Open-source intelligence and privacy by design

被引:29
|
作者
Koops, Bert-Jaap [1 ]
Hoepman, Jaap-Henk [2 ,3 ]
Leenes, Ronald [1 ]
机构
[1] Tilburg Univ, TILT Tilburg Inst Law Technol & Soc, NL-5000 LE Tilburg, Netherlands
[2] TNO, Amsterdam, Netherlands
[3] Radboud Univ Nijmegen, Inst Comp & Informat Sci, NL-6525 ED Nijmegen, Netherlands
关键词
OSINT; Open sources; Social networking; Privacy by design; Techno-regulation; Policy mark-up language; Revocable privacy;
D O I
10.1016/j.clsr.2013.09.005
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience of the VIRTUOSO platform will be used to illustrate this strategy. Ideally, the technical development process of OSINT tools is combined with legal and ethical safeguards in such a way that the resulting products have a legally compliant design, are acceptable within society (social embedding), and at the same time meet in a sufficiently flexible way the varying requirements of different end-user groups. This paper uses the analytic framework of privacy design strategies (minimise, separate, aggregate, hide, inform, control, enforce, and demonstrate), arguing that two approaches for embedding legal compliance seem promising to explore in particular. One approach is the concept of revocable privacy with spread responsibility. The other approach uses a policy mark-up language to define Enterprise Privacy Policies, which determine appropriate data handling. Both approaches are tested against three requirements that seem particularly suitable for a 'compliance by design' approach in OSINT: purpose specification; collection and use limitation and data minimisation; and data quality (up-to-dateness). For each requirement, the paper analyses whether and to what extent the approach could work to build in the requirement in the system. The paper concludes that legal requirements cannot be embedded fully in OSINT systems. However, it is possible to embed functionalities that facilitate compliance in allowing end-users to determine to what extent they adopt a 'privacy-by-design' approach when procuring an OSINT platform, extending it with plugins, and fine-tuning it to their needs. The paper argues that developers of OSINT platforms and networks have a responsibility to make sure that end-users are enabled to use privacy by design, by allowing functionalities such as revocable privacy and a policy-enforcement language. (C) 2013 Bert-Jaap Koops, Jaap-Henk Hoepman and Ronald Leenes. Published by Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:676 / 688
页数:13
相关论文
共 50 条
  • [21] The design of an open-source carbonate reservoir model
    Gomes, Jorge Costa
    Geiger, Sebastian
    Arnold, Daniel
    PETROLEUM GEOSCIENCE, 2022, 28 (03)
  • [22] Open-source Framework for the Concurrent Design of CubeSats
    Gateau, Thibault
    Senaneuch, Lucien
    Cordero, Sophia Salas
    Vingerhoeds, Rob
    7TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (IEEE ISSE 2021), 2021,
  • [23] A System for Automated Open-Source Threat Intelligence Gathering and Management
    Gao, Peng
    Liu, Xiaoyuan
    Choi, Edward
    Soman, Bhavna
    Mishra, Chinmaya
    Farris, Kate
    Song, Dawn
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2716 - 2720
  • [24] On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources
    Tundis, Andrea
    Ruppert, Samuel
    Muehlhaeuser, Max
    COMPUTATIONAL SCIENCE - ICCS 2020, PT II, 2020, 12138 : 453 - 467
  • [25] Open-Source Intelligence Educational Resources: A Visual Perspective Analysis
    Francined Herrera-Cubides, Jhon
    Alonso Gaona-Garcia, Paulo
    Sanchez-Alonso, Salvador
    APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 25
  • [26] IPASS: A Novel Open-Source Intelligence Password Scoring System
    Hubbard, Joshua
    Bendiab, Gueltoum
    Shiaeles, Stavros
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 90 - 95
  • [27] Prediction of accepting journal impact with open-source artificial intelligence
    Bacchi, Stephen
    Lam, Lydia
    CLINICAL AND EXPERIMENTAL OPHTHALMOLOGY, 2022, 50 (08): : 969 - 969
  • [28] DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities
    Wu, Susheng
    Chen, Bin
    Sun, MingXu
    Duan, Renyu
    Zhang, Qixiang
    Huang, Cheng
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 598 - 605
  • [29] VoicePAT: An Efficient Open-Source Evaluation Toolkit for Voice Privacy Research
    Meyer, Sarina
    Miao, Xiaoxiao
    Vu, Ngoc Thang
    IEEE Open Journal of Signal Processing, 2024, 5 : 257 - 265
  • [30] VoicePAT: An Efficient Open-Source Evaluation Toolkit for Voice Privacy Research
    Meyer, Sarina
    Miao, Xiaoxiao
    Vu, Ngoc Thang
    IEEE OPEN JOURNAL OF SIGNAL PROCESSING, 2024, 5 : 257 - 265