Securing Private Communications
Information Law Series Volume 38
Private communications are all around us, the internet is in our "things". While our bits flow across the world, often our data lacks robust protection. Axel Arnbak has managed to grab a critical and complex regulatory phenomenon and offer both conceptual and practical advice on what to do about it. Warmly recommended.
-- Jacob Kohnstamm, Chair Dutch Data Protection Authority, former Chair Article 29 Working Party.
We learned from DigiNotar that online trust is broken, and from Ed Snowden that it's even more broken. So what should European institutions be doing about it? You should read Axel Arnbak's book to find out.
-- Ross Anderson, Professor of Security Enginneering, Computer Laboratory at Cambridge University, author of a.o. ‘Security Engineering’.
Securing Private Communications. Protecting Private Communications Security in EU Law – Fundamental Rights, Functional Value Chains and Market Incentives, offers a conceptual and legislative toolkit that helps in building a step-by-step regulatory model in EU law. This book argues for a stricter stance on protecting private communications security. Increasingly, it has become clear that any communicative act online is subject to breach by intelligence agencies, cybercriminals, advertising networks, employers, and corporate data miners, to mention the most obvious intruders. Internet users, seeing no other choice than to hop onto the web-based bandwagon, have come to depend on a networked communications environment that is fundamentally insecure. Now lawmakers, worldwide, are gearing up to intervene.
What’s in this book:
From the interlocking perspectives of fundamental rights, systems design, and political organization, the author examines such salient issues as the following:
- the history of EU communications security law;
- why systems fail;
- whether communications markets on their own produce security;
- the regulatory strategies of deterrence and protection;
- the emergence of a fundamental right to data security.
This book provides a comprehensive overview of the current European regulatory framework on communications security and offers a multidisciplinary study on EU communications security law. The history of the past 25 years of EU communications security law is analyzed in-depth.
The regulatory model proposed is tested on HTTPS, which covers the user–provider relationship in web browsing, and on ‘cloud’ communications that affect interdomain and intradomain communications. Case studies included in the book are based on the infamous DigiNotar breach and the MUSCULAR program, disclosed by whistle-blower Edward Snowden, and contain original legal, security economic, and computer science research, conducted jointly with scholars trained in these disciplines.
How will this help you:
Responding to a generally positive outlook of the human right to communications security that is emerging from European fundamental rights law, this book not only provides one of the first interdisciplinary studies to appear in existing academic literature on EU communications security law, but also offers broad recommendations to the EU lawmaker and gives directions for future research. This book shows how to balance fundamental rights, systems design, and political organization in communications security regulation by presenting a detailed model, drawing on relevant work in information law, policymaking, computer science, economics, philosophy, and political science. It offers a viable analysis on the market incentives of communications providers to produce communications security. The book is sure to become a first point of discussion, reference, and l
|Product Line||Kluwer Law International|
Chapter 1. Introduction
Part I: A History of EU Communications Security Law
Chapter 2. Five EU Communications Security “Policy Cycles”
Chapter 3. Analytical Framework
Part II: Theory and Tools for the EU Lawmaker
Chapter 4. Fundamental Rights Perspectives
Chapter 5. Systems Design Perspectives
Chapter 6. Political Perspectives
Part III: Case Studies for the EU Lawmaker
Chapter 7. Model and Methodology
Chapter 8. HTTPS – Communications Security in Web Browsing
Chapter 9. The Snowden Files – Communications Security in the “Cloud”
Part IV: Securing Private Communications
Chapter 10. Summary, Analysis, and Conclusions
Table of Cases