CACM: February 2015 What to Do About Our Broken Cyberspace Cyberspace has become an instrument of universal mass surveillance and intrusion threatening everyone’s creativity and freedom of expression. Intelligence services of the most powerful countries gobble up most of the world’s long-distance communications traffic and are able to hack into almost any cellphone, personal computer, and data center to seize information. Preparations are escalating for preemptive cyberwar because a massive attack could instantly shut down almost everything.1 Failure to secure endpoints—cellphones, computers, data centers—and securely encrypt communications end-to-end has turned cyberspace into an active war zone with sporadic attacks. Methods I describe here can, however, reduce the danger of preemptive cyberwar and make mass seizure of the content of citizens’ private information practically infeasible, even for the most technically sophisticated intelligence agencies. Authentication businesses, incorporated in different countries, could publish independent directories of public keys that can then be crossreferenced with other personal and corporate directories. Moreover, hardware that can be verified by independent parties as operating according to formal specifications has been developed that can make mass break-ins using operating system vulnerabilities practically infeasible.2 Security can be further enhanced through interactive biometrics (instead of passwords) for continuous authentication and through interactive incremental revelation of information so large amounts of it cannot be stolen in one go. The result would be strong, publicly evaluated cryptography embedded in independently verified hardware endpoints to produce systems that are dramatically more secure than current ones. FBI Director James Comey has proposed compelling U.S. companies to install backdoors in every cellphone and personal computer, as well as in other network-enabled products and services, so the U.S. government can (with authorization of U.S. courts) hack in undetected. This proposal would actually increase the danger of cyberwar and decrease the competitiveness of almost all U.S. industry due to the emerging Internet of Things, which will soon include almost everything, thus enabling mass surveillance of citizens’ private information. Comey’s proposal has already increased mistrust by foreign governments and citizens alike, with the result that future exports of U.S. companies will have to be certified by corporate officers and verified by independent third parties not to have backdoors available to the U.S. government. Following some inevitable next major terror attack, the U.S. government will likely be granted bulk access to all private information in data centers of U.S. companies. Consequently, creating a more decentralized cyberspace is fundamental to preserving creativity and freedom of expression worldwide. Statistical procedures running in data centers are used to try to find correlations in vast amounts of inconsistent information. An alternative method that can be used on citizens’ cellphones and personal computers has been developed to robustly process inconsistent information2 thereby facilitating new business implementations that are more decentralized—and much more secure. Carl Hewitt, Palo Alto, CA References 1. Harris, S. @War: The Rise of the Military-Internet Complex. Eamon Dolan/Houghton Mifflin Harcourt. Boston, MA, 2014. 2. Hewitt, C. and Woods, J., assisted by Spurr, J., Editors. Inconsistency Robustness. College Publications. London, U.K., 2014.

National Summit on Educational Games -

Carl Hewitt, Palo Alto, CA. References. 1. Harris, S. @War: The Rise of the Military-Internet Complex. Eamon Dolan/Houghton Mifflin. Harcourt. Boston, MA, 2014 ...

156KB Sizes 1 Downloads 174 Views

Recommend Documents

National Zika Summit Programme_102516.pdf
Try one of the apps below to open or edit this item. National Zika Summit Programme_102516.pdf. National Zika Summit Programme_102516.pdf. Open. Extract.

5th R2K National Summit 20-‐22 February 2015 - Right2Know ...
Feb 22, 2015 - We seek a country and a world where we all have the right to know .... Campaigning for free set top boxes to be made available to all, and for the list of demands .... We will increase our social media presence, and participation ...

Note on commented games - GitHub
The starting point for debate upon a classic joseki. 4. An other ... At the start of this game, White made grave errors. ..... 3: At move 28, Black cannot start a ko.

International Summit on Emergency Medicine and ... -
Away from the hustle and bustle of the city life, Pondicherry is a quiet little town on the southern coast of India that has a special ambi- ence, not felt anywhere ...

Communqiue of 25th Extra-ordinary Summit on South ...
GOVERNMENT ON THE SITUATION IN SOUTH SUDAN. ADDIS ABABA, 13th March 2014. The IGAD Assembly of Heads of State and Government held its 25th.

Final Communique of 28th IGAD Extra Ordinary Summit on Somalia ...
Encouraged the voluntary return of all Somali refugees to. participate in ... Page 3 of 3. Final Communique of 28th IGAD Extra Ordinary Summit on Somalia.pdf.

Summit Report on Central American Children Seeking Refuge.pdf ...
Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Summit Report on Central American Children Seeking Refuge.pdf. Summit Report on Central American Chi

A Philosophy on Educational Humanism
development of intellect and critical curiosity. We equip our ... Learning, an inquiry-driven desire to know ... important and enduring than any standardized test.

A Ueto on Uideo Games
mean parents whom kids grum- ble about on the playgound. We're among that ever-shrink- ing goup of parents lmown as video game holdouts. We refuse to buy a video game set. Around. Christmastirne, my son made a wish list, and I noticed that. Nintendo

Contracts as games on event structures - UniCa
May 4, 2015 - distrusting, we study concurrent games on event structures; there, participants may play by firing events in ..... In this section we present a game-based model for contracts, originally introduced in [12]. ...... is that if a client co

Declaration of the Summit on Financial Markets ... - the United Nations
Nov 15, 2008 - 1. We, the Leaders of the Group of Twenty, held an initial meeting in .... not stifle innovation, and encourages expanded trade in financial products and ... Further, we shall strive to reach agreement this year on modalities that lead

Axelrod's Metanorm Games on Networks
May 1, 2011 - triplets per node play key roles in sustaining or collapsing cooperation. ... system in which each player can punish other players that deviate.

Contracts as games on event structures - UniCa
May 4, 2015 - The following lemma establishes a confluence result, namely: given a set of fired events, the order in which we pick them to build the remainder ...

NETWORK FORMATION GAMES BASED ON ...
networks where the goal of the agents is to strategically pro- duce, disseminate and consume information) have been for- malized and studied for the first time in Zhang and van der. Schaar [6]-[7]. In these works, agents are considered to be heteroge

GCC Developers' Summit
GCC requires that both builds use the same inline decisions and similar optimization flags to ensure that the control-flow graph (CFG) that is instrumented in the.

Video games on prescription
professing to give medical advice, according to the NHS. Commissioning Board.2. There are games designed to help cancer patients stick with drug therapy, games aimed at allowing patients to receive physiotherapy at home, and games that claim to treat

Summit Report on Central American Children Seeking Refuge 5.0.pdf
Summit Report on Central American Children Seeking Refuge 5.0.pdf. Summit Report on Central American Children Seeking Refuge 5.0.pdf. Open. Extract.

national conference on -
The greenery, the dazzling stream and the freshness and simplicity around will make the campus life fascinating and exciting. One will enjoy staying in the ...