ABSTRACT
Is more always better? Is conventional wisdom always the right guideline in the development of security policies that have large opportunity costs? Is the evaluation of security measures after their introduction the best way? In the past, these questions were frequently left unasked before the introduction of many public security measures. In this paper we put forward the new paradigm that agent-based simulations are an effective and most likely the only sustainable way for the evaluation of public security measures in a complex environment. As a case-study we provide a critical assessment of the power of Telecommunications Data Retention (TDR), which was introduced in most European countries, despite its huge impact on privacy. Up to now it is unknown whether TDR has any benefits in the identification of terrorist dark nets in the period before an attack. The results of our agent-based simulations suggest, contrary to conventional wisdom, that the current practice of acquiring more data may not necessarily yield higher identification rates.
- http://www.fmsasg.com/Products/SentinelVisualizer.Google Scholar
- http://socnetv.sourceforge.net.Google Scholar
- Bundesministerium der Justiz, Antwort der Bundesregierung zum Fragenkatalog des 1. Senats des Bundesverfassungsgerichts in den Verfahren 1 BvR 256/08, 1 BvR 263/08, 1BvR 586/08, http://www.vorratsdatenspeicherung.de/images/StN_BMJ_2009-06-02.pdf, 2009.Google Scholar
- Directive 2006/24/EC of the European Parliament and of the Council of 03/15/2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC.Google Scholar
- Curtea Constitut¸ionalØa a RomÆaniei. decision (Decizia Nr.1.258) on 10/09/2009 regarding laws no. 298/2008 and no. 506/2004.Google Scholar
- G. An, Q. Mi, J. Dutta-Moscato, and Y. Vodovotz. Agent-based models in translational systems biology. Wiley Interdisciplinary Reviews: Systems Biology and Medicine, 1(2):159--171, 2009.Google ScholarCross Ref
- M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for exploring and manipulating networks. 2009.Google Scholar
- V. Batagelj and A. Mrvar. Pajek - analysis and visualization of large networks. In Graph Drawing Software, pages 77--103. Springer, Berlin, 2003.Google Scholar
- C. Bianchi, P. Cirillo, M. Gallegati, and P. Vagliasindi. Validating and calibrating agent-based models: A case study. Computational Economics, 30:245--264, 2007. Google ScholarDigital Library
- E. Bonabeau. Agent-based modeling: Methods and techniques for simulating human systems. Proc. Nat. Acad. Sci., 99(Suppl 3):7280--7287, 2002.Google ScholarCross Ref
- M. Buchanan. Economics: Meltdown modelling. Nature, 460:680--682, 2009.Google ScholarCross Ref
- Bundesverfassungsgericht. case 1 BvR 256/08 as of 2.3.2010, 1--345.Google Scholar
- T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley, Hoboken, 2. edition, 2006. Google ScholarDigital Library
- H. Ebel, L-I. Mielsch, and S. Bornholdt. Scale-free topology of e-mail networks. Phys. Rev. E, 66:035103(R), 2002.Google ScholarCross Ref
- P. Kampstra. Beanplot: A boxplot alternative for visual comparison of distributions. Journal of Statistical Software, Code Snippets, 28(1):1--9, 11 2008.Google Scholar
- C. Kurz and F. Rieger. Stellungnahme des Chaos Computer Clubs zur Vorratsdatenspeicherung, 2009. 256/08, 1 BvR 263/08 und 1 BvR 586/08 http://www.ccc.de/updates/2009/vds-gutachten.Google Scholar
- X. Li, W. Mao, D. Zeng, and F.-Y. Wang. Agent-based social simulation and modeling in social computing. In C. Yang, H. Chen, M. Chau, K. Chang, S.-D. Lang, P. Chen, R. Hsieh, D. Zeng, F.-Y. Wang, K. Carley, W. Mao, and J. Zhan, editors, Intelligence and Security Informatics, volume 5075 of Lecture Notes in Computer Science, pages 401--412. Springer, Berlin, Heidelberg, 2008. Google ScholarDigital Library
- C. M. Macal and M. J. North. Tutorial on agent-based modeling and simulation. In Proc. 37th Conf. Winter Sim., WSC'05, pages 2--15, 2005. Google ScholarDigital Library
- N. Memon, D. Hicks, D. Muhammad Akbar Hussain, and H. L. Larsen. Practical algorithms and mathematical models for destabilizing terrorist networks. In IEEE Military Communications Conference (MILCOM 2007), Proceedings, pages 1--7. IEEE Press, 2007.Google ScholarCross Ref
- N. Memon, K. C. Kristoffersen, D. L. Hicks, and H. L. Larsen. Detecting critical regions in covert networks: A case study of 9/11 terrorists network. In Proc. 2nd Int. Conf. on Availability, Reliability and Security, ARES 2007, pages 861--870. IEEE Comp. Soc., 2007. Google ScholarDigital Library
- M. E. J. Newman. Assortative mixing in networks. Phys. Rev. Lett., 89(30):208701-1, 2002.Google ScholarCross Ref
- J. Onella, J. Saramäki, J. Hyvönen, G. Szabó, D. Lazer, K. Kaski, J. Kertéz, and A. Barabási. Structure and tie strengths in mobile communication networks. Proc. Nat. Acad. Sci., 104(18):7332--7336, 2007.Google ScholarCross Ref
- J. Onella, J. Saramäki, J. Hyvönen, G. Szabó, M. Menezes, K. Kaski, A. Barabási, and J. Kertéz,. Analysis of a large-scale weighted network of one-to-one human communication. New J. Phys., 9:179, 2007.Google ScholarCross Ref
- L. Schintler, S. Gorman, A. Reggiani, R. Patuelli, and P. Nijkamp. Scale-free phenomena in communication networks: A cross-atlantic comparison. In 43rd European Congress of the Regional Science Association, 2003.Google Scholar
- P. Shannon, A. Markiel, O. Ozier, N. S. Baliga, J. T. Wang, D. Ramage, N. Amin, B. Schwikowski, and T. Ideker. Cytoscape: A Software Environment for Integrated Models of Biomolecular Interaction Networks. Genome Research, 13(11):2498--2504, 2003.Google ScholarCross Ref
- Ústavní soud České republiky. decision (PR 22/11) on 03/22/201.Google Scholar
- W.H. Press et al. Numerical Recipies in C. Cambridge University Press, Cambridge, 1995.Google Scholar
- Y. Xia, C. Tse, W. Tam, F. Lau, and M. Small. Scale-freeuser-network approach to telephone network traffic analysis. Phys. Rev. E, 72:026116-1, 2005.Google ScholarCross Ref
- Y. Xia, C. K. Tse, W. M. Tam, F. C. M. Lau, and M. Small. Telephone traffic analysis based on a scale-free user network. In International Symposium on Nonlinear Theory and Its Applications (NOLTA'05, pages 110--113, 2005.Google Scholar
- J. Xu and H. Chen. Criminal network analysis and visualization. Commun. ACM, 48:100--107, June 2005. Google ScholarDigital Library
- J. Xu and H. Chen. The topology of dark networks. Commun. ACM, 51(10):58--65, 2008. Google ScholarDigital Library
Index Terms
- Public security: simulations need to replace conventional wisdom
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Information Systems Security Audits in Cameroon's Public Administration
ICEGOV '18: Proceedings of the 11th International Conference on Theory and Practice of Electronic GovernanceA few decades ago, most of the Sub-Saharan African countries such as the Republic of Cameroon joined the rest of the world in adopting ICTs to improve the delivery of government services. The Government of Cameroon regards e-Government with numerous ...
Data Security and Trustworthiness in Online Public Services: An Assessment of Portuguese Institutions
ICEGOV '19: Proceedings of the 12th International Conference on Theory and Practice of Electronic GovernanceProviding public services through the internet is an effective approach towards an encompassing number of citizens being covered by them and for cost reduction. However, the fast development of this area has fostered discussion and legislation regarding ...
Comments