Standard Operating Procedure Manual

Total Page:16

File Type:pdf, Size:1020Kb

Standard Operating Procedure Manual Standard Operating Procedure Manual Overview The purpose of this Standard Operating Procedure Manual (SOP) is to provide to employees with written instructions of the regularly recurring work processes and repetitive activities followed by the ADM Board. The procedures set forth in this manual apply to ADM Board employees, interns and volunteers and shall be followed to provide structure and guidance, ensuring that consistent implementation within the organization. You should also be advised that the Executive Director has sole discretion, and reserves the right to adopt new work rules, procedures and policies, and to modify, alter, delete, suspend, change or discontinue existing policies and procedures at any time, with or without notice. You will be informed of changes as they occur. While you may wish to print this manual for your own use, we discourage this. The official and most up to date version of this operating procedure manual resides on the employee communication page. Standard Operating Procedures Overview i Standard Operating Procedure Table of Contents October 2017 Operations Procedures The operations procedures provides guidance on activities related to administration, administrative support, community relations, finance , information technology, information technology security and human resources of the organization. Administration A08 Public Records Request A10 Consumer Scholarships A12 Whistleblower Reporting A13 Reports of Unusual Incidents Administrative Support AD01 General Office Procedures AD02 Board of Directors' Meeting & Committee Meeting Notification and Support AD03 Request for Client Information AD05 Equipment Maintenance AD07 Patient Care System AD08 Office Supply Orders AD10 Monitoring Report Surveys Community Relations COM9 Media Relationships COM10 Updating Online Communication channels including ADM Board Website and Social media sites COM 11 Public Speaking Requests Standard Operating Procedures 2016 Page 1 Finance F1 Cash Receipts F2 Purchasing Procedure F3 Securing and Safeguarding Personal Health Information (PHI) F4 Vendor Account Maintenance F7 Purchase Order – Increase, Decrease, and Discharges F8 Travel, Training, Seminar & Other Business Expense Reimbursement F9 Federal Funding Request F11 Ability to Pay Exception Request F13 Out of County (OOCTY) Remittance Processing F14 Time Sheet and Payroll Processing F17 Void Check and Replacement Check F19 Non-Medicaid Contract Termination F20 Payroll – Adjustments F21 Capping Community Prevention and Community Services F22 Paycheck/Direct Deposit Distribution F23 Financial Compliance Auditor Responsibilities F24 RA Processing F25 Agency Financial & Compliance Audit Reports F26 Preparation of and Subsequent Review of Submitted Provider Budget Applications F27 Capital assets F28 Non-Capital Assets F29 Banner and Kronos Permissions F30 Non- Medicaid Provider Contracts Standard Operating Procedures 2016 Page 2 Human Resources HR1.0 Employee Attendance HR1.1 Employee Grievance HR1.2 Family Medical Leave Act HR1.3 Professional Developments & Training HR1.4 Working at Home HR 1.5 New Hire Orientation HR1.6 Employee Professional Development Plans HR1.7 Reasonable Accommodations HR1.8 Immigration Reform and Employment Eligibility HR1.9 Keys and Key Cards HR1.10 Personnel File Checklist HR1.11 Drug Free Workplace HR1.12 Student Internships and Field Placement Information Technology ITP01 MACSIS General ITP02 MACSIS Member/Eligibility Extract Processing ITP03 MACSIS Claims Files Processing ITP05 MACSIS Claims Files Processing ITP06 MACSIS Retro-Medicaid File Processing ITP07 MACSIS Retroactive Medicaid Script Processing and Agency Reports ITP08 OPLST Reports ITP09 Electronic Remittance Advice (RA) Processing ITP10 Distribution of Remittance Advice (RA) Files to Providers ITP11 MACSIS Caution/Outliers Report Distribution Standard Operating Procedures 2016 Page 3 ITP12 MACSIS Claims Files Reports Processing ITP13 MACSIS Critical Errors Reports Processing ITP14 MACSIS Held Claims Processing IT15 MACSIS Pricing Processing ITP16 Great Office Solution Helper (GOSH) Information Technology Security ITSP01 Access Authorization, Establishment and Modification ITSP02 Access Control ITSP03 Assigning Computer Resources to Employees ITSP04 Password Management ITSP05 Information Systems Activity Review ITSP06 Security Incident Response and Reporting TSP07 Guarding Against, Detecting, and Reporting Malicious Software ITSP08 Data Back-up Plan ITSP09 Data Destruction ITSP10 File Transfer Protocol (FTP) ITSP11 Device and Media Controls ITSP12 ePHI Data Encryption ITSP13 External Unauthorized Access to ePHI ITSP14 Security Reminders ITSP15 Virtual Private Network (VPN) ITSP16 BDR File Restore Standard Operating Procedures 2016 Page 4 Clinical Services Procedures The clinical services procedures provide guidance on activities related to planning, implementation, monitoring, and evaluation of Provider contract agencies’ clinical and support services of the organization. This section of the manual includes procedures on Chief Clinical Officer, Clients rights and the clinical services of the operation. Chief Clinical Officer CC01 Ohio MHAS Incident Reporting CC02 Treatment Over Objection/Capacity Assessment CC03 Health Officer Qualifications and Appointment Process Client Rights CR01 Investigating Complaints Abuse and Neglect CR04 Communication with Persons Who Are Visually Impaired CR05 Civil Rights of Clients CR09 Investigating Complaints and Grievances CR10 Reporting and Record Keeping for Client Rights Investigations Clinical Services CS01 Continuing Education Applications CS05 Clinical Record Review CS08 Crisis Intervention Team (CIT) Statistical Sheet/Psychiatric Emergency Services (PES) Comparison CS09 Quarterly Probate Court / Mental Health Issues Meeting Report CS20 Multiple Agency Community Service Information System (MACSIS) Outpatient Residency Determinations CS22 Independent Peer Review CS27 AoD Agency Referral Satisfaction Surveys CS28 Incident Reporting Standard Operating Procedures 2016 Page 5 CS29 Alcohol and Other Drug Residential Treatment Waiting List Management CS42 Conditional Release Forms CS58 CQI Corrective Action Reviews CS59 CQI Prevention Reviews CS61 Continued Stay Procedure for AoD Residential Treatment CS 62 Mental Health Statistics Improvement Plan (MHSIP) Consumer Survey Standard Operating Procedures 2016 Page 6 Administration Standard Operating Procedure Department: Administration Procedure Number: A 08 Procedure Title: Public Records Requests 1. PURPOSE As a political subdivision of the State of Ohio, the County of Summit Alcohol, Drug Addiction and Mental Health Services (ADM) Board is subject to the rules of Ohio Public Records Statute, Section 149.43 ORC, and strictly adheres to the Ohio Public Records Act. This procedure is to provide clear direction on how to make a public records request to the ADM Board and how it is processed. 2. DEFINITIONS A. Availability of Records All records shall be promptly prepared or made available for inspection to any person at all reasonable times during regular business hours, with exception of published holidays. As required by Ohio Law, records will be organized and maintained so that they are promptly available for inspection and copying, except if legal review and or redaction are required, then the records shall be provided within a reasonable period of time. B. E-mail Documents in electronic format are records as defined by the Ohio Revised Code when their content relates to the business of the office. C. Personal Notes Personal notes of ADM Board staff generally do not meet the definition of a record. Notes have been found not to be public records if they are: 1. Kept as personal papers, not official records; 2. Kept for the employee’s own convenience (for example, to help recall events). 3. Other employees did not use or have access to the notes. D. Public Records Documents kept by the ADM Board office, with certain exceptions as defined by applicable federal and state laws, and the ORC 149.43, and have the following characteristics: 1. Stored on a fixed medium (paper, electronic, or other format); and, 2. Created, received by, or comes under the jurisdiction of the ADM Board office; and 3. That documents the organization, function, policies decision, procedures, operations or other activities of the ADM Board. E. Public Records Log A document listing all public record requests made during the calendar year. Procedure Number: A 08 Page 1 of 4 F. Records Request No specific language is required to make a records request. However the requester must describe the records requested with sufficient clarity to allow the ADM Board to identify, retrieve and review the records. 1. If a Requester makes an ambiguous or overly broad request, or has difficulty in making a request for copies or inspection of public records such that the ADM Board cannot reasonably identify what records are being requested, the ADM Board shall provide the Requester with an opportunity to revise the request by informing the Requester of the manner in which records are maintained; 2. or deny the records request. G. Record Retention Schedule (RC-2) The Schedule of Records Retention and Disposition (RC-2) lists the records created and maintained by the ADM Board. The RC-2 is approved by the Summit County Records Commission. H. Redaction Obscuring, deleting, withholding specific records covered by an exception to the Public Records Act. The ADM Board is required to give the requester an explanation for any part of a record withheld,
Recommended publications
  • PVC Technical Specifications V.1.0
    Pryvate™ Ltd. Functional & Technical Specifications PVC Technical Specifications V.1.0 APRIL 10, 2018 © PRYVATE™ 2018. PRYVATE™ is a suite of security products from Criptyque Ltd. Registered in the Cayman Islands. PRYVATE™ Is a brand wholly owned by CRIPTYQUE Ltd. Pryvate™ Ltd. Functional & Technical Specifications TABLE OF CONTENTS 1 GENERAL INFORMATION 5 1.1 Scope 1.2 Current Platform Summary 2 FUNCTIONAL TECH SPECIFICATIONS 5 2.1 Encrypted Voice Calls (VOIP) 2.2 Off Net Calling 2.3 Secure Conferencing 2.4 Encrypted Video Calls 2.5 Encrypted Instant Message (IM) 2.6 Notification of Screenshots 2.7 Encrypted Email 2.8 Secure File Transfer & Storage 2.9 Pin-Encrypted Mobile Protection 2.10 Multiple Account Management 2.11 Secure managed conversations 2.12 Anti-Blocking 3 HYBRIDIZATION 13 3.1 Voice / Video / Messaging 3.2 File Storage / Archival 3.3 Pryvate Crypto Wallet 3.3.1 Two-Wallet Solution 3.3.2 Three Methods 3.3.3 Enterprise Multi - by Pryvate 3.3.4 Risks of Cryptocurrency Wallets 3.4 Decentralized Email 3.5 Pryvate Dashboard 4 PERFORMANCE REQUIREMENTS 20 4.1 System Maintenance 4.2 Failure Contingencies 4.3 Customization and Flexibility 4.4 Equipment 4.5 Software 4.6 Interface / UI 5 CONCLUSION 21 6 APPENDIX 22 © PRYVATE™ 2018. PRYVATE™ is a suite of security products from Criptyque Ltd. Registered in the Cayman Islands. PRYVATE™ Is a brand wholly owned by CRIPTYQUE Ltd. Pryvate™ Ltd. Functional & Technical Specifications Acronyms: Definitions SCP = Secure Communications Platform Crypto= Cryptocurrency IPFS= Interplanetary File System ZRTP= ("Z" is a reference to its inventor, Zimmermann; "RTP" stands for Real-time Transport Protocol) it is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over Internet Protocol Diffie-Hellman= A method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.
    [Show full text]
  • Everyone's Guide to Bypassing Internet Censorship
    EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Blockchain: an Enabler for Power Market Operations Exploring Potential Uses of Distributed Ledger Technology in the Evolving Georgian Power Market
    BLOCKCHAIN: AN ENABLER FOR POWER MARKET OPERATIONS EXPLORING POTENTIAL USES OF DISTRIBUTED LEDGER TECHNOLOGY IN THE EVOLVING GEORGIAN POWER MARKET USAID GOVERNING FOR GROWTH (G4G) IN GEORGIA 30 May 2019 This publication was produced for review by the United States Agency for International Development. It was prepared by Deloitte Consulting LLP. The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. BLOCKCHAIN: AN ENABLER FOR POWER MARKET OPERATIONS EXPLORING POTENTIAL USES OF DISTRIBUTED LEDGER TECHNOLOGY IN THE EVOLVING GEORGIAN POWER MARKET USAID GOVERNING FOR GROWTH (G4G) IN GEORGIA CONTRACT NUMBER: AID-114-C-14-00007 DELOITTE CONSULTING LLP USAID | GEORGIA USAID CONTRACTING OFFICER’S REPRESENTATIVE: PHILLIP GREENE AUTHOR(S): SRI SEKAR, JAMES CALLIHAN, AVTANDILI TODUA ACTIVITY AREA: 4420 LANGUAGE: ENGLISH 30 MAY 2019 DISCLAIMER: This publication was produced for review by the United States Agency for International Development. It was prepared by Deloitte Consulting LLP. The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. USAID | GOVERNING FOR GROWTH (G4G) IN GEORGIA BLOCKCHAIN: AN ENABLER FOR POWER MARKET OPERATIONS i DATA Reviewed by: Giorgi Giorgobiani, Andrea Lora Project Component: Energy Trade Policy Improvement Component Practice Area: Electricity Trading Mechanism (ETM) Key Words: Blockchain,
    [Show full text]
  • A Framework for Identifying Host-Based Artifacts in Dark Web Investigations
    Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Fall 11-2020 A Framework for Identifying Host-based Artifacts in Dark Web Investigations Arica Kulm Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Databases and Information Systems Commons, Information Security Commons, and the Systems Architecture Commons Recommended Citation Kulm, Arica, "A Framework for Identifying Host-based Artifacts in Dark Web Investigations" (2020). Masters Theses & Doctoral Dissertations. 357. https://scholar.dsu.edu/theses/357 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. A FRAMEWORK FOR IDENTIFYING HOST-BASED ARTIFACTS IN DARK WEB INVESTIGATIONS A dissertation submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cyber Defense November 2020 By Arica Kulm Dissertation Committee: Dr. Ashley Podhradsky Dr. Kevin Streff Dr. Omar El-Gayar Cynthia Hetherington Trevor Jones ii DISSERTATION APPROVAL FORM This dissertation is approved as a credible and independent investigation by a candidate for the Doctor of Philosophy in Cyber Defense degree and is acceptable for meeting the dissertation requirements for this degree. Acceptance of this dissertation does not imply that the conclusions reached by the candidate are necessarily the conclusions of the major department or university. Student Name: Arica Kulm Dissertation Title: A Framework for Identifying Host-based Artifacts in Dark Web Investigations Dissertation Chair: Date: 11/12/20 Committee member: Date: 11/12/2020 Committee member: Date: Committee member: Date: Committee member: Date: iii ACKNOWLEDGMENT First, I would like to thank Dr.
    [Show full text]
  • The Book of Swarm Storage and Communication Infrastructure for Self-Sovereign Digital Society Back-End Stack for the Decentralised Web
    the book of Swarm storage and communication infrastructure for self-sovereign digital society back-end stack for the decentralised web Viktor Trón v1.0 pre-release 7 - worked on November 17, 2020 the swarm is headed toward us Satoshi Nakamoto ii CONTENTS Prolegomena xi Acknowledgments xii i prelude 1 the evolution2 1.1 Historical context 2 1.1.1 Web 1.02 1.1.2 Web 2.03 1.1.3 Peer-to-peer networks 6 1.1.4 The economics of BitTorrent and its limits 7 1.1.5 Towards Web 3.08 1.2 Fair data economy 12 1.2.1 The current state of the data economy 12 1.2.2 The current state and issues of data sovereignty 13 1.2.3 Towards self-sovereign data 15 1.2.4 Artificial intelligence and self-sovereign data 16 1.2.5 Collective information 17 1.3 The vision 18 1.3.1 Values 18 1.3.2 Design principles 19 1.3.3 Objectives 19 1.3.4 Impact areas 20 1.3.5 The future 21 ii design and architecture 2 network 25 2.1 Topology and routing 25 2.1.1 Requirements for underlay network 25 2.1.2 Overlay addressing 26 2.1.3 Kademlia routing 27 2.1.4 Bootstrapping and maintaining Kademlia topology 32 2.2 Swarm storage 35 2.2.1 Distributed immutable store for chunks 35 2.2.2 Content addressed chunks 38 2.2.3 Single-owner chunks 41 2.2.4 Chunk encryption 42 2.2.5 Redundancy by replication 43 2.3 Push and pull: chunk retrieval and syncing 47 iii 2.3.1 Retrieval 47 2.3.2 Push syncing 51 2.3.3 Pull syncing 53 2.3.4 Light nodes 55 3 incentives 57 3.1 Sharing bandwidth 58 3.1.1 Incentives for serving and relaying 58 3.1.2 Pricing protocol for chunk retrieval 59 3.1.3 Incentivising push-syncing
    [Show full text]
  • A Privacy Threat for Internet Users in Internet-Censoring Countries
    A Privacy Threat for Internet Users in Internet-censoring Countries Feno Heriniaina R. College of Computer Science, Chongqing University, Chongqing, China Keywords: Censorship, Human Computer Interaction, Privacy, Virtual Private Networks. Abstract: Online surveillance has been increasingly used by different governments to control the spread of information on the Internet. The magnitude of this activity differs widely and is based primarily on the areas that are deemed, by the state, to be critical. Aside from the use of keywords and the complete domain name filtering technologies, Internet censorship can sometimes even use the total blocking of IP addresses to censor content. Despite the advances, in terms of technology used for Internet censorship, there are also different types of circumvention tools that are available to the general public. In this paper, we report the results of our investigation on how migrants who previously had access to the open Internet behave toward Internet censorship when subjected to it. Four hundred and thirty-two (432) international students took part in the study that lasted two years. We identified the most common circumvention tools that are utilized by the foreign students in China. We investigated the usability of these tools and monitored the way in which they are used. We identified a behaviour-based privacy threat that puts the users of circumvention tools at risk while they live in an Internet-censoring country. We also recommend the use of a user-oriented filtering method, which should be considered as part of the censoring system, as it enhances the performance of the screening process and recognizes the real needs of its users.
    [Show full text]
  • Blocking-Resistant Communication Through Domain Fronting
    Proceedings on Privacy Enhancing Technologies 2015; 2015 (2):46–64 David Fifield*, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson Blocking-resistant communication through domain fronting Abstract: We describe “domain fronting,” a versatile 1 Introduction censorship circumvention technique that hides the re- mote endpoint of a communication. Domain fronting Censorship is a daily reality for many Internet users. works at the application layer, using HTTPS, to com- Workplaces, schools, and governments use technical and municate with a forbidden host while appearing to com- social means to prevent access to information by the net- municate with some other host, permitted by the cen- work users under their control. In response, those users sor. The key idea is the use of different domain names at employ technical and social means to gain access to the different layers of communication. One domain appears forbidden information. We have seen an ongoing conflict on the “outside” of an HTTPS request—in the DNS re- between censor and censored, with advances on both quest and TLS Server Name Indication—while another sides, more subtle evasion countered by more powerful domain appears on the “inside”—in the HTTP Host detection. header, invisible to the censor under HTTPS encryp- Circumventors, at a natural disadvantage because tion. A censor, unable to distinguish fronted and non- the censor controls the network, have a point working fronted traffic to a domain, must choose between allow- in their favor: the censor’s distaste for “collateral dam- ing circumvention traffic and blocking the domain en- age,” incidental overblocking committed in the course of tirely, which results in expensive collateral damage.
    [Show full text]
  • Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (Information
    The Information Society Series Laura DeNardis and Michael Zimmer, Series Editors Interfaces on Trial 2.0, Jonathan Band and Masanobu Katoh Opening Standards: The Global Politics of Interoperability, Laura DeNardis, editor The Reputation Society: How Online Opinions Are Reshaping the Offline World, Hassan Masum and Mark Tovey, editors The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright, Hector Postigo Technologies of Choice? ICTs, Development, and the Capabilities Approach, Dorothea Kleine Pirate Politics: The New Information Policy Contests, Patrick Burkart After Access: The Mobile Internet and Inclusion in the Developing World, Jonathan Donner The World Made Meme: Public Conversations and Participatory Media, Ryan Milner The End of Ownership: Personal Property in the Digital Economy, Aaron Perzanowski and Jason Schultz Digital Countercultures and the Struggle for Community, Jessica Lingel Protecting Children Online? Cyberbullying Policies of Social Media Companies, Tijana Milosevic Authors, Users, and Pirates: Copyright Law and Subjectivity, James Meese Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P, Robert W. Gehl Weaving the Dark Web Legitimacy on Freenet, Tor, and I2P Robert W. Gehl The MIT Press Cambridge, Massachusetts London, England © 2018 Robert W. Gehl All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was set in ITC Stone Serif Std by Toppan Best-set Premedia Limited. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data is available. ISBN: 978-0-262-03826-3 eISBN 9780262347570 ePub Version 1.0 I wrote parts of this while looking around for my father, who died while I wrote this book.
    [Show full text]
  • Orchid: a Decentralized Network Routing Market Jake S
    Orchid: A Decentralized Network Routing Market Jake S. Cannell1,2 , Justin Sheek1,2 , Jay Freeman2 , Greg Hazel 2, Jennifer Rodriguez-Mueller2 , Eric Hou, Brian J. Fox, and Dr. Steven Waterhouse. Version 2.0 11/18/2019 1: Primary authors. 2: Collaborators responsible for the technical design. Additional contributions discussed in the acknowledgements section. Abstract We present Orchid: a decentralized market for anonymous communication and virtual private networking. Extant privacy solutions are either opaque commercial services with concomitant centralization risks or free peer to peer networks which lack the proper aligned incentives for service quality and economic security at scale. Orchid is a bandwidth market where node providers stake tokens to advertise their services using the Ethereum blockchain. Clients construct single or multi-hop onion routed circuits by selecting nodes randomly weighted on stake and filtered on secondary criteria (price, location, etc.). Staking aligns incentives against operator malfeasance and linear stake weighting in particular neutralizes sybil attacks. Orchid uses a probabilistic payment system which scales to millions of transactions per second, enabling a highly liquid bandwidth market without a trusted central party. Payments at packet scale allow high frequency trustless interactions by reducing the implicit floated balances between transactors to miniscule levels. 1. Introduction The Internet, once a free and open frontier, is today increasingly fractured, surveilled, and censored. As governments and corporations have become ever more effective at monitoring, inspecting, and blocking connections, demand for privacy and anonymity tools such as VPNs (Virtual Private Networks) has grown mainstream. While VPNs work well enough for most use cases, they suffer from inherent weaknesses in the centralized trust based model.
    [Show full text]
  • Measuring I2P Censorship at a Global Scale
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • Analysis of Internet Privacy Protection Methods and Private Browsing Mode
    TALLINN UNIVERSITY OF TECHNOLOGY Department of Software Science Alla Sedneva 143018IABB ANALYSIS OF INTERNET PRIVACY PROTECTION METHODS AND PRIVATE BROWSING MODE Bachelor’s thesis Supervisor: Karin Rava MSc. Eng Tallinn 2017 TALLINNA TEHNIKAÜLIKOOL Tarkvarateaduse instituut Alla Sedneva 143018IABB INTERNETI PRIVAATSUSE KAITSMISE MEETODITE JA PRIVAATSE SIRVIMISE REŽIIMI ANALÜÜS Bakalaurusetöö Juhendaja: Karin Rava MSc. Eng Tallinn 2017 Author’s declaration of originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Alla Sedneva 22 May 2017 3 Abstract The subject of Internet privacy attracts many concerns. [26] In order to retain their privacy online, there are various methods available for users. Extensive research is required to find the method best suited for one’s needs. This work explores and briefly describes some of the well-known methods and presents a table summarizing the criteria for each one for easy-to-understand visual overview. One of the methods of protection is Private Browsing Mode, which found its way into every major browser. [4] Supposedly, it should leave no traces of surfing activities on the user’s device. [3] [21] Such claim would be tested by using memory forensics analysis. Browsing artifacts will be examined and it will be found that every browser left essential browsing data on user’s device and each that results varied for each browser. For this work, survey was conducted by the Author to observe user’s perceptions of Internet privacy in general as well as get to know the preferences with respect to the same.
    [Show full text]