skip to main content
10.1145/2752952.2752978acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
invited-talk

Post-Snowden Threat Models

Published:01 June 2015Publication History

ABSTRACT

In June 2013 Edward Snowden leaked a large collection of documents that describe the capabilities and technologies of the NSA and its allies. Even to security experts the scale, nature and impact of some of the techniques revealed was surprising. A major consequence is the increased awareness of the public at large of the existence of highly intrusive mass surveillance techniques. There has also been some impact in the business world, including a growing interest in companies that (claim to) develop end-to-end secure solutions. There is no doubt that large nation states and organized crime have carefully studied the techniques and are exploring which ones they can use for their own benefit. But after two years, there is little progress in legal or governance measures to address some of the excesses by increasing accountability. Moreover, the security research community seems to have been slow to respond to the new threat landscape. In this lecture we analyze these threats and speculate how they could be countered.

Index Terms

  1. Post-Snowden Threat Models

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '15: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies
            June 2015
            242 pages
            ISBN:9781450335560
            DOI:10.1145/2752952

            Copyright © 2015 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 June 2015

            Check for updates

            Qualifiers

            • invited-talk

            Acceptance Rates

            SACMAT '15 Paper Acceptance Rate17of59submissions,29%Overall Acceptance Rate177of597submissions,30%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader