Plausible Deniability Over Broadcast Channels Mayank Bakshi∗ Member, IEEE, and Vinod Prabhakaran† Member, IEEE
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College
Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2015 A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College Recommended Citation Brockmann, Andrew, "A Plausibly Deniable Encryption Scheme for Personal Data Storage" (2015). HMC Senior Theses. 88. https://scholarship.claremont.edu/hmc_theses/88 This Open Access Senior Thesis is brought to you for free and open access by the HMC Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in HMC Senior Theses by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Talithia D. Williams, Advisor Arthur T. Benjamin, Reader Department of Mathematics May, 2015 Copyright © 2015 Andrew Brockmann. The author grants Harvey Mudd College and the Claremont Colleges Library the nonexclusive right to make this work available for noncommercial, educational pur- poses, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Abstract Even if an encryption algorithm is mathematically strong, humans in- evitably make for a weak link in most security protocols. A sufficiently threatening adversary will typically be able to force people to reveal their encrypted data. Methods of deniable encryption seek to mend this vulnerability by al- lowing for decryption to alternate data which is plausible but not sensitive. Existing schemes which allow for deniable encryption are best suited for use by parties who wish to communicate with one another. -
Mobihydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices?
MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices? Xingjie Yuy;z;\, Bo Chen], Zhan Wangy;z;??, Bing Changy;z;\, Wen Tao Zhuz;y, and Jiwu Jingy;z y State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, CHINA z Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, CHINA \ University of Chinese Academy of Sciences, CHINA ] Department of Computer Science, Stony Brook University, USA Email: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Nowadays, smartphones have started being used as a tool to collect and spread po- litically sensitive or activism information. The exposure of the possession of such sensitive data shall pose a risk in severely threatening the life safety of the device owner. For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitigate such risk. In this work, we present MobiHydra, a pragmatic plausibly deniable encryption (PDE) scheme featuring multi-level deniability on mobile devices, to circumvent the coercive attack. MobiHydra is pragmatic in that it remarkably supports hiding opportunistic data without necessarily rebooting the device. In addition, MobiHydra favourably mitigates the so-called booting-time defect, which is a whistle-blower to expose the usage of PDE in previous solutions. We implement a prototype for MobiHydra on Google Nexus S. The evaluation results demonstrate that MobiHydra introduces very low overhead compared with other PDE solutions for mobile devices. -
The Spectacle of the False-Flag
The Spectacle of the False-Flag THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS FROM JFK TO WATERGATE Eric Wilson THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS from JFK to WATERGATE Eric Wilson, Monash University 2015 http://creativecommons.org/licenses/by-nc-nd/4.0/ This work is Open Access, which means that you are free to copy, distribute, display, and perform the work as long as you clearly attribute the work to the author, that you do not use this work for commercial gain in any form whatsoever, and that you in no way, alter, transform, or build upon the work outside of its normal use in academic scholarship without express permission of the author and the publisher of this volume. For any reuse or distribution, you must make clear to others the license terms of this work. First published in 2015 by Thought | Crimes an imprint of punctumbooks.com ISBN-13: 978-0988234055 ISBN-10: 098823405X and the full book is available for download via our Open Monograph Press website (a Public Knowledge Project) at: www.thoughtcrimespress.org a project of the Critical Criminology Working Group, publishers of the Open Access Journal: Radical Criminology: journal.radicalcriminology.org Contact: Jeff Shantz (Editor), Dept. of Criminology, KPU 12666 72 Ave. Surrey, BC V3W 2M8 [ + design & open format publishing: pj lilley ] I dedicate this book to my Mother, who watched over me as I slept through the spectacle in Dallas on November 22, 1963 and who was there to celebrate my birthday with me during the spectacle at the Watergate Hotel on June 17, 1972 Contents Editor©s Preface ................................................................ -
The CIA and Covert Operations: to Disclose Or Not to Disclose - That Is the Question, 17 BYU J
Brigham Young University Journal of Public Law Volume 17 | Issue 1 Article 3 5-1-2002 The IC A and Covert Operations: To Disclose or Not to Disclose - That is the Question Marcus Eyth Follow this and additional works at: https://digitalcommons.law.byu.edu/jpl Part of the National Security Law Commons Recommended Citation Marcus Eyth, The CIA and Covert Operations: To Disclose or Not to Disclose - That is the Question, 17 BYU J. Pub. L. 45 (2002). Available at: https://digitalcommons.law.byu.edu/jpl/vol17/iss1/3 This Article is brought to you for free and open access by BYU Law Digital Commons. It has been accepted for inclusion in Brigham Young University Journal of Public Law by an authorized editor of BYU Law Digital Commons. For more information, please contact [email protected]. EYTH-MACRO 2/5/2003 9:49 AM The CIA and Covert Operations: To Disclose or Not to Disclose – That is the Question Marcus Eyth* I. INTRODUCTION When the president does it, that means it is not illegal.1 President Richard M. Nixon If Mr. Nixon’s statement were unconditionally true, many United States citizens would presumably find the very pillars upon which the United States was founded to have been significantly shaken, and some might even consider a permanent move to another country. With respect to the implications this statement has upon the president’s discretion in conducting covert operations without first consulting Congress, some scholars would opt to reach for pen and paper.2 The issue of whether Congress and the executive branch must share the power to authorize and conduct covert activities, or whether it may be unilaterally exercised by the CIA, under the direction of the National Security Council (NSC), has become ripe for critique since Congress took significant steps to reign-in the discretion of the executive which for nearly two centuries enjoyed virtually carte blanche authority in this area. -
Data Epistemologies / Surveillance and Uncertainty
University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2016 Data Epistemologies / Surveillance and Uncertainty Sun Ha Hong University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Communication Commons, Other Sociology Commons, and the Philosophy of Science Commons Recommended Citation Hong, Sun Ha, "Data Epistemologies / Surveillance and Uncertainty" (2016). Publicly Accessible Penn Dissertations. 1766. https://repository.upenn.edu/edissertations/1766 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/1766 For more information, please contact [email protected]. Data Epistemologies / Surveillance and Uncertainty Abstract Data Epistemologies studies the changing ways in which ‘knowledge’ is defined, promised, problematised, legitimated vis-á-vis the advent of digital, ‘big’ data surveillance technologies in early twenty-first century America. As part of the period’s fascination with ‘new’ media and ‘big’ data, such technologies intersect ambitious claims to better knowledge with a problematisation of uncertainty. This entanglement, I argue, results in contextual reconfigurations of what ‘counts’ as knowledge and who (or what) is granted authority to produce it – whether it involves proving that indiscriminate domestic surveillance prevents terrorist attacks, to arguing that machinic sensors can know us better than we can ever know ourselves. The present work focuses on two empirical cases. The first is the ‘Snowden Affair’ (2013-Present): the public controversy unleashed through the leakage of vast quantities of secret material on the electronic surveillance practices of the U.S. government. The second is the ‘Quantified Self’ (2007-Present), a name which describes both an international community of experimenters and the wider industry built up around the use of data-driven surveillance technology for self-tracking every possible aspect of the individual ‘self’. -
An Overt Turn on Covert Action
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Saint Louis University School of Law Research: Scholarship Commons Saint Louis University Law Journal Volume 53 Number 2 (Winter 2009) Article 6 2009 An Overt Turn on Covert Action A. John Radsan William Mitchell College of Law, [email protected] Follow this and additional works at: https://scholarship.law.slu.edu/lj Part of the Law Commons Recommended Citation A. J. Radsan, An Overt Turn on Covert Action, 53 St. Louis U. L.J. (2009). Available at: https://scholarship.law.slu.edu/lj/vol53/iss2/6 This Article is brought to you for free and open access by Scholarship Commons. It has been accepted for inclusion in Saint Louis University Law Journal by an authorized editor of Scholarship Commons. For more information, please contact Susie Lee. SAINT LOUIS UNIVERSITY SCHOOL OF LAW AN OVERT TURN ON COVERT ACTION A. JOHN RADSAN* “At its best, covert action should be used like a well-honed scalpel, infrequently, and with discretion lest the blade lose its edge.”† INTRODUCTION ............................................................................................... 486 I. HISTORY ..................................................................................................... 488 A. Political Action in Italy ............................................................... 490 B. Cold War Propaganda: Radio Free Europe and Radio Liberty ........................................................................ 494 C. Cold War Coups ......................................................................... -
Threat Models for Analyzing Plausible Deniability of Deniable File Systems
Threat Models for Analyzing Plausible Deniability of Deniable File Systems Michal Kedziora1,∗, Yang-Wai Chow2 and Willy Susilo2 1Faculty of Computer Science and Management, Wroclaw University of Science and Technology, Wroclaw, Poland 2Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia E-mail: [email protected]; {caseyc,wsusilo}@uow.edu.au *Corresponding Author Received 15 August 2017; Accepted 22 October 2017; Publication 27 November 2017 Abstract Plausible deniability is a property of Deniable File System (DFS), which are encrypted using a Plausibly Deniable Encryption (PDE) scheme, where one cannot prove the existence of a hidden file system within it. This paper investigates widely used security models that are commonly employed for analyzing DFSs. We contend that these models are no longer adequate con- sidering the changing technological landscape that now encompass platforms like mobile and cloud computing as a part of everyday life. This necessitates a shift in digital forensic analysis paradigms, as new forensic models are required to detect and analyze DFSs. As such, it is vital to develop new contemporary threat models that cater for the current computing environment that incorporates the increasing use of mobile and cloud technology. In this paper, we present improved threat models for PDE, against which DFS hidden volumes and hidden operating systems can be analyzed. In addition, we demonstrate how these contemporary threat models can be adopted to attack and defeat the plausible deniability property of a widely used DFS software. Journal of Software Networking, 241–264. doi: 10.13052/jsn2445-9739.2017.012 This is an Open Access publication. -
Plausible Deniabilitydeniability Oror Howhow Leadersleaders Maymay Trytry Toto Concealconceal Theirtheir Rolesroles
PlausiblePlausible DeniabilityDeniability oror HowHow LeadersLeaders MayMay TryTry toto ConcealConceal TheirTheir RolesRoles Dr. Walter Dorn Royal Military College of Canada International Criminal Court/Office of the Prosecutor ICC/OTP Guest Lecture, 18 May 2010 NB: The views expressed in this presentation are those of Professor Dorn and do not necessarily reflect ICC/OTP or Canadian government policy. Overview I. Plausible Deniability: definition and scope II. Origins and Examples in US Intelligence III. Purposes and Methods IV. Challenging “Plausible Deniers” V. ICC applications I. Definition and Scope OED Definition plausible deniability n. Polit. (the possibility of) denying a fact (esp. a discreditable action) without arousing suspicion; the method of achieving this. 1974 Washington Post 14 Sept. A2/3 Author David Wise also objected that the secret activities also required a policy of ‘plausible deniability’ on the part of U.S. officials when publicly questioned about them. 1987 N.Y. Times (Nexis) 8 Jan. A1/5 Investigators want to know..whether Mr. Reagan's open support for the contras was translated into action that he and other senior officials now find it convenient to repudiate... According to several Administration officials, the White House in the last few years had used the technique of ‘plausible deniability’. 2001 New Republic 8 Oct. 8/2 So the Agency [sc. the CIA] tried to avoid direct involvement in the war, and to maintain plausible deniability... The U.S. provided the mujahedin only Eastern-bloc weaponry, so the rebels could claim they had captured it from Soviet troops rather than received it from Washington. (Note: All three examples apply to deniability of US government.) The Oxford Essential Dictionary of the U.S. -
Grey Is the New Black: Covert Action and Implausible Deniability
Grey is the new black: covert action and implausible deniability RORY CORMAC AND RICHARD J. ALDRICH* Anxiety about ambiguous warfare and ‘hybridity’ is all the rage. But the rapidly proliferating literature on ‘grey’, ‘hybrid’ and ‘non-linear warfare’ is confused and references a bewildering range of military, political and economic developments associated with the changing nature of war over several decades.1 The proliferation of terms emphasizes that conceptual clarity is in short supply, and this elasticity ultimately obscures more than it explains.2 We argue that this lack of clarity turns upon the paradoxical nature of covert action. Covert action by definition seeks to change things and often leaves some sort of a trail. Although some have remarked on the varying degrees of exposure associated with hybrid warfare, little system- atic analysis exists of the role of visibility and acknowledgement.3 We therefore seek to relocate the debate within a wide-ranging analysis of covert action which, on closer inspection, was often hardly covert at all. We unpack ideas surrounding secrecy to challenge assumptions about covert action and offer broader insights into contemporary interventionism. For hundreds of years, states have sought to intervene in the affairs of others in a deniable manner. Since the professionalization of intelligence services in the aftermath of the Second World War, this behaviour has become known as covert action: commonly understood as activity to influence events in a plausibly deniable manner. Indeed, the concept of plausible deniability—some have gone as far as to call it a doctrine4—is central to understandings of covert action both academically and in practice. -
Download the Transcript
DEMOCRACY-2020/10/02 1 THE BROOKINGS INSTITUTION DISINFORMED DEMOCRACY: THE PAST, PRESENT, AND FUTURE OF INFORMATION WARFARE Washington, D.C. Friday, October 2, 2020 Welcoming Remarks: JOHN R. ALLEN President, The Brookings Institution Opening Conversation: How Disinformation Threatens World Order: KEYNOTE: H.R. McMASTER Fouad and Michelle Ajami Senior Fellow, Hoover Institution, Stanford University Former U.S. National Security Advisor MODERATOR: FIONA HILL Senior Fellow, Center on the United States and Europe The Brookings Institution Panel 1: The Road to Russian Interference in 2016: MODERATOR: FIONA HILL Senior Fellow, Center on the United States and Europe The Brookings Institution CATHERINE BELTON Special Correspondent, Reuters ARKADY OSTROVSKY Russia and Easter Europe Editor, The Economist THOMAS RID Professor of Strategic Studies Johns Hopkins School of Advanced International Studies DAVID SHIMER Global Fellow, Woodrow Wilson International Center for Scholars Associate Fellow, Yale University Panel 2: Domestic Drivers of Disinformation: MODERATOR: CHRIS MESEROLE Fellow and Deputy Director, Artificial Intelligence and Emerging Technology Initiative The Brookings Institution RENÉE DiRESTA Research Manager, Stanford Internet Observatory ANDERSON COURT REPORTING 1800 Diagonal Road, Suite 600 Alexandria, VA 22314 Phone (703) 519-7180 Fax (703) 519-7190 DEMOCRACY-2020/10/02 2 ELAINE KAMARCK Senior Fellow and Director, Center for Effective Public Management The Brookings Institution KATE STARBIRD Associate Professor, Human Centered Design & Engineering University of Washington Panel 3: Novel strategies for countering information warfare MODERATOR: FIONA HILL Senior Fellow, Center on the United States and Europe The Brookings Institution EILEEN DONAHOE Executive Director, Global Digital Policy Incubator, Stanford University Former U.S. Ambassador, United National Human Rights Council THOMAS KENT Adjunct Associate Professor of International and Public Affairs Columbia University DANIEL KIMMAGE Principal Deputy Coordinator, Global Engagement Center U.S. -
Jack Anderson
I• The Washington merry-go-round With LES WHITTEN 1,'41q Jack Anderson WASHINGTON — The Senate report at the bottom; others bear no name at calls "plausible deniability." —The Dominican Republic's late on CIA assassination attempts has been all. The draft report runs about 200 pages dictator, Rafael Trujillo, was censured held up while the senators make a final, There is some evidence that and is bound in a looseleaf folder. But by the Organization of American States probably futile effort to find out who Presidents may have authorized the pages are still being taken out to be in 1960 for sponsoring an unsuccessful authorized the plots against foreign CIA's participation in an occasional rewritten. Key witnesses have also been assassination plot against Venezuela's rulers. coup of kidnaping. For example, called back for additional questioning. President Romulo Betancourt. Although Still unresolved is whether past President Kennedy apparently approved The assassination report may not be the OAS denounced the attempted Presidents were aware of the murder an August 23, 1963 cable directing the ready, therefore, until the end of the murder as a flagrant violation of human plots. Did men like Dwight Eisenhower, U.S. embassy in Saigon to arrange the month. rights, this didn't deter the Eisenhower John Kennedy, Lyndon Johnson and overthrow of South Vietnam's President However, here are the committee's administration from sponsoring plots to Richard Nixon sometimes behave in a Ngo Dinh Diem. preliminary findings: kill not only Castro but Trujillo. At least manner more befitting a Mafia There was also secret testimony that —in 1960, the CIA plotted to do away the State Department, in a clumsily godfather than President of the United President Nixon personally gave CIA with the troublesome Congolese leader, coded message, directed its consulate in States? chief Richard Helms the green light to go Patrice Lumumba. -
Unacknowledged Special Operations and Covert Action 5B
DIFFERENT WORLDS: UNACKNOWLEDGED SPECIAL OPERATIONS AND COVERT ACTION BY COLONEL RICHARD C. GROSS United States Army DISTRIBUTION STATEMENT A: Approved for Public Release. Distribution is Unlimited. USAWC CLASS OF 2009 This SRP is submitted in partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic research paper are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Strategy Research Project U.S. Army War College, Carlisle Barracks, PA 17013-5050 Form Approved Report Documentation Page OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 30 MAR 2009 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Different Worlds: Unacknowledged Special Operations and Covert 5b. GRANT NUMBER Action 5c. PROGRAM ELEMENT NUMBER 6.