Title :
Securing Crisis Maps in Conflict Zones
Author :
Chamales, George ; Baker, Rob
Author_Institution :
Rogue Genius LLC, Oakland, CA, USA
fDate :
Oct. 30 2011-Nov. 1 2011
Abstract :
Crowd sourced crisis mapping technologies aggregate information from individuals, trusted networks of informants, and publicly available media sources for use in informing decision making and response. Deploying this technology in conflict zones introduces a new set of vulnerabilities that can be exploited by hostile actors who have developed or adopted network surveillance and attack capabilities. Successful infiltration or compromise of these deployments can have a significant, negative impact on the lives of those reporting to and operating crisis maps. This paper identifies several fundamental vulnerabilities present in crisis mapping deployments and defines a set of best practices to defend those vulnerabilities from successful attack. The recommendations are adapted from established principles in computer and network security, combined with the authors´ experience operating crisis mapping deployments in Afghanistan, Sudan, and Libya.
Keywords :
computer network reliability; computer network security; decision making; information networks; multimedia systems; outsourcing; attack capabilities; attack vulnerabilities; computer security; conflict zones; crisis map security; crisis mapping deployment; crowdsourced crisis mapping technology; decision making; hostile actors; information aggregation; media sources; network security; network surveillance; trusted informant networks; Best practices; Encryption; Internet; Media; Monitoring; Organizations; Conflict Zones; Crisis Mapping; Security; Social Media;
Conference_Titel :
Global Humanitarian Technology Conference (GHTC), 2011 IEEE
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-61284-634-7
Electronic_ISBN :
978-0-7695-4595-0
DOI :
10.1109/GHTC.2011.47