21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 202<br />

202 Ekater<strong>in</strong>a A. Drozdova<br />

what the United States <strong>in</strong>tends beyond voluntary coord<strong>in</strong>ation, the<br />

European Union reacted unfavorably, cit<strong>in</strong>g privacy implications. 39 A<br />

full-fledged <strong>in</strong>ternational police force would exemplify an extreme of<br />

the reactive approach; its mere existence would pose concerns about<br />

the security <strong>and</strong> <strong>in</strong>tegrity of <strong>in</strong>formation it acquires, the reliability of<br />

its operators <strong>and</strong> users, the trustworth<strong>in</strong>ess of <strong>in</strong>ternational participants,<br />

<strong>and</strong> the possibility of its use for unlawful purposes (by member<br />

states, police officials, or crim<strong>in</strong>als <strong>and</strong> terrorists).<br />

Some forms of <strong>in</strong>ternational cooperation will nonetheless be required<br />

to combat transnational cyber crime. The draft “International<br />

Convention to Enhance Protection from Cyber Crime <strong>and</strong> Terrorism,”<br />

presented follow<strong>in</strong>g Chapter 6, comb<strong>in</strong>es protective <strong>and</strong> reactive measures<br />

with provisions for protect<strong>in</strong>g privacy <strong>and</strong> other civil liberties.<br />

This draft calls upon States Parties to establish cyber offenses as crimes<br />

under domestic law. Thereafter, <strong>in</strong>vestigations, extraditions, prosecutions,<br />

mutual legal assistance, <strong>and</strong> judicial proceed<strong>in</strong>gs are to be<br />

carried out <strong>in</strong> accordance with the laws of the States Parties. 40 Intrusive<br />

<strong>in</strong>ternational law enforcement procedures may be allowed, but only<br />

<strong>in</strong> accordance with domestic legal st<strong>and</strong>ards <strong>and</strong> mutual legal assistance<br />

treaties. The proposed convention explicitly states that it shall<br />

not be construed to require an <strong>in</strong>fr<strong>in</strong>gement of the privacy or other<br />

human rights of any person as def<strong>in</strong>ed by the laws of the requested<br />

state. To ensure systematic monitor<strong>in</strong>g <strong>and</strong> implementation of this<br />

provision, the draft proposes to create a group of experts dedicated to<br />

the protection of privacy <strong>and</strong> other human rights. 41<br />

In some cases, especially those <strong>in</strong>volv<strong>in</strong>g <strong>in</strong>ternational exchanges<br />

of sensitive <strong>in</strong>formation <strong>and</strong> monitor<strong>in</strong>g of networks by law enforcement,<br />

special procedural safeguards for privacy may also be necessary.<br />

Domestic <strong>and</strong> <strong>in</strong>ternational exchanges among technology <strong>and</strong> law<br />

enforcement experts of data regard<strong>in</strong>g past <strong>and</strong> suspected computer<br />

39. Diderich <strong>and</strong> Reuters, May 14, 2000.<br />

40. Draft “International Convention to Enhance Protection from Cyber Crime<br />

<strong>and</strong> Terrorism,” arts. 2–8.<br />

41. Ibid., art. 13.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!