21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 214<br />

214 Ekater<strong>in</strong>a A. Drozdova<br />

for the purposes of optimiz<strong>in</strong>g network performance <strong>and</strong> ensur<strong>in</strong>g<br />

security, generally will not face constra<strong>in</strong>ts of crim<strong>in</strong>al law. Cooperation<br />

among ISPs <strong>and</strong> computer security professionals could be summoned<br />

to protect hardware, software, <strong>and</strong> databases. This would serve<br />

not only the goal of combat<strong>in</strong>g cyber crime (which may have a lower<br />

priority <strong>in</strong> nongovernmental, for-profit organizations), but also immediate<br />

goals of meet<strong>in</strong>g contractual commitments to customers,<br />

ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g cont<strong>in</strong>uity of bus<strong>in</strong>ess, <strong>and</strong> guard<strong>in</strong>g aga<strong>in</strong>st liabilities<br />

that may arise from allegations of negligence. More effective computer<br />

security <strong>and</strong> timely detection of <strong>and</strong> response to unauthorized access<br />

or use of cyber systems would help reduce both cyber crime <strong>and</strong> <strong>in</strong>trusive<br />

law enforcement.<br />

Should police <strong>in</strong>vestigation become necessary, the use of automated<br />

near-real-time <strong>in</strong>trusion detection, track<strong>in</strong>g, conta<strong>in</strong>ment, response,<br />

<strong>and</strong> report<strong>in</strong>g capabilities would more readily satisfy the legal<br />

constra<strong>in</strong>ts imposed on this activity. Automation may not solve all<br />

problems, but where available <strong>and</strong> appropriate, it could provide<br />

grounds for probable cause, identify suspects, <strong>and</strong> collect a certa<strong>in</strong><br />

amount of evidence, while preserv<strong>in</strong>g the anonymity of un<strong>in</strong>volved<br />

network users. Some automated methods may be limited <strong>in</strong> scope to<br />

local orientation <strong>and</strong> reaction, which is <strong>in</strong>effective <strong>in</strong> the <strong>in</strong>ternetworked<br />

global environment. A global response to cyber crime dem<strong>and</strong>s<br />

capabilities to correlate <strong>in</strong>trusion/attack symptoms occurr<strong>in</strong>g<br />

seem<strong>in</strong>gly <strong>in</strong>dependently <strong>in</strong> different parts of the network. Reaction<br />

must be coord<strong>in</strong>ated <strong>and</strong> uniform. Constra<strong>in</strong>ts on search, seizure, <strong>and</strong><br />

due process of law under these circumstances are necessarily more<br />

important.<br />

Due Process of Law<br />

International human rights agreements <strong>and</strong> many national constitutions<br />

guarantee equal <strong>and</strong> proper treatment of <strong>in</strong>dividuals before the<br />

law. This guarantee entitles <strong>in</strong>dividuals to protection aga<strong>in</strong>st self-<strong>in</strong>crim<strong>in</strong>ation<br />

<strong>and</strong> arbitrary arrest, detention, or exile. If arrested, one

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!