DOC PREVIEW
MTU CS 6461 - The Economics of Mass Surveillance

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

The Economics of Mass The Economics of Mass Surveillance and The Surveillance and The Questionable Value of Questionable Value of Anonymous Anonymous CommunicationsCommunicationsGeorge Danezis and Bettina George Danezis and Bettina WittnebenWittnebenPresented By: Warren PowersPresented By: Warren PowersOverviewOverviewIntroductionIntroductionModelModelObtaining network informationObtaining network informationSurveillanceSurveillanceDiscussion of effectivenessDiscussion of effectivenessConclusionConclusionIntroductionIntroductionParticipants belong to clubsParticipants belong to clubsIf one participant is under surveillance, all If one participant is under surveillance, all information shared and membership is information shared and membership is revealedrevealedQuestionsQuestionsHow many need to be under surveillance?How many need to be under surveillance?Who do we put under surveillance?Who do we put under surveillance?How does anonymity affect target selection?How does anonymity affect target selection?ModelModelPeople and spaces (or clubs)People and spaces (or clubs)RelationshipsRelationshipsWhen people belong to spacesWhen people belong to spacesNo links between peopleNo links between peopleRelationships have strengthRelationships have strengthSymbolizes degree of association between Symbolizes degree of association between person and spaceperson and spaceGraph from set of people to set of Graph from set of people to set of spaces.spaces.Extracting the Network from Extracting the Network from DataDataUsed data from mailing list archivesUsed data from mailing list archivesMapped email address to spaceMapped email address to spaceMapped email to personMapped email to personRelations were created from messages Relations were created from messages to liststo listsEffectiveness of Partial Effectiveness of Partial SurveillanceSurveillanceWhat is revealed?What is revealed?Observing one member of a spaceObserving one member of a spaceAll relationships associated with that spaceAll relationships associated with that spaceChoice of targetChoice of targetThose with highest degreeThose with highest degreeAmong spaces not under surveillanceAmong spaces not under surveillanceRepeated as budget allowsRepeated as budget allowsData Uncovered – Full InfoData Uncovered – Full InfoPartial InformationPartial InformationWe can monitor volume of messagesWe can monitor volume of messagesNot degree or correspondentsNot degree or correspondentsTarget selection more difficultTarget selection more difficultLower return on investmentLower return on investmentData Uncovered – Partial InfoData Uncovered – Partial InfoDiscussionDiscussionThe first model could represent no The first model could represent no anonymityanonymityCan obtain much information with little Can obtain much information with little surveillancesurveillanceThe second model represents some The second model represents some anonymityanonymityNo cover trafficNo cover trafficAnonymized communication is helpful but Anonymized communication is helpful but not perfectnot perfectDiminishing ReturnsDiminishing ReturnsInitial investment provides great returnInitial investment provides great returnAs budget is increased, marginal returns As budget is increased, marginal returns decrease.decrease.Cost per unit of intelligence rapidly increasesCost per unit of intelligence rapidly increasesUseful information may be very costlyUseful information may be very costlyPrivacy violation is highPrivacy violation is highInterception FiguresInterception FiguresWarrants issued vs. number under Warrants issued vs. number under surveillancesurveillanceUK populationUK populationFull information graph usedFull information graph usedFormula for those under surveillanceFormula for those under surveillance (0.5/0.01)X(0.5/0.01)X(0.5/0.01)1849 = 92000 people(0.5/0.01)1849 = 92000 peopleInfo on 50 people revealed for each one Info on 50 people revealed for each one monitoredmonitoredFailure of Adaptive Target Failure of Adaptive Target SelectionSelectionAdaptive strategies are inferior to volume Adaptive strategies are inferior to volume selectionselectionAdaptive StrategiesAdaptive StrategiesHigh known degreeHigh known degreeLikely to have links to undiscovered spacesLikely to have links to undiscovered spacesStructural equivalenceStructural equivalenceHigh know degree and few nodes sharing its High know degree and few nodes sharing its positionpositionStrategy ComparisonStrategy ComparisonTarget Selection for DisruptionTarget Selection for DisruptionWhat if goal is to disrupt network?What if goal is to disrupt network?Remove nodes with highest degreeRemove nodes with highest degreeRemove nodes with high volumeRemove nodes with high volumeSelection results not very differentSelection results not very differentNeed to remove twice as many using Need to remove twice as many using volume info.volume info.ConclusionConclusionInformation is leaked through third partiesInformation is leaked through third partiesA small carefully selected set of nodes A small carefully selected set of nodes reveal a large amount of informationreveal a large amount of informationUnlinkablility is not sufficient, Unlinkablility is not sufficient, unobservability is necessaryunobservability is necessarySurveillance will violate privacy of Surveillance will violate privacy of innocent partiesinnocent partiesFinding guilty parties will be costlyFinding guilty parties will be


View Full Document

MTU CS 6461 - The Economics of Mass Surveillance

Documents in this Course
Tapestry

Tapestry

13 pages

Load more
Download The Economics of Mass Surveillance
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view The Economics of Mass Surveillance and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view The Economics of Mass Surveillance 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?