21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 185<br />

<strong>Civil</strong> <strong>Liberties</strong> <strong>and</strong> <strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />

to security measures <strong>in</strong> sections 2 <strong>and</strong> 3. Issues concern<strong>in</strong>g search,<br />

seizure, <strong>and</strong> due process of law apply primarily to crim<strong>in</strong>al law enforcement.<br />

Threats to privacy, however, extend beyond law enforcement<br />

<strong>in</strong>to commercial <strong>and</strong> all other spheres of social life; privacy is<br />

discussed <strong>in</strong> section 2 <strong>in</strong> this broader context, <strong>and</strong> <strong>in</strong> section 3 the<br />

discussion turns to crim<strong>in</strong>al law <strong>and</strong> constra<strong>in</strong>ts on police behavior <strong>in</strong><br />

the course of <strong>in</strong>vestigations. Applicable aspects of the right to freedom<br />

of expression are addressed throughout. 1<br />

1. Protective <strong>and</strong> Reactive Approaches to<br />

<strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />

185<br />

The world’s use of <strong>and</strong> dependence on <strong>in</strong>ternational computer networks<br />

fosters transnational computer crime. Sophisticated crim<strong>in</strong>als<br />

are able to operate from a distance <strong>and</strong> cover up or confuse the orig<strong>in</strong>s<br />

of their attacks. To respond to attacks <strong>in</strong> a timely <strong>and</strong> effective manner,<br />

system operators need to monitor user behavior <strong>and</strong> detect <strong>in</strong>trusions<br />

<strong>in</strong> real time. To identify suspects <strong>and</strong> launch <strong>in</strong>vestigations once a<br />

crime is detected, large-scale screen<strong>in</strong>g, trac<strong>in</strong>g, <strong>and</strong> analysis of electronic<br />

evidence may be required.<br />

Such methods dem<strong>and</strong> substantial commitments of technological,<br />

economic, <strong>and</strong> human resources. States, as well as commercial <strong>and</strong><br />

other public <strong>and</strong> private entities, face difficult trade-offs <strong>in</strong> allocat<strong>in</strong>g<br />

resources to fight cyber crime. Increased network security <strong>and</strong> <strong>in</strong>vestigative<br />

measures may come at the expense of network performance,<br />

privacy, <strong>and</strong> users’ desire for anonymity. States may also f<strong>in</strong>d their<br />

domestic laws, national security objectives, <strong>and</strong> political or economic<br />

priorities at odds with the conditions required for effective <strong>in</strong>ternational<br />

cooperation. Restrictions on cross-border flows of <strong>in</strong>formation<br />

imposed for polic<strong>in</strong>g purposes may impede electronic commerce <strong>and</strong><br />

other transactions.<br />

There are two basic approaches to security <strong>in</strong> cyberspace: a pro-<br />

1. On freedom of expression <strong>in</strong> cyberspace, see also Reno v. American <strong>Civil</strong><br />

<strong>Liberties</strong> Union, 521 U.S. 844 (1997).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!