28.05.2014 Views

uncovering and eliminating child pornography rings on the internet

uncovering and eliminating child pornography rings on the internet

uncovering and eliminating child pornography rings on the internet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2000] Child Pornography <strong>on</strong> <strong>the</strong> Internet 475<br />

a hotly debated issue with wider implicati<strong>on</strong>s than <strong>the</strong> c<strong>on</strong>fines of <strong>the</strong><br />

prohibiti<strong>on</strong> against <str<strong>on</strong>g>child</str<strong>on</strong>g> <str<strong>on</strong>g>pornography</str<strong>on</strong>g>. 151<br />

The right to privacy has several interrelated meanings 152 <str<strong>on</strong>g>and</str<strong>on</strong>g> may be<br />

viewed as three clusters of rights. 153 The first type of privacy right is that<br />

c<strong>on</strong>cerning physical space <str<strong>on</strong>g>and</str<strong>on</strong>g> is typified by <strong>the</strong> Fourth Amendment's<br />

prohibiti<strong>on</strong> against illegal search <str<strong>on</strong>g>and</str<strong>on</strong>g> seizure. 154 The sec<strong>on</strong>d is <strong>the</strong> privacy to<br />

make self-defining choices, such as <strong>the</strong> freedom to choose an aborti<strong>on</strong>. 155<br />

Finally, <strong>the</strong> third area of privacy rights involves freedom from forced<br />

disclosure of <strong>the</strong> details of <strong>on</strong>e's private life. 156 It is this third type of privacy<br />

right that has been discussed in c<strong>on</strong>necti<strong>on</strong> with encrypti<strong>on</strong>.<br />

Encrypti<strong>on</strong> is necessary to many enterprises <strong>on</strong> <strong>the</strong> Internet. 157 For<br />

example, businesses which c<strong>on</strong>duct transacti<strong>on</strong>s over <strong>the</strong> Internet are<br />

vulnerable to computer-facilitated <strong>the</strong>ft <str<strong>on</strong>g>and</str<strong>on</strong>g> piracy, thus, <strong>the</strong>y need<br />

encrypti<strong>on</strong>. 158 Likewise, private individuals need encrypti<strong>on</strong> to prevent<br />

informati<strong>on</strong> <strong>the</strong>ft while using <strong>on</strong>-line communicati<strong>on</strong>s. 159 Hospitals also<br />

require encrypti<strong>on</strong> to prevent hackers from altering patients' records. 160 In<br />

short, our nati<strong>on</strong>al infrastructure depends <strong>on</strong> encrypti<strong>on</strong> to keep important<br />

informati<strong>on</strong> safe. 161<br />

Encrypti<strong>on</strong>, however, becomes a problem when it is so secure that it<br />

prevents law enforcement from doing its job. 162 Law enforcement agencies<br />

151. See Kenneth P. Weinberg, Cryptography: "Key Recovery" Shaping Cyberspace<br />

(Pragmatism <str<strong>on</strong>g>and</str<strong>on</strong>g> Theory), 5 J. INTELL. PROP. L. 667, 673 (1998); see generally J. Terrence<br />

Stender, Too Many Secrets: Challenges to <strong>the</strong> C<strong>on</strong>trol of Str<strong>on</strong>g Crypto <str<strong>on</strong>g>and</str<strong>on</strong>g> <strong>the</strong> Nati<strong>on</strong>al<br />

Security Perspective, 30 CASE W. RES. J. INT'L L. 287 (1998); Joel C. M<str<strong>on</strong>g>and</str<strong>on</strong>g>elman, Lest We<br />

Walk into <strong>the</strong> Well: Guarding <strong>the</strong> Keys-E ncrypting <strong>the</strong> C<strong>on</strong>stituti<strong>on</strong>: To Speak, Search & Seize<br />

in Cyberspace, 8 ALB. L.J. SCI. & TECH. 227 (1998).<br />

152. See NOWAK & ROTUNDA, supra note 136, at 795.<br />

153. See Jerry Kang, Informati<strong>on</strong> Privacy in Cyberspace Transacti<strong>on</strong>s, 50 STAN. L. REV.<br />

1193(1998).<br />

154. See id. at 1202; NOWAK & ROTUNDA, supra note 136, at 796.<br />

155. See NOWAK & ROTUNDA, supra note 136, at 796; Kang, supra note 153, at 1202-<br />

03.<br />

156. See NOWAK & ROTUNDA, supra note 136, at 795; Kang, supra note 153, at 1203.<br />

157. See Weinberg, supra note 151, at 680 (many need encrypti<strong>on</strong> <strong>on</strong> <strong>the</strong> Internet, both<br />

businesses <str<strong>on</strong>g>and</str<strong>on</strong>g> individuals).<br />

158. See id.<br />

159. See id.<br />

160. See id.<br />

161. See id.<br />

162. See id. (stating that "[t]he same technologies that allow c<strong>on</strong>sumers <str<strong>on</strong>g>and</str<strong>on</strong>g> businesses<br />

to scramble financial informati<strong>on</strong>, <strong>the</strong>reby diminishing <strong>the</strong> risk of piracy, can also help thieves<br />

commit different types of crimes . . . such as m<strong>on</strong>ey laundering, fraud, stalking, gambling,<br />

terrorism, <strong>the</strong> commissi<strong>on</strong> of hate crimes, <str<strong>on</strong>g>and</str<strong>on</strong>g> <strong>the</strong> distributi<strong>on</strong> of <str<strong>on</strong>g>child</str<strong>on</strong>g> <str<strong>on</strong>g>pornography</str<strong>on</strong>g>").

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!