Mass surveillance and technological policy options: Improving security of private communications
The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is hand...
Gespeichert in:
Veröffentlicht in: | Computer standards and interfaces 2017-02, Vol.50, p.76-82 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 82 |
---|---|
container_issue | |
container_start_page | 76 |
container_title | Computer standards and interfaces |
container_volume | 50 |
creator | Schuster, Stefan van den Berg, Melle Larrucea, Xabier Slewe, Ton Ide-Kostic, Peter |
description | The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures.
This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture.
•The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged. |
doi_str_mv | 10.1016/j.csi.2016.09.011 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1920727897</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0920548916300988</els_id><sourcerecordid>1920727897</sourcerecordid><originalsourceid>FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwANwscU6wk9hO4IQqfioVcYGzcddOcZTEwU4i9e1xKWdOu9LO7M5-CF1TklJC-W2TQrBpFtuUVCmh9AQtaCmyRBBanqIFqTKSsKKsztFFCA0hJOO5WKDPVxUCDpOfjW1b1YPBqtd4NPDVu9btLKgWD661sMduGK3rwx1ed4N3s-13OBiYvB3jrMaDt7MaDQbXdVMfjb_qS3RWqzaYq7-6RB9Pj--rl2Tz9rxePWwSKCgfk20OlJiqqnUNUCrGhSYagEHGhDLFVii95VxQEAXjmS4pA0YLUdOCsbyueL5EN8e9Mdr3ZMIoGzf5Pp6UNP4uMlFWIqroUQXeheBNLWPqTvm9pEQeQMpGRpDyAFKSSkaQ0XN_9JgYf7bGywDWRFLaegOj1M7-4_4B1_t9bw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1920727897</pqid></control><display><type>article</type><title>Mass surveillance and technological policy options: Improving security of private communications</title><source>Elsevier ScienceDirect Journals</source><creator>Schuster, Stefan ; van den Berg, Melle ; Larrucea, Xabier ; Slewe, Ton ; Ide-Kostic, Peter</creator><creatorcontrib>Schuster, Stefan ; van den Berg, Melle ; Larrucea, Xabier ; Slewe, Ton ; Ide-Kostic, Peter</creatorcontrib><description>The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures.
This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture.
•The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged.</description><identifier>ISSN: 0920-5489</identifier><identifier>EISSN: 1872-7018</identifier><identifier>DOI: 10.1016/j.csi.2016.09.011</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Computer architecture ; Cybersecurity ; Encryption ; Government ; Internet ; Policy ; Privacy ; Surveillance ; Vulnerability</subject><ispartof>Computer standards and interfaces, 2017-02, Vol.50, p.76-82</ispartof><rights>2016 The Authors</rights><rights>Copyright Elsevier BV Feb 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</citedby><cites>FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0920548916300988$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Schuster, Stefan</creatorcontrib><creatorcontrib>van den Berg, Melle</creatorcontrib><creatorcontrib>Larrucea, Xabier</creatorcontrib><creatorcontrib>Slewe, Ton</creatorcontrib><creatorcontrib>Ide-Kostic, Peter</creatorcontrib><title>Mass surveillance and technological policy options: Improving security of private communications</title><title>Computer standards and interfaces</title><description>The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures.
This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture.
•The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged.</description><subject>Computer architecture</subject><subject>Cybersecurity</subject><subject>Encryption</subject><subject>Government</subject><subject>Internet</subject><subject>Policy</subject><subject>Privacy</subject><subject>Surveillance</subject><subject>Vulnerability</subject><issn>0920-5489</issn><issn>1872-7018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OwzAQhC0EEqXwANwscU6wk9hO4IQqfioVcYGzcddOcZTEwU4i9e1xKWdOu9LO7M5-CF1TklJC-W2TQrBpFtuUVCmh9AQtaCmyRBBanqIFqTKSsKKsztFFCA0hJOO5WKDPVxUCDpOfjW1b1YPBqtd4NPDVu9btLKgWD661sMduGK3rwx1ed4N3s-13OBiYvB3jrMaDt7MaDQbXdVMfjb_qS3RWqzaYq7-6RB9Pj--rl2Tz9rxePWwSKCgfk20OlJiqqnUNUCrGhSYagEHGhDLFVii95VxQEAXjmS4pA0YLUdOCsbyueL5EN8e9Mdr3ZMIoGzf5Pp6UNP4uMlFWIqroUQXeheBNLWPqTvm9pEQeQMpGRpDyAFKSSkaQ0XN_9JgYf7bGywDWRFLaegOj1M7-4_4B1_t9bw</recordid><startdate>20170201</startdate><enddate>20170201</enddate><creator>Schuster, Stefan</creator><creator>van den Berg, Melle</creator><creator>Larrucea, Xabier</creator><creator>Slewe, Ton</creator><creator>Ide-Kostic, Peter</creator><general>Elsevier B.V</general><general>Elsevier BV</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20170201</creationdate><title>Mass surveillance and technological policy options: Improving security of private communications</title><author>Schuster, Stefan ; van den Berg, Melle ; Larrucea, Xabier ; Slewe, Ton ; Ide-Kostic, Peter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer architecture</topic><topic>Cybersecurity</topic><topic>Encryption</topic><topic>Government</topic><topic>Internet</topic><topic>Policy</topic><topic>Privacy</topic><topic>Surveillance</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schuster, Stefan</creatorcontrib><creatorcontrib>van den Berg, Melle</creatorcontrib><creatorcontrib>Larrucea, Xabier</creatorcontrib><creatorcontrib>Slewe, Ton</creatorcontrib><creatorcontrib>Ide-Kostic, Peter</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer standards and interfaces</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Schuster, Stefan</au><au>van den Berg, Melle</au><au>Larrucea, Xabier</au><au>Slewe, Ton</au><au>Ide-Kostic, Peter</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mass surveillance and technological policy options: Improving security of private communications</atitle><jtitle>Computer standards and interfaces</jtitle><date>2017-02-01</date><risdate>2017</risdate><volume>50</volume><spage>76</spage><epage>82</epage><pages>76-82</pages><issn>0920-5489</issn><eissn>1872-7018</eissn><abstract>The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures.
This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture.
•The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.csi.2016.09.011</doi><tpages>7</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0920-5489 |
ispartof | Computer standards and interfaces, 2017-02, Vol.50, p.76-82 |
issn | 0920-5489 1872-7018 |
language | eng |
recordid | cdi_proquest_journals_1920727897 |
source | Elsevier ScienceDirect Journals |
subjects | Computer architecture Cybersecurity Encryption Government Internet Policy Privacy Surveillance Vulnerability |
title | Mass surveillance and technological policy options: Improving security of private communications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T02%3A28%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mass%20surveillance%20and%20technological%20policy%20options:%20Improving%20security%20of%20private%20communications&rft.jtitle=Computer%20standards%20and%20interfaces&rft.au=Schuster,%20Stefan&rft.date=2017-02-01&rft.volume=50&rft.spage=76&rft.epage=82&rft.pages=76-82&rft.issn=0920-5489&rft.eissn=1872-7018&rft_id=info:doi/10.1016/j.csi.2016.09.011&rft_dat=%3Cproquest_cross%3E1920727897%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1920727897&rft_id=info:pmid/&rft_els_id=S0920548916300988&rfr_iscdi=true |