Against the Law: Countering Lawful Abuses of Digital Surveillance

نویسندگان

  • Andrew ‘bunnie’ Huang
  • Edward Snowden
چکیده

Front-line journalists are high-value targets, and their enemies will spare no expense to silence them. Unfortunately, journalists can be betrayed by their own tools. Their smartphones are also the perfect tracking device. Because of the precedent set by the US’s “third-party doctrine,” which holds that metadata on such signals enjoys no meaningful legal protection, governments and powerful political institutions are gaining access to comprehensive records of phone emissions unwittingly broadcast by device owners. This leaves journalists, activists, and rights workers in a position of vulnerability. This work aims to give journalists the tools to know when their smart phones are tracking or disclosing their location when the devices are supposed to be in airplane mode. We propose to accomplish this via direct introspection of signals controlling the phone’s radio hardware. The introspection engine will be an open source, user-inspectable and field-verifiable module attached to an existing smart phone that makes no assumptions about the trustability of the phone’s operating system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Disciplinary Challenges in Addiction Prevention through Countering the Distribution of Industrial Narcotics (A Case Study of Kermanshah Police Stations)

Objective: The aim of this study was to explain the disciplinary challenges in preventing addiction by countering the distribution of industrial narcotics in Kermanshah. Method: The present study was applied in terms of purpose and qualitative-quantitative in terms of methodology and nature. The statistical population in qualitative section included NAJA experts in Kermanshah province, and in q...

متن کامل

رشوه در زمان توقف حق بر آن

From the viewpoint of some experts in Sharia law, paying bribes in lawsuits by the beneficiary is lawful. Some others believe that this permission is only possible when obtaining the right is restricted to paying the bribe. Various reasons, including Islamic traditions Hadiths[, the rule of denial of hardship, and the permission to obtain the right are the evidences for this verdict. Studies sh...

متن کامل

Multiple Objectives of Lawful-Surveillance Protocols

In recent work on open, privacy-preserving, accountable surveillance, we have proposed the use of cryptographic protocols that enable law-enforcement and intelligence agencies to obtain actionable information about targeted users of mass-communication systems without intruding on the privacy of untargeted users. Our suggestion that appropriate technology, combined with sound policy and the rule...

متن کامل

Digital Forensic Implications of Collusion Attacks on the Lightning Network

The limited size of a block in the Bitcoin blockchain produces a scaling bottleneck. The transaction scalability problem can be addressed by performing smaller transactions off-chain and periodically reporting the results to the Bitcoin blockchain. One such solution is the Lightning Network. Bitcoin is employed by lawful users and criminals. This requires crimes against lawful users as well as ...

متن کامل

Substantive criminal analysis of sexual abuse of children and adolescents

The Child and Adolescent Protection Act approved in 1399 have criminalized many sexually abusive acts against children and adolescents by using the term “sexual abuse” for the first time. Sexual abuse can be divided into two general categories: first, abuses in which the child or adolescent is the main target of perpetrator to satisfy his sexual needs, second, using child or adolescent as a mea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016