Login/Join

Surveillance and Anonymity

Discussion
Apr 14, 2016
by: kepler

This past week my class and I have been challenged to use the EBSCO Research Database for a topic of our choice; using EBSCO I have discovered many interesting things about my topic - encryption and governments' role in it. EBSCO brought forth many articles on the issue of encryption as a whole, however, its most interesting so far have discussed encryptions role in keeping anonymous and preventing online tracking from your government and other governments around the world.

The first paper, written by Joan Feigenbaum and Bryan Fork, titled "Seeking Anonymity in An Internet Panopticon" illustrated the Tor network, how it is used, and how it may possible by abused or infiltrated by those who wish to do it harm. The Tor network allows users with specially written programs to access the internet anonymously. This is done through a series of proxies obscuring your true location and identity. You may initiate your connection in the United States but upon entering the Tor network your connection could go through any number of countries before arriving in its final destination.

This is made possible through a network of "exit nodes" which are hosted, free of charge, around the world; these nodes are what supply the Tor network with access to the global Internet and allow you to mask your connection's location as the exit node's location. Tor software also takes numerous other steps to ensure that your connection and information remain encrypted and protected. The paper by Feigenbaum and Fork show that the Tor network could be infiltrated and monitored if a majority of exit nodes on the network are made to monitor you.

A government with wishes of monitoring its citizens on the Tor network would have to create Tor nodes around the world designed to surveil in order to monitor. The paper finishes with a warning stating that distributed attempts to create anonymous efforts are only effective if the users of those networks allow them to become saturated by those who wish to do the network harm.

The second paper, written by Bryan Glick, titled "Government Must Build Trust Over Privacy" shows the same concern for government reach into technology. The paper begins with an observation from the author noticing as governments increase attempts to surveil their citizens' technology communities will increase their attempts to protect themselves. After this observation the author explains the United Kingdom's promise not to demand backdoors be created in devices, weakening their privacy, however still expects technology companies to fulfill warrants and their requests for information.

However there exists an issue here, incredibly strong - end-to-end - encryption makes it impossible for companies to fulfill these requests creating issues for governments and law enforcement agencies alike.

Sources

FEIGENBAUM, JOAN, and BRYAN FORD. "Seeking Anonymity In An Internet Panopticon." Communications Of The ACM 58.10 (2015): 58-69. Computer Source. Web. 11 Apr. 2016. https://via.hypothes.is/http://cacm.acm.org/magazines/2015/10/192387-see...

Glick, Bryan. "Government Must Build Trust Over Privacy." Computer Weekly (2016): 13. Computer Source. Web. 11 Apr. 2016. https://via.hypothes.is/http://www.computerweekly.com/blogs/editors-blog...

Comments

Interesting

Submitted by Mar I Sol on Fri, 2016-04-15 16:25.

This is a very interesting subject. I have heard so much about e government spying on people and a lot of conspiracy theories. The way you smoothly included the articles in a narrative manner was excellent. I also like how you explained terms that many people would not know.

I really liked this article.

Submitted by timhemm98 on Sun, 2016-04-17 19:43.

I really liked this article. I liked how you brought up more than just the government's use of phone surveillance to spy on us. It really made me much more knowledgable on the issue.