8,395 Hits in 6.5 sec

Open, privacy-preserving protocols for lawful surveillance [article]

Aaron Segal, Joan Feigenbaum, Bryan Ford
2016 arXiv   pre-print
In particular, we present practical, privacy-preserving protocols for two operations that law-enforcement and intelligence agencies have used effectively: set intersection and contact chaining.  ...  Experiments with our protocols suggest that privacy-preserving contact chaining can perform a 3-hop privacy-preserving graph traversal producing 27,000 ciphertexts in under two minutes.  ...  Bandits [15] formulated the openness principle that we have followed and were the first to design privacy-preserving protocols for the surveillance of unknown targets. Kearns et al.  ... 
arXiv:1607.03659v1 fatcat:5sk2ivu5vrfvxgh44z2j5ijfr4

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aaron Segal, Bryan Ford, Joan Feigenbaum
2014 USENIX Security Symposium  
We formulate principles that we believe effective, lawful surveillance protocols should adhere to in an era of big data and global communication networks.  ...  Preliminary experiments indicate that such a system could be efficient and usable, suggesting that privacy and accountability need not be barriers to effective intelligence gathering.  ...  The U.S. government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
dblp:conf/uss/SegalFF14 fatcat:nps2hrb5ujhdzc2hd24vtrtwyu

Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion) [chapter]

Joan Feigenbaum
2017 Lecture Notes in Computer Science  
Feigenbaum, "Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance," in Proceedings of the Fourth USENIX Workshop on Free and Open Communications on the Internet  ...  We've certainly been claiming we know how to do that for many years. In our 2014 FOCI paper, we considered lawful, accountable, privacy-preserving surveillance.  ... 
doi:10.1007/978-3-319-71075-4_2 fatcat:xhmkamq3drcbbnvqdx6netsgjm

Ensuring Privacy When Integrating Patient-Based Datasets: New Methods and Developments in Record Linkage

Adrian P. Brown, Anna M. Ferrante, Sean M. Randall, James H. Boyd, James B. Semmens
2017 Frontiers in Public Health  
Current conceptual and experimental privacy-preserving record linkage (PPRL) models show promise in addressing data integration challenges.  ...  issues associated with protecting an individual's privacy.  ...  PrivAcY-PreserviNG sOLUtiONs Privacy-preserving record linkage protocols utilize algorithms and techniques to conduct linkage on encrypted or masked information; these methods do not require data custodians  ... 
doi:10.3389/fpubh.2017.00034 pmid:28303240 pmcid:PMC5332360 fatcat:x7hp6zyev5b4pnnzynz27ge6hy

The Effect of Political Affiliation on Support for Police Drone Monitoring

Mattie N. Milner, Stephen Rice, Scott Richard Winter, Emily C. Anania
2019 Journal of Unmanned Vehicle Systems  
Acknowledgements I would like to express my deepest appreciation to Stephen McCammon for all his hard work and dedication! His invaluable contributions were vital in giving this paper life.  ...  This body of law tells us that even low-tech manned aerial surveillance of open private spaces generally requires a warrant, especially when that surveillance is conducted at low altitudes. 104 In one  ...  Consistent with the TTC's policy of limiting law enforcement access to recorded images to the investigation of specific incidents, the two-signature sign-off protocol is critical to ensuring that privacy  ... 
doi:10.1139/juvs-2018-0026 fatcat:vtfwbzswi5htrlykik5khujvna

On the Feasibility of a Technological Response to the Surveillance Morass [chapter]

Joan Feigenbaum, Jérémie Koenig
2014 Lecture Notes in Computer Science  
We consider mass surveillance from a computer-science perspective.  ...  emphasizing technical problems associated with such behavior, rather than political, legal, and social problems), we propose a grass-roots, technological response: decentralized cloud services, facilitated by open-source  ...  Research on the question of how simultaneously to provide scalable cloud services, user privacy, and support for lawful surveillance is fairly new, and open questions abound.  ... 
doi:10.1007/978-3-319-12400-1_23 fatcat:eupmk554t5h3xmhhmdds26f7se

Mass surveillance and technological policy options: Improving security of private communications

Stefan Schuster, Melle van den Berg, Xabier Larrucea, Ton Slewe, Peter Ide-Kostic
2017 Computer Standards & Interfaces  
Some are willing to sacrifice part of their privacy, while others defend the preservation of their privacy vehemently.  ...  The motivation behind the policy recommendation of "promoting open protocols, open implementations [and] open systems" is the idea of enabling public scrutiny that allows for validation and verification  ... 
doi:10.1016/j.csi.2016.09.011 fatcat:zhzmptvtyzb6jj64vcl4u4adb4

Rethinking Privacy Online and Human Rights: The Internet's Standardisation Bodies as the Guardians of Privacy Online in the Face of Mass Surveillance

Adamantia Rachovitsa
2017 Social Science Research Network  
Second, in the area of online privacy informal law-making and international law converge in a distinctive way.  ...  The present discussion is placed in the context of cyberspace and, more specifically, the Internet standardisation bodies" informal law-making functions when creating Internet protocols by setting Internet  ...  Privacy by Design Subject to Law and Business Practices Privacy by Design as a technological/informal law-making standard embedded into Internet protocols is yet subject to law as well as business practices  ... 
doi:10.2139/ssrn.2911978 fatcat:bypaxqqbjjeajjcp6lb7x2r2im

Technological sovereignty: Missing the point?

Tim Maurer, Isabel Skierka, Robert Morgus, Mirko Hohmann
2015 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace  
A Therefore, the impact on privacy depends on the local government's respect for privacy.  ...  For more on the Safe Harbor, see: Dowling, Jr., Donald C. 2009. "International Data Protection and Privacy Law." White & Case. p. 12.  ... 
doi:10.1109/cycon.2015.7158468 dblp:conf/cycon/MaurerSMH15 fatcat:xpro2cb2cjgsjbirmmqagh6r6i

Privacy enabling technology for video surveillance

Frédéric Dufaux, Mourad Ouaret, Yousri Abdeljaoued, Alfonso Navarro, Fabrice Vergnenègre, Touradj Ebrahimi, Sos S. Agaian, Sabah A. Jassim
2006 Mobile Multimedia/Image Processing for Military and Security Applications  
In this paper, we address the problem privacy in video surveillance. We propose an efficient solution based on transformdomain scrambling of regions of interest in a video sequence.  ...  In the proposed video surveillance system, heterogeneous clients can remotely access the system through the Internet or 2G/3G mobile phone network.  ...  This technique is therefore suitable to preserve privacy in video surveillance system.  ... 
doi:10.1117/12.664945 fatcat:dge4pryubzayvearaa6plda4zy

Averting the Inherent Dangers of 'Going Dark': Why Congress Must Require a Locked Front Door to Encrypted Data

Geoffrey S. Corn
2015 Social Science Research Network  
Thus, its presence should be open to the public and available for attack, both in laboratories and in the real world.  ...  Indeed, the Fourth Amendment itself tolerates such risk by allowing for lawful government searches and surveillance in the first place.  ... 
doi:10.2139/ssrn.2630361 fatcat:lkegdtizarfjjhmiopwask7j5a

The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism

Murdoch Watney
2007 Journal of Digital Forensics, Security and Law  
After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the  ...  Data preservation is the preservation of specific traffic data of an identifiable Internet user for a specific criminal investigation for a limited period of time.  ...  and protocols (Lyon 2003, Edwards and Howells 2003) .  ... 
doi:10.15394/jdfsl.2007.1022 fatcat:adsy65jwnrgodpaz7azlq2vfha

Engineering and lawyering privacy by design: understanding online privacy both as a technical and an international human rights issue

Adamantia Rachovitsa
2016 International Journal of Law and Information Technology  
from surveillance and serious threats to their privacy.  ...  in the core (low-layer) Internet protocols. 92 The IETF has thus far focused mostly on the design and update of Internet protocols since it is difficult for protocol designers to foresee all pertinent  ... 
doi:10.1093/ijlit/eaw012 fatcat:byzn6jlffrhr5izct7r76xyp5m

When the Profile Becomes the Population: Examining Privacy Governance and Road Traffic Surveillance in Canada and Australia

Ian Warren, Randy Lippert, Kevin Walby, Darren Palmer
2013 Current Issues in Criminal Justice  
Perhaps of greatest concern is that neither PbD in Canada, nor Australia's distinct lack of privacy protocols for the use of ANPR, prevent the expanded use of these systems or related surveillance technologies  ...  This tension highlights the importance of comparative inquiry into how privacy standards are established for this form of law enforcement surveillance.  ... 
doi:10.1080/10345329.2013.12035984 fatcat:apz5w5ggo5chlnm5gfpqcnsdr4

P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property

Frances S. Grodzinsky, Herman T. Tavani
2005 Ethics and Information Technology  
In particular, we examine the implications of this act for a new form of "panoptic surveillance" that can be carried out by organizations such as the RIAA.  ...  In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case.  ...  We are grateful for comments received from conference participants. In composing this paper, we drew from material in two previously published works: and .  ... 
doi:10.1007/s10676-006-0012-4 fatcat:3ynxvk5ujbh2roghte4jcfiqhi
« Previous Showing results 1 — 15 out of 8,395 results