Civil Liberties and Security in Cyberspace - Hoover Institution
Civil Liberties and Security in Cyberspace - Hoover Institution
Civil Liberties and Security in Cyberspace - Hoover Institution
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 193<br />
<strong>Civil</strong> <strong>Liberties</strong> <strong>and</strong> <strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />
193<br />
The U.S. Federal Trade Commission found that privacy policies,<br />
posted on many commercial websites, did not provide sufficient protection<br />
for on-l<strong>in</strong>e consumers. 18 Bus<strong>in</strong>esses track on-l<strong>in</strong>e behavior, sell<br />
personal <strong>in</strong>formation, <strong>and</strong> misuse personal profiles built on the basis<br />
of f<strong>in</strong>ancial, medical, <strong>and</strong> other sensitive <strong>in</strong>formation. 19 Employers’<br />
<strong>in</strong>trusion <strong>in</strong>to electronic communications of employees <strong>in</strong> the workplace<br />
is another area of concern. Privacy protection is often subord<strong>in</strong>ated<br />
to property rights of employers as the providers of their employees’<br />
electronic communication services. In the United States, for<br />
example, legislation prohibits employers from eavesdropp<strong>in</strong>g on the<br />
private telephone conversations of their employees at work, but no<br />
similar protection extends to electronic mail communications. 20<br />
Crim<strong>in</strong>als take advantage of deficiencies <strong>in</strong> the protection of sensitive<br />
<strong>in</strong>formation transmitted <strong>and</strong> accumulated <strong>in</strong> electronic form.<br />
Identity theft is among the fastest-grow<strong>in</strong>g cyber crimes; <strong>in</strong> the U.S.<br />
alone, it has <strong>in</strong>creased more than 300 percent, from 7,868 cases <strong>in</strong><br />
1997 to 30,115 <strong>in</strong> 1999. Pedophiles entice victims <strong>in</strong> Internet chat<br />
rooms <strong>and</strong> use electronic communications to arrange actual meet<strong>in</strong>gs.<br />
Spurned suitors forge v<strong>in</strong>dictive e-mails <strong>in</strong>vit<strong>in</strong>g rape. 21 Stalkers identify<br />
victims on the Internet <strong>and</strong> threaten them physically. 22<br />
The spread <strong>and</strong> grow<strong>in</strong>g severity of cyber crime require greater<br />
security <strong>and</strong> better law enforcement. 23 Where security <strong>and</strong> polic<strong>in</strong>g<br />
methods are <strong>in</strong>trusive, achiev<strong>in</strong>g these objectives may dem<strong>and</strong> some<br />
18. Schjolberg, “Legal Mechanisms for International Cooperation.”<br />
19. See Jeffrey Rosen, “The Eroded Self,” New York Times Magaz<strong>in</strong>e, April 30,<br />
2000, pp. 46–53.<br />
20. See Ann Beeson, “Privacy <strong>in</strong> <strong>Cyberspace</strong>: Is Your E-mail Safe from the Boss,<br />
the SysOp, the Hackers, <strong>and</strong> the Cops?” American <strong>Civil</strong> <strong>Liberties</strong> Union, Cyber-<br />
<strong>Liberties</strong> (1996), available at http://www.aclu.org/issues/cyber/priv/privpap.html.<br />
21. See Stephen J. Lukasik, “Combat<strong>in</strong>g Cyber Crime <strong>and</strong> Terrorism,” presentation<br />
at the Technical Sem<strong>in</strong>ar, Center for International <strong>Security</strong> <strong>and</strong> Cooperation,<br />
Stanford University, May 2, 2000; Lukasik cites identity theft figures reported by the<br />
Social <strong>Security</strong> Adm<strong>in</strong>istration.<br />
22. Sam Howe Verhovek, “Creators of Anti-Abortion Web Site Told to Pay Millions,”<br />
New York Times, February 3, 1999, p. A11.<br />
23. Chap. 1 of this volume.