Abstract
Cyberspace is an inherently global medium. Cybercrime and terrorism are worldwide concerns. Preserving human rights in cyberspace is also an international concern.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
An alternate version of this essay was printed in the International Review of Law, Computers & Technology, 14, no. 1 (March 2000): 11–24. For research assistance with this essay, including drafting the footnotes, Professor Strossen gratefully acknowledges her chief aide, Amy L. Tenney, and her research assistant, Cesar de Castro. The footnotes were added through the efforts of Professor Strossen’s staff, who thereby have earned both the credit and the responsibility for them (which Professor Strossen has not reviewed, and for which she disclaims both credit and responsibility).
See, for example, Global Internet Liberty Campaign, Regardless of Frontiers: Protecting the Human Right to Freedom of Expression on the Global Internet, 1998, available at <http://www.cdt.org/gilc/report.html>
Global Internet Liberty Campaign, Privacy and Human Rights: An International Survey of Privacy Laws and Practice, 1998, available at <http://www.gilc.org/privacy/survey/>.
Williams v. Garrett, 722 R Supp. 254,256 (W.D. Va. 1989) (quoting Thomas Jefferson).
See Nadine Strossen and Ernie Allen, “Megan’s Law and the Protection of the Child in the Online Age,” American Criminal Law Review 35, no. 4 (summer 1998): 1319–41. In a related vein, Professor Frederick Schauer of Harvard University testified against the Child Pornography Prevention Act of 1996, a federal law punishing anyone who possesses any work that depicts someone who appears to be a minor engaged in “sexually explicit conduct.” Schauer stated that the law would “wind up hurting rather than helping the cause of prosecuting the . . . individuals who exploit children by diverting resources away from actual prosecution of child molesters.” (See Nadine Strossen, “Bang the Tin Drum No More.” Monthly column for Intellectual Capital, M July, 1997, <http://www.intellectual capital.com>).
See Erznoznik v. City of Jacksonville, 422 U.S. 205, 212 (1975) ([M]inors are entitled to a significant measure of First Amendment protection.); Tinker v. Des Moines Indep. Community Sch Dist, 393 U.S. 503, 506 (1969) (First Amendment rights... are available to ... students...); United Nations Children’s Fund (1989) Convention on the Rights of the Child. See Article 13 under “Convention Full Text” tab from <http://www.unicef.org/crc/crc.htm>: “The child shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of the child’s choice.”
See Electronic Privacy Information Center, Cryptography and Liberty 1999: An International Survey of Encryption Policy, (1999), <http://www2.epic.org/reports/crypto 1999.html>.
The concept of the right to privacy as personal security against unwarranted intrusion by others is embodied in many legal guarantees of that right, including the Fourth Amendment to the U.S. Constitution, which provides, in pertinent part: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated ...” Indeed, many individuals feel particularly threatened by governmental intrusions.
See S.D. Warren and L.D. Brandeis, “The Right to Privacy,” Harvard Law Review 4, no. 5 (1890): 193.
See Olmstead v. United States, 277 U.S. 438, 485 (1928) (Brandeis, J. dissenting), overruled by Katz v. United States, 389 U.S. 347 (1967).
See National Research Council, Cryptography’s Role in Securing the Information Society, ed. Kenneth W Dam and Herbert S. Lin (Washington, D.C.: National Academy Press, 1996), <http://www.nap.edu/readingroom/books/crisis/>.
See 47 U.S.C. Section 223 (a, d) (1999).
See Reno v. American Civil Liberties Union, 521 U.S. 844 (1997)
See 47 U.S.C. Section 231 (1999).
See American Civil Liberties Union v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999).
Id. at 498.
See American Civil Liberties Union v. Miller, 977 F. Supp. 1228 (N.D. Ga. 1997).
Bernstein v. U.S., 974 R Supp. 1288 (N.D. Ca. 1997), aff’d,176 F.3d 1132 (9th Cir. May 6, 1999) (holding that encryption regulations were an unconstitutional prior restraint in violation of the First Amendment). But cf. Junger v. Dale, 8 F. Supp. 2d 708, 715 (N.D. Oh. 1998) (holding that although encryption source code may occasionally be expressive, its export is not protected conduct under the First Amendment); Kam v. U.S. Dept of State, 925 F. Supp. 1 (D.D.C. 1996) (rejecting First Amendment challenge to encryption export regulations). In mid-September 1999, the Clinton Administration announced that it will relax encryption export controls. See J. Clausing, “In a Reversal, White House Will End Data-Encryption Export Curbs,” New York Times, 17 September 1999. However, even with the Clinton Administration’s recent pronouncement, civil libertarians continue to point out the problems with encryption regulations—namely, that export control laws on encryption are unconstitutional prior restraints on speech, and that the new proposed regulations apply only to commercial, not academic, work; see Electronic Frontier Foundation, “Latest Governmental Encryption Scheme Still Unconstitutional: EFF-Sponsored Legal Challenge Will Proceed,” 16 September 1999, <http://www.eff.org/91699_crypto_release.html>. In 1999, the Ninth Circuit withdrew the three-judge panel decision in Bernstein and ordered the case to be reheard en banc. Bernstein v. U.S., No. 97–16686, 1999 U.S. App. LEXIS 24324 (9th Cir. Sept. 30, 1999).
See Global Internet Liberty Campaign, Wayne Madsen et. al, “Cryptography and Liberty 1998: An International Survey of Encryption Policy,” February 1998, <http://www.gilc.org/crypto/crypto-survey.html>.
Ibid.
Ibid., 6.
See Y. Akdeniz and N. Strossen, “Obscene and Indecent Speech,” in The Internet, Law and Society, ed. C. Walker, Y. Akdeniz, and D. Wall (Essex: Addison Wesley Longman, 2000).
See Garrison Keillor, Statement to the Senate Subcommittee on Education, 29 March 1990 (Testimony on NEA Grant Funding and Restrictions) 136 Cong. Rec. E. 993 (1990).
See American Civil Liberties Union Freedom Network, “Cyber-Liberties,” <http://www.aclu.org/issues/cyber/hmcl.html>.
See Reno v. American Civil Liberties Union, 521 U.S. 844 (1997); American Civil Liberties Union v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999).
See American Library Assn v. Pataki, 969 F. Supp. 160 (S.D.N.Y. 1997).
See Urofsky v. Allen, 995 F. Supp. 634 (E.D. Va. 1998), overruled by Urofsky v. Gilmore, 167 F.3d 191 (4th Cir. 1999).
See American Civil Liberties Union v. Johnson, 4 F. Supp. 2d 1029 (D.N.M. 1998).
See Cyberspace v. Engler, 55 F. Supp. 2d 737 (E.D. Mich. 1999).
See Mainstream Loudoun v. Loudoun County Library, 24 F. Supp. 2d 552 (E.D. Va. 1998).
See Urfosky v. Gilmore, 167 F3d 191 (4th Cir. 1999)
See Waters v. Churchill, 511 U.S. 661, 674–75 (1994); Pickery v. Board ofEduc, 391 U.S. 563, 568 (1968).
See Urofsky v. Allen, 995 F. Supp. 634 (E.D. Va. 1998).
See Urofsky v. Gilmore, 167 F.3d 191, 196 (4th Cir. 1999).
See Reno v. American Civil Liberties Union, 521 U.S. 844 (1997).
See 47 U.S.C. Section 223(d)(1)(B).
See 47 U.S.C. Section 223(a)(l)(B)(ii).
See 47 U.S.C. Section 231(a)(1).
Id.
See 47 U.S.C. Section 231(e)(2)(B).
See 47 U.S.C. Section 231(e)(6).
See Nadine Strossen, Defending Pornography. Free Speech, Sex, and the Fight for Womens Rights (New York: Charles Scribner & Sons, 1995; reprint New York: New York University Press, 2000).
See American Civil Liberties Union v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999).
Id. at 492.
See E. Chemerinsky, Constitutional Law: Principles and Policies (New York: Aspen Law & Business, 1997), 416.
See American Civil Liberties Union v. Reno, 31 R Supp. 2d 473, 495 (E.D. Pa. 1999).
Id. at 497.
Id.
See American Civil Liberties Union, “Internet Censorship Battle Moves to Appeals Court,” Press Release, 4 April, 1999, available at <http://www.aclu.org/news/1999/n040299a.html>.
See Ginsberg v. New York, 390 U.S. 629 (1968).
See Mainstream Loudoun v. Loudoun County Library, 24 F. Supp. 2d 552 (E.D. Va. 1998).
See American Civil Liberties Union, “Fahrenheit 451.2: Is Cyberspace Burning?” 1997, <http://www.aclu.org/issues/cyber/burning.html>
also American Civil Liberties Union, “Censorship In a Box,” 1998, <http://www.aclu.org/issues/cyber/box.html>.
See American Civil Liberties Union, “Censorship In A Box,” 1998 <http://www.aclu.org/issues/cyber/box.html>.
See Mainstream Loudoun v. Loudoun County Library, 24 F. Supp. 2d 552 (E.D. Va. 1998).
Id. at 567.
See Harris v. Forklift Sys. Inc., 510 U.S. 17, 21 (1993); and Nadine Strossen, Defending Pornography. Free Speech, Sex, and the Fight for Women’s Rights, (New York: Charles Scribner & Sons, 1995; reprint New York: New York University Press, 2000).
See Mainstream Loudoun v. Loudoun County Library, 24 F. Supp. 2d 552,564–65 (E.D.Va. 1998).
Id. at 564.
Id. at 570.
Id. at 567.
Id.
See D. Hedgpeth, “Libraries Abandon Court Fight; Board Won’t Appeal Internet Policy Rulings,” Washington Post, 22 April, 1999.
For detailed information on all of these cases, including the parties’ litigation papers and the courts’ rulings, see the ACLU’s Web site: <http://www.aclu.org/issues/cyber/hmcl.html>.
See Brian Gladman, “Wassenaar Controls, Cyber-Crime and Information Terrorism,” Cyber-Rights and Cyber-Liberties (UK), September 1998, < http://www.cyber-rights.org/crypto/wassenaar.htm>.
See National Public Radio, “Feds Say E-Mail Scrambler is a Weapon,” National Public Radio Morning Edition, April 14, 1995.
See J. Fraser, “The Use of Encrypted, Coded and Secret Communications is an ‘Ancient Liberty’ Protected by the United States Constitution,” Virginia Journal of Law and Technology, 2 (1997): 25, n.123.
See National Research Council, Cryptography’s Role in Securing the Information Society, ed. Kenneth W. Dam and Herbert S. Lin, 1996, <http://www.nap.edu/readingroom/books/crisis/>.
Ibid.
See Global Internet Liberty Campaign, “Cryptography is a Defensive Tool, Not a Weapon,” 14 September 1998, <http://www.gilc.org/crypto/wassenaar/gilc-statement-998.html>, 2.
See George Smith, “An Electronic Pearl Harbor? Not Likely,” Issues in Science and Technology Online, Fall 1998, <http://www.nap.edU/issues/15.l/smith.html>.
Ibid., 1.
Ibid., 2.
Ibid., 9.
Ibid., 1.
See The President’s Commission on Critical Infrastructure Protection (Report Summary), “Critical Foundations: Thinking Differently,” October 1997, available at <http://www.ciao.gov/PCCIP/PCCIP_Report.pdf>.
See Andy Oram, “A Sacrifice to the War Against Cyber-Terrorism,” 1997, <http://www.oreilly.com/people/staff/andyo/ar/terror_pub.html> (quoting the report issued by the President’s Commission on Critical Infrastructure Protection on October 13, 1997 and presented by its Chairman Robert T. Marsh, before a Congressional Committee on November 5, 1997).
See Electronic Privacy Information Center (White Paper), “The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63,” 22 May 1998, <http://www.epic.org/security/infowar/cip_ white_paper.html>.
See Brian Gladman, “Wassenaar Controls, Cyber-Crime and Information Terrorism,” Cyber-Rights and Cyber-Liberties (UK), September 1998, <http://www.cyber-rights.org/crypto/wassenaar.htm>.
See Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, and Whitfield Diffie, “The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption,” A Report by an Ad Hoc Group of Cryptographers and Computer Scientists, September 1998. Available at <http://www.cdt.org/crypto/risks98>.
See Omega Foundation, “An Appraisal of the Technologies of Political Control,” September 1998, <http://www.jya.com/stoa-atpc-so.htm>.
See Global Internet Liberty Campaign, “Cryptography and Liberty 1998,” February 1998, <http://www.gilc.org/crypto/crypto-survey.html>.
See also Electronic Privacy Information Center, Cryptography and Liberty 1999: An International Survey of Encryption Policy, 1999, <http://www2.epic.org/ reports/cryptol999.html>.
See Global Internet Liberty Campaign, Cryptography and Liberty 1998, February 1998, <http://www.gilc.org/crypto/crypto-survey.html>.
See Olmstead v. United States, 277 U.S. 438, 479 (1928) (Brandeis, J. dissenting), overruled by Katz v. United States, 389 U.S. 347 (1967).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Strossen, N. (2002). Cybercrimes v. Cyberliberties. In: Lehr, W.H., Pupillo, L.M. (eds) Cyber Policy and Economics in an Internet Age. Topics in Regulatory Economics and Policy Series, vol 43. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-3575-8_10
Download citation
DOI: https://doi.org/10.1007/978-1-4757-3575-8_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-3577-2
Online ISBN: 978-1-4757-3575-8
eBook Packages: Springer Book Archive