All swept up

An initial classification of NSA surveillance technology

M. Cayford, C. Van Gulijk, P. H A J M Van Gelder

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

Abstract

The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in government oversight mechanisms. Methods and findings: The methods for this research begin with a review and analysis of the leaked NSA information and documents. Further, a study of articles delving deeper into the NSA programs is conducted. Lastly, the research focuses on a technical understanding of the technology involved through readings and interviews with experts. It is found that these numerous programs can be classified in a few categories of surveillance technology. This initial study forms for the basis for evaluation of the effectiveness of these technologies.

Original languageEnglish
Title of host publicationSafety and Reliability
Subtitle of host publicationMethodology and Applications
EditorsTomasz Nowakowski, Marek Młyńczak, Anna Jodejko-Pietruczuk, Sylwia Werbińska-Wojchiechowska
PublisherCRC Press/Balkema
Pages643-650
Number of pages8
ISBN (Print)9781138026810
Publication statusPublished - 1 Sep 2014
Externally publishedYes
EventEuropean Safety and Reliability Conference - Wroclaw, Poland
Duration: 14 Sep 201418 Sep 2014

Conference

ConferenceEuropean Safety and Reliability Conference
Abbreviated titleESREL 2014
CountryPoland
CityWroclaw
Period14/09/1418/09/14

Cite this

Cayford, M., Van Gulijk, C., & Van Gelder, P. H. A. J. M. (2014). All swept up: An initial classification of NSA surveillance technology. In T. Nowakowski, M. Młyńczak, A. Jodejko-Pietruczuk, & S. Werbińska-Wojchiechowska (Eds.), Safety and Reliability: Methodology and Applications (pp. 643-650). CRC Press/Balkema.
Cayford, M. ; Van Gulijk, C. ; Van Gelder, P. H A J M. / All swept up : An initial classification of NSA surveillance technology. Safety and Reliability: Methodology and Applications. editor / Tomasz Nowakowski ; Marek Młyńczak ; Anna Jodejko-Pietruczuk ; Sylwia Werbińska-Wojchiechowska. CRC Press/Balkema, 2014. pp. 643-650
@inbook{efaf8dbc37f744b38f025b4cb8b9cbc6,
title = "All swept up: An initial classification of NSA surveillance technology",
abstract = "The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in government oversight mechanisms. Methods and findings: The methods for this research begin with a review and analysis of the leaked NSA information and documents. Further, a study of articles delving deeper into the NSA programs is conducted. Lastly, the research focuses on a technical understanding of the technology involved through readings and interviews with experts. It is found that these numerous programs can be classified in a few categories of surveillance technology. This initial study forms for the basis for evaluation of the effectiveness of these technologies.",
author = "M. Cayford and {Van Gulijk}, C. and {Van Gelder}, {P. H A J M}",
year = "2014",
month = "9",
day = "1",
language = "English",
isbn = "9781138026810",
pages = "643--650",
editor = "Tomasz Nowakowski and Młyńczak, {Marek } and Anna Jodejko-Pietruczuk and Sylwia Werbińska-Wojchiechowska",
booktitle = "Safety and Reliability",
publisher = "CRC Press/Balkema",

}

Cayford, M, Van Gulijk, C & Van Gelder, PHAJM 2014, All swept up: An initial classification of NSA surveillance technology. in T Nowakowski, M Młyńczak, A Jodejko-Pietruczuk & S Werbińska-Wojchiechowska (eds), Safety and Reliability: Methodology and Applications. CRC Press/Balkema, pp. 643-650, European Safety and Reliability Conference, Wroclaw, Poland, 14/09/14.

All swept up : An initial classification of NSA surveillance technology. / Cayford, M.; Van Gulijk, C.; Van Gelder, P. H A J M.

Safety and Reliability: Methodology and Applications. ed. / Tomasz Nowakowski; Marek Młyńczak; Anna Jodejko-Pietruczuk; Sylwia Werbińska-Wojchiechowska. CRC Press/Balkema, 2014. p. 643-650.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - All swept up

T2 - An initial classification of NSA surveillance technology

AU - Cayford, M.

AU - Van Gulijk, C.

AU - Van Gelder, P. H A J M

PY - 2014/9/1

Y1 - 2014/9/1

N2 - The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in government oversight mechanisms. Methods and findings: The methods for this research begin with a review and analysis of the leaked NSA information and documents. Further, a study of articles delving deeper into the NSA programs is conducted. Lastly, the research focuses on a technical understanding of the technology involved through readings and interviews with experts. It is found that these numerous programs can be classified in a few categories of surveillance technology. This initial study forms for the basis for evaluation of the effectiveness of these technologies.

AB - The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in government oversight mechanisms. Methods and findings: The methods for this research begin with a review and analysis of the leaked NSA information and documents. Further, a study of articles delving deeper into the NSA programs is conducted. Lastly, the research focuses on a technical understanding of the technology involved through readings and interviews with experts. It is found that these numerous programs can be classified in a few categories of surveillance technology. This initial study forms for the basis for evaluation of the effectiveness of these technologies.

UR - http://www.scopus.com/inward/record.url?scp=84906707960&partnerID=8YFLogxK

UR - https://www.crcpress.com/Safety-and-Reliability-Methodology-and-Applications/Nowakowski-Mlynczak-Jodejko-Pietruczuk-Werbinska-Wojciechowska/p/book/9781138026810

M3 - Chapter

SN - 9781138026810

SP - 643

EP - 650

BT - Safety and Reliability

A2 - Nowakowski, Tomasz

A2 - Młyńczak, Marek

A2 - Jodejko-Pietruczuk, Anna

A2 - Werbińska-Wojchiechowska, Sylwia

PB - CRC Press/Balkema

ER -

Cayford M, Van Gulijk C, Van Gelder PHAJM. All swept up: An initial classification of NSA surveillance technology. In Nowakowski T, Młyńczak M, Jodejko-Pietruczuk A, Werbińska-Wojchiechowska S, editors, Safety and Reliability: Methodology and Applications. CRC Press/Balkema. 2014. p. 643-650