21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 200<br />

200 Ekater<strong>in</strong>a A. Drozdova<br />

From the st<strong>and</strong>po<strong>in</strong>t of security aga<strong>in</strong>st cyber crime, the 1995 EU<br />

Data Protection Directive does not necessarily impede law enforcement<br />

activities <strong>and</strong> <strong>in</strong>ternational cooperation <strong>in</strong> cyberspace. The directive<br />

fully applies to the first two Pillars of the Treaty of the European<br />

Union: (I) the European Community, which covers democratization<br />

of the <strong>in</strong>stitutions, citizenship, <strong>and</strong> economic <strong>and</strong> monetary union, <strong>and</strong><br />

(II) the common foreign <strong>and</strong> security policy. It is the third Pillar (III),<br />

however, that addresses the issues of justice <strong>and</strong> home affairs, <strong>in</strong>clud<strong>in</strong>g<br />

police <strong>and</strong> judicial cooperation to combat drug traffick<strong>in</strong>g, <strong>in</strong>ternational<br />

fraud, <strong>and</strong> other crimes. 34 The scope of the directive does not<br />

cover law enforcement procedures. This means that there are opportunities<br />

for <strong>in</strong>ternational cooperation aga<strong>in</strong>st cyber crime <strong>and</strong> also<br />

threats to privacy <strong>in</strong> the course of such cooperation. Privacy-related<br />

law enforcement practices are be<strong>in</strong>g exam<strong>in</strong>ed by the European Commission<br />

<strong>and</strong> may be subject to more <strong>in</strong>tense scrut<strong>in</strong>y <strong>in</strong> the near future.<br />

35<br />

To compensate for the uneven or <strong>in</strong>sufficient privacy protections<br />

<strong>in</strong> commercial <strong>and</strong> public sett<strong>in</strong>gs, <strong>and</strong> to reduce their vulnerability to<br />

cyber crime, public <strong>and</strong> private organizations <strong>and</strong> <strong>in</strong>dividuals can<br />

adopt exist<strong>in</strong>g protective measures. Encryption, anonymous remailers,<br />

proxy servers, <strong>and</strong> other technologies, described <strong>in</strong> the preced<strong>in</strong>g chapter,<br />

are commercially available. 36 Many of these technologies offer<br />

protection aga<strong>in</strong>st cyber crime coupled with enhancement of privacy.<br />

These <strong>in</strong>clude more secure network protocols <strong>and</strong> routers, encryption,<br />

firewalls, virtual private networks, secure anonymous communications,<br />

challenge response systems, <strong>and</strong> security management applications.<br />

IP version 6 (IPv6), the next generation of Internet Protocols,<br />

allows routers along delivery paths to record addresses of previous<br />

34. The Maastricht Treaty that established the European Union <strong>and</strong> the three<br />

Pillars can be viewed at www.felixent.force9.co.uk/europe/eu.html.<br />

35. See Hear<strong>in</strong>g, European Parliament.<br />

36. Stephen J. Lukasik, “Current <strong>and</strong> Future Technical Capabilities,” Chap. 4 of<br />

this volume, <strong>in</strong> particular, section 2, “Defend<strong>in</strong>g Information Systems Aga<strong>in</strong>st Cyber<br />

Attack,” <strong>and</strong> the conclusion to the chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!