Civil Liberties and Security in Cyberspace - Hoover Institution
Civil Liberties and Security in Cyberspace - Hoover Institution
Civil Liberties and Security in Cyberspace - Hoover Institution
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 214<br />
214 Ekater<strong>in</strong>a A. Drozdova<br />
for the purposes of optimiz<strong>in</strong>g network performance <strong>and</strong> ensur<strong>in</strong>g<br />
security, generally will not face constra<strong>in</strong>ts of crim<strong>in</strong>al law. Cooperation<br />
among ISPs <strong>and</strong> computer security professionals could be summoned<br />
to protect hardware, software, <strong>and</strong> databases. This would serve<br />
not only the goal of combat<strong>in</strong>g cyber crime (which may have a lower<br />
priority <strong>in</strong> nongovernmental, for-profit organizations), but also immediate<br />
goals of meet<strong>in</strong>g contractual commitments to customers,<br />
ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g cont<strong>in</strong>uity of bus<strong>in</strong>ess, <strong>and</strong> guard<strong>in</strong>g aga<strong>in</strong>st liabilities<br />
that may arise from allegations of negligence. More effective computer<br />
security <strong>and</strong> timely detection of <strong>and</strong> response to unauthorized access<br />
or use of cyber systems would help reduce both cyber crime <strong>and</strong> <strong>in</strong>trusive<br />
law enforcement.<br />
Should police <strong>in</strong>vestigation become necessary, the use of automated<br />
near-real-time <strong>in</strong>trusion detection, track<strong>in</strong>g, conta<strong>in</strong>ment, response,<br />
<strong>and</strong> report<strong>in</strong>g capabilities would more readily satisfy the legal<br />
constra<strong>in</strong>ts imposed on this activity. Automation may not solve all<br />
problems, but where available <strong>and</strong> appropriate, it could provide<br />
grounds for probable cause, identify suspects, <strong>and</strong> collect a certa<strong>in</strong><br />
amount of evidence, while preserv<strong>in</strong>g the anonymity of un<strong>in</strong>volved<br />
network users. Some automated methods may be limited <strong>in</strong> scope to<br />
local orientation <strong>and</strong> reaction, which is <strong>in</strong>effective <strong>in</strong> the <strong>in</strong>ternetworked<br />
global environment. A global response to cyber crime dem<strong>and</strong>s<br />
capabilities to correlate <strong>in</strong>trusion/attack symptoms occurr<strong>in</strong>g<br />
seem<strong>in</strong>gly <strong>in</strong>dependently <strong>in</strong> different parts of the network. Reaction<br />
must be coord<strong>in</strong>ated <strong>and</strong> uniform. Constra<strong>in</strong>ts on search, seizure, <strong>and</strong><br />
due process of law under these circumstances are necessarily more<br />
important.<br />
Due Process of Law<br />
International human rights agreements <strong>and</strong> many national constitutions<br />
guarantee equal <strong>and</strong> proper treatment of <strong>in</strong>dividuals before the<br />
law. This guarantee entitles <strong>in</strong>dividuals to protection aga<strong>in</strong>st self-<strong>in</strong>crim<strong>in</strong>ation<br />
<strong>and</strong> arbitrary arrest, detention, or exile. If arrested, one