메뉴 건너뛰기




Volumn 7, Issue 2, 2005, Pages 61-73

Where computer security meets national security

Author keywords

Computer security; Cyber security; Securitization

Indexed keywords

COMPARATIVE EVALUATIONS; COMPUTER SCIENCE AND ENGINEERINGS; COPENHAGEN; CYBER SECURITY; INTERNATIONAL RELATIONS; NATIONAL SECURITY AGENCIES; SECURITIZATION;

EID: 31144461818     PISSN: 13881957     EISSN: 15728439     Source Type: Journal    
DOI: 10.1007/s10676-005-4582-3     Document Type: Article
Times cited : (100)

References (60)
  • 1
    • 84876651303 scopus 로고    scopus 로고
    • note
    • This article has been on the drawing boards for longer than I dare to admit. Along the way, many have helped its development by generously sharing their wisdom: James Der Derian, Niva Elkin-Koren, Ed Felten, Batya Friedman, Lene Hansen, audiences at CEPE, TPRC, the Yale Cybercrime and Digital Law Enforcement Conference, and Watson Institute's Symposium in Dis/Simulations of War and Peace," and University of Newcastle, Computer Science Department. Thanks, also, to Sam Howard-Spink for excellent editorial assistance.
  • 4
    • 84876653402 scopus 로고    scopus 로고
    • "Value in Technology Design: Democracy, Autonomy, and Justice"
    • See at the project available at:
    • See at the project "Value in Technology Design: Democracy, Autonomy, and Justice," available at: [http://www.nyu.edu/projects/valuesindesign/];
  • 6
    • 80052942353 scopus 로고    scopus 로고
    • "Design for Trust"
    • Rino Falcone, editor, Aamas 2002 International Workshop, Bologna, Italy, July 15, 2002: Selected and Invited Papers (Lecture Notes in Artificial Intelligence). Springer-Verlag, Berlin
    • Camp I. Jean, "Design for Trust". In Rino Falcone, editor, Trust, Reputation and Security: Theories and Practice: Aamas 2002 International Workshop, Bologna, Italy, July 15, 2002: Selected and Invited Papers (Lecture Notes in Artificial Intelligence). Springer-Verlag, Berlin, 2003;
    • (2003) Trust, Reputation and Security: Theories and Practice
    • Camp, I.J.1
  • 7
    • 26444440601 scopus 로고    scopus 로고
    • "Privacy Enhancing Technologies for Internet Commerce"
    • Springer-Verlag, Berlin
    • L.Jean Camp & Carlos Osorio, "Privacy Enhancing Technologies for Internet Commerce". In Trust in the Network Economy. Springer-Verlag, Berlin, 2002;
    • (2002) Trust in the Network Economy
    • Camp, L.J.1    Osorio, C.2
  • 9
    • 84866926128 scopus 로고    scopus 로고
    • "Will Security Enhance Trust Online, or Supplant It?"
    • M.R. Kramer and S.K. Cook, editors, in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York
    • H. Nissenbaum. "Will Security Enhance Trust Online, or Supplant It?" In M.R. Kramer and S.K. Cook, editors, Trust and Distrust in Organizations: Dilemmas and Approaches Volume VII in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York, 2004;
    • (2004) Trust and Distrust in Organizations: Dilemmas and Approaches Volume VII
    • Nissenbaum, H.1
  • 10
    • 84876610590 scopus 로고    scopus 로고
    • "Commons Based Peer Production and Virtue"
    • (forthcoming)
    • Benkler Y. and Nissenbaum H. (forthcoming), "Commons Based Peer Production and Virtue."
    • Benkler, Y.1    Nissenbaum, H.2
  • 11
    • 27444447755 scopus 로고    scopus 로고
    • National Research Council, (The National Academies Press, Washington, D.C.)
    • National Research Council, The Internet Under Crisis Conditions, (The National Academies Press, Washington, D.C., 2003);
    • (2003) The Internet Under Crisis Conditions
  • 13
    • 0027804413 scopus 로고
    • "Information Systems Design Methods: Implications for Information Systems Development"
    • Baskerville R. (1993), "Information Systems Design Methods: Implications for Information Systems Development," 25(4) ACM Computing Surveys, pp. 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 14
    • 0003714340 scopus 로고    scopus 로고
    • "Trust in Cyberspace"
    • Committee on Information Systems Trustworthiness, National Research Council available at:
    • "Trust in Cyberspace," Committee on Information Systems Trustworthiness, National Research Council (1999) available at: [http://www.nap.edu/readingroom/books/trust/];
    • (1999)
  • 15
    • 84876596497 scopus 로고    scopus 로고
    • see the society's dependability definition by the DIRC project, available at:
    • see the society's dependability definition by the DIRC project, available at: [http://www.dirc.org.uk/overview/index.html].
  • 16
    • 27944476171 scopus 로고    scopus 로고
    • "The American Cyber-Angst and the Real World-Any Link?"
    • R. Latham, editor, The New Press, New York
    • Bendrath, R. "The American Cyber-Angst and the Real World-Any Link?" In R. Latham, editor, Bombs and Bandwidth, pp. 49-73. The New Press, New York, 2003.
    • (2003) Bombs and Bandwidth , pp. 49-73
    • Bendrath, R.1
  • 17
    • 0344559509 scopus 로고    scopus 로고
    • "The National Strategy to Secure Cyberspace"
    • Feb. (available at: cyber-attacks on U.S. information networks can have serious consequences such as disrupting critical operations, loss of revenue and intellectual property, or loss of life
    • According to the "The National Strategy to Secure Cyberspace," Feb. 2003 (available at: http://www.us-cert.-gov/reading_room/cyberspace_strategy.pdf) cyber-attacks on U.S. information networks can have serious consequences such as disrupting critical operations, loss of revenue and intellectual property, or loss of life;
    • (2003)
  • 18
    • 84876597280 scopus 로고    scopus 로고
    • see also United State Senate, Committee on the Judiciary, Testimony of Mr. Keith Lourdeau, FBI Deputy Assistant Director, Cyber Division, February 24, (available at)
    • see also United State Senate, Committee on the Judiciary, Testimony of Mr. Keith Lourdeau, FBI Deputy Assistant Director, Cyber Division, February 24, 2004 (available at: http://judiciary.senate.gov/testimony.cfm?id=1054&wit_id=2995).
    • (2004)
  • 19
    • 84923496697 scopus 로고    scopus 로고
    • "Prohibition and Preemption"
    • Cambridge University Press
    • R. Arthur. "Prohibition and Preemption," In 5 Legal Theory, pp. 235-263, Cambridge University Press, 1999.
    • (1999) 5 Legal Theory , pp. 235-263
    • Arthur, R.1
  • 20
    • 4243136729 scopus 로고    scopus 로고
    • "Cryptography and Competition Policy-Issues with Issues with Trusted Computing"
    • R. Anderson. "Cryptography and Competition Policy-Issues with Issues with Trusted Computing." In Proceedings Workshop on Economics and Information Sector, pp. 1-11, 2003.
    • (2003) Proceedings Workshop on Economics and Information Sector , pp. 1-11
    • Anderson, R.1
  • 21
    • 0003578254 scopus 로고    scopus 로고
    • For a description of this approach to security studies, I have used Lynne Rienner Publishers, Inc., Boulder
    • For a description of this approach to security studies, I have used B. Buzan, O. Wyer, J.D. Wilde and O. Waever, Security: A New Framework for Analysis, Lynne Rienner Publishers, Inc., Boulder, 1997;
    • (1997) Security: A New Framework for Analysis
    • Buzan, B.1    Wyer, O.2    Wilde, J.D.3    Waever, O.4
  • 22
    • 0009175065 scopus 로고
    • "Concepts of Security"
    • Ph.D. dissertation. Institute of Political Science, University of Copenhagen
    • O. Waever, "Concepts of Security," Ph.D. dissertation. Institute of Political Science, University of Copenhagen, 1995.
    • (1995)
    • Waever, O.1
  • 24
    • 0039430385 scopus 로고    scopus 로고
    • "Terror Groups Hide Behind Web Encryption"
    • February 6
    • J. Kelley, "Terror Groups Hide Behind Web Encryption," USA Today (February 6, 2001)
    • (2001) USA Today
    • Kelley, J.1
  • 25
    • 84891395253 scopus 로고    scopus 로고
    • "bin Laden: Steganography Master?"
    • discussed in (February 7, 2001), available at:
    • discussed in McCullagh D. (2001), "bin Laden: Steganography Master?" Wired News (February 7, 2001), available at: [http://www.wired.com/news/print/0,1294,41658,00.html].
    • (2001) Wired News
    • McCullagh, D.1
  • 26
    • 27944476171 scopus 로고    scopus 로고
    • "The American Cyber-Angst and the Real World - Any Link?"
    • Robert Latham (ed.) (New York: The New Press)
    • R. Bendrath, "The American Cyber-Angst and the Real World - Any Link?" In Bombs and Bandwidth (2003) Robert Latham (ed.) (New York: The New Press), pp. 49-73.
    • (2003) Bombs and Bandwidth , pp. 49-73
    • Bendrath, R.1
  • 27
    • 31144435476 scopus 로고    scopus 로고
    • "The Terrorist Network"
    • November 26, Available at:
    • Gaudin, S. "The Terrorist Network," NetworkWorld-Fusion (November 26, 2001). Available at: [http://www.nwfusion.com/research/2001/1126featside4.html].
    • (2001) NetworkWorld-Fusion
    • Gaudin, S.1
  • 28
    • 84886759923 scopus 로고    scopus 로고
    • "Captured Qaeda Figure Led Way To Information Behind Warning"
    • D. Jehl and D. Rohde, "Captured Qaeda Figure Led Way To Information Behind Warning," The New York Times, 2004.
    • (2004) The New York Times
    • Jehl, D.1    Rohde, D.2
  • 29
    • 84876636418 scopus 로고    scopus 로고
    • For example, the testimony of Jack Valenti, President and CEO Motion Picture Association of America, before the SubCommittee on Courts, the Internet, and Intellectual Property Committee on the Judiciary U.S. House of Representatives, "International Copyright Piracy: Links to Organized Crime and Terrorism" (March 13,) available at:
    • For example, the testimony of Jack Valenti, President and CEO Motion Picture Association of America, before the SubCommittee on Courts, the Internet, and Intellectual Property Committee on the Judiciary U.S. House of Representatives, "International Copyright Piracy: Links to Organized Crime and Terrorism" (March 13, 2003) available at: [http:// www.house.gov/judiciary/valenti031303.htm].
    • (2003)
  • 30
    • 84876595976 scopus 로고    scopus 로고
    • "Cyberspace Threats and Vulnerabilities: A Case for Action"
    • An official rendering of threats and vulnerabilities in the context of national security concerns can be seen in February a report by President George W. Bush's Critical Infrastructure Protection Board (headed by Richard A. Clarke), especially the chapter
    • An official rendering of threats and vulnerabilities in the context of national security concerns can be seen in The National Strategy to Secure Cyberspace, February 2003, a report by President George W. Bush's Critical Infrastructure Protection Board (headed by Richard A. Clarke), especially the chapter, "Cyberspace Threats and Vulnerabilities: A Case for Action."
    • (2003) The National Strategy to Secure Cyberspace
  • 31
    • 27944476171 scopus 로고    scopus 로고
    • "The American Cyber-Angst and the Real World-Any Link?"
    • R. Latham, editor, New York, The New Press, 2003, quoting Admiral Thomas R. Wilson's comments during a hearing of Senate Select Committee on Intelligence, February
    • R. Bendrath. "The American Cyber-Angst and the Real World-Any Link?" In R. Latham, editor, Bombs and Bandwidth, p.56. New York, The New Press, 2003, quoting Admiral Thomas R. Wilson's comments during a hearing of Senate Select Committee on Intelligence, February 2001.
    • (2001) Bombs and Bandwidth , pp. 56
    • Bendrath, R.1
  • 32
    • 27944476171 scopus 로고    scopus 로고
    • "The American Cyber-Angst and the Real World-Any Link?"
    • R. Latham, editor, The New Press, New York
    • R. Bendrath. "The American Cyber-Angst and the Real World-Any Link?" In R. Latham, editor, Bombs and Bandwidth, p. 57. The New Press, New York, 2003.
    • (2003) Bombs and Bandwidth , pp. 57
    • Bendrath, R.1
  • 33
    • 84876639909 scopus 로고    scopus 로고
    • "Hacker in Shackles"
    • (London)
    • K. Mitnick. "Hacker in Shackles," The Guardian (London), 1999.
    • (1999) The Guardian
    • Mitnick, K.1
  • 34
    • 0007985969 scopus 로고    scopus 로고
    • "The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen Schoo"
    • H. Lene. "The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School," Millennium, 29(2): 285-306, 2000.
    • (2000) Millennium , vol.29 , Issue.2 , pp. 285-306
    • Lene, H.1
  • 35
    • 0003275083 scopus 로고
    • "The Value of Security: Hobbes, Marx, Nietzsche, and Baudrillard"
    • D. Campbell and M. Dillon (eds.), Manchester University Press, Manchester
    • Derian. D.J. "The Value of Security: Hobbes, Marx, Nietzsche, and Baudrillard." In D. Campbell and M. Dillon (eds.), The Political Subject of Violence. Manchester University Press, Manchester, 1993.
    • (1993) The Political Subject of Violence
    • Derian, D.J.1
  • 38
    • 84876653915 scopus 로고    scopus 로고
    • "Privacy and Secrecy after September 11"
    • For more on the subject of government secrecy, (Latham R. ed.) (The New Press)
    • For more on the subject of government secrecy, see Rotenberg M. "Privacy and Secrecy after September 11." In Bombs and Bandwidth (Latham R. ed.) (The New Press, 2003), pp. 132-142.
    • (2003) Bombs and Bandwidth , pp. 132-142
    • Rotenberg, M.1
  • 39
    • 84876631818 scopus 로고    scopus 로고
    • "Justice and Security in the Accommodation of Minority Nationalism, Comparing East and West"
    • The point is derived from Draft paper presented at Princeton University
    • The point is derived from Will Kymlika, "Justice and Security in the Accommodation of Minority Nationalism, Comparing East and West." Draft paper presented at Princeton University, 2001, especially pp. 16-21.
    • (2001) , pp. 16-21
    • Kymlika, W.1
  • 40
    • 84949717896 scopus 로고
    • "The Priority of Defense"
    • For a critical discussion of this practice, see Chicago: The University of Chicago Press, Chapter 11
    • For a critical discussion of this practice, see Goodin (1982), Political Theory and Public Policy, Chicago: The University of Chicago Press, Chapter 11, "The Priority of Defense."
    • (1982) Political Theory and Public Policy
    • Goodin1
  • 41
    • 84876632935 scopus 로고    scopus 로고
    • "The Invisible Handshake: The Reemergence of the State in the Digital Envitonment" 8 Virginia J. of L. & Tech, 6
    • A similar connection but with motion in the other direction is pointed out by Birnhak and Elkin-Koren in an important paper on the ways security concerns have allowed the state to re-enter governance of the Net by collaborating with private actors
    • A similar connection but with motion in the other direction is pointed out by Birnhak and Elkin-Koren in an important paper on the ways security concerns have allowed the state to re-enter governance of the Net by collaborating with private actors (Birnhack D. M. and Elkin-Koren N. (2003)), "The Invisible Handshake: The Reemergence of the State in the Digital Envitonment", 8 Virginia J. of L. & Tech, 6.
    • (2003)
    • Birnhack, D.M.1    Elkin-Koren, N.2
  • 42
    • 84876653954 scopus 로고    scopus 로고
    • "Intellectual property theft is a clear danger to our economy and the health, safety, and security of the American people"
    • Attorney General John Ashcroft stressed the possible dangers to the society as a result of intellectual property infringement: Attorney General John Ashcroft, Announces Recommendations of The Justice Department's Intellectual Property Task Force, October 12, 2004. available at: The possible relation between security and intellectual property theft was recognized in the task force report itself: "... those who benefit most from intellectual property theft are criminals, and alarmingly, criminal organizations with possible ties to terrorism."
    • Attorney General John Ashcroft stressed the possible dangers to the society as a result of intellectual property infringement: "Intellectual property theft is a clear danger to our economy and the health, safety, and security of the American people." Attorney General John Ashcroft, Announces Recommendations of The Justice Department's Intellectual Property Task Force, October 12, 2004. available at: [http://www.usdoj.gov/criminal/cybercrime/AshcroftIPTF.htm]. The possible relation between security and intellectual property theft was recognized in the task force report itself: "... those who benefit most from intellectual property theft are criminals, and alarmingly, criminal organizations with possible ties to terrorism."
  • 44
    • 31144436642 scopus 로고    scopus 로고
    • Evidence of disunity comes, for example, from the Federal District Court in Manhattan ruling in Doe v. Ashcroft, 334 F. Supp 2d, striking down, on constitutional grounds, a section of the USA PATRIOT Act that would have allowed government security agencies to subpoena personal information from Internet Service Providers without having to obtain a court order
    • Evidence of disunity comes, for example, from the Federal District Court in Manhattan ruling in Doe v. Ashcroft, 334 F. Supp 2d, 471 (2004), striking down, on constitutional grounds, a section of the USA PATRIOT Act that would have allowed government security agencies to subpoena personal information from Internet Service Providers without having to obtain a court order.
    • (2004) , pp. 471
  • 45
    • 84876613077 scopus 로고    scopus 로고
    • note
    • Obviously, these are paradigmatic and designed to illustrate alternatives at two ends of a spectrum which offers many variations in between.
  • 46
    • 84876653934 scopus 로고    scopus 로고
    • note
    • Discussions with Ed Felten greatly influenced the conception of this example.
  • 47
    • 31144459124 scopus 로고    scopus 로고
    • Statement by Amit Yoran, Director National Cyber Security Division Department of Homeland Security, before the U.S. Senate Committee on the Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, February 24
    • Statement by Amit Yoran, Director National Cyber Security Division Department of Homeland Security, before the U.S. Senate Committee on the Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, February 24, 2004.
    • (2004)
  • 48
    • 84876601932 scopus 로고    scopus 로고
    • The National Strategy to Secure Cyberspace, Bush Administration, final draft released February 14, 2003 (Available at: November 24)
    • The National Strategy to Secure Cyberspace, Bush Administration, final draft released February 14, 2003 (Available at: http://www.whitehouse.gov/pcipb/, November 24, 2004).
    • (2004)
  • 49
    • 84876622625 scopus 로고    scopus 로고
    • "Online and Even Near Home, a New Front Is Opening in the Global Terror Battle"
    • September 23
    • E. Lipton and E. Lightblau, "Online and Even Near Home, a New Front Is Opening in the Global Terror Battle," The New York Times, September 23, 2004, A12.
    • (2004) The New York Times
    • Lipton, E.1    Lightblau, E.2
  • 50
    • 84876613945 scopus 로고    scopus 로고
    • "Approaches to Combat Terrorism: Opportunities for Basic Research"
    • See for example the CIA and National Science Foundation joint project aimed at finding ways to monitor on-line chat rooms. For more information about this project and additional ones visit EPIC website at:
    • See for example the CIA and National Science Foundation joint project "Approaches to Combat Terrorism: Opportunities for Basic Research," aimed at finding ways to monitor on-line chat rooms. For more information about this project and additional ones visit EPIC website at: http://www.epic.org/privacy/wiretap/nsf_release.html.
  • 51
    • 84876618686 scopus 로고    scopus 로고
    • "EFF Analysis of the Cyber Security Enhancement Act"
    • See also the available at:
    • See also the "EFF Analysis of the Cyber Security Enhancement Act," available at: http://www.eff.org/Privacy/Surveillance/ ?f=20020802_eff_csea_analysis.html.
  • 53
    • 0038921813 scopus 로고
    • "The Exclusive Right to Read"
    • Digital Millennium Copyright Act of 1998 (DMCA), Pub. L. No. 105-304, 112 Stat. 2860, Codified as 17 U.S.C. §§ 1201-1205; for commentary review see:
    • Digital Millennium Copyright Act of 1998 (DMCA), Pub. L. No. 105-304, 112 Stat. 2860, Codified as 17 U.S.C. §§ 1201-1205; for commentary review see: Litman J. (1994), "The Exclusive Right to Read," 13 Cardozo Arts & Ent. L. J., 29;
    • (1994) 13 Cardozo Arts & Ent. L. J. , vol.29
    • Litman, J.1
  • 54
    • 0000627689 scopus 로고    scopus 로고
    • "Intellectual Property And The Digital Economy: Why The Anti-Circumvention Regulations Need To Be Revised"
    • Samuelson P. (1999), "Intellectual Property And The Digital Economy: Why The Anti-Circumvention Regulations Need To Be Revised," 14 Berkeley Tech. L. J. 519;
    • (1999) 14 Berkeley Tech. L. J. , vol.519
    • Samuelson, P.1
  • 55
    • 84876662032 scopus 로고    scopus 로고
    • also, see the legislation: S. 2560, The International Inducement of Copyright Infringement Act of 2004 (The INDUCE Act)., presently "on hold"
    • also, see the legislation: S. 2560, The International Inducement of Copyright Infringement Act of 2004 (The INDUCE Act)., presently "on hold".
  • 56
    • 84876653949 scopus 로고    scopus 로고
    • "House Gives Final Approval to FY 2002 Commerce, Justice, State and Judiciary Spending Bill"
    • (November 14) available at:
    • "House Gives Final Approval to FY 2002 Commerce, Justice, State and Judiciary Spending Bill," CJIS Group News (November 14, 2001) available at: [http://www.cjisgroup.com/aboutCJIS/newsBudget111401.cfm]
    • (2001) CJIS Group News
  • 58
    • 84876652398 scopus 로고    scopus 로고
    • See for example the attempt to create passenger profiling as part of the Secure Flight passenger prescreening program. The Transportation Security Administration has ordered airlines to turn over a month's worth of passenger data, which will allow the creation of passenger profiling. For more information about this step and the attempt to prevent such profiling in the name of privacy right, visit the Electronic Privacy Information Center (EPIC) website, available at:
    • See for example the attempt to create passenger profiling as part of the Secure Flight passenger prescreening program. The Transportation Security Administration has ordered airlines to turn over a month's worth of passenger data, which will allow the creation of passenger profiling. For more information about this step and the attempt to prevent such profiling in the name of privacy right, visit the Electronic Privacy Information Center (EPIC) website, available at: [http://www.epic.org/privacy/airtravel/profiling.html].
  • 59
    • 84876628856 scopus 로고    scopus 로고
    • Question 2, Article 5
    • Aquinas, Summa Theologica, Part I of II, Question 2, Article 5.
    • Summa Theologica , Issue.Part I and II
    • Aquinas1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.