Advertisement

Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret

Policy Lessons for Government After the Snowden Leaks
  • Theo Tryfonas
  • Michael Carter
  • Tom Crick
  • Panagiotis Andriotis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9750)

Abstract

Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UKs cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states.

Keywords

Surveillance Cyberspace Public trust 

References

  1. 1.
    Emerson, B.: Annual report of the Special Rapporteur to the Human Rights Council, March 2014Google Scholar
  2. 2.
    Ball, C.: Organization, surveillance and the body: towards a politics of resistance. In: Lyon, D. (ed.) Theorising Surveillance: The Panopticon and beyond, pp. 296–317. Willan Publishing, Collumpton (2006)Google Scholar
  3. 3.
    Greenwald, G.: No Place to Hide: Edward Snowden, the NSA and the Surveillance State, Hamish Hamilton, 2014Google Scholar
  4. 4.
    Kelly, E.: Senate approves USA Freedom Act, USA Today, 2 June 2015Google Scholar
  5. 5.
    Gosling, S.: Snoop: What Your Stuff Says About You. Profile Books, London (2009)Google Scholar
  6. 6.
    Oatley, G., Crick, T.: Changing faces: identifying complex behavioural profiles. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 282–293. Springer, Heidelberg (2014)Google Scholar
  7. 7.
    Obama, B.: Remarks by the President On Securing Our Nation’s Cyber Infrastructure, May 2009. http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/
  8. 8.
    Department for Business, Innovation & Skills: 2014 Information Security Breaches Survey. UK Government (2014)Google Scholar
  9. 9.
    Bush, G.W.: The National Strategy to Secure Cyberspace. The White House, February 2003Google Scholar
  10. 10.
    Cabinet Office: Cyber Security Strategy. UK Government, November 2011Google Scholar
  11. 11.
    Cabinet Office: National Cyber Security Strategy 2014: progress and forward plans. UK Government, December 2014Google Scholar
  12. 12.
    Cabinet Office: Keeping the UK safe in cyber space. UK Government, December 2014Google Scholar
  13. 13.
    Carr, M., Crick, T.: The Problem of the P3: Public-Private Partnerships in National Cyber Security Strategies. In: Proceedings of 1st International Conference on Cyber Security for Sustainable Society (2015)Google Scholar
  14. 14.
    House of Commons of Canada: Bill C-51, first reading, 30 January 2015Google Scholar
  15. 15.
    Ferran, L.: Ex-NSA Chief: We Kill People Based on Metadata, abcNEWS, 12 May 2014Google Scholar
  16. 16.
    Kaye, D.: Report on encryption, anonymity, and the human rights framework, first report to the Human Rights Council, Office for the High Commissioner for Human Rights (2015)Google Scholar
  17. 17.
    Hales, T.: The NSA back door to NIST. Not. AMS 61(2), 191–192 (2014)MathSciNetzbMATHGoogle Scholar
  18. 18.
    Anderson, D.: A Question of Trust - Report of the Investigatory Powers Review, Independent Reviewer of Terrorism Legislation, 11 June 2015Google Scholar
  19. 19.
    Ditton, J.: Crime and the city. Br. J. Criminol. 40(4), 692–709 (2000)CrossRefGoogle Scholar
  20. 20.
    Woodhouse, J.: CCTV and its effectiveness in tackling crime, House of Commons Library Standard Note SN/HA/5624 (2010)Google Scholar
  21. 21.
    Lobban, I.: Sir Iain Lobban’s valedictory speech as delivered, GCHQ website (2014)Google Scholar
  22. 22.
    Tsoukas, H.: The missing link: a transformational view of metaphors in organizational science. Acad. Manag. Rev. 16(3), 566–585 (1991)Google Scholar
  23. 23.
    Lackoff, G.: Metaphors of terror. In: Return to The Days After, essays written in the aftermath of September 11, 2001. University of Chicago Press (2011)Google Scholar
  24. 24.
    Tryfonas, T.: On Security metaphors and how they shape the emerging practice of secure information systems development. J. Inf. Syst. Secur. 3(3), 21–50 (2007)Google Scholar
  25. 25.
  26. 26.
    Interdisciplinary Centre for Law and ICT/Centre for Intellectual Property Rights (ICRI/CIR), KU Leuven: From social media service to advertising network: A critical analysis of Facebooks Revised Policies and Terms, DRAFT 31 v1.2, March 2015Google Scholar
  27. 27.
    Kravets, D.: Which Telecoms store your data the longest?.secret memo tells all. Wired Magazine (2011). http://www.wired.com/2011/09/cellular-customer-data/ Accessed 28 September 2011
  28. 28.
    Anastasopoulou, K., Tryfonas, T., Kokolakis, S.: Strategic interaction analysis of privacy-sensitive end-users of cloud-based mobile Apps. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 209–216. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  29. 29.
    Giddens, A.: The Constitution of Society: Outline of the Theory of Structuration. Polity Press, Cambridge (1984)Google Scholar
  30. 30.
    Gerrard, G., Parkins, G., Cunningham, I., Jones, W., Douglas, S.: National CCTV Strategy. Home Office, London (2007)Google Scholar
  31. 31.
    McCahill, M., Norris, C.: CCTV in Britain Urbaneye. Working Paper no. 3. Centre for technology and Society, Technical University of Berlin (2002)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Theo Tryfonas
    • 1
  • Michael Carter
    • 2
  • Tom Crick
    • 3
  • Panagiotis Andriotis
    • 4
  1. 1.Crypto GroupUniversity of BristolBristolUK
  2. 2.Surveillance Studies CentreQueen’s UniversityKingstonCanada
  3. 3.Department of ComputingCardiff Metropolitan UniversityCardiffUK
  4. 4.The Information Security GroupUniversity College LondonLondonUK

Personalised recommendations