern' study]

Knight Ridder/Tribune Business News
Privacy at Forefront of Internet Worries
by Bernice Kanner
29 April 1999
[cites 'Beyond Concern' study]

Wired News
Commerce Tech Boss Checks In
by Christopher Jones
26 April 1999
[cites 'Beyond Concern' study]

Forbes ASAP
Net Noise
by Sean Donahue
20 April 1999
[cites 'Beyond Concern' study]

The New York Times
Peekaboo! Anonymity Is Not Always Secure
by Peter H. Lewis
15 April 1999
[anonymity tools]

Washington Post
Privacy Policy Vs.Practice: Group Finds Contrast In Agency Web Sites
by John Schwartz
16 April 1999
[cites 'Beyond Concern' study]

AT&T: Multiple privacy approaches needed on Net
by Tom Diederich
16 April 1999
['Beyond Concern' study]

Wired News
Take My Email, but Not My Data
by Chris Oakes
14 April 1999
['Beyond Concern' study]

FamilyPC on the Web
What Do Real People Think About Privacy on the Internet?
by Robin Raskin
14 April 1999
['Beyond Concern' study]

Wired News
Shaping Online Privacy
by Declan McCullagh
6 April 1999
[CFP 2000]

USA Today
Keeping 'pry' out of the privacy debate
by Leslie Miller and Elizabeth Weise
31 March 1999
p. 4D
[P3P/Privacy Minder]

Wired News
Your Data, Your Choice
by Chris Oakes
24 March 1999

USA Today
Tips for keeping kids on 'safe' sites
by Marc Saltzman
26 January 1999
['Technology Inventory'/keeping kids safe online]


NPR Morning Edition
Court Mandates VA. Library to Cease Internet Filtering
by Larry Abramson
29 December 1999
[filtering software]

Technology Review
The Web's Unelected Government
by Simson L. Garfinkel
November/December 1998

USA Today
Campaign unfurls safety Net for kids
by Leslie Miller
15 September 1998
[cites 'Technology Inventory']

Internet Magazine
Unsung Heroes
July 1998
p. 40-43
[P3P - names Lorrie Cranor an Unsung Hero of the Internet for work on P3P]

Wired News
The Dawn of the Infomediary
by James Glave
24 February 1999

Executive Summary
P3P: Programming Privacy
by Rick E. Bruner

Wired News
The Trouble with P3P
by Chris Oakes
25 June 1998

The Boston Globe
Plugged In: The facts of Spam
by Simson L. Garfinkel
28 May 1998
p. D04

Rekenen aan het ideale kiesstelsel (Calculating the Ideal Voting System)
by Sjaak Adriaanse
23 April 1998
[Declared Strategy Voting - written in Dutch]

Village Voice
Click the Vote
by Austin Bunn
3 February 1998
p. 29
[electronic voting/Costa Rica election]

The New York Times - CyberTimes
Online Test of Costa Rican Election Postponed
by Jeri Clausing
30 January 1998
[electronic voting/Costa Rica election]


HotWired: HotSeat
Online Voting: The Costa Rica Experiment
with host John McChesney
26 November 1997
[electronic voting/Costa Rica election]

The New York Times - CyberTimes
Costa Rica to Try Online Elections
by Jeri Clausing
22 October 1997
[electronic voting/Costa Rica election]


National Journal
Ballot Lines
by Graeme Browning
20 April 1996
p. 879-882
[electronic voting/Sensus/DSV]

The Boston Globe
Casting ballots in cyberspace
by Danial Akst
21 March 1996
p. 37
[electronic voting/Sensus]

Los Angeles Times
POSTCARD: Do We Really Want This Much Participatory Democracy?
by Danial Akst
18 March 1996
p. D11
[electronic voting/Sensus - same as 21 March Boston Globe article]


Prior to 1996 I was twice featured in local newspapers, complete with embarrassing photos. While in college, the St. Louis Post-Dispatch pictured me seated at a Missouri bar and complaining because local grocery stores and other bars in the area refused to accept my valid Maryland driver's license as ID. Several years earlier I was pictured in the Montgomery Journal wearing a bright green Girl Scout uniform and holding a check that then President Reagan had sent to our troop after I wrote him a letter.