{"id":26913,"date":"2014-10-21T03:44:48","date_gmt":"2014-10-21T07:44:48","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26913"},"modified":"2014-10-21T03:44:48","modified_gmt":"2014-10-21T07:44:48","slug":"open-surveillance","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/open-surveillance.php","title":{"rendered":"Open Surveillance"},"content":{"rendered":"<p><p>    Cryptography could keep electronic investigations under    control.  <\/p>\n<p>      Bryan Ford    <\/p>\n<p>    Democracy rests on the principle that legal processes must be    open and public. Laws are created through open deliberation;    anyone can read or challenge them; and in enforcing them the    government must get a warrant before searching a persons    private property. For our increasingly electronic society to    remain democratic, this principle of open process must follow    us into cyberspace. Unfortunately, it appears to have been lost    in translation.  <\/p>\n<p>    The National Security Agency, formed after World War II to spy    on wartime adversaries, has clung to military-grade secrecy    while turning its signalsintelligence weapons on us and    our allies. While nominally still a    foreign intelligence agency, the NSA has become a de facto    law enforcement agency by collecting bulk surveillance data within    the United States and feeding the data to law enforcement    agencies. Other agencies also have secret-surveillance fever.    The FBI secretly uses warrantless subpoenas to obtain bulk cell-tower records affecting    hundreds of thousands of users at once, whether investigating    bank robberies or harmless urban pranks. Police spy on entire    neighborhoods with fake cellular base stations known as    StingRays and have deliberately obfuscated warrants to conceal their use of the    technology.  <\/p>\n<p>    All this secrecy harms our democracy. But effective surveillance    does not require total secrecy. It can follow an openness    principle: any surveillance process that collects or handles    bulk data or metadata about people who are not specifically    targeted by a warrant must be subject to public review and    should use strong encryption to safeguard the privacy of the    innocent. To gain access to unencrypted surveillance data, law    enforcement agencies must identify people whose actions justify    closer investigation and then demonstrate probable cause. The    details of an investigation need not be public, but the data    collection process should bewhat was collected, from whom, and    how it was decrypted. This is no different from the way the    police traditionally use an open process to obtain physical    search warrants without publicly revealing details of their    investigation.  <\/p>\n<p>    Technology that my colleague Joan Feigenbaum and I and our    research group have developed could allow law enforcement    officials to enact this approach without hampering their work.    In fact, it could even enhance it. Modern cryptography could    let agencies surgically extract warrant-authorized data about    people of interest while guarding the privacy of innocent    users. In the case of bank robbers known as the High Country    Bandits, the FBI intercepted cell-tower records of 150,000    people to find one criminal who had carried a cell phone to    three robbery sites. Using our encrypted search system, the FBI    could have found the bandits number without obtaining data on    about 149,999 innocent bystanders.  <\/p>\n<p>    Its better to risk that a few criminals will be slightly    better informed than to risk the privacy and trust of everyone.  <\/p>\n<p>    Bryan    Ford is an associate professor of computer science at Yale    University.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technologyreview.com\/view\/531681\/open-surveillance\" title=\"Open Surveillance\">Open Surveillance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cryptography could keep electronic investigations under control. Bryan Ford Democracy rests on the principle that legal processes must be open and public<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-26913","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26913"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26913"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26913\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}