Securing Private Communications : Protecting Private Communication Security in EU Law – Fundamental Rights, Functional Value Chains and Market Incentives.
Securing Private Communications : Protecting Private Communication Security in EU Law – Fundamental Rights, Functional Value Chains and Market Incentives.
Private communications are all around us, the internet is in our "things". While our bits flow across the world, often our data lacks robust protection. Axel Arnbak has managed to grab a critical and complex regulatory phenomenon and offer both conceptual and practical advice on what to do about it. Warmly recommended. -- Jacob Kohnstamm, Chair Dutch Data Protection Authority, former Chair Article 29 Working Party. We learned from DigiNotar that online trust is broken, and from Ed Snowden that it's even more broken. So what should European institutions be doing about it? You should read Axel Arnbak's book to find out. -- Ross Anderson, Professor of Security Enginneering, Computer Laboratory at Cambridge University, author of a.o. ‘Security Engineering’. Securing Private Communications. Protecting Private Communications Security in EU Law – Fundamental Rights, Functional Value Chains and Market Incentives, offers a conceptual and legislative toolkit that helps in building a step-by-step regulatory model in EU law. This book argues for a stricter stance on protecting private communications security. Increasingly, it has become clear that any communicative act online is subject to breach by intelligence agencies, cybercriminals, advertising networks, employers, and corporate data miners, to mention the most obvious intruders. Internet users, seeing no other choice than to hop onto the web-based bandwagon, have come to depend on a networked communications environment that is fundamentally insecure. Now lawmakers, worldwide, are gearing up to intervene. What’s in this book: From the interlocking perspectives of fundamental rights, systems design, and political organization, the author examines such salient issues as the following: the history of EU communications security law; why systems fail; whether communications markets on their own produce security; the regulatory strategies of deterrence and protection; the emergence of a fundamental right to data security. This book provides a comprehensive overview of the current European regulatory framework on communications security and offers a multidisciplinary study on EU communications security law. The history of the past 25 years of EU communications security law is analyzed in-depth. The regulatory model proposed is tested on HTTPS, which covers the user–provider relationship in web browsing, and on ‘cloud’ communications that affect interdomain and intradomain communications. Case studies included in the book are based on the infamous DigiNotar breach and the MUSCULAR program, disclosed by whistle-blower Edward Snowden, and contain original legal, security economic, and computer science research, conducted jointly with scholars trained in these disciplines.
Formatted Contents Note
Preface Acknowledgements Chapter 1. Introduction Part I: A History of EU Communications Security Law Chapter 2. Five EU Communications Security “Policy Cycles” Chapter 3. Analytical Framework Part II: Theory and Tools for the EU Lawmaker Chapter 4. Fundamental Rights Perspectives Chapter 5. Systems Design Perspectives Chapter 6. Political Perspectives Part III: Case Studies for the EU Lawmaker Chapter 7. Model and Methodology Chapter 8. HTTPS – Communications Security in Web Browsing Chapter 9. The Snowden Files – Communications Security in the “Cloud” Part IV: Securing Private Communications Chapter 10. Summary, Analysis, and Conclusions – Bibliography Table of Cases Legal Texts Index