Quantifying Surveillance in the Networked Age:Node-based Intrusions and Group Privacy
نویسندگان
چکیده
From the “right to be left alone” to the “right to selective disclosure”, privacy has long been thought as the control individuals have over the information they share and reveal about themselves. However, in a world that is more connected than ever, the choices of the people we interact with increasingly affect our privacy. This forces us to rethink our definition of privacy. We here formalize and study, as local and global nodeand edge-observability, Bloustein’s concept of group privacy. We prove edge-observability to be independent of the graph structure, while node-observability depends only on the degree distribution of the graph. We show on synthetic datasets that, for attacks spanning several hops such as those implemented by social networks and current US laws, the presence of hubs increases node-observability while a high clustering coefficient decreases it, at fixed density. We then study the edgeobservability of a large real-world mobile phone dataset over a month and show that, even under the restricted two-hops rule, compromising as little as 1% of the nodes leads to observing up to 46% of all communications in the network. More worrisome, we also show that on average 36% of each person’s communications would be locally edge-observable under the same rule. Finally, we use real sensing data to show how people living in cities are vulnerable to distributed node-observability attacks. Using a smartphone app to compromise 1% of the population, an attacker could monitor the location of more than half of London’s population. Taken together, our results show that the current individual-centric approach to privacy and data protection does not encompass the realities of modern life. This makes us—as a society—vulnerable to large-scale surveillance attacks which we need to develop protections against.
منابع مشابه
Design of Observer-based H∞ Controller for Robust Stabilization of Networked Systems Using Switched Lyapunov Functions
In this paper, H∞ controller is synthesized for networked systems subject to random transmission delays with known upper bound and different occurrence probabilities in the both of feedback (sensor to controller) and forward (controller to actuator) channels. A remote observer is employed to improve the performance of the system by computing non-delayed estimates of the sates. The closed-loop s...
متن کاملPrivacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement
The number of video surveillance deployments in publicly accessible spaces is continuously increasing. At the same time, the call for technical assistance of human operators in terms of so-called smart video surveillance system has been growing ever louder and is addressed by research and development. With such systems, video analysis algorithms for activity recognition, tracking, and biometric...
متن کاملModelling and Compensation of uncertain time-delays in networked control systems with plant uncertainty using an Improved RMPC Method
Control systems with digital communication between sensors, controllers and actuators are called as Networked Control Systems (NCSs). In general, NCSs encounter with some problems such as packet dropouts and network induced delays. When plant uncertainty is added to the aforementioned problems, the design of the robust controller that is able to guarantee the stability, becomes more complex. In...
متن کاملMineral chemistry and physical conditions of crystallization in Filshour and Goft dioritic intrusions, Southwest of Sabzevar
The Late cretaceous dioritic intrusions of Filshour and Goft in southwest of Sabzevar are situated in the northern edge of central Iran zone. The rocks of these plutons show porphyry, granular, ophitic and subophitic textures and are composed of amphibole, plagioclase and clinopyroxene (in diorites), along with quartz (in quartz diorites). The amphiboles of these rocks are in the group of calci...
متن کاملUnited States Cases of Employee E-Mail Privacy Intrusions: Do You Really Know the Legal Consequences?
Employers and employees are both highly vulnerable to negative consequences which may result from e-mail privacy intrusions. These intrusions may arise internally from co-workers or the employer, or externally from entities associated with the U.S. legal system, such as law enforcement agencies or attorneys, or from hackers. Given potentially differing perceptions regarding e-mail privacy and t...
متن کامل