Jonathan Mayer is a Ph.D. candidate in computer science at Stanford University, where he received his J.D. in 2013. He was named one of the Forbes 30 Under 30 in 2014, for his work on technology security and privacy. Jonathan's research and commentary frequently appears in national publications, and he has contributed to federal and state law enforcement actions.
Jonathan is a Cybersecurity Fellow at the Center for International Security and Cooperation, a Junior Affiliate Scholar at the Center for Internet and Society, and a Stanford Interdisciplinary Graduate Fellow. He earned his A.B. at Princeton University in 2009, concentrating in the Woodrow Wilson School of Public and International Affairs. Jonathan has consulted for both federal and state law enforcement agencies, and his research on consumer privacy has contributed to multiple regulatory interventions. A proud Chicago native, Jonathan is undaunted by freezing weather and enjoys celery salt on a hot dog.
Co-authored with Patrick Mutchler. This is a project of the Stanford Security Lab.
Just over a month ago we launched MetaPhone, an Android app for crowdsourcing phone metadata. Our results have already confirmed that phone activity easily reveals private relationships, is deeply interconnected, and can trivially be identified.
We’ve received lots of great feedback on the study from researchers and participants. One request has been especially consistent: show me my metadata!
Starting today, the MetaPhone app will provide personalized results about your phone metadata privacy. Read more » about Spy on Your Metadata
Co-authored with Patrick Mutchler. This is a project of the Stanford Security Lab.
We’re studying the National Security Agency, and we need your help.
Our recent research on Google’s circumvention of the Safari cookie blocking feature has led to some confusion, in part owing to the company’s statement in response (reproduced in its entiretybelow). This post is an attempt to elucidate the central issues. As with the original writeup, I aim for a neutral viewpoint in the interest of establishing a common factual understanding. Read more » about Setting the Record Straight on Google’s Safari Tracking
Apple’s Safari web browser is configured to block third-party cookies by default. We identified four advertising companies that unexpectedly place trackable cookies in Safari. Google and Vibrant Media intentionally circumvent Safari’s privacy feature. Media Innovation Group and PointRoll serve scripts that appear to be derived from circumvention example code. Read more » about Safari Trackers
Yesterday the Digital Advertising Alliance (DAA) announced a supplementary set of self-regulatory principles for third parties on the web (pdf, press release). This post is a brief — and far from comprehensive — overview of improvements, continued deficiencies, and procedural issues. Read more » about A Brief Overview of the Supplementary DAA Principles
By Jonathan Mayer and Edward W. Felten
Special to The Bee
Cross-posted from The New York Times Opinion Pages.
To the Editor:
By Edward Felten and Jonathan Mayer
Snooping on the Internet is tricky. The network is diffuse, global, and packed with potential targets. There’s no central system for identifying or locating individuals, so it’s hard to keep track of who is online and what they’re up to. What’s a spy agency to do? Read more » about How the NSA Piggy-Backs on Third-Party Trackers
John Mitchell and I have written a new paper that synthesizes research on policy and technology issues surrounding third-party web tracking. It will appear at the IEEE Symposium on Security and Privacy in May. Read more » about Third-Party Web Tracking: Policy and Technology
"AT&T appears to be the latest company to use its perceived power over the conduit to manipulate the message. Stanford computer science and legal lecturer Jonathan Mayer recently visited the Dulles airport in DC, and found AT&T's Wi-Fi hotspots pushing a number of pop up ads, overlaying themselves on browser content: Read more » about AT&T Injecting Ads Into Its Wi-Fi Hotspot Data Streams
"As the ad industry girds for the mushrooming debate around privacy, consumer choice and ad blocking, it’s clear that existing opt-out mechanisms aren’t exactly cutting it, especially when it comes to cross-device. Read more » about The State Of Opt-Outs: Not Pretty For Privacy
""The court filings scrupulously avoid naming Tor (or mentioning hacking). Instead, they provide a detailed description of an anonymizing ‘Network’ and how a particular website was hidden in that ‘Network," Jonathan Mayer, a Stanford University legal scholar and current computer science doctoral candidate, told Ars. "There's only one software tool with the described popularity and with the described client and server functionality. That's Tor."" Read more » about Feds bust through huge Tor-hidden child porn site using questionable malware
"Online advertising companies, for instance, can collect huge amounts of information about a person's browsing history, which can reveal "a very comprehensive dossier of what you've been up to" on the Internet, according to Jonathan Mayer, a lawyer and computer scientist affiliated with Stanford's Center for Internet and Society -- not all of which might match up with the persona you present in real life. Read more » about How technology could kill the art of lying
"“With a cellphone, the I.P. address might get you a city or part of a city,” said Jonathan Mayer, a computer scientist and lawyer at Stanford University. “But, if you are using a landline address, that could in fact be incredibly precise — to an exact address or part of a building, depending on how it is configured.” Read more » about Uber Data Collection Changes Should Be Barred, Privacy Group Urges
Because of Edward Snowden’s remarkable public service, we know that the National Security Agency, with the cooperation of some large firms, has amassed an unprecedented database of personal information. The ostensible goal in collecting that information is to protect national security. The effect, according to Reed Hundt, is to undermine democracy. Read more » about Saving Privacy
This talk presents an empirical assessment of the NSA’s legal restrictions, including research cited by President Obama’s intelligence review group. We find that present limits on bulk surveillance programs come up far short; authorities to intercept international Internet traffic and domestic telephone metadata place ordinary Americans at risk. Read more » about The Science of Surveillance
Solutions to many pressing economic and societal challenges lie in better understanding data. New tools for analyzing disparate information sets, called Big Data, have revolutionized our ability to find signals amongst the noise. Big Data techniques hold promise for breakthroughs ranging from better health care, a cleaner environment, safer cities, and more effective marketing. Yet, privacy advocates are concerned that the same advances will upend the power relationships between government, business and individuals, and lead to prosecutorial abuse, racial or other profiling, discrimination, redlining, overcriminalization, and other restricted freedoms. Read more » about Big Data and Privacy: Making Ends Meet
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer. Read more » about Innovation or Exploitation?
Hosted by the Stanford Center for E-Commerce.
5:30 pm - 6:30 pm: Registration/Reception (Manning Faculty Lounge, second floor breezeway fo Stanford Law School) Read more » about Behavioral Advertising and Privacy Law Reboot - US and International Legal Trends and Best Practices for Internet, Cloud and E-Commerce Companies
"WELNA: It could indeed. Hackers, by definition, are trying to break into other people's computer accounts and steal their information, so monitoring their activity means watching them poach on other people's Internet usage and private data. I talked with Jonathan Mayer, a computer security fellow at Stanford who's reviewed these latest Snowden documents. He says because of the way the surveillance law is written, the NSA can actually hang on to that hacked information. Read more » about New Snowden Documents Reveal Government Collection Of Online Data
CIS Affiliate Scholar David Levine interviews Jonathan Mayer, Stanford Ph.D. candidate in computer science, author of Terms of Abuse: An Empirical Assessment of the Federal Hacking Law, and How to Fix It. Read more » about Jonathan Mayer - Hearsay Culture Show #231 - KZSU-FM
Listen to the full piece at Marketplace.org.
"Now Neustar might lose the contract to Ericsson, which is based in Sweden. Neustar says this would be bad for national security, said Jonathan Mayer, a fellow at Stanford's Center for International Security and Cooperation.
“It certainly is a legitimate concern that the company that routes calls is in position to know a fair amount about law enforcement and intelligence investigations,” Mayer said." Read more » about The battle over which company has your number
View the CBS News Broadcast here.
"Stanford University Ph.D. student Jonathan Mayer and his research partner created an Android app called MetaPhone that asked users to volunteer their phone records in an effort to learn what could be uncovered from metadata. More than 500 people signed up. Read more » about Just how much personal information does phone metadata reveal?