On the Feasibility of a Technological Response to the Surveillance Morass

  • Joan FeigenbaumEmail author
  • Jérémie Koenig
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)


We consider mass surveillance from a computer-science perspective. After presenting some objections to the behavior of the US National Security Agency and its counterparts in allied nations (emphasizing technical problems associated with such behavior, rather than political, legal, and social problems), we propose a grass-roots, technological response: decentralized cloud services, facilitated by open-source, decentralized configuration-management tools.


Cloud Service Internet Protocol Intelligence Agency Domain Name System Fourth Amendment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014)Google Scholar
  2. 2.
    Goldfarb, A., Tucker, C.E.: Online advertising, behavioral targeting, and privacy. Commun. ACM 54(5), 25–27 (2011)CrossRefGoogle Scholar
  3. 3.
    Lichtblau, E., Schmidt, M.S.: Other Agencies Clamor for Data NSA Compiles. The New York Times, 23 Aug 2013Google Scholar
  4. 4.
    Gorman, S.: NSA Officers Spy on Love Interests. The Wall Street Journal, 23 August 2013Google Scholar
  5. 5.
    Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post, 30 Oct 2013Google Scholar
  6. 6.
    Clarke, R.A., Morell, M.J., Stone, G.R., Sunstein, C.R., Swire, P.: Liberty and Security in a Changing World, 12 Dec 2013.
  7. 7.
    Soltani, A., Gellman, B.: New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. The Washington Post, 10 Dec 2013Google Scholar
  8. 8.
    Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593–622 (2005)Google Scholar
  11. 11.
    The Guardian: Project Bullrun - classification guide to the NSA’s decryption program, 5 Sept 2013.
  12. 12.
    Prevelakis, V., Spinellis, D.: The athens affair. IEEE Spectrum. 44(7), 26–33 (2007)CrossRefGoogle Scholar
  13. 13.
    Schneier, B.: When It Comes to Security, We’re Back to Feudalism, 26 Nov 2012.
  14. 14.
    Lanier, J.: Who Owns the Future?. Simon and Schuster, New York (2013)Google Scholar
  15. 15.
    AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, Yahoo!: Global Government Surveillance Reform (2013).
  16. 16.
    Gulbrandsen, A., Vixie, P., Esibov, L.: A DNS RR for specifying the location of services (DNS SRV). RFC 2782 (Proposed Standard), Feb 2000. Updated in RFC 6335
  17. 17.
    Vaughan-Nichols, S.J.: Freedom box: Freeing the Internet one Server at a time, 16 Feb 2011.
  18. 18.
    Henderson, N.: Open Source Project arkOS Brings Simplicity to Self-Hosting, 12 Nov 2013.
  19. 19.
    Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 461–472. ACM Press, New York (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Yale UniversityNew HavenUSA

Personalised recommendations