21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 204<br />

204 Ekater<strong>in</strong>a A. Drozdova<br />

privacy. The use of automated <strong>and</strong> semiautomated tools facilitates<br />

near-real-time detection of security breaches, trac<strong>in</strong>g to orig<strong>in</strong> of attack,<br />

scalability of action (detect<strong>in</strong>g <strong>in</strong>trusions among large volumes<br />

of data <strong>in</strong>volved <strong>in</strong> normal network operations <strong>and</strong> respond<strong>in</strong>g to<br />

<strong>in</strong>trusions that may hop across <strong>in</strong>ternational networks), <strong>and</strong> ultimately<br />

<strong>in</strong>creased efficiency <strong>and</strong> effectiveness. Automation <strong>in</strong> search<strong>in</strong>g, trac<strong>in</strong>g,<br />

<strong>and</strong> track<strong>in</strong>g preserves the anonymity <strong>and</strong> privacy of <strong>in</strong>nocent<br />

<strong>in</strong>dividuals whose messages may be subjected to search <strong>in</strong> the course<br />

of an <strong>in</strong>vestigation. The protection of privacy ultimately relies on a<br />

comb<strong>in</strong>ation of automated <strong>and</strong> other protective technologies as well<br />

as laws that constra<strong>in</strong> law enforcement. Where law enforcement methods<br />

are <strong>in</strong>trusive <strong>and</strong> automation is not available or fully reliable, legal<br />

constra<strong>in</strong>ts are especially necessary.<br />

3. Crim<strong>in</strong>al Law <strong>and</strong> Constra<strong>in</strong>ts<br />

on Police Behavior<br />

Constra<strong>in</strong>ts on police behavior <strong>in</strong> cyberspace have received far less<br />

public attention than privacy problems. This is partly because they are<br />

narrowly focused on crim<strong>in</strong>al <strong>in</strong>vestigation—whereas privacy <strong>in</strong>terests<br />

span personal, commercial, <strong>and</strong> government realms—<strong>and</strong> partly because<br />

what is necessary <strong>and</strong> legally permissible <strong>in</strong> cyber-related <strong>in</strong>vestigation<br />

<strong>and</strong> prosecution procedures is still be<strong>in</strong>g determ<strong>in</strong>ed.<br />

The protections aga<strong>in</strong>st self-<strong>in</strong>crim<strong>in</strong>ation <strong>and</strong> unwarranted<br />

searches <strong>and</strong> seizures <strong>and</strong> the rights to due process of law apply <strong>in</strong><br />

cyberspace as anywhere else, yet technological realities can complicate<br />

the observance of these rights. The pursuit of crimes committed over<br />

<strong>in</strong>ternational computer networks is also complicated by the differences<br />

<strong>in</strong> domestic procedures <strong>and</strong> the absence of a system of <strong>in</strong>ternational<br />

crim<strong>in</strong>al law.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!