10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Domestic LawThe domestic legal environment is particularly complex <strong>for</strong> cyberoperations. Principally, <strong>the</strong> 4 th amendment to <strong>the</strong> U.S. Constitution <strong>of</strong>fersprotection against unreasonable searches and seizures. This has significantimplications <strong>for</strong> international cyber operations against <strong>the</strong> U.S. that have adomestic nexus (e.g. a <strong>for</strong>eign-operated botnet that employs thousands <strong>of</strong> U.S.computers). Though not specifically codified in <strong>the</strong> U.S. Constitution, 40 <strong>the</strong>established right to privacy plays ano<strong>the</strong>r role in this same vein. Additionally,<strong>the</strong> Foreign Intelligence Surveillance Act (FISA) (as modified in 2008) protectscitizens at home or abroad from electronic government surveillance without awarrant from a FISA court. This may hinder, <strong>for</strong> instance, <strong>the</strong> ability <strong>of</strong>government agencies to monitor Internet traffic <strong>of</strong> a U.S. citizen even if thatindividual’s computer or network is linked to (or has been coopted by) a <strong>for</strong>eigncyber actor.Legislation like <strong>the</strong> Computer Fraud and Abuse Act (CFAA) and <strong>the</strong>Digital Millennium Copyright Act (DMCA) place fur<strong>the</strong>r constraints on whatsorts <strong>of</strong> cyber activity is legal. Lastly, <strong>the</strong> United States Code Titles 10 and 50delineate <strong>the</strong> authorities, responsibilities and limitations <strong>for</strong> <strong>the</strong> IntelligenceCommunity (IC) and <strong>the</strong> Department <strong>of</strong> Defense respectively. Because <strong>the</strong> IC andDoD <strong>of</strong>ten overlap with regard to cyber actions, this poses ano<strong>the</strong>r complicatingfactor <strong>for</strong> cyber policy makers.40 For a brief synopsis, see (Linder, 2012)31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!