Improving Effectiveness of Communications Sampling of Covert Networks
نویسندگان
چکیده
On December 16, 2005, a New York Times article[31] revealed that in the immediate aftermath of the September 11th attacks, the U.S. Government began a broad program of domestic signal intelligence collection. As press reports indicated [28], NSA implemented its new collections program based on the snowball sampling methods, which is generally used in surveying hidden populations and networks. However, snowball method is known to be a biased toward highly connected actors[21] and consequently produces core-periphery networks when these may not necessarily be present. In case of terrorist networks, the last statement is particularly important in light of the “smoking gun” arguments presented by the government. In the use of snowball sampling, overload of information collection system does present a distinct problem due to exponential growth of the number of suspects to be monitored. In this paper, we will focus on evaluating the effectiveness of the wiretapping program in terms of mapping fastchanging networks of a covert organization. By running a series of simulation-based experiments, we are able to give a number of information gathering regimes a fair evaluation based on a consistent criteria. Further, we propose a set of information gathering programs that achieve higher effectiveness then snowball sampling, at a lower cost.
منابع مشابه
Improving QoS in VANETs: A Survey
The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads ...
متن کاملDetection And Elimination Of Covert Communication In Transport And Internet Layer – A Survey
Covert channels use stealth communications to compromise the security policies of systems. They constitute an important security threat since they can be used to exfiltrate confidential data from networks. TCP/IP protocols are used everyday and are subject to covert channels problems. Covert channels are used for the secret transfer of information. Encryption only protects communication from be...
متن کاملOn Covert Acoustical Mesh Networks in Air
Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a commun...
متن کاملRecent Developments in Covert Acoustical Communications
The topic of covert acoustical communication in air has produced public attention, lately. In 2013, we presented the fact that infected drones (e.g. laptops) might form covert acoustical mesh networks in air, only utilizing the built-in speakers and microphones. In this article, we aim to present the current state of covert acoustical communication in air. We discuss future forms of covert acou...
متن کاملProposing a model for entrepreneurship opportunities and challenges in online social networks in Iran
Human life has been affected by new communications in recent years. The development of cyberspace has led to businesses embracing social networks. The appearance of the cyberspace and features offered by information technology (IT) has provided hope, wishes, opportunities, and challenges for business owners. Organizations create opportunities for improving productivity, market share and value, ...
متن کامل