Snitches Get Stitches: On The Difficulty of Whistleblowing

06/25/2020
by   Mansoor Ahmed-Rengers, et al.
0

One of the most critical security protocol problems for humans is when you are betraying a trust, perhaps for some higher purpose, and the world can turn against you if you're caught. In this short paper, we report on efforts to enable whistleblowers to leak sensitive documents to journalists more safely. Following a survey of cases where whistleblowers were discovered due to operational or technological issues, we propose a game-theoretic model capturing the power dynamics involved in whistleblowing. We find that the whistleblower is often at the mercy of motivations and abilities of others. We identify specific areas where technology may be used to mitigate the whistleblower's risk. However we warn against technical solutionism: the main constraints are often institutional.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/23/2018

ARCHANGEL: Trusted Archives of Digital Public Documents

We present ARCHANGEL; a de-centralised platform for ensuring the long-te...
research
07/11/2018

Privacy, Security and Trust in the Internet of Neurons

Arpanet, Internet, Internet of Services, Internet of Things, Internet of...
research
06/19/2023

Evaluation of an information security management system at a Mexican higher education institution

The purpose of this research was to know the degree of administrative kn...
research
08/30/2019

Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation

Customers of cloud services have to trust the cloud providers, as they c...
research
07/05/2022

Electric Vehicle Charging: a Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)

The increased use of smart Electric Vehicles (EVs) and Plug-in Electric ...
research
12/26/2020

Towards Assessing Critical Infrastructures Cyber-Security Culture During Covid-19 Crisis: A Tailor-Made Survey

This paper outlines the design and development of a survey targeting the...
research
04/13/2023

Murder by design: Design thinking approach for pre-emptive cybernetic security design

In an ever more connected world, awareness has grown towards the hazards...

Please sign up or login with your details

Forgot password? Click here to reset