21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 193<br />

<strong>Civil</strong> <strong>Liberties</strong> <strong>and</strong> <strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />

193<br />

The U.S. Federal Trade Commission found that privacy policies,<br />

posted on many commercial websites, did not provide sufficient protection<br />

for on-l<strong>in</strong>e consumers. 18 Bus<strong>in</strong>esses track on-l<strong>in</strong>e behavior, sell<br />

personal <strong>in</strong>formation, <strong>and</strong> misuse personal profiles built on the basis<br />

of f<strong>in</strong>ancial, medical, <strong>and</strong> other sensitive <strong>in</strong>formation. 19 Employers’<br />

<strong>in</strong>trusion <strong>in</strong>to electronic communications of employees <strong>in</strong> the workplace<br />

is another area of concern. Privacy protection is often subord<strong>in</strong>ated<br />

to property rights of employers as the providers of their employees’<br />

electronic communication services. In the United States, for<br />

example, legislation prohibits employers from eavesdropp<strong>in</strong>g on the<br />

private telephone conversations of their employees at work, but no<br />

similar protection extends to electronic mail communications. 20<br />

Crim<strong>in</strong>als take advantage of deficiencies <strong>in</strong> the protection of sensitive<br />

<strong>in</strong>formation transmitted <strong>and</strong> accumulated <strong>in</strong> electronic form.<br />

Identity theft is among the fastest-grow<strong>in</strong>g cyber crimes; <strong>in</strong> the U.S.<br />

alone, it has <strong>in</strong>creased more than 300 percent, from 7,868 cases <strong>in</strong><br />

1997 to 30,115 <strong>in</strong> 1999. Pedophiles entice victims <strong>in</strong> Internet chat<br />

rooms <strong>and</strong> use electronic communications to arrange actual meet<strong>in</strong>gs.<br />

Spurned suitors forge v<strong>in</strong>dictive e-mails <strong>in</strong>vit<strong>in</strong>g rape. 21 Stalkers identify<br />

victims on the Internet <strong>and</strong> threaten them physically. 22<br />

The spread <strong>and</strong> grow<strong>in</strong>g severity of cyber crime require greater<br />

security <strong>and</strong> better law enforcement. 23 Where security <strong>and</strong> polic<strong>in</strong>g<br />

methods are <strong>in</strong>trusive, achiev<strong>in</strong>g these objectives may dem<strong>and</strong> some<br />

18. Schjolberg, “Legal Mechanisms for International Cooperation.”<br />

19. See Jeffrey Rosen, “The Eroded Self,” New York Times Magaz<strong>in</strong>e, April 30,<br />

2000, pp. 46–53.<br />

20. See Ann Beeson, “Privacy <strong>in</strong> <strong>Cyberspace</strong>: Is Your E-mail Safe from the Boss,<br />

the SysOp, the Hackers, <strong>and</strong> the Cops?” American <strong>Civil</strong> <strong>Liberties</strong> Union, Cyber-<br />

<strong>Liberties</strong> (1996), available at http://www.aclu.org/issues/cyber/priv/privpap.html.<br />

21. See Stephen J. Lukasik, “Combat<strong>in</strong>g Cyber Crime <strong>and</strong> Terrorism,” presentation<br />

at the Technical Sem<strong>in</strong>ar, Center for International <strong>Security</strong> <strong>and</strong> Cooperation,<br />

Stanford University, May 2, 2000; Lukasik cites identity theft figures reported by the<br />

Social <strong>Security</strong> Adm<strong>in</strong>istration.<br />

22. Sam Howe Verhovek, “Creators of Anti-Abortion Web Site Told to Pay Millions,”<br />

New York Times, February 3, 1999, p. A11.<br />

23. Chap. 1 of this volume.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!