Skip to main content

Governmental Control of the Internet in addressing Law Enforcement and National Security

  • Chapter
  • 453 Accesses

Abstract

Some people contended that governmental regulation of the Internet would not be possible due to its inherent characteristics. This paper relates how governments, in addressing law enforcement and national security, have taken control of the Internet by means of legislation. Consideration is given to the influence and impact of powerful governments on the legal regulation of the Internet. It is pointed out that when addressing law enforcement and national security the borderless nature of the Internet is in reality bordered. It is concluded that in striving towards law enforcement and national security, enforcement of governmental control of the Internet is not easily achieved without the assistance of the Internet Service Provider (ISP) as well as international assistance and co-operation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barlow, John Perry: A declaration of the Independence of Cyberspace. In: http://www.islandone.org/Politics/DeclarationOfIndependance.html (August 1, 2007).

    Google Scholar 

  2. Baumann, Michael: Cyberattacks engulf Kremlin’s critics, left and right. In: http://www.ioltechnology,co.za/article_print.php?iArticleID=5017802 January 24, 2008).

    Google Scholar 

  3. Bowrey, Kathy: Law and Internet Culture. Cambridge University Press, 2005, p. 8–9, 194–197.

    Google Scholar 

  4. Burney, Brett: The Concept of Cybercrime — Is it right to analogize a physical crime to a cybercrime? The rise of the Internet. In: http://www.cybercrimes.net/Virtual/Burney/pages3.html (February 12, 2002)

    Google Scholar 

  5. Carr, Indira: Anonymity, the Internet and Criminal Law Issues. In: C. Nicoll, J.E.J. Prins and M.J.M. van Dellen (Eds): Digital Anonymity and the Law. T M C Asser Press, The Hague, 2003, p. 161–188.

    Google Scholar 

  6. Carvajal, Doreen: Europe poised to bolster web shield. In: http://yaleglobal.yale.edu/display.article?id=10598 (June 15, 2008).

    Google Scholar 

  7. Ferguson, Tim: Nato fires up cyber defences. In: http://software.silicon,com/securty/0,39024655,39223469,00.htm (June 15, 2008).

    Google Scholar 

  8. Goldsmith, Jack and Wu, Tim: Who controls the Internet. Oxford University Press, USA, 2006, p. 73, 81, 84, 103, 145, 163–167.

    Google Scholar 

  9. Heath, Nick: Nato: Cyber terrorism “as dangerous s missile attack”. In: http://www.crime-research.org/news/10.03.2008/3241/ (March 19, 2008).

    Google Scholar 

  10. Hiller, Janine and Cohen, Ronnie: Internet Law and Policy. Pearson Education, Inc., New Jersey, 2002, p. 75–76, 95, 98–100, 169, 170–171.

    Google Scholar 

  11. Janczewski, Lech and Colarik, Andrew: Managerial Guide for Handling Cyber-terrorism and Information Warfare, Idea Group Publishing, USA, 2005, p. x, 43, 222–225.

    Google Scholar 

  12. Jones, Huw: Estonia calls for EU law to ban cyber attacks. In: http://www.crime-research.org/news/12/03.2008/3248/ (March 19, 2008).

    Google Scholar 

  13. Ryan, Johny: Outbreak of iWar imminent. In: Commercial Crime Journal, March 2008, p. 10–11.

    Google Scholar 

  14. Taylor, R.W., Caeti, T.J., Loper, T.J., Fritsch, E.J. and Liederbach, J: Digital Crime and Digital Terrorism, Pearson Education, Inc, USA, 2006, p. 9–15, 27, 43, 378–379.

    Google Scholar 

  15. Tribe, Laurence. H: The Constitution in Cyberspace: Law and Liberty Beyond the Electronic Frontier. Presented at the first Conference on Computers, Freedom and Privacy, held in 1991. In: http://www.fiu.edu/∼mizrachs/CyberConst.html (March 22, 2008).

    Google Scholar 

  16. Warren, Jim: Introduction. Presented at the first Conference on Computers, Freedom and Privacy, held in 1991. IEEE Computer Society. In: http://www.cpsr.org/conferences/cfp91/intro.html/view (March 21, 2008).

    Google Scholar 

  17. Watney, Murdoch: State Surveillance of the Internet: human rights infringement or e-security mechanism? International Journal of Electronic Security and Digital Forensics, Vol. 1, No.1, 2007, p. 42–54.

    Article  Google Scholar 

  18. Watney, Murdoch: The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet’ In: N. Pohlmann, H. Reiner and W. Schneider ISSE/Secure 2007 Securing Electronic Business Processes, Vieweg, Wiesbaden, p. 26–37.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Watney, M. (2009). Governmental Control of the Internet in addressing Law Enforcement and National Security. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9283-6_11

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0660-4

  • Online ISBN: 978-3-8348-9283-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics