Skip to main content

Multiple Objectives of Lawful-Surveillance Protocols

  • Conference paper
  • First Online:
Security Protocols XXV (Security Protocols 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10476))

Included in the following conference series:

  • 595 Accesses

Abstract

In recent work on open, privacy-preserving, accountable surveillance, we have proposed the use of cryptographic protocols that enable law-enforcement and intelligence agencies to obtain actionable information about targeted users of mass-communication systems without intruding on the privacy of untargeted users. Our suggestion that appropriate technology, combined with sound policy and the rule of law, can afford typical users significantly more privacy than they have now without hindering lawful and effective actions by law-enforcement and intelligence agencies has met with considerable skepticism. In this paper, we summarize the principal objections to our approach and address them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Defense Advanced Research Projects Agency and the Intelligence Advanced Research Project Activity are technology-research organizations within the US Department of Defense and the US Office of the Director of National Intelligence, respectively.

References

  1. Bieber, M.A.: Meeting the statute or beating it: Using John Doe indictments based on DNA to meet the statute of limitations. Univ. PA Law Rev. 150(3), 1079–1098 (2002)

    Article  Google Scholar 

  2. Greenberg, A.: DARPA will spend $20 million to search for crypto’s holy grail. Forbes, 6 April 2011

    Google Scholar 

  3. Kamara, S.: Restructuring the NSA metadata program. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 235–247. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_19

    Google Scholar 

  4. Kearns, M., Roth, A., Wu, Z.S., Yaroslavtsev, G.: Private algorithms for the protected in social network search. Proc. Nat. Acad. Sci. 113(4), 913–918 (2016)

    Article  Google Scholar 

  5. Kroll, J.A., Felten, E.W., Boneh, D.: Secure protocols for accountable warrant execution (2014). http://www.cs.princeton.edu/~felten/warrant-paper.pdf

  6. Lohr, S.: With ‘Brandeis’ project, DARPA seeks to advance privacy technology. The New York Times, 14 September 2015

    Google Scholar 

  7. Segal, A., Feigenbaum, J., Ford, B.: Open, privacy-preserving protocols for lawful surveillance (2016). https://arxiv.org/abs/1607.03659

  8. Segal, A., Feigenbaum, J., Ford, B.: Privacy-preserving contact chaining [preliminary report]. In: Proceedings of the 15th Workshop on Privacy in the Electronic Society. pp. 185–188. ACM, New York NY, USA, October 2016

    Google Scholar 

  9. Segal, A., Ford, B., Feigenbaum, J.: Catching bandits and only bandits: privacy-preserving intersection warrants for lawful surveillance. In: Proceedings of the 4th Workshop on Free and Open Communications on the Internet. USENIX, Berkeley CA, USA, August 2014

    Google Scholar 

  10. Soltani, A., Gellman, B.: New documents show how the NSA infers relationships based on mobile location data. The Washington Post, 10 December 2013

    Google Scholar 

Download references

Acknowledgements

This work was supported by US National Science Foundation grants CNS-1407454 and CNS-1409599, William and Flora Hewlett Foundation grant 2016-3834, and the AXA Research Fund.

We are grateful to our collaborator and former student Aaron Segal for all of his good work in this area and for helpful discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joan Feigenbaum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Feigenbaum, J., Ford, B. (2017). Multiple Objectives of Lawful-Surveillance Protocols. In: Stajano, F., Anderson, J., Christianson, B., Matyáš, V. (eds) Security Protocols XXV. Security Protocols 2017. Lecture Notes in Computer Science(), vol 10476. Springer, Cham. https://doi.org/10.1007/978-3-319-71075-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71075-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71074-7

  • Online ISBN: 978-3-319-71075-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics