Cover image for Fighting terror online : the convergence of security, technology, and the law
Title:
Fighting terror online : the convergence of security, technology, and the law
Personal Author:
Publication Information:
New York, NY : Springer, 2008
Physical Description:
xiii, 178 p. ; 25 cm.
ISBN:
9780387735771

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010178750 HV6431 G64 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror. It identifies the threats, the security needs, and the issues unique to this environment. The book examines whether the characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda.


Author Notes

Martin Charles Golumbic is Professor of Computer Science and Director of the Caesarea Edmond Benjamin de Rothschild Foundation Institute for Interdisciplinary Applications of Computer Science at the University of Haifa. He is the editor of the book "Advances in Artificial Intelligence, Natural Language and Knowledge-based Systems" (Springer, 1990), the author of the book "Algorithmic Graph Theory and Perfect Graphs" (second edition, Elsevier 2004), coauthor of a second book "Tolerance Graphs" (Cambridge University Press, 2004), and the founding editor-in-chief of the journal series "Annals of Mathematics and Artificial Intelligence" (Springer). Professor Golumbic received his Ph.D. in mathematics from Columbia University in 1975, and has previously held positions at New York University, Bell Laboratories, IBM Israel and Bar-Ilan University as well as visiting positions at Université de Paris, the Weizmann Institute of Science, and Ecole Polytechnique Fédérale de Lausanne. He has given guest lectures in 15 states in the U.S.A. and in 20 other countries, and he was elected as a Fellow of the European Artificial Intelligence society ECCAI in 2005.


Table of Contents

Introductionp. 1
Global Wars in a Global Information Environmentp. 1
The Decline of the Statep. 4
The Comeback of the Statep. 6
Balancing Wars through the Lawp. 8
Digital Lawp. 10
The Law of Digital Warsp. 12
An Outline of the Bookp. 12
1 The Balance Between Security and Civil Rightsp. 15
1.1 Mapping the Threats: Preventing Physical and Virtual Terrorist Attacksp. 16
1.2 Designing Policies to Address New Security Threatsp. 18
1.2.1 Information Warfarep. 19
1.2.2 Data Securityp. 22
1.2.3 Gathering Information and Surveillancep. 24
1.2.4 Regulation of Encryption Productsp. 28
1.2.5 Terror Propagandap. 30
1.3 Preserving Civil Libertiesp. 37
1.3.1 The Right to Privacyp. 38
1.3.2 Freedom of Expressionp. 44
1.3.3 Enforcementp. 49
1.4 Electronic Commerce and Innovationp. 56
1.4.1 Ramifications for Research and Developmentp. 56
1.4.2 Encryption Regulation and Electronic Commercep. 58
2 The Legal Situation: Prevention and Enforcement in the Information Agep. 63
2.1 The International Scenep. 64
2.1.1 Protection of the Right to Privacyp. 64
2.1.2 International Regulation for Protection of Personal Datap. 65
2.1.3 International Regulation of Encryption Productsp. 68
2.1.4 International Regulation of Decryption Productsp. 68
2.2 The United Statesp. 69
2.2.1 Protection of the Right to Privacyp. 69
2.2.2 Protection of the Freedom of Speechp. 74
2.2.3 American Regulation of Encryption Productsp. 80
2.2.4 American Regulation of Decryption Productsp. 85
2.3 The European Unionp. 88
2.3.1 Protection of the Right to Privacyp. 89
2.3.2 EU Regulation of Encryptionp. 95
2.3.3 EU Regulation of Copyrightp. 99
2.4 Other Countriesp. 102
2.4.1 Britainp. 102
2.4.2 Canadap. 104
2.4.3 Australiap. 105
3 The Legal Framework in Israelp. 107
3.1 The Right to Privacyp. 107
3.1.1 Search and Seizurep. 108
3.1.2 Secret Monitoring in Israeli Lawp. 110
3.2 Freedom of Speechp. 119
3.2.1 Liability of Service Providersp. 119
3.2.2 Enforcement of Hacking Prohibitionsp. 122
3.3 Israeli Regulation of Encryptionp. 124
3.3.1 The Framework of the Legal Arrangements up to 1998p. 125
3.3.2 The Framework of the Legal Arrangements After 1998p. 128
3.4 Freedom of Occupationp. 132
3.5 Property Rightsp. 135
4 Technological Issuesp. 137
4.1 What is Encryption? The Technological Basisp. 137
4.2 The Basic Principle of Encryption: Letter Replacementp. 139
4.3 Symmetrical Encryptionp. 139
4.4 Asymmetrical Encryption: Public Key and Private Keyp. 141
4.4.1 The RSA Encryption Methodp. 141
4.4.2 Analysis of the RSA Methodp. 142
4.5 How is Information Gathered on the Internet?p. 146
4.5.1 General Backgroundp. 146
4.5.2 Means of Collecting Information and Monitoring the Internetp. 148
4.5.3 Collection of information on the server or the PCp. 152
5 Recommendations: Is There a Need for New Regulations?p. 155
5.1 The Existing System's Suitability for the Internetp. 155
5.2 Implementing Existing Legal Regulations for the Internetp. 156
5.3 Protecting the Right to Privacyp. 157
5.4 The Liability of Internet Service Providersp. 159
5.5 Regulating Encryption Products to Protect Freedom of Occupationp. 160
Concluding Remarksp. 165
Name Indexp. 169
Subject Indexp. 173