21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 184<br />

184 Ekater<strong>in</strong>a A. Drozdova<br />

by evaluat<strong>in</strong>g the specific measures or agreements proposed. But certa<strong>in</strong><br />

legal pr<strong>in</strong>ciples are broadly applicable, <strong>in</strong>clud<strong>in</strong>g the right to privacy,<br />

the protections aga<strong>in</strong>st self-<strong>in</strong>crim<strong>in</strong>ation <strong>and</strong> unwarranted<br />

searches <strong>and</strong> seizures, <strong>and</strong> the right to due process of law. These civil<br />

liberties are supported <strong>in</strong> <strong>in</strong>ternational law <strong>and</strong> guaranteed <strong>in</strong> vary<strong>in</strong>g<br />

forms by the national laws <strong>and</strong> <strong>in</strong>stitutions of many countries. An<br />

<strong>in</strong>ternational regime aga<strong>in</strong>st cyber crime <strong>and</strong> terrorism must operate<br />

with<strong>in</strong> the constra<strong>in</strong>ts of these pr<strong>in</strong>ciples, as def<strong>in</strong>ed by the legal frameworks<br />

of its States Parties.<br />

There is often a tension between protect<strong>in</strong>g civil liberties <strong>and</strong> enforc<strong>in</strong>g<br />

laws to ma<strong>in</strong>ta<strong>in</strong> public safety <strong>and</strong> order. States resolve this<br />

tension differently. Agree<strong>in</strong>g upon a common global level of protection<br />

of citizens’ rights is problematic ow<strong>in</strong>g to <strong>in</strong>ternational variance <strong>in</strong><br />

normative st<strong>and</strong>ards, legal practices, <strong>and</strong> political objectives. An <strong>in</strong>ternational<br />

common denom<strong>in</strong>ator could reduce the level of protections<br />

currently afforded <strong>in</strong> some states to the level of authoritarian states.<br />

In the <strong>in</strong>terest of promot<strong>in</strong>g <strong>in</strong>ternational cooperation <strong>and</strong> a timely<br />

response to the grow<strong>in</strong>g threat of cyber attacks, seek<strong>in</strong>g measures other<br />

than agreement on a specific level of protection is more likely to succeed.<br />

However, the differences <strong>in</strong> domestic values <strong>and</strong> rules may allow<br />

misuse of systems set up for prevent<strong>in</strong>g, track<strong>in</strong>g, or punish<strong>in</strong>g cyber<br />

crime. The diversion of technologies for illegitimate purposes—such<br />

as unwarranted surveillance—is a real threat, especially <strong>in</strong> countries<br />

that give little weight to civil liberty pr<strong>in</strong>ciples constra<strong>in</strong><strong>in</strong>g such activities.<br />

Countries may be tempted to circumvent legal constra<strong>in</strong>ts,<br />

moreover, when faced with a national security threat. Systems set up<br />

for <strong>in</strong>ternational cooperation would also <strong>in</strong>troduce new cyber vulnerabilities,<br />

s<strong>in</strong>ce they may be “hacked” or “cracked” <strong>and</strong> misused by<br />

crim<strong>in</strong>als or unauthorized persons. States should address these dangers<br />

<strong>in</strong> the course of develop<strong>in</strong>g forms of <strong>in</strong>ternational cooperation that<br />

extend to shar<strong>in</strong>g <strong>in</strong>formation <strong>and</strong> coord<strong>in</strong>at<strong>in</strong>g technology.<br />

This chapter considers the basic protective <strong>and</strong> reactive approaches<br />

to security <strong>in</strong> cyberspace <strong>in</strong> section 1 <strong>and</strong> the legal pr<strong>in</strong>ciples that apply

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!