Abstract
In recent work on open, privacy-preserving, accountable surveillance, we have proposed the use of cryptographic protocols that enable law-enforcement and intelligence agencies to obtain actionable information about targeted users of mass-communication systems without intruding on the privacy of untargeted users. Our suggestion that appropriate technology, combined with sound policy and the rule of law, can afford typical users significantly more privacy than they have now without hindering lawful and effective actions by law-enforcement and intelligence agencies has met with considerable skepticism. In this paper, we summarize the principal objections to our approach and address them.
Keywords
- Surveillance Controller
- Mass Communication Systems
- Privacy Research Community
- Privacy-preserving Manner
- Intelligence Advanced Research Projects Activity
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The Defense Advanced Research Projects Agency and the Intelligence Advanced Research Project Activity are technology-research organizations within the US Department of Defense and the US Office of the Director of National Intelligence, respectively.
References
Bieber, M.A.: Meeting the statute or beating it: Using John Doe indictments based on DNA to meet the statute of limitations. Univ. PA Law Rev. 150(3), 1079–1098 (2002)
Greenberg, A.: DARPA will spend $20 million to search for crypto’s holy grail. Forbes, 6 April 2011
Kamara, S.: Restructuring the NSA metadata program. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 235–247. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_19
Kearns, M., Roth, A., Wu, Z.S., Yaroslavtsev, G.: Private algorithms for the protected in social network search. Proc. Nat. Acad. Sci. 113(4), 913–918 (2016)
Kroll, J.A., Felten, E.W., Boneh, D.: Secure protocols for accountable warrant execution (2014). http://www.cs.princeton.edu/~felten/warrant-paper.pdf
Lohr, S.: With ‘Brandeis’ project, DARPA seeks to advance privacy technology. The New York Times, 14 September 2015
Segal, A., Feigenbaum, J., Ford, B.: Open, privacy-preserving protocols for lawful surveillance (2016). https://arxiv.org/abs/1607.03659
Segal, A., Feigenbaum, J., Ford, B.: Privacy-preserving contact chaining [preliminary report]. In: Proceedings of the 15th Workshop on Privacy in the Electronic Society. pp. 185–188. ACM, New York NY, USA, October 2016
Segal, A., Ford, B., Feigenbaum, J.: Catching bandits and only bandits: privacy-preserving intersection warrants for lawful surveillance. In: Proceedings of the 4th Workshop on Free and Open Communications on the Internet. USENIX, Berkeley CA, USA, August 2014
Soltani, A., Gellman, B.: New documents show how the NSA infers relationships based on mobile location data. The Washington Post, 10 December 2013
Acknowledgements
This work was supported by US National Science Foundation grants CNS-1407454 and CNS-1409599, William and Flora Hewlett Foundation grant 2016-3834, and the AXA Research Fund.
We are grateful to our collaborator and former student Aaron Segal for all of his good work in this area and for helpful discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Feigenbaum, J., Ford, B. (2017). Multiple Objectives of Lawful-Surveillance Protocols. In: Stajano, F., Anderson, J., Christianson, B., Matyáš, V. (eds) Security Protocols XXV. Security Protocols 2017. Lecture Notes in Computer Science(), vol 10476. Springer, Cham. https://doi.org/10.1007/978-3-319-71075-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-71075-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71074-7
Online ISBN: 978-3-319-71075-4
eBook Packages: Computer ScienceComputer Science (R0)