21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 201<br />

<strong>Civil</strong> <strong>Liberties</strong> <strong>and</strong> <strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />

201<br />

dest<strong>in</strong>ations <strong>in</strong> the header of the message. This feature would enable<br />

the search<strong>in</strong>g <strong>and</strong> trac<strong>in</strong>g of suspect messages without prior disclosure<br />

of their content or author, thus protect<strong>in</strong>g the identity of the sender<br />

<strong>and</strong> the secrecy of communications. 37<br />

Information exchanges among computer security staff regard<strong>in</strong>g<br />

modes of penetration <strong>and</strong> attack, suspected crimes, early warn<strong>in</strong>gs,<br />

<strong>and</strong> anomalies <strong>in</strong> computer operation can facilitate prevention <strong>and</strong><br />

timely <strong>in</strong>cident response. Incentives for greater protection can be created<br />

by plac<strong>in</strong>g more legal or f<strong>in</strong>ancial responsibility on the owners<br />

<strong>and</strong> pr<strong>in</strong>cipal operators of computers <strong>and</strong> networks—be they bus<strong>in</strong>esses,<br />

organizations, or <strong>in</strong>dividuals. Stronger cyber security would<br />

deter some cyber crimes, but not all. Moreover, technologically <strong>and</strong><br />

economically advanced nations can enhance cyber security <strong>and</strong> privacy<br />

by mak<strong>in</strong>g protective technologies available <strong>and</strong> affordable on the<br />

market, but citizens of less advanced countries may not be able to<br />

afford these alternatives.<br />

The United States has proposed creat<strong>in</strong>g an <strong>in</strong>ternational cyber<br />

police. 38 Such a system would need to be worldwide <strong>in</strong> both coverage<br />

<strong>and</strong> participation, <strong>and</strong> would enable police to conduct rapid <strong>in</strong>vestigations<br />

over global communication networks. Although it is unclear<br />

37. Dynamically allocated IP addresses may still present a track<strong>in</strong>g problem.<br />

Moreover, IPv6 allows for the allocation of unique addresses for each network node<br />

(addresses <strong>in</strong> the current IP version 4 have been depleted). This will enable greater<br />

clarity <strong>and</strong> reliability <strong>in</strong> determ<strong>in</strong><strong>in</strong>g orig<strong>in</strong>ators <strong>and</strong> recipients of suspect messages.<br />

See ibid., “Next Generation IP Protocols,” <strong>in</strong> section 3, <strong>and</strong> Lee Garber, “Steve<br />

Deer<strong>in</strong>g on IP Next Generation,” Computer, April 1999, pp. 11–13. If the nondisclosure<br />

feature is not used, however, privacy may be compromised.<br />

38. José Luis Barbería, “Los países europeos del G-8 rechazan el plan de EE UU<br />

de crear una ‘ciberpolicía’ mundial,” El País Digital, May 16, 2000, reported at<br />

www.elpais.es/p/d/20000516/sociedad/ciberpol.htm; “Rich Nations to Work Together<br />

Aga<strong>in</strong>st Cyber Crime” (Reuters), New York Times on the Web, May 15, 2000,<br />

reported at www.nytimes.com/reuters/<strong>in</strong>ternational/<strong>in</strong>ternational-crime-c.html.<br />

Joelle Diderich, “G8 to Work Together Aga<strong>in</strong>st Cyber Crime” Reuters, May 14,<br />

2000, which was reported at http://www.zdnet.com/zdnn/stories/news/0,4586,<br />

2569402,00.html. See also Anne Swardson, “International Officials Admit Internet<br />

<strong>Security</strong> Holes,” Wash<strong>in</strong>gton Post on L<strong>in</strong>e, May 16, 2000, available at wash<strong>in</strong>gtonpost.com/wp-dyn/articles/A12013-2000May16.html.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!