詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "Edward Snowden"
27件中 1-20の結果を表示しています
  • :AI がもたらす監視社会
    村田 潔
    情報経営
    2022年 84 巻
    発行日: 2022/11/05
    公開日: 2023/02/17
    会議録・要旨集 フリー
  • エドワード・スノーデンが教えてくれたこと
    *村田 潔, 折戸 洋子, 福田 康典
    経営情報学会 全国研究発表大会要旨集
    2017年 2017f 巻 F3-1
    発行日: 2017年
    公開日: 2017/11/30
    会議録・要旨集 フリー
    2013年6月からエドワード・スノーデンとその協力者によって行われた,米国の情報機関NSAによる無差別大量監視に関する内部告発が社会に与えた影響について,筆者らは2014年10月~11月に, 日本を含む8か国における,大学生を対象としたアンケート調査ならびに聞取り調査を行った。この国際比較研究の結果,「国家による監視」に対する社会的態度において,日本は調査を行った国の中で特異な存在であることが明らかになった。本研究報告ではこの調査結果に基づき,高度情報化が進む日本社会における「国家による監視」に対する人々の態度の特徴を示し,それがプライバシー保護や個人の自由と自律,民主主義のあり方などに対して持つ意味を明らかにする。
  • Jiyeon LEE, Kilho LEE
    IEICE Transactions on Information and Systems
    2022年 E105.D 巻 10 号 1817-1820
    発行日: 2022/10/01
    公開日: 2022/10/01
    ジャーナル フリー

    Privacy violations via spy cameras are becoming increasingly serious. With the recent advent of various smart home IoT devices, such as smart TVs and robot vacuum cleaners, spycam attacks that steal users' information are being carried out in more unpredictable ways. In this paper, we introduce a new spycam attack on a mobile WebVR environment. It is performed by a web attacker who maliciously accesses the back-facing cameras of victims' mobile devices while they are browsing the attacker's WebVR site. This has the power to allow the attacker to capture victims' surroundings even at the desired field of view through sophisticated content placement in VR scenes, resulting in serious privacy breaches for mobile VR users. In this letter, we introduce a new threat facing mobile VR and show that it practically works with major browsers in a stealthy manner.

  • 青木 崇
    情報管理
    2017年 60 巻 5 号 359-364
    発行日: 2017/08/01
    公開日: 2017/08/01
    ジャーナル フリー HTML
  • 情報管理
    2013年 56 巻 5 号 329-332
    発行日: 2013/08/01
    公開日: 2013/08/01
    ジャーナル フリー HTML
  • ―米英における技術変化のインパクト―
    土屋 大洋
    国際政治
    2015年 2015 巻 179 号 179_44-179_56
    発行日: 2015/02/15
    公開日: 2016/01/23
    ジャーナル フリー
    In response to an increasing number of cyber attacks, many governments have tasked their intelligence agencies with ensuring the safety and security of cyber space. This is a marked shift from the Cold War era when intelligence agencies’ main role was espionage in hostile countries. Their targets in this sense were clear and their tasks specific. However, perpetrators of cyber attacks today can hide themselves in the vast traffic of digital information. They might send computer viruses to a large indefinite number of computers and order them to attack a target by remote control. Or, they might take over someone else’s computer to eavesdrop others’ communications or to steal confidential information. This makes it difficult to identify the perpetrators of cyber attack incidents. With attribution becoming one of the core problems in cyber security, intelligence agencies are shifting their missions from espionage of fixed targets to wider surveillance of possible targets. This sometimes includes the general public.
    The shift has been generated by three changes in the information society. First, governments need to care for unknown risks rather than known threats. Intelligence agencies need to cast wider nets to detect possible signs of risk. Second, digital communications lowers the costs of collecting, processing, analyzing, and storing information. These lowered costs make surveillance easier. Finally, the prevalence of social media platforms like Twitter and Facebook has meant that people are putting an increasing amount of private and sensitive information online, available for collection by intelligence agencies. These changes have compelled intelligence agencies to shift their practices, with signal intelligence (SIGINT) increasingly becoming more effective than human intelligence (HUMINT). This paper looks at case studies of the United States and the United Kingdom to analyze the shift in intelligence practices in response to cyber security.
    In June 2013 former National Security Agency (NSA) contractor
    Edward
    Snowden
    revealed vast surveillance programs such as PRISM by the NSA. The British Government Communications Headquarters (GCHQ) was also revealed to be working in close cooperation with the NSA. Snowden’s revelations also shed light on hidden cooperation between intelligence agencies and information technology companies including Google, Microsoft, Apple, Facebook, Twitter and others. Without such cooperation, intelligence agencies face difficulties accessing the communications of possible targets. These activities have been amplified by cultures of anxieties after the 9/11 terrorist attacks. The U.S. and the U.K. might be exceptional cases, but other countries, including other democracies, are conducting surveillance in some ways. As more and more people get online, the needs for such forms of surveillance may grow. Governments worldwide must consider reasonable and proper ways to protect their nations in cyber space, while striking a balance between privacy and security. This is an unavoidable policy task to be considered in the information age.
  • Joonsang BAEK, Ilsun YOU
    IEICE Transactions on Information and Systems
    2016年 E99.D 巻 4 号 1251-1254
    発行日: 2016/04/01
    公開日: 2016/04/01
    ジャーナル フリー
    This paper presents an efficient subverted symmetric encryption scheme, which outputs a random initialization vector (IV). Compared with the available scheme of the same kind in the literature, our attack provides a saboteur (big brother) with much faster recovery of a key used in a victim's symmetric encryption scheme. Our result implies that care must be taken when a symmetric encryption scheme with a random IV such as randomized CBC is deployed.
  • Steven Rosefielde
    The Northeast Asian Economic Review
    2014年 2 巻 1 号 39-50
    発行日: 2014年
    公開日: 2023/02/10
    ジャーナル オープンアクセス
    American international relations with Russia until recently were governed by the Obama administration's 'reset policy.' Its goal was to work with the Kremlin to construct a harmonious global order based on democracy, free enterprise and universal human rights. This objective wasn't realized. The policy instead led to contentious engagement, and has been 'paused.' The failure was caused by both sides' overzealous double gaming, and raises the prospect of renewed cold war. The danger can be averted on a second best basis by both camps committing themselves to the principles of 'coexistence,' and mutual self-restraint.
  • Kazumaro AOKI
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    2019年 E102.A 巻 1 号 11-16
    発行日: 2019/01/01
    公開日: 2019/01/01
    ジャーナル 認証あり

    ICT development progresses, and many cryptographic algorithms are used. The most of cryptographic algorithms require assumptions to guarantee their security, but it is sometimes not clearly written. This causes many problems. This paper shows previous cases, and suggests to concede cryptographers and system developer each other from an industrial cryptographers viewpoint.

  • 奥山 俊宏
    マス・コミュニケーション研究
    2019年 94 巻 73-91
    発行日: 2019/01/31
    公開日: 2019/06/06
    ジャーナル フリー

    This research focuses on the U.S. Department of Justice’s investigation and

    prosecution of unauthorized disclosures of government information to the

    media. Based on a review of 21 cases, the research shows trends in the frequency

    of prosecutions.

      The investigations and prosecutions by the U.S. Department of Justice

    (DOJ) and the Federal Bureau of Investigation (FBI) with regard to leaks

    have gone through some transition. In the 20th century, only four cases were

    prosecuted. However, the situation has completely changed in this century.

    Under the Obama administration, there were eight charges against alleged

    leakers between 2009 and 2013. On the other hand, no such charges were filed

    from October 2013 to September 2016. Despite President Trump’s pledge for

    more prosecutions, there have only been five cases since his inauguration. This

    has occurred notwithstanding the frequency of leaks being about to “explode.”

      Several factors contribute to this volatility. Among these factors are the

    DOJ and FBI’s internal codes or norms with which the investigators and prosecutors

    must comply.

      For example, between 2005 and 2006, the normal constraints were relaxed,

    both in terms of investigative procedures with regard to the news media and

    the scope of the interpretation of the substantive law, such as the Espionage

    Act. As a result, the frequency of prosecutions increased between 2009 and

    2013.

      However, between 2013 and 2015, the constraints of investigations against

    the press strengthened significantly under the direction of President Obama.

    Therefore there was “downtime” between 2013 and 2016.

      The DOJ serving under the Trump administration announced in 2017 that

    it was reviewing policies affecting media subpoenas. The announcement can be

    regarded as evidence of the fact that the change of the norms or internal codes

    has played an important role in trends in the frequency of prosecutions.

  • 斉藤 賢爾, 内田 晃秀
    電子情報通信学会 通信ソサイエティマガジン
    2023年 17 巻 3 号 219-
    発行日: 2023年
    公開日: 2023/12/01
    ジャーナル フリー
  • 情報管理
    2015年 58 巻 1 号 78-81
    発行日: 2015/04/01
    公開日: 2015/04/01
    ジャーナル フリー HTML
  • 福田 充
    マス・コミュニケーション研究
    2016年 89 巻 45-60
    発行日: 2016/07/31
    公開日: 2017/10/06
    ジャーナル フリー
    Along with the evolution of the media, risk society and globalization have made progress. Media technology manages the risks that result as these functions become means of control. With the progress of risk society and globalization,“ crisis management” has become an important theme in the world.   The problem with the National Security Agency (NSA) monitoring global communication has become apparent in the Snowden incident. Changes in media have also caused evolutions in intelligence activities: state power to monitor the world, social structure to preserve state secrets in the name of security, and risk management. Computers and the internet are supporting the social infrastructure.   Under the pretext of security (e.g., counterterrorism), monitoring technology has evolved and been introduced to society. As with intelligence activity, this technology is a technique for preventing potential risks that could create crises. Big data is used for economic marketing in corporate activities. It has been used as a tool for intelligence activities by political power.  The Arab Spring was described as “Revolution 2.0.” Public Diplomacy 2.0 is using social media (e.g., Twitter and Facebook). While bonding with intelligence activities, this development has affected international relations. In this way, media evolution and risk management society have progressed in the world.
  • Mikio Fujiwara, Masahide Sasaki
    情報通信研究機構ジャーナル
    2017年 64 巻 1 号 011-021
    発行日: 2017年
    公開日: 2021/04/20
    研究報告書・技術報告書 オープンアクセス
  • Ali Ferdowsi
    中東レビュー
    2016年 3 巻 33-48
    発行日: 2016年
    公開日: 2019/12/03
    ジャーナル フリー HTML

    2014年6月のイスラーム国(以下ISIS)のメディアへの華々しい登場以降、米国政治を規定する主要な要因の1つとして「恐怖心」がかつてない程の重要性を帯びてきている。本稿では政治心理学的な分析手法を援用しつつ、ISISが何よりも「テロ攻撃集団」としていかに「恐怖心」を醸成するための洗練された戦略を実践しているか、またそれが統計的には圧倒的に中東現地のムスリム一般住民を標的にしており、本来的にS.ハンティントン的な「西欧文明に敵対するイスラーム」という問題を内包していないにもかかわらず、米国エスタブリッシュメントによる他者への「恐怖心」によって如何に本質が曲解されて「ムスリム排斥」のような情緒的な政治主張に向かわせているかの契機を分析する。

    筆者は論稿中でマキャベリから以降最近に至るまでの政治学関係の議論を渉猟しつつ、「恐怖心」をめぐる問題が「テロル」との関係においていかに扱われてきたかを再検討し、西欧のメディアにおける「テロ集団」としてのISISの登場が政治学的な観点から提起している問題の新しさと古さを跡付けようとする。同時に現在の米国社会を覆っているイスラモフォビアの情緒的反応についてもその淵源が古くかつ政治的に根深い問題から発していることを指摘している。

    本論稿の分析は直接的にはISISによって政治的な雰囲気が大きく変容するなかで大統領選挙の年を迎えている米国の国内政治を扱うものであるが、ここでの議論は「アラブの春」以降のシリア危機に発する難民問題に直面している欧州(EU)や、2015年11月のパリのテロ多発事件以降緊迫した雰囲気に覆われているフランスの政治状況にも通底しており、その意味では偶々2014年にISISによって惹起されたとはいえそれ自体が自律的な展開の契機を内包する現代社会の政治的な抑圧的システムのグローバルな拡大と拡散に警鐘を鳴らそうとするものである。

    (文責・鈴木均)

  • Junko TAKAHASHI, Keiichi OKABE, Hiroki ITOH, Xuan-Thuy NGO, Sylvain GUILLEY, Ritu-Ranjan SHRIVASTWA, Mushir AHMED, Patrick LEJOLY
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    2022年 E105.A 巻 3 号 311-325
    発行日: 2022/03/01
    公開日: 2022/03/01
    [早期公開] 公開日: 2021/09/30
    ジャーナル 認証あり

    The growing threat of Hardware Trojans (HT) in the System-on-Chips (SoC) industry has given way to the embedded systems researchers to propose a series of detection methodologies to identify and detect the presence of Trojan circuits or logics inside a host design in the various stages of the chip design and manufacturing process. Many state of the art works propose different techniques for HT detection among which the popular choice remains the Side-Channel Analysis (SCA) based methods that perform differential analysis targeting the difference in consumption of power, change in electromagnetic emanation or the delay in propagation of logic in various paths of the circuit. Even though the effectiveness of these methods are well established, the evaluation is carried out on simplistic models such as AES coprocessors and the analytical approaches used for these methods are limited by some statistical metrics such as direct comparison of EM traces or the T-test coefficients. In this paper, we propose two new detection methodologies based on Machine Learning algorithms. The first method consists in applying the supervised Machine Learning (ML) algorithms on raw EM traces for the classification and detection of HT. It offers a detection rate close to 90% and false negative smaller than 5%. In the second method, we propose an outlier/novelty algorithms based approach. This method combined with the T-test based signal processing technique, when compared with state-of-the-art, offers a better performance with a detection rate close to 100% and a false positive smaller than 1%. In different experiments, the false negative is nearly the same level than the false positive and for that reason the authors only show the false positive value on the results. We have evaluated the performance of our method on a complex target design: RISC-V generic processor. Three HTs with their corresponding sizes: 0.53%, 0.27% and 0.09% of the RISC-V processors are inserted for the experimentation. In this paper we provide elaborative details of our tests and experimental process for reproducibility. The experimental results show that the inserted HTs, though minimalistic, can be successfully detected using our new methodology.

  • 米中対立の先に待ち構える三項対立
    小宮山 功一朗
    Nextcom
    2020年 2020 巻 43 号 14-23
    発行日: 2020/09/01
    公開日: 2024/03/06
    研究報告書・技術報告書 フリー
  • Kazuki YONEYAMA, Reo YOSHIDA, Yuto KAWAHARA, Tetsutaro KOBAYASHI, Hitoshi FUJI, Tomohide YAMAMOTO
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    2018年 E101.A 巻 6 号 929-944
    発行日: 2018/06/01
    公開日: 2018/06/01
    ジャーナル 認証あり

    In this paper, we propose the first identity-based dynamic multi-cast key distribution (ID-DMKD) protocol which is secure against maximum exposure of secret information (e.g., secret keys and session-specific randomness). In DMKD protocols, users share a common session key without revealing any information of the session key to the semi-honest server, and can join/leave to/from the group at any time even after establishing the session key. Most of the known DMKD protocols are insecure if some secret information is exposed. Recently, an exposure resilient DMKD protocol was introduced, however, each user must manage his/her certificate by using the public-key infrastructure. We solve this problem by constructing the DMKD protocol authenticated by user's ID (i.e., without certificate). We introduce a formal security definition for ID-DMKD by extending the previous definition for DMKD. We must carefully consider exposure of the server's static secret key in the ID-DMKD setting because exposure of the server's static secret key causes exposure of all users' static secret keys. We prove that our protocol is secure in our security model in the standard model. Another advantage of our protocol is scalability: communication and computation costs of each user are independent from the number of users. Furthermore, we show how to extend our protocol to achieve non-interactive join by using certificateless encryption. Such an extension is useful in applications that the group members frequently change like group chat services.

  • 村上 陽亮
    Nextcom
    2015年 2015 巻 24 号 25-
    発行日: 2015/12/01
    公開日: 2024/03/15
    研究報告書・技術報告書 フリー
  • 遅野井 茂雄
    ラテンアメリカ・レポート
    2013年 30 巻 2 号 26-35
    発行日: 2013年
    公開日: 2021/09/02
    解説誌・一般情報誌 フリー
feedback
Top