the TPM. The number of private call
minutes available to the platform can
be controlled through software in the
platform, with the software certified by
remote attestation. If need be, the private call minutes can be prepaid.
The potential for considering the
private mode as a prepaid service may
have a significant advantage with re-
spect to CALEA, as CALEA does not
currently cover prepaid cellular tele-
phones. In the U.S. and many other
countries, one may buy and use a pre-
paid cellular telephone without associ-
ating one’s name with the phone.w The
proposed privacy overlay would thus
provide postpaid cellular telephone
users with the privacy benefits of pre-
paid cellular.x
Other problems remain to be ad-
dressed, of course. For example,
Cortes, Pregibon, and Volinsky have
shown that it is possible to identify
fraudulent users of a cellular system
by using call data to construct dy-
namic graphs, and then performing
a comparative analysis of subgraphs
that form “communities of interest.” 7
A similar comparative analysis can be
used for deanonymizing users of the
proposed system unless the random
tag is changed fairly frequently.
Conclusion
We have seen that cellular telephony
is a surveillance technology. Cellular
networks were designed, however unintentionally, to collect personal data,
thus creating an extremely attractive
source of information for law enforcement agencies and marketers. The impact of this surveillance on the users
and uses of the cellular platform is becoming increasingly important as the
platform plays a prominent role in so-
w According to the UPI, many of the cell phones
used to coordinate action in the Philippine uprisings against former President Estrada were
unregistered, prepaid phones. See http://www.
upiasia.com/Politics/2008/01/21/texting_as_
an_activist_tool/6075/.
cial, economic, and political contexts.
It remains possible, however, to secure
cellular networks against surveillance.
The private cellular overlay proposed
here would serve this purpose while
potentially putting the subscriber in
control of his or her personal information. Legal issues remain and legislation may be necessary before a private
cellular system can be made available
to the public, but a public discussion
as to whether we want a technology as
important as cellular to be open to covert surveillance would be a good and
highly democratic idea.
Acknowledgments
This work was funded in part by the National Science Foundation TRUST Science and Technology Center and the
NSF Trustworthy Computing Program.
The author gratefully acknowledges
the technical and editorial assistance
of Sarah Hale, Lee Humphries, and
Jeff Pool. He also extends thanks to the
anonymous reviewers for their extensive and insightful comments.
References
1. tPM Main, Part 1 Design Principles, specification
Version 1. 2, level 2 revision 103. tech. rep., trusted
computing group (July 9 2007).
2. Bentham, J. The Panopticon; or The Inspection House.
london, 1787. Miran Božovi (ed.). Verso, london, uk,
1995.
3. Berger v. New York, 388 u.s. 41 (1967).
4. communications assistance for law enforcement act
(calea, 47 u.s.c. xx10011010).
5. clarke, r.a. Information technology and dataveillance.
Commun. ACM 31, 5 (May 1988), 498–512.
6. cohen, J. e. examined lives: Informational privacy and
the subject as object. Stanford Law Review (2000).
7. cortes, c., Pregibon, D., and Volinsky, c. communities
of interest. In Proceedings of the 4th International
Conference on Advances in Intelligent Data Analysis
(2001), 105-114.
8. cuddihy, W.J. The Fourth Amendment: Origins and
Original Meaning, 602–1791. oxford university Press,
2009. (see also the Ph. D. thesis with the same title,
claremont graduate school, 1990).
9. Deleuze, g. Postscript on the societies of control.
october 59 (1992), 3–7. (Winter).
10. Diffie, W., and hellman, M. new directions in
cryptography. IEEE Transactions on Information
Theory 22, 6 (1976), 644–654.
11. Dworkin, g. The Theory and Practice of Autonomy.
university Press, cambridge, 1988.
12. electronic communications Privacy act.
13. etemad, k. CDMA 2000 Evolution: System Concepts
and Design Principles. Wiley, ny, 2004.
14. Implementation of the telecommunications act of
1996: telecommunications carriers use of customer
Proprietary network Information and other customer
Information (1998).
15. Implementation of the telecommunications act of
1996: telecommunications carriers use of customer
Proprietary network Information and other customer
Information, 17 f.c.c.r. 14860 (2002).
16. Implementation of the telecommunications act of
1996: telecommunications carriers use of customer
Proprietary network Information and other customer
Information.
17. foucault, M. Discipline and Punish. Vintage, 1995,
(Surveiller et punir: Naissance de la Prison, 1975).
18. freeh, l. J. Digital telephony and law enforcement
access to advanced telecommunications technologies
and services. Joint hearings on h.r. 4922 and s. 2375,
103d cong. 7, 1994.
Stephen B. Wicker ( wicker@ece.cornell.edu) is a
professor in the school of electrical and computer
engineering, cornell university, Ithaca, ny.
© 2011 acM 0001-0782/11/07 $10.00