Hipeac Vision 2015 HIGH PERFORMANCE and EMBEDDED ARCHITECTURE and COMPILATION

Total Page:16

File Type:pdf, Size:1020Kb

Hipeac Vision 2015 HIGH PERFORMANCE and EMBEDDED ARCHITECTURE and COMPILATION HiPEAC Vision 2015 HIGH PERFORMANCE AND EMBEDDED ARCHITECTURE AND COMPILATION Editorial board: Marc Duranton, Koen De Bosschere, Albert Cohen, Jonas Maebe, Harm Munk This document was produced as a deliverable of the FP7 HiPEAC Network of Excellence under grant agreement 287759. January 2015 The editorial board is indebted to Dr Max Lemke and to Dr Sandro D’Elia of the Complex Systems and Advanced Computing unit of the Directorate-General for Communication Networks, Content and Technology of the European Commission for their active support to this work. © 2015 HiPEAC CONTENTS contents 3.3. TECHNOLOGY 29 SILICON-BASED TECHNOLOGY: MORE AND MORE ROADBLOCKS 29 executive summary PROPOSED COURSE OF ACTIONS 31 STORAGE 39 1. introduction 1 COMMUNICATION 40 FACING A NEW SOFTWARE CRISIS AND ITS COURSE OF ACTION 43 2. about challenges, context and actions 3 2.1. PRIMARY CHALLENGES 4 4. the position of europe 49 DEPENDABILITY BY DESIGN 4 4.1. STRENGTHS 49 MANAGING SYSTEM COMPLEXITY 5 STRONG EMBEDDED ECOSYSTEM 49 ENERGY EFFICIENCY 5 PUBLIC FUNDING FOR R&D AND TECHNOLOGY TRANSFER 49 ENTANGLEMENT BETWEEN THE PHYSICAL AND VIRTUAL WORLD 6 ONE OF THE BIGGEST MARKETS 50 2.2. SECONDARY CHALLENGES 6 GOOD EDUCATION 50 MULTIDISCIPLINARY 6 4.2. WEAKNESSES 51 HOLISTIC 7 EUROPE IS FULL OF HORIZONTAL SPECIALISATION 51 TECHNOLOGICAL EVOLUTION 7 LOSS OF COMPETITIVENESS IN SOME DOMAINS 51 MATURITY LEVEL 8 BORDERS AND DIFFERENT LANGUAGES 51 2.3. POLICY RECOMMENDATIONS 9 WEAK ACADEMIA-INDUSTRY LINK 51 ON THE RESEARCH CONTENT OF EU PROJECTS 9 EUROPE IS WEAK ON COMMERCIALISATION 51 ON THE IMPACT OF EU PROJECTS 9 EUROPE LACKS A SILICON VALLEY 51 ON THE VISIBILITY OF EU PROJECTS 9 4.3. OPPORTUNITIES 51 COST EFFECTIVE CUSTOMISATION 51 3. rationale: change keeps accelerating 11 LEVERAGING FREE/CHEAP/OPEN INFRASTRUCTURE 52 3.1. SOCIETY 11 SOCIETAL CHALLENGES 52 MISUSE OF INFORMATION TECHNOLOGY MIGHT DESTROY CONVERGENCE 52 OUR PRIVACY 11 MICRO- AND NANO-ELECTRONICS 52 GOVERNMENTS WANT TO CONTROL THEIR (AND OTHERS) 4.4. THREATS 52 INFORMATION TECHNOLOGY 13 COMPETING WITH FREE/CHEAP/OPEN INFRASTRUCTURE 52 INFORMATION TECHNOLOGY MIGHT EVENTUALLY DESTROY FINANCIAL CRISIS 53 MORE JOBS THAN IT CREATES 14 AGEING POPULATION AND SHRINKING WORK FORCE 53 INFORMATION TECHNOLOGY WILL HAVE AN INCREASING IMPACT ON THE ENVIRONMENT 15 5. glossary and abbreviations 55 INFORMATION TECHNOLOGY WILL BRING IMPROVED EFFICIENCY TO SOLVE SOCIETAL CHALLENGES 16 6. references 59 FULFILLING HUMAN NEEDS THANKS TO INFORMATION TECHNOLOGY 18 7. process 64 3.2. MARKET 20 VERTICALISATION IS PROGRESSING 20 8. acknowledgements 65 THE MARKET CARES ABOUT APPLICATIONS AND SERVICES, NOT ABOUT PLATFORMS 21 NO MORE CLOUDLESS DAYS 21 COMPUTING BUILDS ON INTERACTION + REACTION 23 COMPUTING BECOMES INCREASINGLY COGNITIVE 25 HIGH PERFORMANCE COMPUTING: FROM BIG-DATA TO EXAFLOP COMPUTING 28 EXECUTIVE SUMMARY If there is one thing that characterizes the development of technology on these processes may become possible, again, information technology, it is the unrelenting, always accelerating through the Internet of Things. change. Computing systems keep pervading society deeper and Finally, Cyber-Physical Systems and robotic systems, whereby deeper, and have acquired a strong foothold in everyday life. The humans, computers and the physical world interact, will enable smartphone and tablet revolution, which was enabled by the assisting or replacing human actors in dangerous, tedious, or wide availability of Internet access, has made life without dirty jobs. These systems still need a considerable amount of information technology unthinkable. With the Internet of Things research and development, might rely on cloud resources, and on the doorstep, we are facing the challenge of the exponential will necessitate measures to protect the privacy and security of growth of the amount of online data. With the advent of Cyber- their users. Physical Systems, computing systems are not just monitoring, but actively controlling parts of the world around us. Finding CHALLENGES AND ACTIONS one’s way in the growing amount of data and determining a course of action requires cognitive systems that can make DEPENDABILITY, SECURITY decisions based on available information much faster than Cyber-Physical Systems and the Internet of Things require the humans can. highest possible levels of security, safety and reliability for their Yet, some of the key technologies that have fuelled the exponen tial adoption. In particular, security has to become one of the primary growth of computing systems seem to be heading for a wall design features of whole systems. Systems have to be dependable dictated by physical limits, creating serious technological by design. challenges for computing power, storage capacity and commu- nication speed: we are nearing the end of the information MANAGING SYSTEM COMPLEXITY technology world as we know it. Society has become almost In information science, we are entering the era of systems of completely dependent on information technology. In reaction to systems, with the accompanying exponential growth in complexity. several breaches of trust and integrity, society is increasingly We need new system paradigms, such as reactive systems and concerned about privacy and security. To address these issues, we feed back systems to manage this increase in overall complexity. need a holistic view of the complete system, both of hardware and software. Designing trustworthy systems will require better POWER AND ENERGY EFFICIENCY security tools. Europe, with its strong presence in software We need to overcome energy as the limiting factor for increasing security and with one leading processor architecture is well system performance. Instead of over-designing systems and positioned to play a prominent role here. targeting best effort, we need to design methodologies and tools Information technology is accelerating the replacement of jobs, that allow for systems to scale to the desired Quality of Service. particularly middle class ones, by computers and robots. Depen- We need to investigate methods that allow for information flow ding on society’s ability to create new jobs as has happened in the and optimization across system layers. Instead of being locked-in past, this may either result in a shift to different jobs or in a silicon-based Von-Neumann architectures, we need to investigate growing unemployment rate. However, as compared to the past, other architectures based on alternative technologies, such as the pace of technological development is still accelerating, neuromorphic architectures, Bayesian systems, etc. allowing society less and less time to adapt. This will require considerable flexibility from the educational system, policy ENTANGLEMENT BETWEEN THE PHYSICAL AND makers, legal frameworks and unions, to name just a few. VIRTUAL WORLD The human race is increasingly depleting Earth’s resources. The Information systems will sense, monitor, and even control the production of ICT devices, for example, has an almost insatiable physical world via Cyber-Physical Systems and the Internet of hunger for rare elements. On the other hand, information techno- Things. Dealing with large amounts of unstructured data will logy also, increasingly, has the ability to optimize the usage of require new approaches to bridge the gap between the physical scarce resources, ranging from real-time tailoring of energy world and computer systems. As these systems also exercise produc tion to consumption, to recycling and the reusing of control over the physical world, safety is a fundamental concern equipment. Further unleashing the power of information and becomes a primary design constraint. executive summary i MULTIDISCIPLINARY ON POLICY RECOMMENDATIONS Information systems have moved out of the realm of computer science and moved into the hands of experts in other disciplines. RESEARCH PROJECT CONTENT Yet, many systems still need to be adapted to the human-in-the- Experience from participants of past and current European loop paradigm, letting knowledgeable experts concentrate on projects indicates a concern over the protection of intellectual the what-to-solve instead of the how-to-solve. This requires a property rights in projects. Based on those concerns, we multidisciplinary approach to application development. recommend careful examination of IP rights in projects, especially in the light of the business models of the project participants. HOLISTIC Additionally, IP rights containment is less problematic with a Systems are becoming distributed systems-of-systems of hetero- limited number of project participants. Therefore we recommend geneous architectures with a wide variety of applications and that some projects can have a limited number of participants, communication infrastructure. To make effective and especially possibly even bilateral concerning IP rights. efficient use of such complex architectures, we have to develop Many participants recommend focusing projects on topics that holistic approaches to system design, allowing for non-functional seek to develop basic, non-discriminative technology, or projects information flow to enable (dynamic) optimizations. that pursue technology development that is too expensive to be carried out by a single company. TECHNOLOGICAL EVOLUTION Several technologies that have fuelled the exponential perfor- PROJECT IMPACT mance growth of computer systems in the past decades are The HiPEAC community is typically involved in development at facing physical walls. We need to develop new, disruptive
Recommended publications
  • D1.5 Final Business Models
    ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ...........................................................................................................................
    [Show full text]
  • Online Anonymity Islamic State and Surveillance
    online anonymity islamic state and surveillance Jamie Bartlett Alex Krasodomski-Jones March 2015 Open Access. Some rights reserved. As the publisher of this work, Demos wants to encourage the circulation of our work as widely as possible while retaining the copyright. We therefore have an open access policy which enables anyone to access our content online without charge. Anyone can download, save, perform or distribute this work in any format, including translation, without written permission. This is subject to the terms of the Demos licence found at the back of this publication. Its main conditions are: . Demos and the author(s) are credited . This summary and the address www.demos.co.uk are displayed . The text is not altered and is used in full . The work is not resold . A copy of the work or link to its use online is sent to Demos. You are welcome to ask for permission to use this work for purposes other than those covered by the licence. Demos gratefully acknowledges the work of Creative Commons in inspiring our approach to copyright. To find out more go to www.creativecommons.org Partners Credits Commissioned by? Published by Demos March 2015 © Demos. Some rights reserved. Third Floor Magdalen House 136 Tooley Street London SE1 2TU [email protected] www.demos.co.uk 2 INTRODUCTION This is a very short discussion paper about the way in which terrorist groups, and specifically Islamic State, use modern encryption systems to evade surveillance. It examines how the risks of online anonymity are weighed against its many social, personal and economic benefits.
    [Show full text]
  • National Insecurity: the Impacts of Illegal Disclosures of Classified Information
    National Insecurity: The Impacts of Illegal Disclosures of Classified Information MARK D. YOUNG* There had never been anything like it. In today's terms, it was as if an NSA employee had publicly revealed the complete communications intelligence operations of the Agency for the past twelve years-all its techniques and major successes, its organizational structure and budget-and had, for good measure, included actual intercepts, decrypts, and translations of the communications not only of our adversaries but of our allies as well.' In the mid-summer of 2013, the British newspaper, The Guardian, published claims by a contractor for the National Security Agency (NSA), that millions of telephone records were being collected under an order from the Foreign Intelligence Surveillance Court. Throughout the summer and fall, additional disclosures about apparent surveillance operations seized headlines around the world. Accurately interpreting the meaning of the disclosures has been more complicated, but it is clear that there is great public interest in United States intelligence activities. *Mark D. Young is the Senior Vice President and Chief Strategy Officer of National Security Partners, LLC. Previously he served as the Executive Director for the Directorate of Plans and Policy at United States Cyber Command, the Special Counsel for Defense Intelligence for the House Permanent Select Committee on Intelligence, and as a senior leader at the National Security Agency. The views expressed in this article are those of the author and do not reflect the official policy or position of the U.S. government. This article is derived entirely from open source material and contains no classified information.
    [Show full text]
  • P27 Layout 1
    WEDNESDAY, JANUARY 22, 2014 technology Carphone Warehouse sales get 4G boost LONDON: Carphone Warehouse, and Vodafone started services in within the market,” he said, noting that of growth of 2 percent and second quar- ance for headline earnings per share of Europe’s biggest independent mobile August last year. growing penetration of 4G was also driv- ter like-for-like growth of 3.6 percent. 17-20 pence, up from 12.3 pence in the phone retailer, beat consensus forecasts Take-up of 4G is being driven by rock- ing a rise in incremental average revenue CPW UK like-for-like revenue rose 5 2012-13 year. It also reiterated guidance for third-quarter revenue growth at its eting demand for mobile data. “There is a per user (ARPU). percent during the quarter, building on for pro-forma headline earnings before main CPW Group business, helped by real willingness for customers to move to Shares in Carphone, up over a quarter growth of 16 percent in the same period interest and tax (EBIT) of 140-160 million growing sales of 4G superfast mobile 4G and a willingness for them to under- in the last year, rose 1.4 percent after the last year. The firm said its Virgin Mobile pounds ($230-263 million) for CPW broadband products. stand that data usage is going to go up in firm said sales at CPW Group stores open France joint venture maintained its post- Group. Mobile operator EE, a joint venture the future,” Carphone Chief Executive over a year rose 3.1 percent in the three pay customer base at 1.33 million, Carphone shares were up 3 pence at between Frances’ Orange and Deutsche Andrew Harrison told Reuters yesterday.
    [Show full text]
  • Maintaining Corporate Privacy in the Digital Age
    Maintaining Corporate Privacy in the Digital Age Securing sensitive data while in motion and at rest Introduction Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise mobility initiatives to grow their businesses and increase operating efficiency. However, Ovum is concerned that corporate information security management policies do not appear to be adapting quickly enough to cope with the tumultuous rate of change imposed by the rapidly evolving business and technological landscape. Although encryption has been around for many years, it has come to the fore recently as a means of making it more difficult to gain unauthorized access to sensitive or confidential information, especially within the context of mobile devices. Ovum expects the adoption of encryption technologies to grow rapidly in the near term due to the fact that conventional approaches to information security are failing to stem the flow of data leakage incidents and privacy breaches. Eventually, all data will be encrypted at rest and/or in motion. However, for a variety of technical, practical, and legislative reasons, organizations must be diligent and meticulous in their use of this technology, with the customer and employee experience being of paramount importance. Companies can prioritize the encryption of corporate data by carrying out a data classification exercise across their business processes and IT infrastructure. However, data classification is a resource-intensive and generally costly process. Not only is it time- and resource-consuming to implement a manual classification in the first place, but it also requires employees to be aware of changing classification policies going forward, and to potentially apply them to information and data items that they have already created and distributed.
    [Show full text]
  • Reframing the Crypto Wars
    CONTENTS Introduction 1 A Highlights Reel of the U.S. Encryption Debate 2 The Early “Crypto Wars” and the Clipper Chip 2 The Encryption Debate Sequel: Snowden and Surveillance 3 Privacy and the Encryption Debate 3 Earn It: Encryption Controversy Over Section 230 3 The Current International Debate Around Encryption 4 The Impact of International Encryption Policy on Domestic Policy 5 Security Versus Privacy or Security Versus Security 5 Challenges to Making Progress on the Encryption Debate 6 The Increased Availability of User-friendly Encryption Services 6 A Lack of a Common Language 6 A Lack of a Whole of Government Approach to Cybersecurity 7 Disagreement About Backdoor Alternatives 8 Conclusion 9 About the Authors 10 R STREET POLICY STUDY NO. 237 The debate was seemingly set to be answered by the courts in July 2021 2016, when Apple refused to craft new software at the behest of the Federal Bureau of Investigation (FBI) that would allow the agency to access encrypted information on a phone belonging to one of the shooters in a 2015 terrorist attack on Inland Regional Center in San Bernardino, California. REFRAMING THE CRYPTO WARS But the “going dark” encryption debate shares a key charac- By Kathryn Waldron and Sofia Lesmes teristic with the walking dead: no matter how many times you try to put it to rest, it keeps coming back. In October 2020, the Department of Justice (DOJ) issued an international INTRODUCTION statement calling for companies to “[e]nable law enforce- ment access to content in a readable and usable format where or the past several decades, policymakers, law enforce- authorisation is lawfully issued, is necessary and proportion- ment, private companies, civil liberties advocates and ate, and is subject to strong safeguards and oversight.”2 Both cybersecurity specialists have been locked in a pas- at home and abroad, there are increased government calls to sionate yet seemingly unending battle over encryp- weaken encryption in the name of national security.
    [Show full text]
  • Navigating the Digital Age: the Definitive Cybersecurity Guide For
    THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS NAVIGATING THE DIGITAL AGE: The Defi nitive Cybersecurity Guide for Directors and Offi cers Published by Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers Publisher: Tim Dempsey Editor: Matt Rosenquist Design and Composition: Graphic World, Inc. Printing and Binding: Transcontinental Printing Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers is published by: Caxton Business & Legal, Inc. 27 North Wacker Drive, Suite 601 Chicago, IL 60606 Phone: +1 312 361 0821 Email: [email protected] First published: 2015 ISBN: 978-0-9964982-0-3 Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers © October 2015 Cover illustration by Tim Heraldo Copyright in individual chapters rests with the authors. No photocopying: copyright licenses do not apply. DISCLAIMER Navigating the Digital Age: The Defi nitive Cybersecurity Guide for Directors and Offi cers (the Guide) contains summary information about legal and regulatory aspects of cybersecurity governance and is current as of the date of its initial publication (October 2015). Although the Guide may be revised and updated at some time in the future, the publishers and authors do not have a duty to update the information contained in the Guide, and will not be liable for any failure to update such information. The publishers and authors make no representation as to the completeness or accuracy of any information contained in the Guide. This guide is written as a general guide only. It should not be relied upon as a substitute for specifi c professional advice.
    [Show full text]
  • Feature Article
    FEATURE ARTICLE PRIVACY VS. PUBLIC SAFETY: PROSECUTING AND DEFENDING CRIMINAL CASES IN THE POST-SNOWDEN ERA Jason M. Weinstein, William L. Drake, and Nicholas P. Silverman* I. INTRODUCTION ....................................... 729 II. PRIVACY VS.PUBLIC SAFETY—THE BATTLEGROUNDS ............ 732 A. Pushback from the Courts .......................... 732 1. Search Warrants for Seized Devices and Email Accounts.................................... 733 2. Searches of Cellphones Incident to Arrest............ 736 3. Use of Cell Tower Records ...................... 738 4. Cell Site Simulators............................ 741 B. Pushback from Providers........................... 743 1. Apple and Google Adopt New Encryption Policies ..... 744 2. Jurisdictional Challenges to Search Warrants......... 746 3. Less Cooperation, More Confrontation.............. 748 C. The Politics of Privacy on the Hill .................... 748 II. CHALLENGES FOR PROSECUTORS,OPPORTUNITIES FOR DEFENSE LAWYERS .......................................... 750 III. WHAT’S NEXT?...................................... 750 IV. CONCLUSION ........................................ 752 I. INTRODUCTION Over the past several years, there have been signs that federal courts at all levels—from magistrates to the Supreme Court—are increasingly struggling with the privacy implications of evidence-gathering in the digital age. Judicial discom- fort with certain law enforcement techniques was already simmering well before anyone ever heard of Edward Snowden, but it only intensified after
    [Show full text]
  • INTEGRITY 0510 Integrity Brochure
    Green Hills Software The most advanced RTOS technology The most secure & reliable RTOS The flagship of our family of operating systems, the INTEGRITY® RTOS, is built around a microkernel architecture that provides embedded systems with total reliability, absolute security, and maximum real-time response. With its leadership pedigree underscored by certifications from a range of industries, INTEGRITY sets the standard for real-time operating systems. Maximum performance, security, reliability Safety and security certifications From inception, the INTEGRITY RTOS was designed so that Since its release over 13 years ago, the INTEGRITY embedded developers could ensure their applications met RTOS has received the following certifications and the highest possible requirements for security, reliability, accreditations that testify to its robustness, enabling and performance. developers to achieve the highest levels of safety, security, and reliability in their designs. To achieve this, INTEGRITY uses hardware memory protec- s FAA: DO-178B, Level A tion to create secure partitions that isolate and protect s embedded applications. Secure partitions guarantee each Common Criteria: EAL 6+ High Robustness, the highest task the resources it needs to run correctly and fully pro- security level ever achieved for an operating system tect the operating system and user tasks from errant and s FDA: Class II and Class III medical devices malicious code—including denial-of-service attacks, s IEC: Industrial safety 61508 SIL 3 worms, and Trojan horses. s CENELEC:
    [Show full text]
  • How Much Is Too Much?
    LINCOLN MEMORIAL UNIVERSITY LAW REVIEW __________________________________ VOLUME 3 FALL 2015 _____________________________________ THE NSA’S EAVESDROPPING OPERATIONS AFTER THE SNOWDEN REVELATIONS: HOW MUCH IS TOO MUCH? JANUARY 2015 SYMPOSIUM TRANSCRIPT James Bamford MR. JACOB BAGGETT: I have the pleasure of introducing Mr. James Bamford as our first speaker. Mr. Bamford is an award-winning journalist in the field of national security. The New York Times calls him the nation's premier journalist on the subject of the NSA. And his most recent book, "The Shadow Factory", which is on sale outside by Union Avenue Books, was named by the Washington Post as one of the best books of the year. And he's here to discuss the transformation of the NSA since September 11th. Please welcome Mr. Bamford. (Applause) MR. JAMES BAMFORD: Thanks very much. It's really great being here. I want to thank Matt Lyon and Melanie Reid, Jacob Baggett, and Lauren Mullins for taking really great care of me. It's really great being here. The fact that this university is named after NSA AFTER SNOWDEN 116 President Lincoln is really quite an honor for me because I've always admired one of the things he's said. And that is the quote he has up here. I think if he had been President about a dozen years ago, we might not have gotten into the war in Iraq. If you read his quote there, "[k]ings had always been involving and impoverishing their people in wars, pretending generally, if not always, that the good of the people was the object."1 He was very much against attacking countries without getting congressional approval.
    [Show full text]
  • Surveillance After Snowden: Effective Espionage in an Age of Transparency By: Robin Simcox ISBN 978-1-909035-18-8
    SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Robin Simcox Published in 2015 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society 2015 The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: Surveillance after Snowden: Effective Espionage in an Age of Transparency By: Robin Simcox ISBN 978-1-909035-18-8 £10.00 where sold All rights reserved Front Cover Image: Laura Poitras/Praxis Films (© wikimedia.org). www.istockphoto.com SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Robin Simcox www.henryjacksonsociety.org 5 SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Acknowledgments Many of those who agreed to speak to me in the course of this project cannot be named. They all have my thanks, as does Elliot Soward for his research assistance. Additional thanks to Richard Black, Samantha Feuer, Mark Finegold, Oscar Isham, Livinia Mouries, Jeevan Vipinachandran, Chris Underwood and Quentin Wight. About the Author Robin Simcox is a Research Fellow at The Henry Jackson Society, where he works on terrorism and security issues. He has written for the likes of Foreign Affairs, Washington Post, Wall Street Journal, Los Angeles Times, The Guardian, New Republic and The Atlantic; and comments in the media for the likes of the BBC, CNN, Sky News, al-Jazeera and Fox News.
    [Show full text]
  • Following Snowden, German Uncertainty About Monitoring
    Following Snowden, German uncertainty about monitoring Andrew A. Adams Centre for Business Information Ethics, Meiji University, [email protected] Sarah Hosell HMKW University of Applied Sciences, [email protected] Kiyoshi Murata Centre for Business Information Ethics, Meiji University, [email protected] Abstract. Purpose – As part of an international study of knowledge of and attitudes to Snowden's revelations about the activities of the NSA/GCHQ, this paper deals with Germany, taking its socio-cultural and political environment surrounding privacy and state surveillance into account. Design/methodology/approach – A questionnaire was answered by 76 German University students. The quantitative responses to the survey were statistically analysed as well as qualitative considerations of free text answers. Findings – Snowden’s revelations have had an important influence over German students’ attitudes toward privacy and state surveillance, and shows concerns over the privacy risks associated with Internet activity. Practical implications – The study results imply a need to build a collective awareness of the importance of the right to privacy and its responsibilities, the available technological options for individuals to exert their own privacy and security and the democratic means to agree and enforce appropriate legal restrictions on state surveillance. Social implications – Young Germans support Snowden's actions and would be more willing to emulate him in Germany than the US. While many believe that people must give up some privacy and freedom for security, few seem to believe that current US or German approaches are valid and justified. Originality/value – This study is the first attempt to investigate the social impact of Snowden’s revelations on German students’ attitudes toward privacy and state surveillance as part of cross-cultural analyses between eight countries.
    [Show full text]