skip to main content
10.1145/2073276.2073288acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

Public security: simulations need to replace conventional wisdom

Published:12 September 2011Publication History

ABSTRACT

Is more always better? Is conventional wisdom always the right guideline in the development of security policies that have large opportunity costs? Is the evaluation of security measures after their introduction the best way? In the past, these questions were frequently left unasked before the introduction of many public security measures. In this paper we put forward the new paradigm that agent-based simulations are an effective and most likely the only sustainable way for the evaluation of public security measures in a complex environment. As a case-study we provide a critical assessment of the power of Telecommunications Data Retention (TDR), which was introduced in most European countries, despite its huge impact on privacy. Up to now it is unknown whether TDR has any benefits in the identification of terrorist dark nets in the period before an attack. The results of our agent-based simulations suggest, contrary to conventional wisdom, that the current practice of acquiring more data may not necessarily yield higher identification rates.

References

  1. http://www.fmsasg.com/Products/SentinelVisualizer.Google ScholarGoogle Scholar
  2. http://socnetv.sourceforge.net.Google ScholarGoogle Scholar
  3. Bundesministerium der Justiz, Antwort der Bundesregierung zum Fragenkatalog des 1. Senats des Bundesverfassungsgerichts in den Verfahren 1 BvR 256/08, 1 BvR 263/08, 1BvR 586/08, http://www.vorratsdatenspeicherung.de/images/StN_BMJ_2009-06-02.pdf, 2009.Google ScholarGoogle Scholar
  4. Directive 2006/24/EC of the European Parliament and of the Council of 03/15/2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC.Google ScholarGoogle Scholar
  5. Curtea Constitut¸ionalØa a RomÆaniei. decision (Decizia Nr.1.258) on 10/09/2009 regarding laws no. 298/2008 and no. 506/2004.Google ScholarGoogle Scholar
  6. G. An, Q. Mi, J. Dutta-Moscato, and Y. Vodovotz. Agent-based models in translational systems biology. Wiley Interdisciplinary Reviews: Systems Biology and Medicine, 1(2):159--171, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for exploring and manipulating networks. 2009.Google ScholarGoogle Scholar
  8. V. Batagelj and A. Mrvar. Pajek - analysis and visualization of large networks. In Graph Drawing Software, pages 77--103. Springer, Berlin, 2003.Google ScholarGoogle Scholar
  9. C. Bianchi, P. Cirillo, M. Gallegati, and P. Vagliasindi. Validating and calibrating agent-based models: A case study. Computational Economics, 30:245--264, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Bonabeau. Agent-based modeling: Methods and techniques for simulating human systems. Proc. Nat. Acad. Sci., 99(Suppl 3):7280--7287, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Buchanan. Economics: Meltdown modelling. Nature, 460:680--682, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  12. Bundesverfassungsgericht. case 1 BvR 256/08 as of 2.3.2010, 1--345.Google ScholarGoogle Scholar
  13. T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley, Hoboken, 2. edition, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Ebel, L-I. Mielsch, and S. Bornholdt. Scale-free topology of e-mail networks. Phys. Rev. E, 66:035103(R), 2002.Google ScholarGoogle ScholarCross RefCross Ref
  15. P. Kampstra. Beanplot: A boxplot alternative for visual comparison of distributions. Journal of Statistical Software, Code Snippets, 28(1):1--9, 11 2008.Google ScholarGoogle Scholar
  16. C. Kurz and F. Rieger. Stellungnahme des Chaos Computer Clubs zur Vorratsdatenspeicherung, 2009. 256/08, 1 BvR 263/08 und 1 BvR 586/08 http://www.ccc.de/updates/2009/vds-gutachten.Google ScholarGoogle Scholar
  17. X. Li, W. Mao, D. Zeng, and F.-Y. Wang. Agent-based social simulation and modeling in social computing. In C. Yang, H. Chen, M. Chau, K. Chang, S.-D. Lang, P. Chen, R. Hsieh, D. Zeng, F.-Y. Wang, K. Carley, W. Mao, and J. Zhan, editors, Intelligence and Security Informatics, volume 5075 of Lecture Notes in Computer Science, pages 401--412. Springer, Berlin, Heidelberg, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. M. Macal and M. J. North. Tutorial on agent-based modeling and simulation. In Proc. 37th Conf. Winter Sim., WSC'05, pages 2--15, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Memon, D. Hicks, D. Muhammad Akbar Hussain, and H. L. Larsen. Practical algorithms and mathematical models for destabilizing terrorist networks. In IEEE Military Communications Conference (MILCOM 2007), Proceedings, pages 1--7. IEEE Press, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  20. N. Memon, K. C. Kristoffersen, D. L. Hicks, and H. L. Larsen. Detecting critical regions in covert networks: A case study of 9/11 terrorists network. In Proc. 2nd Int. Conf. on Availability, Reliability and Security, ARES 2007, pages 861--870. IEEE Comp. Soc., 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. E. J. Newman. Assortative mixing in networks. Phys. Rev. Lett., 89(30):208701-1, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. Onella, J. Saramäki, J. Hyvönen, G. Szabó, D. Lazer, K. Kaski, J. Kertéz, and A. Barabási. Structure and tie strengths in mobile communication networks. Proc. Nat. Acad. Sci., 104(18):7332--7336, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  23. J. Onella, J. Saramäki, J. Hyvönen, G. Szabó, M. Menezes, K. Kaski, A. Barabási, and J. Kertéz,. Analysis of a large-scale weighted network of one-to-one human communication. New J. Phys., 9:179, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  24. L. Schintler, S. Gorman, A. Reggiani, R. Patuelli, and P. Nijkamp. Scale-free phenomena in communication networks: A cross-atlantic comparison. In 43rd European Congress of the Regional Science Association, 2003.Google ScholarGoogle Scholar
  25. P. Shannon, A. Markiel, O. Ozier, N. S. Baliga, J. T. Wang, D. Ramage, N. Amin, B. Schwikowski, and T. Ideker. Cytoscape: A Software Environment for Integrated Models of Biomolecular Interaction Networks. Genome Research, 13(11):2498--2504, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  26. Ústavní soud České republiky. decision (PR 22/11) on 03/22/201.Google ScholarGoogle Scholar
  27. W.H. Press et al. Numerical Recipies in C. Cambridge University Press, Cambridge, 1995.Google ScholarGoogle Scholar
  28. Y. Xia, C. Tse, W. Tam, F. Lau, and M. Small. Scale-freeuser-network approach to telephone network traffic analysis. Phys. Rev. E, 72:026116-1, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  29. Y. Xia, C. K. Tse, W. M. Tam, F. C. M. Lau, and M. Small. Telephone traffic analysis based on a scale-free user network. In International Symposium on Nonlinear Theory and Its Applications (NOLTA'05, pages 110--113, 2005.Google ScholarGoogle Scholar
  30. J. Xu and H. Chen. Criminal network analysis and visualization. Commun. ACM, 48:100--107, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Xu and H. Chen. The topology of dark networks. Commun. ACM, 51(10):58--65, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Public security: simulations need to replace conventional wisdom

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      NSPW '11: Proceedings of the 2011 New Security Paradigms Workshop
      September 2011
      152 pages
      ISBN:9781450310789
      DOI:10.1145/2073276

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 September 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate62of170submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader