75 research outputs found
Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct
Sexual misconduct is prevalent in workplace and education settings
but stigma and risk of further damage deter many victims from
seeking justice. Callisto, a non-profit that has created an online sexual assault reporting platform for college campuses, is expanding its
work to combat sexual assault and harassment in other industries.
In this new product, users will be invited to an online "matching
escrow" that will detect repeat perpetrators and create pathways
to support for victims. Users submit encrypted data about their
perpetrator, and this data can only be decrypted by the Callisto
Options Counselor (a lawyer), when another user enters the identity of the same perpetrator. If the perpetrator identities match,
both users will be put in touch independently with the Options
Counselor, who will connect them to each other (if appropriate) and
help them determine their best path towards justice. The client relationships with the Options Counselors are structured so that any
client-counselor communications would be privileged. A combination of client-side encryption, encrypted communication channels,
oblivious pseudo-random functions, key federation, and Shamir
Secret Sharing keep data confidential in transit, at rest, and during
the matching process with the guarantee that only the lawyer ever
has access to user submitted data, and even then only when a match
is identified.Accepted manuscrip
Finding Safety in Numbers with Secure Allegation Escrows
For fear of retribution, the victim of a crime may be willing to report it
only if other victims of the same perpetrator also step forward. Common
examples include 1) identifying oneself as the victim of sexual harassment,
especially by a person in a position of authority or 2) accusing an influential
politician, an authoritarian government, or ones own employer of corruption. To
handle such situations, legal literature has proposed the concept of an
allegation escrow: a neutral third-party that collects allegations anonymously,
matches them against each other, and de-anonymizes allegers only after
de-anonymity thresholds (in terms of number of co-allegers), pre-specified by
the allegers, are reached.
An allegation escrow can be realized as a single trusted third party;
however, this party must be trusted to keep the identity of the alleger and
content of the allegation private. To address this problem, this paper
introduces Secure Allegation Escrows (SAE, pronounced "say"). A SAE is a group
of parties with independent interests and motives, acting jointly as an escrow
for collecting allegations from individuals, matching the allegations, and
de-anonymizing the allegations when designated thresholds are reached. By
design, SAEs provide a very strong property: No less than a majority of parties
constituting a SAE can de-anonymize or disclose the content of an allegation
without a sufficient number of matching allegations (even in collusion with any
number of other allegers). Once a sufficient number of matching allegations
exist, the join escrow discloses the allegation with the allegers' identities.
We describe how SAEs can be constructed using a novel authentication protocol
and a novel allegation matching and bucketing algorithm, provide formal proofs
of the security of our constructions, and evaluate a prototype implementation,
demonstrating feasibility in practice.Comment: To appear in NDSS 2020. New version includes improvements to writing
and proof. The protocol is unchange
Shield: Secure Allegation Escrow System with Stronger Guarantees
The rising issues of harassment, exploitation, corruption, and other forms of abuse have led victims to seek comfort by acting in unison against common perpetrators (e.g., #MeToo movement). One way to curb these issues is to install allegation escrow systems that allow victims to report such incidents. The escrows are responsible for identifying victims of a common perpetrator and taking the necessary action to bring justice to them. However, users hesitate to participate in these systems due to the fear of such sensitive reports being leaked to perpetrators, who may further misuse them. Thus, to increase trust in the system, cryptographic solutions are being designed to realize secure allegation escrow (SAE) systems.
In the work of Arun et al. (NDSS\u2720), which presents the state-of-the-art solution, we identify attacks that can leak sensitive information and compromise victim privacy. We also report issues present in prior works that were left unidentified. To arrest all these breaches, we put forth an SAE system that prevents the identified attacks and retains the salient features from all prior works. The cryptographic technique of secure multi-party computation (MPC) serves as the primary underlying tool in designing our system. At the heart of our system lies a new duplicity check protocol and an improved matching protocol. We also provide additional features such as allegation modification and deletion, which were absent in the state of the art. To demonstrate feasibility, we benchmark the proposed system with state-of-the-art MPC protocols and report the cost of processing an allegation. Different settings that affect system performance are analyzed, and the reported values showcase the practicality of our solution
Computational Transformation of the Public Sphere : Theories and Case Studies
This book is an edited collection of MA research paper on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidental election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It considers how digitilization can serve to emancipate women through ride-sharing, and how it leads to the question of robot rights. It considers fake news and algorithmic governance with respect to case studies of the Chinese social credit system, the US FICO credit score, along with Facebook, Twitter, Cambridge Analytica and the European effort to regulate and protect data usage.Non peer reviewe
Computational Transformation of the Public Sphere: Theories and Cases
This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It considers how digitilization can serve to emancipate women through ride-sharing, and how it leads to the question of robot rights. It considers fake news and algorithmic governance with respect to case studies of the Chinese social credit system, the US FICO credit score, along with Facebook, Twitter, Cambridge Analytica and the European effort to regulate and protect data usage
Computational transformation of the public sphere : theories and case studies
Computational Transformation of the Public Sphere is the organic product of what turned out to be an effective collaboration between MA students and their professor in the Global Politics and Communication program in the Faculty of Social Sciences at the University of Helsinki, in the Fall of 2019. The course, Philosophy of Politics and Communication, is a gateway course into this MA program. As I had been eager to conduct research on the impact of new digital technologies and artificial intelligence (AI) on democratic governance, I saw this course as an opportunity to not only share, but also further develop my knowledge of this topic
You Wanna Play Rough? : The Unlikely Partnership of the Italian Mafia and Butch Lesbians in Greenwich Village, 1945-1968
During economic and political upheaval in Europe beginning in the late-1910s and dramatically progressing throughout the 1920s, young Italian men emigrated to the United States to earn decent salaries to bring back to their families across the ocean. However, some single men embraced the opportunities of New York City and its diversified neighborhoods. Since xenophobic sanctions forced disenfranchised minorities into confined spaces and immigrants tended to find comfort settling in neighborhoods with well-established ethnic enclaves, this pushed Italian immigrants into the same space as butch lesbians in a counterculture place referred to as Greenwich Village on the west side of Lower Manhattan. Once settled in, those with ties to the original Sicilian Mafia and who intended to institute a new American sector of the criminal enterprise, joined arms with butch lesbians who felt ostracized by their queer community for their conformity to heteronormative-based approaches towards jobs, hobbies, and relationships. This thesis explores the ways the unlikely partnership of the Italian Mafia and butch lesbians transgressed traditional Italian-machismo dynamics, particularly in the way that female masculinity complemented Mafia tradition. Through first-hand accounts, one can see that the alliance revolved around achieving the American Dream—the primary bond between the butches and Italians. While Italian immigrants were criminalized in American society, the butches’ conformity to patriarchal structures severed their ties with femme lesbians and especially openly-radical gay men. In accepting, or rather ignoring, their estrangement from society and closely-affiliated social groups, the butch lesbians and Italian Mafia established a profitable business that spanned the post-World War II era in the most populous city in the country
Figure
This open access book shows how figures, figuring, and configuration are used to understand complex, contemporary problems. Figures are images, numbers, diagrams, data and datasets, turns-of-phrase, and representations. Contributors reflect on the history of figures as they have transformed disciplines and fields of study, and how methods of figuring and configuring have been integral to practices of description, computation, creation, criticism and political action. They do this by following figures across fields of social science, medicine, art, literature, media, politics, philosophy, history, anthropology, and science and technology studies. Readers will encounter figures as various as Je Suis Charlie, #MeToo, social media personae, gardeners, asthmatic children, systems configuration management and cloud computing – all demonstrate the methodological utility and contemporary relevance of thinking with figures. This book serves as a critical guide to a world of figures and a creative invitation to “go figure!
The Society of the Selfie
This book explores how the Internet is connected to the global crisis of liberal democracy. Today, self-promotion is at the heart of many human relationships. The selfie is not just a social media gesture people love to hate. It is also a symbol of social reality in the age of the Internet. Through social media people have new ways of rating and judging themselves and one another, via metrics such as likes, shares, followers and friends. There are new thirsts for authenticity, outlets for verbal aggression, and social problems. Social media culture and neoliberalism dovetail and amplify one another, feeding social estrangement. With neoliberalism, psychosocial wounds are agitated and authoritarianism is provoked. Yet this new sociality also inspires resistance and political mobilisation. Illustrating ideas and trends with examples from news and popular culture, the book outlines and applies theories from Debord, Foucault, Fromm, Goffman, and Giddens, among others. Topics covered include the global history of communication technologies, personal branding, echo chamber effects, alienation and fear of abnormality. Information technologies provide channels for public engagement where extreme ideas reach farther and faster than ever before, and political differences are widened and inflamed. They also provide new opportunities for protest and resistance
- …