CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Incentives for and Against Pervasive Monitoring Threats

by Sheema Zia, Afshar Alam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 7
Year of Publication: 2016
Authors: Sheema Zia, Afshar Alam
10.5120/ijca2016910234

Sheema Zia, Afshar Alam . Incentives for and Against Pervasive Monitoring Threats. International Journal of Computer Applications. 149, 7 ( Sep 2016), 6-10. DOI=10.5120/ijca2016910234

@article{ 10.5120/ijca2016910234,
author = { Sheema Zia, Afshar Alam },
title = { Incentives for and Against Pervasive Monitoring Threats },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 7 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number7/26007-2016910234/ },
doi = { 10.5120/ijca2016910234 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:54:04.611670+05:30
%A Sheema Zia
%A Afshar Alam
%T Incentives for and Against Pervasive Monitoring Threats
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 7
%P 6-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Pervasive is defined as ‘spreading widely throughout an area or a group of people (Especially of an unwelcome influence or effect’. Pervasive monitoring is simply a case of continuous monitoring of people for the sake of checking conduct or watching over. After the recent Snowdonia occurrence, where Edward Snowden leaked classified information about the ongoing surveillance programs by the NSA of United States, pervasive monitoring became a hot topic of discussion and if it was beneficial for the users or internet or posed as a threat. The objective of the paper is to analyze whether pervasive monitoring is a threat or a necessity and also to compare the benefits and challenges of pervasive monitoring. The comparison between the importance of pervasive monitoring and that of its ill-effect argue that it helps in combating terrorism as it is unbiased and non-targeted. Moreover, it does not collect the meta-data but, only collects it. Besides its importance, it is also essential for network administrators to have plaintext for managing their networks. On the other hand, the STRINT workshop by IETF called it a technical attack same as any attack as it leads to some chilling effects like self censorship etc. If pervasive monitoring is being done by an organisation, it can lead to the database holder or admin to exercise undue influence on the employees of the organisation undergoing the monitoring. Even though it is against the basic human right to privacy but the public does not seem to care too much about it. The pervasive nature of this monitoring might help the governments but also has adverse affect. The beneficial and destructive effects of pervasive monitoring are tabulated according to different fields pervasive monitoring is done for. This includes the fields of organisation, future, software, law, networking and healthcare. Considering all the researched and analyzed fields, it can be stated that pervasive monitoring should be allowed at some levels as it becomes a necessity and also have some standards and protocols so as not to be misused for personal issues or motives. The standards and policies should be defined for all internet traffic without any bias whatsoever.

References
  1. Stephen Farrell “Report from the Strengthening the Internet (STRINT) Workshop”, rfc7687, December 2015
  2. S. Farrell, IETF, BCP188, May 2014, https://tools.ietf.org/html/rfc7258
  3. Discussion with Jari Arrko: IETF and Pervasive monitoring, Netnod News Magazine, spring 2014
  4. Tim Bray, amazon employee, http://www.tbray.org/ongoing/When/201x/2014/05/13/Pervasive-Monitoring-is-an-Attack
  5. Joe St Sauver, PhD, Scientist, Farsight Security,Inc. Senior Technical Advisor, M3AAWG, SECURECOMM, Dallas TX; “What must we do? Industry reactions to Pervasive Monitoring Programs
  6. Dana Polatin-Reuben “Pervasive Monitoring as an Insider Threat An Adapted Model”
  7. Karen O’Donoghue, STRINT workshop focuses on pervasive monitoring, IETF Journal July 2014
  8. Andrew Odlyzko, Privacy, Economics, and Price Discrimination on the Internet, Revised version, July 27, 2003
  9. Carl Colwill, “Human factors in information security: The insider threat Who can you trust these days” information security technical report 14 ( 2 0 0 9 ) 1 8 6 e1 9
  10. Judith Symonds, Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools and Applications, Auckland University of Technology, New Zealand
  11. Cappelli, D., Moore, A., and Trzeciak, R., 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Upper Saddle River, NJ: Pearson Education, Inc.
  12. Dave Thaler, November 6, 2013, summary of recent pervasive monitoring threats
  13. Cyber Threat Intelligence-how to get ahead of cybercrime by Ernst and Young Ltd. from November 2014
  14. Jeremy Martin, Beginner’s Guide to the Internet Underground, 31 may 2015
  15. Arkko, J., "Privacy and Networking Functions", March 2014,http://www.arkko.com/ietf/strint/draft-arkko-strint-networking-functions.txt
  16. Pouwelse, J., "The Shadow Internet: liberation from Surveillance, Censorship and Servers", Work in Progress, draft-pouwelse-perpass-shadow-internet-00, February 2014.
  17. Melinda Shore, Karen O’Donoghue, Trust problems in pervasive monitoring, https://www.w3.org/2014/strint/papers/58.pdf
  18. S.Kent, BBN technologies, “Opportunistic security as countermeasure to Pervasive Monitoring”, Network Working Group, April 2014
  19. Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) Authentication Protocol", RFC 4252, DOI 10.17487/RFC4252, January 2006, http://www.rfc-editor.org/info/rfc4252
  20. Olaf Kolkman, Chief ITO, Internet Society, http://www.internetsociety.org/blog/tech-matters/2015/02/talking-encryption-routing-security-ipv6-and-more-mobile-world-congress
  21. Ryan Gallagher, Operation Auroragold, Dewayne Net Archives, December 2014
  22. Tech Desk, ‘WhatsApp end-to-end encryption: How it works and what it means for users’, April 2016
  23. Asheeta Regidi, ‘WhatsApp end-to-end encryption is legal in India, but not for long’, April 2016
  24. Dr. Glyn Lawson, Dr. Alex Stedmon, Hostile Intent and Counter-terrorism- Human factors Theory and application
  25. Melinda Shore, Karen O’Donoghue, Trust problems in pervasive monitoring, https://www.w3.org/2014/strint/papers/58.pdf
  26. Richardson, M. and D. Redelmeier, "Opportunistic Encryption using the Internet Key Exchange (IKE)", RFC4322, December 2005
  27. David Meyer, “how the internet engineers are fighting mass surveillance”, December 30, 2014
Index Terms

Computer Science
Information Sciences

Keywords

Pervasive monitoring threat necessity comparison