Abstract
We consider mass surveillance from a computer-science perspective. After presenting some objections to the behavior of the US National Security Agency and its counterparts in allied nations (emphasizing technical problems associated with such behavior, rather than political, legal, and social problems), we propose a grass-roots, technological response: decentralized cloud services, facilitated by open-source, decentralized configuration-management tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Call for Papers, Cambridge Security Protocols Workshop, 2014.
- 2.
References
Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014)
Goldfarb, A., Tucker, C.E.: Online advertising, behavioral targeting, and privacy. Commun. ACM 54(5), 25–27 (2011)
Lichtblau, E., Schmidt, M.S.: Other Agencies Clamor for Data NSA Compiles. The New York Times, 23 Aug 2013
Gorman, S.: NSA Officers Spy on Love Interests. The Wall Street Journal, 23 August 2013
Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post, 30 Oct 2013
Clarke, R.A., Morell, M.J., Stone, G.R., Sunstein, C.R., Swire, P.: Liberty and Security in a Changing World, 12 Dec 2013. http://www.scribd.com/doc/192387819/NSA-review-board-s-report
Soltani, A., Gellman, B.: New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. The Washington Post, 10 Dec 2013
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)
Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593–622 (2005)
The Guardian: Project Bullrun - classification guide to the NSA’s decryption program, 5 Sept 2013. http://www.theguardian.com/world/interactive/2013/sep/05/nsa-project-bullrun-classification-guide
Prevelakis, V., Spinellis, D.: The athens affair. IEEE Spectrum. 44(7), 26–33 (2007)
Schneier, B.: When It Comes to Security, We’re Back to Feudalism, 26 Nov 2012. https://www.schneier.com/essay-406.html
Lanier, J.: Who Owns the Future?. Simon and Schuster, New York (2013)
AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, Yahoo!: Global Government Surveillance Reform (2013). http://reformgover-nmentsurveillance.com
Gulbrandsen, A., Vixie, P., Esibov, L.: A DNS RR for specifying the location of services (DNS SRV). RFC 2782 (Proposed Standard), Feb 2000. http://www.ietf.org/rfc/rfc2782.txt. Updated in RFC 6335
Vaughan-Nichols, S.J.: Freedom box: Freeing the Internet one Server at a time, 16 Feb 2011. http://www.zdnet.com/blog/networking/freedom-box-freeing-the-internet-one-server-at-a-time/698
Henderson, N.: Open Source Project arkOS Brings Simplicity to Self-Hosting, 12 Nov 2013. http://www.thewhir.com/web-hosting-news/open-source-project-arkos-brings-simplicity-to-self-hosting
Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 461–472. ACM Press, New York (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Feigenbaum, J., Koenig, J. (2014). On the Feasibility of a Technological Response to the Surveillance Morass. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-12400-1_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12399-8
Online ISBN: 978-3-319-12400-1
eBook Packages: Computer ScienceComputer Science (R0)