ebook img

Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology) PDF

146 Pages·2009·4.3 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

Lecture Notes in Computer Science 5661 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany Cecilia S. Gal Paul B. Kantor Michael E. Lesk (Eds.) Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008 New Brunswick, NJ, USA, May 12, 2008 Revised Selected Papers 13 Volume Editors Cecilia S. Gal Paul B. Kantor Michael E. Lesk Rutgers University School of Communication and Information New Brunswick, NJ, USA Preface The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of Com- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final version. Although the papers are not verbatim transcriptions of the talks given, some do retain the informal and conver- sational quality of the presentations. In one instance we have included some material from the question-and-answer period after the talk, since the material covered proved to be relevant and interesting. The majority of authors, however, preferred to include a more formal paper based on the material presented at the workshop. A few notes about language and conventions used in the book. Since some of the authors in this volume come from different parts of the globe we have tried to preserve their native cadences in the English versions of their papers. And finally, a few papers have pictures from screen captures of illustrations or graphics created for computer displays. Although every effort was made to include the highest quality pictures so they would reproduce well in print, in some instances these pictures may not repro- duce as well as might be desired, and we beg the reader’s indulgence. We wanted to thank Rutgers University for their support for the ISIPS Program, DyDAn for sponsoring the workshop and SPARTA, Inc. for their generous contribu- tion for the workshop bags and nametags. We also wanted to thank our many review- ers for help in the paper selection process and the Program Committee for help with the initial direction and planning of the workshop. May 2009 Cecilia S. Gal Organization Conference Co-chairs Paul B. Kantor Rutgers University, USA Michael E. Lesk Rutgers University, USA Naftaly Minsky Rutgers University, USA Reviewers Yigal Arens University of Southern California, USA Antonio Badia University of Louisville, USA Hsinchun Chen The University of Arizona, USA Gordon Cormack University of Waterloo, Canada Dennis Egan Telcordia Technologies, USA Stephen Fienberg Carnegie Mellon University, USA Mark Goldberg Rensselaer Polytechnic Institute, USA Jim Horning SPARTA, Inc., USA Leslie Kennedy Rutgers University, USA Moshe Koppel Bar-Ilan University, Israel Ivan Koychev Bulgarian Academy of Science, Bulgaria Don Kraft Louisiana State University, USA Carl Landwehr IARPA, USA Janusz Luks GROM Group, Poland Antonio Sanfilippo Pacific Northwest National Laboratory, USA Joshua Sinai The Analysis Corporation, USA David Skillicorn Queen's University, Canada Rebecca Wright Rutgers University, USA Program Committee Yaakov Amidror Lander Institute, Israel Yigal Arens University of Southern California, USA Antonio Badia University of Louisville, USA Maureen Baginski SPARTA, Inc., USA Arthur Becker IARPA, USA Michael Blair SAIC, USA Endre Boros Rutgers University, USA Yigal Carmon MEMRI, USA Hsinchun Chen University of Arizona, USA Gordon Cormack University of Waterloo, Canada George Cybenko Dartmouth College, USA VIII Organization Timothy Edgar ODNI, USA Dennis Egan Telcordia Technologies, USA Yuval Elovici Deutsche Telekom Research Laboratories at Ben-Gurion University, Israel Stephen Fienberg Carnegie Mellon University, USA Uwe Glaesser Simon Fraser University, Canada Mark Goldberg Rensselaer Polytechnic Institute, USA Vladimir Golubev Computer Crime Research Center, Ukraine David Grossman Illinois Institute of Technology, USA Jim Horning SPARTA, Inc., USA Leslie Kennedy Rutgers University, USA Joseph Kielman U.S. Department of Homeland Security, USA Moshe Koppel Bar-Ilan University, Israel Ivan Koychev Bulgarian Academy of Science, Bulgaria Don Kraft Louisiana State University, USA Carl Landwehr IARPA, USA Mark Levene Birkbeck University of London, UK Janusz Luks GROM Group, Poland Richard Mammone Rutgers University, USA Joan McNamara Los Angeles Police Department, USA Rafail Ostrovsky University of California, Los Angeles, USA Gerhard Paass Fraunhofer Institute for Intelligent Analysis and Information Systems, Germany Warren Powell Princeton University, USA Fred Roberts Rutgers University, USA Antonio Sanfilippo Pacific Northwest National Laboratory, USA Bracha Shapira Ben-Gurion University, Israel Andrew Silke University of East London, UK Joshua Sinai The Analysis Corporation, USA David Skillicorn Queen's University, Canada Eugene Spafford Purdue University, USA Gary Strong Johns Hopkins University, USA Rebecca Wright Rutgers University, USA Stefan Wrobel Fraunhofer Institute for Intelligent Analysis and Information Systems, Germany Daniel Zeng University of Arizona, USA Conference Coordinator Cecilia S. Gal Conference Sponsors Rutgers University, ISIPS, DyDAn, SPARTA Inc. Table of Contents The Challenges of Seeking Security While Respecting Privacy . . . . . . . . . 1 Paul B. Kantor and Michael E. Lesk Section One: Statement of the Problem Intelligence Policy and the Science of Intelligence . . . . . . . . . . . . . . . . . . . . 11 Maureen Baginski Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Eugene H. Spafford Intelligence, Dataveillance, and Information Privacy . . . . . . . . . . . . . . . . . . 34 Robyn R. Mace Results of Workshops on Privacy Protection Technologies . . . . . . . . . . . . . 45 Carl Landwehr Words Matter: Privacy, Security, and Related Terms. . . . . . . . . . . . . . . . . . 57 James J. Horning Section Two: Theoretical Approaches to the Problem kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Slava Kisilevich, Yuval Elovici, Bracha Shapira, and Lior Rokach Valid Statistical Analysis for Logistic Regression with Multiple Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Stephen E. Fienberg, Yuval Nardi, and Aleksandra B. Slavkovi´c Section Three: Practical Approaches to the Problem Suspicious Activity Reporting (SAR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Joan T. McNamara Stable Statistics of the Blogograph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Mark Goldberg, Malik Magdon-Ismail, Stephen Kelley, and Konstantin Mertsalov X Table of Contents Privacy-Preserving Accountable Accuracy Management Systems (PAAMS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Roshan K. Thomas, Ravi Sandhu, Elisa Bertino, Budak Arpinar, and Shouhuai Xu On the Statistical Dependency of Identity Theft on Demographics . . . . . . 122 Giovanni Di Crescenzo Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 The Challenges of Seeking Security While Respecting Privacy Paul B. Kantor and Michael E. Lesk Rutgers University 4 Huntington Street New Brunswick, NJ 2 P.B. Kantor and M.E. Lesk prying eyes. Other physical techniques such as the wax seal with a special imprint, or the use of invisible inks attest to the importance of maintaining the privacy of communication. With the founding of the United States and the establishment of the postal service this requirement of privacy was written deeply into the fabric of American civiliza- tion. It has adapted, as modes of communication have changed to deal with the tele- gram, and then the telephone. It is adapting, with some difficulty to the era of email. Email must pass through many intermediary “hands”. Many employers, such as our own university, claim a legal right to all the email that we place on our servers, al- though they assure us that they would not look at it save for the gravest of reasons. All such stored records are subject to subpoena by the courts on proper authorization. With the advent of Voice Over IP, telephonic communications also travel through the internet, sliced into many packets and perhaps traveling across the ocean and back on their way from New York to Baltimore. Thus the opportunities for prying hands to read the mail are growing exponentially. All of us have a reasonable expectation of privacy if we are sending a message that says nothing more than “mom is feeling better and we hope you can drop by for coffee in the afternoon”. Unless, of course this is pre-agreed code meaning “get the explosives and meet me in the basement of the World Trade Center”. This volume contains selected papers written to extend remarks presented at a workshop on privacy and security, sponsored by Rutgers University, the Center for Interdisciplinary Studies in Information Privacy and Security (ISIPS), the Department of Homeland Security Center for Dynamic Data Analysis (DyDAn), and SPARTA. At the time of the workshop, May 2008, it was clear from a cursory glance at the media, that in the United States there was a strong and growing concern regarding the tensions between programs aimed at protecting the security of citizens, and programs or policies aimed at protecting the privacy of those same citizens. There was a sense among many concerned observers that the United States had fallen behind the Euro- pean Union, in the protection of individual privacy. There was also a general sense, particularly following the attacks in the United States in 2001, in Madrid in 2004, and in London in 2005, that the North American and European community faced a sus- tained threat from a very diffuse organization whose primary symbolic center might be located in Al Qaeda. The wheels of public concern turn in unpredictable ways. For example, one of the presenters shared with workshop participants the ACLU Pizza Video clip. That clip, which appears (at the time of this writing) on the website of the American Civil Liber- ties Union, was posted as a campaign message against the policies of the United States Administration at the time (President G. W. Bush). The video, which remains an engaging and insightful comment on the threats to privacy, is preserved at the Internet Archive [3]. Since the time at which the workshop was held, there has been a national election in the United States, with substantial changes in the composition of the Congress, and a new President in the White House. At the same time, the world economy has experienced a decline, which is being compared to the most difficult recessions of the preceding 40 years. The spotlight of media and public interest there- fore seems to have moved away from the themes of this conference. However, it takes little reflection to realize that these themes remain as important as they ever were. In addition, there is no evidence that significant progress has been

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.