33
DISPATCH: SECURE MOBILE JOURNALISM Kanak Biscuitwala* , Willem Bult*, Mathias Lécuyer**, T. J. Purtell*, Madeline Ross**, Augustin Chaintreau**, Chris Haseman***, Monica Lam*, Susan McGregor** Stanford University*, Columbia University**, Tumblr, Inc.***

DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

DISPATCH: SECURE MOBILE JOURNALISM

Kanak Biscuitwala*, Willem Bult*, Mathias Lécuyer**, T. J. Purtell*, Madeline Ross**, Augustin Chaintreau**, Chris Haseman***, Monica Lam*, Susan McGregor**

Stanford University*, Columbia University**, Tumblr, Inc.***

Page 2: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

JOURNALISM?

Page 3: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

CITIZENS + JOURNALISTSA long-lasting connection

Page 4: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

CITIZENS + JOURNALISTSA relationship that is changing the world today

• Recent links between citizen reporting and journalists have had a profound impact

Page 5: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

AWESOME, RIGHT?

Page 6: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

PERVASIVE RISKS

• Citizen and professional journalists are threatened

• People jailed because of Facebook messages exchanged during the Arab Spring, and many citizen and professional reporters alike are unaware of the risks of using social media until it’s too late

• Source protection is broken

• By law, journalists don’t have to reveal their sources (in the US)

• What if the source contacts them by email or Twitter and the government has the right to see the messages without any warrant?

Page 7: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

PERVASIVE RISKS

"When your computer can be confiscated and your emails be viewed, there are times when meeting in person, taking notes on a notepad and hiding the notepad is the most secure way to conduct journalism"

- Rebecca MacKinnonformer CNN journalist, co-founder Global Voices Online

Page 8: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

NEED FOR PROTECTION

• Journalists

• Extend reach of what can be reported

• Validate trustworthiness of source

• Maintain integrity and security of sources

• Citizen Reporters

• Avoid negative repercussions of reports

• Communicate regardless of the censorship situation

• Establish reputation

Page 9: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

HOW?

Page 10: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

THE TEAM

PublishingChris Haseman (Tumblr)

commitment to publish

Computer ScienceMobiSocial team at Stanford

secure group communicationNetworking lab at Columbia

opportunistic networks

JournalismSusan McGregor (Columbia)

background with WSJMadeline Ross (Columbia)specializes in digital communication

Page 11: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

PROJECT CONTRIBUTIONS

• Raising awareness of security among journalists

• Dispatch:

• Production-quality secure communication/publication system for journalists

• Experimental disconnection tolerance

• Real-life field tests with journalists on Dispatch to inform difficulties in the use and adoption

Page 12: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SECURE COMMUNICATION

Trusted Pseudonym

Page 13: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

PUBLISHING

Page 14: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

PUBLISHING

Page 15: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

PUBLISHING

Instant or after approval

Looks like a user

Page 16: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

PUBLISHING

Instant or after approval

Looks like a user

Page 17: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

IDENTITY-BASED ROUTING

Header AES(Payload, Message Key)

Version Sender Id Hash

Sender Device App Id AES IV Flags Rcpt

Count Recipient 0 ... Recipient n

Recipient Id Hash

Encrypted Conv Key

Sender Signature AES(..., Conv Key)

Message Hash

Sequence Number

Message Key

• Messages are encrypted and signed using Identity-Based Cryptography (IBC)a

• The system routes by hashed identities rather than by IP addresses, allowing users to send and receive messages from anywhere

• The message contains all necessary recipient information, allowing for ad-hoc message routing of signed and encrypted messagesb

a D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In CRYPTO 2001, 2001. b T. J. Purtell, I. Vo, and M. S. Lam. A Mobile Social Network on ESP: an Egocentric Social Platform

Page 18: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SYSTEM ARCHITECTURE

Identity-Based Routing

Publishing Server

PublisherSSL

Key IssuerSSL

Identity Provider

SSL

= signed and encrypted by

identities

SSL

Page 19: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SNEAKERNET

Page 20: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SNEAKERNET

Page 21: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SNEAKERNET

Page 22: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SNEAKERNET

Page 23: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SNEAKERNET

Page 24: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SNEAKERNET

Page 25: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SNEAKERNET

Page 26: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

APPROACHES

• Reputation building

• Forgery protection

• Interception protection

• Expand reach

Page 27: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

APPROACHES

• Reputation building

• Forgery protection

• Interception protection

• Expand reach

• Messages cryptographically signed by pseudonyms

• Identity-based encryption

• Sneakernet built on identity-based routing

Page 28: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

WORKING WITH JOURNALISTS

Page 29: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

DISPATCH ON ELECTION DAY

• We want journalists to use Dispatch regardless of danger level

• Thus, we recruited some journalist contacts to report the elections in NYC

• The day before, we held a brief tutorial

Page 30: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

DISPATCH ON ELECTION DAY• 96 posts

• 21 text posts

• 75 image posts

• 10 unique contributors

• 3 users with 5 or more posts each

• 1 MVP user

• Usage throughout the day

22%

78%

Text Images

Page 31: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

DEMO

Page 32: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

COMMUNITY BUILDINGdispatch-politics.tumblr.com

@Dispatch_Appdispatchapp.wpengine.com

Page 33: DISPATCH: SECURE MOBILE JOURNALISM...2013/04/18  · alike are unaware of the risks of using social media until it’s too late • Source protection is broken • By law, journalists

SUMMARY

• We’ve assembled a diverse team to tackle problems

• We’re continuing to map clever technical approaches to challenges journalists face today

• An iterative process is critical when working with journalists

• We’re on iOS and Android app marketplaces!