Civil Liberties and Security in Cyberspace - Hoover Institution
Civil Liberties and Security in Cyberspace - Hoover Institution
Civil Liberties and Security in Cyberspace - Hoover Institution
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 185<br />
<strong>Civil</strong> <strong>Liberties</strong> <strong>and</strong> <strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />
to security measures <strong>in</strong> sections 2 <strong>and</strong> 3. Issues concern<strong>in</strong>g search,<br />
seizure, <strong>and</strong> due process of law apply primarily to crim<strong>in</strong>al law enforcement.<br />
Threats to privacy, however, extend beyond law enforcement<br />
<strong>in</strong>to commercial <strong>and</strong> all other spheres of social life; privacy is<br />
discussed <strong>in</strong> section 2 <strong>in</strong> this broader context, <strong>and</strong> <strong>in</strong> section 3 the<br />
discussion turns to crim<strong>in</strong>al law <strong>and</strong> constra<strong>in</strong>ts on police behavior <strong>in</strong><br />
the course of <strong>in</strong>vestigations. Applicable aspects of the right to freedom<br />
of expression are addressed throughout. 1<br />
1. Protective <strong>and</strong> Reactive Approaches to<br />
<strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />
185<br />
The world’s use of <strong>and</strong> dependence on <strong>in</strong>ternational computer networks<br />
fosters transnational computer crime. Sophisticated crim<strong>in</strong>als<br />
are able to operate from a distance <strong>and</strong> cover up or confuse the orig<strong>in</strong>s<br />
of their attacks. To respond to attacks <strong>in</strong> a timely <strong>and</strong> effective manner,<br />
system operators need to monitor user behavior <strong>and</strong> detect <strong>in</strong>trusions<br />
<strong>in</strong> real time. To identify suspects <strong>and</strong> launch <strong>in</strong>vestigations once a<br />
crime is detected, large-scale screen<strong>in</strong>g, trac<strong>in</strong>g, <strong>and</strong> analysis of electronic<br />
evidence may be required.<br />
Such methods dem<strong>and</strong> substantial commitments of technological,<br />
economic, <strong>and</strong> human resources. States, as well as commercial <strong>and</strong><br />
other public <strong>and</strong> private entities, face difficult trade-offs <strong>in</strong> allocat<strong>in</strong>g<br />
resources to fight cyber crime. Increased network security <strong>and</strong> <strong>in</strong>vestigative<br />
measures may come at the expense of network performance,<br />
privacy, <strong>and</strong> users’ desire for anonymity. States may also f<strong>in</strong>d their<br />
domestic laws, national security objectives, <strong>and</strong> political or economic<br />
priorities at odds with the conditions required for effective <strong>in</strong>ternational<br />
cooperation. Restrictions on cross-border flows of <strong>in</strong>formation<br />
imposed for polic<strong>in</strong>g purposes may impede electronic commerce <strong>and</strong><br />
other transactions.<br />
There are two basic approaches to security <strong>in</strong> cyberspace: a pro-<br />
1. On freedom of expression <strong>in</strong> cyberspace, see also Reno v. American <strong>Civil</strong><br />
<strong>Liberties</strong> Union, 521 U.S. 844 (1997).