Featured Research

from universities, journals, and other organizations

Protection for whistleblowers: New system would allow for secret data transfer

Date:
June 19, 2013
Source:
Freie Universitaet Berlin
Summary:
Scientists are developing a system that would make it possible for an individual to submit data over the Internet while remaining unobserved.

Volker Roth, a professor of computer science at Freie Universitδt Berlin, is working in a project called AdLeaks to create a system that would make it possible for an individual to submit data over the Internet while remaining unobserved. The AdLeaks system is currently being checked and tested as part of the EU CONFINE project. A first version of the source code is available as download for interested persons. Unobserved data transfer is relevant, for example, for so-called whistleblowers, persons with inside information who inform the public about corporate or official corruption.

Related Articles


Examples of whistleblowers are Mark Klein, and more recently Edward Snowden, who revealed the extent to which the U.S. National Security Agency (NSA) monitors the Internet.

The current discussion focuses heavily on the PRISM program that, as recently became publicly known, allows the NSA to access user data stored by Google, Apple, Microsoft, and other companies. What is often forgotten is that the NSA also accesses data directly from the glass fiber connections over which a great deal of the communication in the Internet takes place. This includes the contents of the affected communication, as well as the call data showing who communicated with whom and when.

"You have to admire the civil courage of Edward Snowden, who sacrifices his future for his democratic convictions, when he reports abuse," says Professor Volker Roth. Not all whistleblowers dare to step out in public, which is often associated with stigma, loss of employment, or criminal prosecution.. "Even whistleblowers who wish to remain anonymous, take risks when they pass information through the Internet because the information collected by the NSA allows the organization to trace connection data calls made once or Internet connections far into the past." Encryption would not change anything in that regard. It is better to use anonymizing services such as Tor that route the connections through several computers and disguise their origin.. The New Yorker magazine advises potential whistleblowers to do just that and report anonymous information to its own strongbox service.

Whether this step is sufficient for an organization such as the NSA remains unclear. "Just using Tor might make one appear suspicious," says Volker Roth. The Tor network also tries to establish a low latency of connections, which may enable a traffic analysis, whereby a wiretap measures when users send data and when data reach their goal. Sufficient commonality makes it possible to assign connections to individuals. "If both user and server are based in the U.S., the NSA might be able to perform such traffic analysis," according to Roth.

It was this risk via traffic analysis that led him, along with a group of students, to seek another solution. In cooperation with computer science professor Sven Dietrich from the Stevens Institute of Technology in New Jersey, they are developing a system that, even with full surveillance of the Internet, permits data transmission that cannot be easily traced.

The so-called AdLeaks system robs the connection data of their significance.. It utilizes small programs, with which most websites are designed to be dynamic and interactive. Embedded in popular websites, this type of program automatically encrypts and transmits empty messages to the AdLeaks server, whenever such a website is viewed. Whistleblowers can use a modified browser that encrypts confidential messages instead of empty messages. An observer monitoring the Internet cannot distinguish between the two. He/she cannot draw any meaning from the connection data because all Internet users transmit the same type of data, and no intention can be presumed. The necessary software is distributed in a similar manner to all users, without having to be downloaded.


Story Source:

The above story is based on materials provided by Freie Universitaet Berlin. Note: Materials may be edited for content and length.


Cite This Page:

Freie Universitaet Berlin. "Protection for whistleblowers: New system would allow for secret data transfer." ScienceDaily. ScienceDaily, 19 June 2013. <www.sciencedaily.com/releases/2013/06/130619122034.htm>.
Freie Universitaet Berlin. (2013, June 19). Protection for whistleblowers: New system would allow for secret data transfer. ScienceDaily. Retrieved October 31, 2014 from www.sciencedaily.com/releases/2013/06/130619122034.htm
Freie Universitaet Berlin. "Protection for whistleblowers: New system would allow for secret data transfer." ScienceDaily. www.sciencedaily.com/releases/2013/06/130619122034.htm (accessed October 31, 2014).

Share This



More Computers & Math News

Friday, October 31, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Samsung's Incredible Shrinking Smartphone Profits

Samsung's Incredible Shrinking Smartphone Profits

Reuters - Business Video Online (Oct. 30, 2014) — The world's top mobile maker is under severe pressure, delivering a 60 percent drop in Q3 profit as its handset business struggles. Turning it around may not prove easy, says Reuters' Jon Gordon. Video provided by Reuters
Powered by NewsLook.com
Ban On Wearable Cameras In Movie Theaters Surprises No One

Ban On Wearable Cameras In Movie Theaters Surprises No One

Newsy (Oct. 30, 2014) — The Motion Picture Association of America and the National Association of Theatre Owners now prohibit wearable cameras such as Google Glass. Video provided by Newsy
Powered by NewsLook.com
Microsoft Launches Fitness Band After Accidental Reveal

Microsoft Launches Fitness Band After Accidental Reveal

Newsy (Oct. 30, 2014) — Microsoft accidentally revealed its upcoming fitness band on Wednesday, so the company went ahead and announced it. Video provided by Newsy
Powered by NewsLook.com
Mind-Controlled Prosthetic Arm Restores Amputee Dexterity

Mind-Controlled Prosthetic Arm Restores Amputee Dexterity

Reuters - Innovations Video Online (Oct. 29, 2014) — A Swedish amputee who became the first person to ever receive a brain controlled prosthetic arm is able to manipulate and handle delicate objects with an unprecedented level of dexterity. The device is connected directly to his bone, nerves and muscles, giving him the ability to control it with his thoughts. Matthew Stock reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:

Strange & Offbeat Stories

 

Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins