No Cover Image

Conference contribution 53 views 14 downloads

Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret / Theo Tryfonas; Michael Carter; Tom Crick; Panagiotis Andriotis

Human Aspects of Information Security, Privacy, and Trust, Volume: 9750, Pages: 174 - 185

Swansea University Author: Crick, Tom

Abstract

Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle i...

Full description

Published in: Human Aspects of Information Security, Privacy, and Trust
ISBN: 978-3-319-39380-3 978-3-319-39381-0
ISSN: 0302-9743 1611-3349
Published: Toronto, ON, Canada Springer 2016
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa43379
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2018-08-14T15:01:05Z
last_indexed 2019-06-07T20:41:51Z
id cronfa43379
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2019-06-07T14:17:03Z</datestamp><bib-version>v2</bib-version><id>43379</id><entry>2018-08-14</entry><title>Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret</title><alternativeTitle></alternativeTitle><author>Tom Crick</author><firstname>Tom</firstname><surname>Crick</surname><active>true</active><ORCID>0000-0001-5196-9389</ORCID><ethesisStudent>false</ethesisStudent><sid>200c66ef0fc55391f736f6e926fb4b99</sid><email>9971fd6d74987b78a0d7fce128f8c721</email><emailaddr>z93Ri4T5hwMLTfh+6XG11n2HZhUyFASdV1DFdgIIhKs=</emailaddr><date>2018-08-14</date><deptcode>EDUC</deptcode><abstract>Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UK's cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear &#x2013; as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states.</abstract><type>Conference contribution</type><journal>Human Aspects of Information Security, Privacy, and Trust</journal><volume>9750</volume><journalNumber/><paginationStart>174</paginationStart><paginationEnd>185</paginationEnd><publisher>Springer</publisher><placeOfPublication>Toronto, ON, Canada</placeOfPublication><isbnPrint>978-3-319-39380-3</isbnPrint><isbnElectronic>978-3-319-39381-0</isbnElectronic><issnPrint>0302-9743</issnPrint><issnElectronic>1611-3349</issnElectronic><keywords>Surveillance, Cyberspace, Public trust</keywords><publishedDay>17</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2016</publishedYear><publishedDate>2016-07-17</publishedDate><doi>10.1007/978-3-319-39381-0_16</doi><url>https://link.springer.com/chapter/10.1007%2F978-3-319-39381-0_16</url><notes>4th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2016)</notes><college>College of Arts and Humanities</college><department>School of Education</department><CollegeCode>CAAH</CollegeCode><DepartmentCode>EDUC</DepartmentCode><institution/><researchGroup>None</researchGroup><supervisor/><sponsorsfunders/><grantnumber/><degreelevel/><degreename></degreename><lastEdited>2019-06-07T14:17:03Z</lastEdited><Created>2018-08-14T15:44:54Z</Created><path><level id="1">College of Science</level><level id="2">Computer Science</level></path><authors><author><firstname>Theo</firstname><surname>Tryfonas</surname><orcid/><order>1</order></author><author><firstname>Michael</firstname><surname>Carter</surname><orcid/><order>2</order></author><author><firstname>Tom</firstname><surname>Crick</surname><orcid>0000-0001-5196-9389</orcid><order>3</order></author><author><firstname>Panagiotis</firstname><surname>Andriotis</surname><orcid/><order>4</order></author></authors><documents><document><filename>0043379-28082018113956.pdf</filename><originalFilename>has2016.pdf</originalFilename><uploaded>2018-08-28T11:39:56Z</uploaded><type>Output</type><contentLength>352600</contentLength><contentType>application/pdf</contentType><version>AM</version><cronfaStatus>true</cronfaStatus><action>Updated Copyright</action><actionDate>09/10/2018</actionDate><embargoDate>2018-08-28T00:00:00</embargoDate><documentNotes/><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents></rfc1807>
spelling 2019-06-07T14:17:03Z v2 43379 2018-08-14 Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret Tom Crick Tom Crick true 0000-0001-5196-9389 false 200c66ef0fc55391f736f6e926fb4b99 9971fd6d74987b78a0d7fce128f8c721 z93Ri4T5hwMLTfh+6XG11n2HZhUyFASdV1DFdgIIhKs= 2018-08-14 EDUC Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UK's cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states. Conference contribution Human Aspects of Information Security, Privacy, and Trust 9750 174 185 Springer Toronto, ON, Canada 978-3-319-39380-3 978-3-319-39381-0 0302-9743 1611-3349 Surveillance, Cyberspace, Public trust 17 7 2016 2016-07-17 10.1007/978-3-319-39381-0_16 https://link.springer.com/chapter/10.1007%2F978-3-319-39381-0_16 4th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2016) College of Arts and Humanities School of Education CAAH EDUC None 2019-06-07T14:17:03Z 2018-08-14T15:44:54Z College of Science Computer Science Theo Tryfonas 1 Michael Carter 2 Tom Crick 0000-0001-5196-9389 3 Panagiotis Andriotis 4 0043379-28082018113956.pdf has2016.pdf 2018-08-28T11:39:56Z Output 352600 application/pdf AM true Updated Copyright 09/10/2018 2018-08-28T00:00:00 true eng
title Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
spellingShingle Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
Crick, Tom
title_short Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
title_full Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
title_fullStr Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
title_full_unstemmed Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
title_sort Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret
author_id_str_mv 200c66ef0fc55391f736f6e926fb4b99
author_id_fullname_str_mv 200c66ef0fc55391f736f6e926fb4b99_***_Crick, Tom
author Crick, Tom
author2 Theo Tryfonas
Michael Carter
Tom Crick
Panagiotis Andriotis
format Conference contribution
container_title Human Aspects of Information Security, Privacy, and Trust
container_volume 9750
container_start_page 174
publishDate 2016
institution Swansea University
isbn 978-3-319-39380-3
978-3-319-39381-0
issn 0302-9743
1611-3349
doi_str_mv 10.1007/978-3-319-39381-0_16
publisher Springer
college_str College of Science
hierarchytype
hierarchy_top_id collegeofscience
hierarchy_top_title College of Science
hierarchy_parent_id collegeofscience
hierarchy_parent_title College of Science
department_str Computer Science{{{_:::_}}}College of Science{{{_:::_}}}Computer Science
url https://link.springer.com/chapter/10.1007%2F978-3-319-39381-0_16
document_store_str 1
active_str 1
description Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UK's cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states.
published_date 2016-07-17T06:08:55Z
_version_ 1642361242325614592
score 10.8362255