21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 218<br />

218 Ekater<strong>in</strong>a A. Drozdova<br />

extend to denial of technological <strong>and</strong> economic assistance under the<br />

regime, expulsion from the regime, <strong>and</strong> measures to limit the ability<br />

of the offend<strong>in</strong>g government to benefit from participat<strong>in</strong>g <strong>in</strong> the <strong>in</strong>ternational<br />

<strong>in</strong>formation <strong>in</strong>frastructure.<br />

4. Conclusion<br />

The extent to which the rights to privacy, the protections aga<strong>in</strong>st<br />

unwarranted searches <strong>and</strong> seizures, <strong>and</strong> the rights to due process of<br />

law constra<strong>in</strong> an <strong>in</strong>ternational regime aga<strong>in</strong>st cyber crime <strong>and</strong> terrorism<br />

depends on the regime <strong>and</strong> the domestic laws of participat<strong>in</strong>g<br />

states. National laws often conta<strong>in</strong> exceptions or special privileges for<br />

law enforcement to pursue crim<strong>in</strong>al <strong>in</strong>vestigations. These privileges<br />

may also threaten the protection of human rights. States have different<br />

attitudes toward privacy, law enforcement powers, <strong>and</strong> due process.<br />

However, unilateral responses to cyber crime are not likely to be<br />

effective. Confronted with the need for <strong>in</strong>ternational cooperation,<br />

states will look for ways to reconcile these differences or attempt to<br />

justify some <strong>in</strong>appropriate behavior. Greater emphasis on protective<br />

technological <strong>and</strong> legal measures, <strong>and</strong> respect for civil liberties <strong>in</strong> the<br />

course of cooperation, will help reduce the latter outcome.<br />

Overall, protective measures, which aim to reduce cyber vulnerabilities<br />

<strong>and</strong> rely on computer security staff for <strong>in</strong>itial reaction to <strong>in</strong>cidents,<br />

are less <strong>in</strong>trusive than measures designed to allow extensive law<br />

enforcement presence <strong>in</strong> cyberspace. The protective approach can be<br />

implemented through encryption, automation, <strong>and</strong> anonymous tagg<strong>in</strong>g<br />

<strong>and</strong> track<strong>in</strong>g—record<strong>in</strong>g fields <strong>in</strong> packet header <strong>in</strong>formation, for<br />

example, which does not <strong>in</strong>trude on the content of messages, or routerassisted<br />

f<strong>in</strong>gerpr<strong>in</strong>t<strong>in</strong>g of packets without disclosure of their orig<strong>in</strong>ator<br />

unless sufficient evidence of crime emerges. Although better measures<br />

will need to be designed <strong>and</strong> updated cont<strong>in</strong>uously to keep up with<br />

offenses, this approach can afford greater protection aga<strong>in</strong>st both<br />

cyber crime <strong>and</strong> <strong>in</strong>trusive law enforcement.<br />

The reactive approach necessarily <strong>in</strong>volves the participation of law

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!