2017
DOI: 10.1515/popets-2017-0022
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering Attacks on Government Opponents: Target Perspectives

Abstract: New methods of dissident surveillance employed by repressive nation-states increasingly involve socially engineering targets into unwitting cooperation (e.g., by convincing them to open a malicious attachment or link). While a fair amount is understood about the nature of these threat actors and the types of tools they use, there is comparatively little understood about targets' perceptions of the risks associated with their online activity, and their security posture. We conducted in-depth interviews of 30 po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 3 publications
0
15
0
Order By: Relevance
“…We find that the ability of humanitarian field workers to carry out their mandate hinges on numerous operational and legal factors such as developing capacity by training local workers, operating in local, untrusted facilities, and negotiating and maintaining bilateral agreements with local authorities. These factors tend to differ from other at-risk groups such as political dissidents [23], [22], [27], [15], [26] and journalists [29], [30], [24] whose activities can be carried out individually, or in small groups, with no or little support from authorities. As a result, whereas journalists generally depend on their own security practices and that of their sources, humanitarian workers must consider a multitude of other factors such as the engagement, acceptance, and trustworthiness of the local actors and infrastructure, the confidentiality of their physical location, and the specific Privileges and Immunities (P&I) recognized in their delegation's bilateral agreement.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We find that the ability of humanitarian field workers to carry out their mandate hinges on numerous operational and legal factors such as developing capacity by training local workers, operating in local, untrusted facilities, and negotiating and maintaining bilateral agreements with local authorities. These factors tend to differ from other at-risk groups such as political dissidents [23], [22], [27], [15], [26] and journalists [29], [30], [24] whose activities can be carried out individually, or in small groups, with no or little support from authorities. As a result, whereas journalists generally depend on their own security practices and that of their sources, humanitarian workers must consider a multitude of other factors such as the engagement, acceptance, and trustworthiness of the local actors and infrastructure, the confidentiality of their physical location, and the specific Privileges and Immunities (P&I) recognized in their delegation's bilateral agreement.…”
Section: Resultsmentioning
confidence: 99%
“…Although this study shares similarities with recent work on computer security for political dissidents and journalists, humanitarian action differs in terms of organizational structure, data flows, and threat models. First, unlike political dissidents who often act individually or as part of small nongovernmental organizations (NGOs) [23], [22], [27], [15], [26], to be effective, humanitarian action needs considerable logistical support, generally from a large organization, which significantly complicates the security of the corresponding data flows. In this respect, humanitarian action is more akin to journalism for large media outlets.…”
Section: Introductionmentioning
confidence: 99%
“…Studies outlined the complex nature of social engineering and enterprise security but have not fully explored the value each component could provide an organization. Moreover, the review of literature facilitates discussions on the characterization of a social engineer, explanations of the social engineering and design process, and what social engineers do (Marczak & Paxson, 2017). Even though Weaver, Furr, and Norton (Wardono et al, 2017) outlined a convenient historical perspective of engineering ethics, inconsistencies still exist pertaining to what social engineers do.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Activists, journalists and lawyers have a need to use secure communication technology, specifically email, but often face obstacles in adoption [25]. E2EE messengers such as Signal [21] provide easier-to-use alternatives, but because these tools lack certain functionality, users continue to opt for less secure alternatives in order to work effectively [1,5,26,29,33].…”
Section: Introductionmentioning
confidence: 99%