Skip to main content

On the Feasibility of a Technological Response to the Surveillance Morass

  • Conference paper
  • First Online:
Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

Abstract

We consider mass surveillance from a computer-science perspective. After presenting some objections to the behavior of the US National Security Agency and its counterparts in allied nations (emphasizing technical problems associated with such behavior, rather than political, legal, and social problems), we propose a grass-roots, technological response: decentralized cloud services, facilitated by open-source, decentralized configuration-management tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Call for Papers, Cambridge Security Protocols Workshop, 2014.

  2. 2.

    https://github.com/jeremie-koenig/ldapmin

References

  1. Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014)

    Google Scholar 

  2. Goldfarb, A., Tucker, C.E.: Online advertising, behavioral targeting, and privacy. Commun. ACM 54(5), 25–27 (2011)

    Article  Google Scholar 

  3. Lichtblau, E., Schmidt, M.S.: Other Agencies Clamor for Data NSA Compiles. The New York Times, 23 Aug 2013

    Google Scholar 

  4. Gorman, S.: NSA Officers Spy on Love Interests. The Wall Street Journal, 23 August 2013

    Google Scholar 

  5. Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post, 30 Oct 2013

    Google Scholar 

  6. Clarke, R.A., Morell, M.J., Stone, G.R., Sunstein, C.R., Swire, P.: Liberty and Security in a Changing World, 12 Dec 2013. http://www.scribd.com/doc/192387819/NSA-review-board-s-report

  7. Soltani, A., Gellman, B.: New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. The Washington Post, 10 Dec 2013

    Google Scholar 

  8. Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593–622 (2005)

    Google Scholar 

  11. The Guardian: Project Bullrun - classification guide to the NSA’s decryption program, 5 Sept 2013. http://www.theguardian.com/world/interactive/2013/sep/05/nsa-project-bullrun-classification-guide

  12. Prevelakis, V., Spinellis, D.: The athens affair. IEEE Spectrum. 44(7), 26–33 (2007)

    Article  Google Scholar 

  13. Schneier, B.: When It Comes to Security, We’re Back to Feudalism, 26 Nov 2012. https://www.schneier.com/essay-406.html

  14. Lanier, J.: Who Owns the Future?. Simon and Schuster, New York (2013)

    Google Scholar 

  15. AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, Yahoo!: Global Government Surveillance Reform (2013). http://reformgover-nmentsurveillance.com

  16. Gulbrandsen, A., Vixie, P., Esibov, L.: A DNS RR for specifying the location of services (DNS SRV). RFC 2782 (Proposed Standard), Feb 2000. http://www.ietf.org/rfc/rfc2782.txt. Updated in RFC 6335

  17. Vaughan-Nichols, S.J.: Freedom box: Freeing the Internet one Server at a time, 16 Feb 2011. http://www.zdnet.com/blog/networking/freedom-box-freeing-the-internet-one-server-at-a-time/698

  18. Henderson, N.: Open Source Project arkOS Brings Simplicity to Self-Hosting, 12 Nov 2013. http://www.thewhir.com/web-hosting-news/open-source-project-arkos-brings-simplicity-to-self-hosting

  19. Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 461–472. ACM Press, New York (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joan Feigenbaum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Feigenbaum, J., Koenig, J. (2014). On the Feasibility of a Technological Response to the Surveillance Morass. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics