Conference Paper/Proceeding/Abstract 870 views 340 downloads
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
Human Aspects of Information Security, Privacy, and Trust, Volume: 9750, Pages: 174 - 185
Swansea University Author: Tom Crick
-
PDF | Accepted Manuscript
Download (382.26KB)
DOI (Published version): 10.1007/978-3-319-39381-0_16
Abstract
Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle i...
Published in: | Human Aspects of Information Security, Privacy, and Trust |
---|---|
ISBN: | 978-3-319-39380-3 978-3-319-39381-0 |
ISSN: | 0302-9743 1611-3349 |
Published: |
Toronto, ON, Canada
Springer
2016
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa43379 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2018-08-14T15:01:05Z |
---|---|
last_indexed |
2023-01-11T14:20:02Z |
id |
cronfa43379 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2022-12-18T17:41:28.2333151</datestamp><bib-version>v2</bib-version><id>43379</id><entry>2018-08-14</entry><title>Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret</title><swanseaauthors><author><sid>200c66ef0fc55391f736f6e926fb4b99</sid><ORCID>0000-0001-5196-9389</ORCID><firstname>Tom</firstname><surname>Crick</surname><name>Tom Crick</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2018-08-14</date><deptcode>EDUC</deptcode><abstract>Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UK's cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states.</abstract><type>Conference Paper/Proceeding/Abstract</type><journal>Human Aspects of Information Security, Privacy, and Trust</journal><volume>9750</volume><journalNumber/><paginationStart>174</paginationStart><paginationEnd>185</paginationEnd><publisher>Springer</publisher><placeOfPublication>Toronto, ON, Canada</placeOfPublication><isbnPrint>978-3-319-39380-3</isbnPrint><isbnElectronic>978-3-319-39381-0</isbnElectronic><issnPrint>0302-9743</issnPrint><issnElectronic>1611-3349</issnElectronic><keywords>Surveillance, Cyberspace, Public trust</keywords><publishedDay>17</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2016</publishedYear><publishedDate>2016-07-17</publishedDate><doi>10.1007/978-3-319-39381-0_16</doi><url/><notes>4th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2016)</notes><college>COLLEGE NANME</college><department>Education</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>EDUC</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-12-18T17:41:28.2333151</lastEdited><Created>2018-08-14T15:44:54.0254114</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">School of Social Sciences - Education and Childhood Studies</level></path><authors><author><firstname>Theo</firstname><surname>Tryfonas</surname><order>1</order></author><author><firstname>Michael</firstname><surname>Carter</surname><order>2</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>3</order></author><author><firstname>Panagiotis</firstname><surname>Andriotis</surname><order>4</order></author></authors><documents><document><filename>0043379-28082018113956.pdf</filename><originalFilename>has2016.pdf</originalFilename><uploaded>2018-08-28T11:39:56.0170000</uploaded><type>Output</type><contentLength>352600</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2018-08-28T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
spelling |
2022-12-18T17:41:28.2333151 v2 43379 2018-08-14 Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret 200c66ef0fc55391f736f6e926fb4b99 0000-0001-5196-9389 Tom Crick Tom Crick true false 2018-08-14 EDUC Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UK's cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states. Conference Paper/Proceeding/Abstract Human Aspects of Information Security, Privacy, and Trust 9750 174 185 Springer Toronto, ON, Canada 978-3-319-39380-3 978-3-319-39381-0 0302-9743 1611-3349 Surveillance, Cyberspace, Public trust 17 7 2016 2016-07-17 10.1007/978-3-319-39381-0_16 4th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2016) COLLEGE NANME Education COLLEGE CODE EDUC Swansea University 2022-12-18T17:41:28.2333151 2018-08-14T15:44:54.0254114 Faculty of Humanities and Social Sciences School of Social Sciences - Education and Childhood Studies Theo Tryfonas 1 Michael Carter 2 Tom Crick 0000-0001-5196-9389 3 Panagiotis Andriotis 4 0043379-28082018113956.pdf has2016.pdf 2018-08-28T11:39:56.0170000 Output 352600 application/pdf Accepted Manuscript true 2018-08-28T00:00:00.0000000 true eng |
title |
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret |
spellingShingle |
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret Tom Crick |
title_short |
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret |
title_full |
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret |
title_fullStr |
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret |
title_full_unstemmed |
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret |
title_sort |
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret |
author_id_str_mv |
200c66ef0fc55391f736f6e926fb4b99 |
author_id_fullname_str_mv |
200c66ef0fc55391f736f6e926fb4b99_***_Tom Crick |
author |
Tom Crick |
author2 |
Theo Tryfonas Michael Carter Tom Crick Panagiotis Andriotis |
format |
Conference Paper/Proceeding/Abstract |
container_title |
Human Aspects of Information Security, Privacy, and Trust |
container_volume |
9750 |
container_start_page |
174 |
publishDate |
2016 |
institution |
Swansea University |
isbn |
978-3-319-39380-3 978-3-319-39381-0 |
issn |
0302-9743 1611-3349 |
doi_str_mv |
10.1007/978-3-319-39381-0_16 |
publisher |
Springer |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
School of Social Sciences - Education and Childhood Studies{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}School of Social Sciences - Education and Childhood Studies |
document_store_str |
1 |
active_str |
0 |
description |
Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UK's cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states. |
published_date |
2016-07-17T03:54:37Z |
_version_ |
1763752728322899968 |
score |
11.029921 |