Mass surveillance and technological policy options: Improving security of private communications

The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is hand...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer standards and interfaces 2017-02, Vol.50, p.76-82
Hauptverfasser: Schuster, Stefan, van den Berg, Melle, Larrucea, Xabier, Slewe, Ton, Ide-Kostic, Peter
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 82
container_issue
container_start_page 76
container_title Computer standards and interfaces
container_volume 50
creator Schuster, Stefan
van den Berg, Melle
Larrucea, Xabier
Slewe, Ton
Ide-Kostic, Peter
description The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures. This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture. •The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged.
doi_str_mv 10.1016/j.csi.2016.09.011
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1920727897</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0920548916300988</els_id><sourcerecordid>1920727897</sourcerecordid><originalsourceid>FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwANwscU6wk9hO4IQqfioVcYGzcddOcZTEwU4i9e1xKWdOu9LO7M5-CF1TklJC-W2TQrBpFtuUVCmh9AQtaCmyRBBanqIFqTKSsKKsztFFCA0hJOO5WKDPVxUCDpOfjW1b1YPBqtd4NPDVu9btLKgWD661sMduGK3rwx1ed4N3s-13OBiYvB3jrMaDt7MaDQbXdVMfjb_qS3RWqzaYq7-6RB9Pj--rl2Tz9rxePWwSKCgfk20OlJiqqnUNUCrGhSYagEHGhDLFVii95VxQEAXjmS4pA0YLUdOCsbyueL5EN8e9Mdr3ZMIoGzf5Pp6UNP4uMlFWIqroUQXeheBNLWPqTvm9pEQeQMpGRpDyAFKSSkaQ0XN_9JgYf7bGywDWRFLaegOj1M7-4_4B1_t9bw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1920727897</pqid></control><display><type>article</type><title>Mass surveillance and technological policy options: Improving security of private communications</title><source>Elsevier ScienceDirect Journals</source><creator>Schuster, Stefan ; van den Berg, Melle ; Larrucea, Xabier ; Slewe, Ton ; Ide-Kostic, Peter</creator><creatorcontrib>Schuster, Stefan ; van den Berg, Melle ; Larrucea, Xabier ; Slewe, Ton ; Ide-Kostic, Peter</creatorcontrib><description>The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures. This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture. •The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged.</description><identifier>ISSN: 0920-5489</identifier><identifier>EISSN: 1872-7018</identifier><identifier>DOI: 10.1016/j.csi.2016.09.011</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Computer architecture ; Cybersecurity ; Encryption ; Government ; Internet ; Policy ; Privacy ; Surveillance ; Vulnerability</subject><ispartof>Computer standards and interfaces, 2017-02, Vol.50, p.76-82</ispartof><rights>2016 The Authors</rights><rights>Copyright Elsevier BV Feb 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</citedby><cites>FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0920548916300988$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Schuster, Stefan</creatorcontrib><creatorcontrib>van den Berg, Melle</creatorcontrib><creatorcontrib>Larrucea, Xabier</creatorcontrib><creatorcontrib>Slewe, Ton</creatorcontrib><creatorcontrib>Ide-Kostic, Peter</creatorcontrib><title>Mass surveillance and technological policy options: Improving security of private communications</title><title>Computer standards and interfaces</title><description>The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures. This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture. •The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged.</description><subject>Computer architecture</subject><subject>Cybersecurity</subject><subject>Encryption</subject><subject>Government</subject><subject>Internet</subject><subject>Policy</subject><subject>Privacy</subject><subject>Surveillance</subject><subject>Vulnerability</subject><issn>0920-5489</issn><issn>1872-7018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OwzAQhC0EEqXwANwscU6wk9hO4IQqfioVcYGzcddOcZTEwU4i9e1xKWdOu9LO7M5-CF1TklJC-W2TQrBpFtuUVCmh9AQtaCmyRBBanqIFqTKSsKKsztFFCA0hJOO5WKDPVxUCDpOfjW1b1YPBqtd4NPDVu9btLKgWD661sMduGK3rwx1ed4N3s-13OBiYvB3jrMaDt7MaDQbXdVMfjb_qS3RWqzaYq7-6RB9Pj--rl2Tz9rxePWwSKCgfk20OlJiqqnUNUCrGhSYagEHGhDLFVii95VxQEAXjmS4pA0YLUdOCsbyueL5EN8e9Mdr3ZMIoGzf5Pp6UNP4uMlFWIqroUQXeheBNLWPqTvm9pEQeQMpGRpDyAFKSSkaQ0XN_9JgYf7bGywDWRFLaegOj1M7-4_4B1_t9bw</recordid><startdate>20170201</startdate><enddate>20170201</enddate><creator>Schuster, Stefan</creator><creator>van den Berg, Melle</creator><creator>Larrucea, Xabier</creator><creator>Slewe, Ton</creator><creator>Ide-Kostic, Peter</creator><general>Elsevier B.V</general><general>Elsevier BV</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20170201</creationdate><title>Mass surveillance and technological policy options: Improving security of private communications</title><author>Schuster, Stefan ; van den Berg, Melle ; Larrucea, Xabier ; Slewe, Ton ; Ide-Kostic, Peter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c416t-b3c10e99fdfcc8a567d0dcc5c257ae4b7adb6671c74562d815c5147f14553f963</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer architecture</topic><topic>Cybersecurity</topic><topic>Encryption</topic><topic>Government</topic><topic>Internet</topic><topic>Policy</topic><topic>Privacy</topic><topic>Surveillance</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schuster, Stefan</creatorcontrib><creatorcontrib>van den Berg, Melle</creatorcontrib><creatorcontrib>Larrucea, Xabier</creatorcontrib><creatorcontrib>Slewe, Ton</creatorcontrib><creatorcontrib>Ide-Kostic, Peter</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer standards and interfaces</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Schuster, Stefan</au><au>van den Berg, Melle</au><au>Larrucea, Xabier</au><au>Slewe, Ton</au><au>Ide-Kostic, Peter</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mass surveillance and technological policy options: Improving security of private communications</atitle><jtitle>Computer standards and interfaces</jtitle><date>2017-02-01</date><risdate>2017</risdate><volume>50</volume><spage>76</spage><epage>82</epage><pages>76-82</pages><issn>0920-5489</issn><eissn>1872-7018</eissn><abstract>The 2013 Snowden revelations ignited a vehement debate on the legitimacy and breadth of intelligence operations that monitor the Internet and telecommunications worldwide. The ongoing invasion of the private sphere of individuals around the world by governments and companies is an issue that is handled inadequately using current technological and organizational measures. This article11This article is based on research carried out at the request of the Science and Technology Option Assessment Panel (STOA) and the Committee for Civil Liberties, Justice and Home Affairs (LIBE) of the European Parliament [11,9]. Its scope is therefore primarily European, however its implications are assumed to be generally applicable. argues that in order to retain a vital and vibrant Internet, its basic infrastructure needs to be strengthened considerably. We propose a number of technical and political options, which would contribute to improving the security of the Internet. It focuses on the debates around end-to-end encryption and anonymization, as well as on policies addressing software and hardware vulnerabilities and weaknesses of the Internet architecture. •The debate on mass surveillance has highlighted the need to improve the security of the internet.•Policies should be aimed at stimulating the adoption of Privacy-Enhancing Technologies (PETs).•Weaknesses should be addressed on software and hardware levels.•Industry incentives to give consumers and organisations more choice should be enlarged.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.csi.2016.09.011</doi><tpages>7</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0920-5489
ispartof Computer standards and interfaces, 2017-02, Vol.50, p.76-82
issn 0920-5489
1872-7018
language eng
recordid cdi_proquest_journals_1920727897
source Elsevier ScienceDirect Journals
subjects Computer architecture
Cybersecurity
Encryption
Government
Internet
Policy
Privacy
Surveillance
Vulnerability
title Mass surveillance and technological policy options: Improving security of private communications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T02%3A28%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mass%20surveillance%20and%20technological%20policy%20options:%20Improving%20security%20of%20private%20communications&rft.jtitle=Computer%20standards%20and%20interfaces&rft.au=Schuster,%20Stefan&rft.date=2017-02-01&rft.volume=50&rft.spage=76&rft.epage=82&rft.pages=76-82&rft.issn=0920-5489&rft.eissn=1872-7018&rft_id=info:doi/10.1016/j.csi.2016.09.011&rft_dat=%3Cproquest_cross%3E1920727897%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1920727897&rft_id=info:pmid/&rft_els_id=S0920548916300988&rfr_iscdi=true