High-profile cybercrimes that underscore the Net's vulnerability are frequently the subject of headlines in major publications. The Wall Street Journal proclaimed the Internet "Under Siege" (Hamilton and Cloud 2000) as it described how cyberterrorists had temporarily paralyzed some of the country's biggest Web sites through a denial-of-service attack. The technique is relatively simple, but the results can be catastrophic. Denial of service now joins a long list of other weapons that "black hat" hackers or crackers use to disrupt Web sites. These include packet sniffers, trojan horses, and malicious applets. Many companies fall prey to these damaging technologies despite their renewed vigilance and their heavy investment in security systems.
Privacy and intellectual property rights will be meaningless unless we can adequately secure the Net and thwart the efforts of those who engage in criminal activity. Also, as observed in Chapter 4, Internet commerce is unlikely to flourish in an environment rife with crime and theft. There must be a level of trust, but how can we achieve this trust with the opaqueness of so many Internet relationships and transactions?
In this final chapter we will cover some of the legal and technical background central to developing a lucid analysis of security and related policy issues. After a cursory overview of the Net's vulnerabilities and cybercrime, we turn to the new frontiers for law enforcement in cyberspace. Special focus will be on the encryption controversy in the United States, the uneasy issues raised by government surveillance, and the use of technologies such as the FBI's Carnivore. These issues have obviously assumed greater import thanks to the events of September 11. The problem is that some of the architectures used to secure the Net and protect privacy give succor to criminals and terrorists. Society must make difficult trade-offs between privacy and anonymity and the need for an Internet infrastructure that permits electronic surveillance by law-enforcement authorities. We will carefully look at how these tradeoffs have been managed so far and how the balance between security and liberty may need to be recalibrated to help in the struggle against terrorism.
We then shift focus to the topic of digital identity as a way to promote trust and security. Mandating digital identity as a means of assuring authentication appears to have the force of inevitability, but is it a sound and responsible idea? We will argue that code has a role to play in resolving this problem, since there are architectures that can authenticate without creating a privacy hazard. Finally, we conclude with a laconic discussion on whether security achieved through architectures is the best path to a more trustworthy Internet.
1 comments: on "Cybercrime, Encryption, and Government Surveillance"
They just browbeaten safety flaws, unlatched vulnerabilities in the Windows NT in service system
Regards
vanya
Post a Comment