75 research outputs found

    Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct

    Get PDF
    Sexual misconduct is prevalent in workplace and education settings but stigma and risk of further damage deter many victims from seeking justice. Callisto, a non-profit that has created an online sexual assault reporting platform for college campuses, is expanding its work to combat sexual assault and harassment in other industries. In this new product, users will be invited to an online "matching escrow" that will detect repeat perpetrators and create pathways to support for victims. Users submit encrypted data about their perpetrator, and this data can only be decrypted by the Callisto Options Counselor (a lawyer), when another user enters the identity of the same perpetrator. If the perpetrator identities match, both users will be put in touch independently with the Options Counselor, who will connect them to each other (if appropriate) and help them determine their best path towards justice. The client relationships with the Options Counselors are structured so that any client-counselor communications would be privileged. A combination of client-side encryption, encrypted communication channels, oblivious pseudo-random functions, key federation, and Shamir Secret Sharing keep data confidential in transit, at rest, and during the matching process with the guarantee that only the lawyer ever has access to user submitted data, and even then only when a match is identified.Accepted manuscrip

    Finding Safety in Numbers with Secure Allegation Escrows

    Full text link
    For fear of retribution, the victim of a crime may be willing to report it only if other victims of the same perpetrator also step forward. Common examples include 1) identifying oneself as the victim of sexual harassment, especially by a person in a position of authority or 2) accusing an influential politician, an authoritarian government, or ones own employer of corruption. To handle such situations, legal literature has proposed the concept of an allegation escrow: a neutral third-party that collects allegations anonymously, matches them against each other, and de-anonymizes allegers only after de-anonymity thresholds (in terms of number of co-allegers), pre-specified by the allegers, are reached. An allegation escrow can be realized as a single trusted third party; however, this party must be trusted to keep the identity of the alleger and content of the allegation private. To address this problem, this paper introduces Secure Allegation Escrows (SAE, pronounced "say"). A SAE is a group of parties with independent interests and motives, acting jointly as an escrow for collecting allegations from individuals, matching the allegations, and de-anonymizing the allegations when designated thresholds are reached. By design, SAEs provide a very strong property: No less than a majority of parties constituting a SAE can de-anonymize or disclose the content of an allegation without a sufficient number of matching allegations (even in collusion with any number of other allegers). Once a sufficient number of matching allegations exist, the join escrow discloses the allegation with the allegers' identities. We describe how SAEs can be constructed using a novel authentication protocol and a novel allegation matching and bucketing algorithm, provide formal proofs of the security of our constructions, and evaluate a prototype implementation, demonstrating feasibility in practice.Comment: To appear in NDSS 2020. New version includes improvements to writing and proof. The protocol is unchange

    Shield: Secure Allegation Escrow System with Stronger Guarantees

    Get PDF
    The rising issues of harassment, exploitation, corruption, and other forms of abuse have led victims to seek comfort by acting in unison against common perpetrators (e.g., #MeToo movement). One way to curb these issues is to install allegation escrow systems that allow victims to report such incidents. The escrows are responsible for identifying victims of a common perpetrator and taking the necessary action to bring justice to them. However, users hesitate to participate in these systems due to the fear of such sensitive reports being leaked to perpetrators, who may further misuse them. Thus, to increase trust in the system, cryptographic solutions are being designed to realize secure allegation escrow (SAE) systems. In the work of Arun et al. (NDSS\u2720), which presents the state-of-the-art solution, we identify attacks that can leak sensitive information and compromise victim privacy. We also report issues present in prior works that were left unidentified. To arrest all these breaches, we put forth an SAE system that prevents the identified attacks and retains the salient features from all prior works. The cryptographic technique of secure multi-party computation (MPC) serves as the primary underlying tool in designing our system. At the heart of our system lies a new duplicity check protocol and an improved matching protocol. We also provide additional features such as allegation modification and deletion, which were absent in the state of the art. To demonstrate feasibility, we benchmark the proposed system with state-of-the-art MPC protocols and report the cost of processing an allegation. Different settings that affect system performance are analyzed, and the reported values showcase the practicality of our solution

    Computational Transformation of the Public Sphere : Theories and Case Studies

    Get PDF
    This book is an edited collection of MA research paper on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidental election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It considers how digitilization can serve to emancipate women through ride-sharing, and how it leads to the question of robot rights. It considers fake news and algorithmic governance with respect to case studies of the Chinese social credit system, the US FICO credit score, along with Facebook, Twitter, Cambridge Analytica and the European effort to regulate and protect data usage.Non peer reviewe

    Computational Transformation of the Public Sphere: Theories and Cases

    Get PDF
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It considers how digitilization can serve to emancipate women through ride-sharing, and how it leads to the question of robot rights. It considers fake news and algorithmic governance with respect to case studies of the Chinese social credit system, the US FICO credit score, along with Facebook, Twitter, Cambridge Analytica and the European effort to regulate and protect data usage

    Computational transformation of the public sphere : theories and case studies

    Get PDF
    Computational Transformation of the Public Sphere is the organic product of what turned out to be an effective collaboration between MA students and their professor in the Global Politics and Communication program in the Faculty of Social Sciences at the University of Helsinki, in the Fall of 2019. The course, Philosophy of Politics and Communication, is a gateway course into this MA program. As I had been eager to conduct research on the impact of new digital technologies and artificial intelligence (AI) on democratic governance, I saw this course as an opportunity to not only share, but also further develop my knowledge of this topic

    You Wanna Play Rough? : The Unlikely Partnership of the Italian Mafia and Butch Lesbians in Greenwich Village, 1945-1968

    Get PDF
    During economic and political upheaval in Europe beginning in the late-1910s and dramatically progressing throughout the 1920s, young Italian men emigrated to the United States to earn decent salaries to bring back to their families across the ocean. However, some single men embraced the opportunities of New York City and its diversified neighborhoods. Since xenophobic sanctions forced disenfranchised minorities into confined spaces and immigrants tended to find comfort settling in neighborhoods with well-established ethnic enclaves, this pushed Italian immigrants into the same space as butch lesbians in a counterculture place referred to as Greenwich Village on the west side of Lower Manhattan. Once settled in, those with ties to the original Sicilian Mafia and who intended to institute a new American sector of the criminal enterprise, joined arms with butch lesbians who felt ostracized by their queer community for their conformity to heteronormative-based approaches towards jobs, hobbies, and relationships. This thesis explores the ways the unlikely partnership of the Italian Mafia and butch lesbians transgressed traditional Italian-machismo dynamics, particularly in the way that female masculinity complemented Mafia tradition. Through first-hand accounts, one can see that the alliance revolved around achieving the American Dream—the primary bond between the butches and Italians. While Italian immigrants were criminalized in American society, the butches’ conformity to patriarchal structures severed their ties with femme lesbians and especially openly-radical gay men. In accepting, or rather ignoring, their estrangement from society and closely-affiliated social groups, the butch lesbians and Italian Mafia established a profitable business that spanned the post-World War II era in the most populous city in the country

    Figure

    Get PDF
    This open access book shows how figures, figuring, and configuration are used to understand complex, contemporary problems. Figures are images, numbers, diagrams, data and datasets, turns-of-phrase, and representations. Contributors reflect on the history of figures as they have transformed disciplines and fields of study, and how methods of figuring and configuring have been integral to practices of description, computation, creation, criticism and political action. They do this by following figures across fields of social science, medicine, art, literature, media, politics, philosophy, history, anthropology, and science and technology studies. Readers will encounter figures as various as Je Suis Charlie, #MeToo, social media personae, gardeners, asthmatic children, systems configuration management and cloud computing – all demonstrate the methodological utility and contemporary relevance of thinking with figures. This book serves as a critical guide to a world of figures and a creative invitation to “go figure!

    The Society of the Selfie

    Get PDF
    This book explores how the Internet is connected to the global crisis of liberal democracy. Today, self-promotion is at the heart of many human relationships. The selfie is not just a social media gesture people love to hate. It is also a symbol of social reality in the age of the Internet. Through social media people have new ways of rating and judging themselves and one another, via metrics such as likes, shares, followers and friends. There are new thirsts for authenticity, outlets for verbal aggression, and social problems. Social media culture and neoliberalism dovetail and amplify one another, feeding social estrangement. With neoliberalism, psychosocial wounds are agitated and authoritarianism is provoked. Yet this new sociality also inspires resistance and political mobilisation. Illustrating ideas and trends with examples from news and popular culture, the book outlines and applies theories from Debord, Foucault, Fromm, Goffman, and Giddens, among others. Topics covered include the global history of communication technologies, personal branding, echo chamber effects, alienation and fear of abnormality. Information technologies provide channels for public engagement where extreme ideas reach farther and faster than ever before, and political differences are widened and inflamed. They also provide new opportunities for protest and resistance
    • …
    corecore