StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Laws of Nation-States Against Cyber Anarchy - Term Paper Example

Cite this document
Summary
The objective of this paper "Laws of Nation-States Against Cyber Anarchy" is to argue that the law of nations applies to the Internet. The writer will critique the arguments featured in the regulation cynics. Thus, the paper will challenge the cynic’s claims and their assumptions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Laws of Nation-States Against Cyber Anarchy
Read Text Preview

Extract of sample "Laws of Nation-States Against Cyber Anarchy"

Laws of Nation s against Cyber anarchy Introduction The regulation cynics make normative and descriptive arguments. Normatively, they claim that since cyberspace transactions take place ‘simultaneously and equally in all national jurisdictions’ (Thierer & Crews 2003: 74) control of information exchanges by any specific jurisdictions unlawfully generates considerable negative spill over implications for other jurisdictions. Descriptively, they argue that the use of geographically founded notions of national regulation and preference of law to a cyberspace activity that is geographically based is utterly useless or will only result in uncertainty (Thierer & Crews 2003). They also argue that the design of cyberspace disqualifies notice of prevailing law that is critical to the legitimacy of the law. On the contrary, cyberspace members are much better sanctioned than territorial watchdogs to formulate wide-ranging legal policies that would grant appropriate notice to cyberspace members and internalise the expenditures of cyberspace transactions. The regulation cynics assume from these claims that national regulators must “defer to the self-regulatory efforts of Cyberspace participants” (Thierer & Crew 2003: 31). This paper will challenge the cynic’s claims and their assumptions, or more specifically, this paper will argue that the law of nations applies to the Internet. The cynics have three obvious mistakes. First, they overemphasise the dissimilarities between cyberspace activities and other transnational activities. Both entail individuals in actual space in one national jurisdiction negotiating with individuals in actual space in another national jurisdiction in a manner that at times brings about actual-world damages. Second, the cynics do not address the delineation between mandatory laws and default laws. Their absolute normative argument that self-regulation should be granted to cyberspace makes sense in relation to default laws that, theoretically, private factions can adjust to suit their needs (Spinello 2002). On the contrary, it makes much less logic in relation to regulatory or mandatory laws that, for protective justifications or in order to safeguard intermediaries, set restrictions on ‘private legal ordering’ (Spinello 2002: 101). Lastly, the cynics undervalue the capability of established legal instruments and technology to lighten the regulatory difficulties caused by cyberspace. Cyberspace activities do not naturally permit any more respect by territorial regulators, and are not considerably less opposed to the instruments of conflict of laws, compared to other transnational activities (Thierer & Crew 2003). A number of limitations are determined in advance. This paper will only argue that national laws are applicable to the Internet or that cyberspace regulation is possible and justifiable from the point of view of preference of law and jurisdiction. It does not claim that regulation of the cyberspace is an excellent initiative, and it does not take a standpoint on the plus points of specific regulations outside their jurisdictional authority. For instance, it does not explore whether specific territorial regulations of the Internet encourage democratic practices, or are effective, or are beneficial or disadvantageous for humanity. Likewise, this paper does not take into account concrete restrictions on cyberspace regulation such as could be located in the international human rights law. But analysis of these concerns also contributes on how we interpret the jurisdictional uncertainties that occur when territorial regulation, which has habitually been interpreted mainly in terms of geographical facts, relates to a phenomenon that seems to defy geographical point of reference. This jurisdictional uncertainty is the emphasis of this paper. The Drawbacks of Enforcement Jurisdiction The cynics’ arguments are highlighted by drawbacks on every nation’s capability of enforcing its laws. A nation can claim to control transactions that transpire anywhere (Franda 2001). For instance, the Island of Tobago can endorse a law that claims to tie the rights of the entire world. However, the useful capacity of this law rests on the ability of Tobago to enforce it. And generally a nation can merely ratify its laws in opposition to: ‘(a) persons with a presence or assets in the nation’s territory; (b) persons over whom the nation can obtain personal jurisdiction and enforce a default judgment against abroad; (c) or, persons whom the nation can successfully extradite’ (Thierer & Crew 2003: 44). Assets or properties within the territory or the physical presence of a defendant remain the major ground for a state or nation to endorse its laws (Thierer & Crew 2003). The vast majority of individuals who participate in cyberspace have no assets or presence in the jurisdictions that aspire to control their information exchanges in cyberspace. Such controls are hence likely to affect mainly Internet users and service providers with a physical presence in the legislating jurisdiction (Feigin 2004). Internet users in other national jurisdictions will not immediately feel the impact of the regulations to the degree that they are reliant on content or service providers with a presence in the legislating jurisdictions. Yet for practically all users, there will be no danger of extraterritorial legal responsibility due to the absence of a presence in the legislating jurisdictions (The Economist 2001). A state or nation can also endorse its laws over an individual with no local assets or presence if it can acquire personal jurisdiction over the individual and implement a national default resolution against that individual overseas (Wall 2001). The local interstate situation provides a much greater risk in relation to this than does the global setting. This is due to the fact that the Full Faith and Credit Clause necessitate a nation to implement the default resolution of an associate state that had special jurisdiction over the defendant (Wall 2001). However, this risk is intensified by constitutional restrictions on a nation’s claim of special jurisdiction. The Due Process Clauses forbid a nation from claiming special jurisdiction over an individual with no domestic presence except if the individual has intentionally aimed its transactions to the forum nation and the claim of jurisdiction is justifiable (Marsden 2000). Application of this regulation to cyberspace transactions creates particular problems. Under general ideas about the design of cyberspace, individuals can upload or send information with the knowledge that it may get in touch with several and all jurisdictions, yet without having the knowledge on which specific jurisdiction it may contact (Thierer & Crews 2002). Can every nation where these communications emerge claim particular special jurisdictions over the instrument of the information under the decisive availment and reasonableness analyses? Full reflection over this concern is far beyond the coverage of this paper. The discussion basically aims to determine why there is somewhat trivial justification currently, and even less justification in the coming years, to suppose that the sheer use of information in cyberspace will independently be enough for special jurisdiction over the instrument of the dissemination in every nation where the information surfaces. Courts in general have mandated something more than simple post of information on a Web site in one nation as grounds for special jurisdiction in another nation where the Web site is used (Jackson, Jackson, Eckersley 2003). For various rationales, these resolutions have restricted particular special jurisdiction to cases in which there are self-supporting evidence that the defendant abroad intentionally and persistently aimed the consequences of overseas behaviour to a specific nation where the conducts were considered unlawful (Jackson, Jackson, Eckersley 2003). Given the premises of the cynics about the design of cyberspace, this assumption seems fitting. It seems unreasonable to parade a service provider to special jurisdiction in all fifty states for the sheer act of “uploading information on a computer if the provider cannot take affordable precautions to avoid simultaneous multijurisdictional effects” (Thierer & Crew 2003: 48). Nonetheless, the cynics’ design assumptions are erroneous. Why? It is already feasible for service providers to perform measures to attain considerable control over information exchanges. And technology for identification and filtering guarantee a greater and cost-effective control. In cyberspace, similar to actual space, the crucial meaning of ‘purposeful availment’ and ‘reasonableness’ (Thierer & Crew 2003: 48) will rest on the workability and cost of information exchange regulation; as such regulation becomes more workable and cost-effective, special jurisdiction over cyberspace transactions will become efficiently similar to special jurisdiction over actual-space transactions. This diversion into the details of special jurisdiction was prompted by an anxiety about the extraterritorial implementation of domestic default resolutions against nondomestic Internet users within the federal system of the United States. Such issues are less definite in the global setting (Litan 2001). Contrary to the local interstate context, traditional international law enforces a small number of implementable regulations on a nation’s claim of special jurisdiction, and there are a small number of treatises on the matter. Nevertheless, also contrary to local law, there is an absence of full faith and credit liability to insist on foreign resolutions in the global context (Litan 2001). If one nation exercises special jurisdiction on an excessive grounds, the ensuing resolution is not likely to be implemented in another nation. Furthermore, domestic public regulation exceptions to the implementation of foreign resolutions are somewhat ordinary in the global context, particularly when the overseas resolutions flies in the face of implementing nation’s regulatory government. Because of these premises, there is little concern that an overseas default resolution will be implementable in opposition to Internet users who reside outside the legislating jurisdiction (Castells 2001). The ultimate way that a state can put into effect its regulations against entities outside of its jurisdiction is by pursuing extradition. For instance, extradition among a number of American states is legalised by the federal extradition law and Article IV of the Constitution (Thierer & Crews 2003). As a wide-ranging issue, State A should comply with the appropriate claim of State B for the giving up of a renegade who carried out an operation in State B that State B deems illegal. Nevertheless, an individual who in State A sends out information exchanges that constitute and play a part in offence in State B will unlikely be put under expatriation to State B under these conditions. This is because the extradition liability only applies to renegades who have escaped State B, and these provisions have traditionally been restricted to individuals who were physically present in the claiming state during the commission of the offence (Thierers & Crews 2003). A dissimilar, but similarly powerful, restriction extends to international extradition. This is ruled mostly by treaty. A persistent attribute of contemporary extradition discourses is the code of double criminality. This code demands that the indicted wrongdoing be unlawful in both the demanding and the demanded jurisdictions (Spinello 2002). This code, and its dynamic underlying principle, makes it improbable that there will be global collaboration in the implementation of excessive independent criminal regulations of Internet activities (Spinello 2002). This analysis of ‘transnational enforcement jurisdiction’ (Thierer & Crews 2003: 76) specifies that the cynics overstate the risk of manifold regulation of information exchanges in cyberspace. This risk should be examined by the implementable range of a regulation, not by its accepted range. And the implementable range is quite constricted. It applies only to system operators or individual users with assets or presence in the enforcement jurisdiction, or to individuals that carry out additional measures to aim for information exchanges in cyberspace to states where such information exchanges are unlawful (Thierer & Crews 2003). Such regulatory coverage is a critical issue for cyberspace members. But it is exactly the manner regulatory coverage works in actual space. And it is far less critical than the exaggerated argument of cynics that all cyberspace users will be all together placed under all national legislations (Feigin 2004). Even with these drawbacks, the cynics are concerned that an individual Internet service provider in one jurisdiction will confront possible accountability in another jurisdiction once that service provider posts information on a Web page. This possible accountability can become an unexpected reality once the service provider goes to the regulating jurisdiction, or transfers properties there (Katsh 1995). Such possible accountability consequently influences provider’s transactions at home and hence can be perceived as an unstable kind of extraterritorial legislation. This type of regulation is a conceptual risk, but it should not be overstated. No nation at present has as yet obliged accountability on a service provider for unexpected consequences in a foreign jurisdiction (Katsh 1995). The risk of such accountability will lighten as service providers keep on gaining means to regulate information exchanges. It is also possible that shaky normative restrictions might be present or emerge to stop a jurisdiction from controlling domestic impacts that were actually unexpected or unmanageable (Huber 1997). The argument thus far is that even without such restrictions; this possible risk of accountability is somewhat irrelevant and does not come close to the cynics’ wide-ranging descriptive arguments about vast manifold regulation of individual users. Certainly, if the restrictions on enforcement jurisdiction confirm any of the descriptive arguments of the cynics, it is their relatively distinctive argument that due to the potential for evasion of regulation, cyberspace activities are outside the regulatory authorities of national governments. Internet service providers can change the source of their information exchanges to jurisdictions outside the implementable range of national legislation and hence go on with information disseminations into the legislating jurisdiction (Wall 2001). For instance, they can transfer in ‘geographical space’, or hire telnet to transform the geographical source of their information in a form that is difficult to detect. These and other similar methods of regulatory evasion create problems for a nation in terms of regulating the extraterritorial supply aspect of risky cyberspace transaction (Wall 2001). Regulation skirting of this type is not exclusive to cyberspace. For instance, firms reintegrate to escape regulatory laws and wrongdoers commit money laundering. Foreign regulation skirting has been a major feature of other communications media. Radio Free Europe, for instance, transmitted from Western Europe into USSR but lacked a controllable existence there (Thierer & Crews 2003). Likewise, television signals are at times transmitted from another country by an individual with no domestic presence. The extraterritorial centre of these and several other non-cyberspace transactions is outside the implementable range of national regulation. But this does not imply that national regulation is useless (Marsden 2000). In cyberspace, similar to actual space, foreign regulation evasion does not stop a country from controlling the extraterritorial transaction. This is due to the fact that nation can control people and assets/resources in its territory to regulate the national impacts of the extraterritorial transaction (Marsden 2000). This kind of indirect regulation is how countries have regulated national damages brought about by other communications media with overseas sources and no national presence. Also, it is how countries have started to control national damages brought about by overseas Internet service or content providers. For instance, states reprimand in-state users who acquire and make use of unlawful content or who, if not, endeavour in an unlawful cyberspace activity (Castells 2001). They also control the domestic means through which offshore content is conveyed. For instance, they enforce screening requirements on in-state service providers and other individuals that provide or pass on information (Wall 2001). Or they control in-state software and hardware through which these communications are obtained. Or they regulate the national financial mediators that make commercial dealings on the cyberspace possible (Franda 2001). Conclusions Drawbacks on the global industrial law administration are not, obviously, exclusive to cyberspace activities. These similar drawbacks typify actual-space transnational activities. Such drawbacks are unavoidable when it is difficult for participants of transnational activities to form private legal administrations, or when these activities negatively affect mediators or involve the defensive concerns of affected nations. The essential argument is that these drawbacks are difficult to conquer both in actual space and cyberspace. The modest objective of this paper is to demonstrate that the prevailing problems of the law of the nation created by the Internet are not considerably dissimilar from the ones provided by other transnational activities. Cyberspace activities are no dissimilar from actual-space transnational activities. They comprise individuals in actual space in one jurisdiction interacting or communicating with individuals in actual space in other jurisdictions in a manner that usually does well but at times brings about negative outcomes. There is no common normative claim that substantiates the exclusion of cyberspace transactions from national legislation. And there is every justification to suppose that nations can employ national power to attain considerable regulatory authority over cyberspace activities. References Abbate, J. (1999) Inventing the Internet, Cambridge: MIT Press. Balderama, J. (2002) Free Speech-- Virtually. Washington Post , E8. Boele-Woelki, K. & Kessedjian, C. (eds.) (1998) Internet: Which Court Decides? Which Law Applies? The Hague: Kluwer Law International. Castells, M. (2001) The Internet Galaxy, New York: Oxford University Press. Feigin, E. (2004) Architecture of Consent: Internet Protocols and their Legal Implications, Stanford Law Review , 901+. Franda, M. (2001) Governing the Internet: The Emergence of an International Regime, Boulder, CO: Lynne Rienner. Huber, P. (1997) Law and Disorder in Cyberspace: Abolish the FCC and Let Common Law Rule the Telecosm, Oxford: Oxford University Press. Jackson, P., & Jackson, L., & Eckersley, P.M. (eds.) (2003) E-Business Fundamentals: Managing Organisations in the Electronic Age, New York: Routledge. Jacobus, P. (2001) Building Fences, One by One. CNET News.com . Katsh, M. E. (1995) Law in a Digital World, New York: Oxford University Press. Litan, R. (2001) Law and Policy in the Age of the Internet, Duke Law Journal , 1045. Marsden, C. (2000) Regulating the Global Information Society, London: Routledge. McCullagh, D. & Morehead, N. (2001) Nader Wants Internet Control, Wired News . Spinello, R. A. (2002) Regulating Cyberspace: The Policies and Technologies of Control, Westport, CT: Quorum Books. Steele, H. L. (1997) The Web that Binds Us all: The Future Legal Environment of the Internet, Houston Journal of International Law , 495-518. The Internets New Borders. (2001) The Economist . Thierer, A. & Crews, C.W. (eds.) (2002) Copy Fights: The Future of Intellectual Property in the Information Age, Washington, DC: Cato Institute. Thierer, A. & Crews, C.W. (2003) Who Rules the Net? Internet Governance and Jurisdiction, Washington, DC: Cato Institute. Totty, M. (2003) Taming the Frontier, Wall Street Journal , R10. Wall, D. S. (Ed.) (2001) Crime and the Internet, New York: Routledge. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Laws of Nation-States Against Cyber Anarchy Term Paper, n.d.)
Laws of Nation-States Against Cyber Anarchy Term Paper. Retrieved from https://studentshare.org/law/1560508-business-law-ethics
(Laws of Nation-States Against Cyber Anarchy Term Paper)
Laws of Nation-States Against Cyber Anarchy Term Paper. https://studentshare.org/law/1560508-business-law-ethics.
“Laws of Nation-States Against Cyber Anarchy Term Paper”, n.d. https://studentshare.org/law/1560508-business-law-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Laws of Nation-States Against Cyber Anarchy

Letter from a Birmingham Jail

King lays down the rules for any fight against injustice: “Collection of the facts to determine whether injustices exist; negotiation; self purification; and direct action” (King, 6).... The use of drones in Pakistan in making preemptive strikes against Al Quaeda is justified.... This validates the Obama government's action against Osama bin Laden in Pakistan.... Name Instructor Course Date Martin Luther King: Just and Unjust laws....
31 Pages (7750 words) Essay

Economic and Political Aspects of Britain

But what seems to be the most striking feature of Britain is its status in the world.... The two World Wars consequently had brought a heavy loss in the materialistic and man power, however Britain… The peculiarity of Britain is well seen in its imperialistic outlook and dominating spirit. The facts behind the industrial success and the reducing degree of materialism in the present years Many books and articles were written based on these crises....
6 Pages (1500 words) Essay

The Roles of a Government

In the words of the philosopher Thomas Hobbes people tend to prefer submission to a government dominated by a sovereign rather than a system where there is no government, a system also known as anarchy therefore people in a community will submit to a government to create for themselves a system security and social order.... We can see that states or nations whose populations live under a state of anarchy there is a distinct condition of turmoil and confusion amongst them since each and every one of them has to fend for themselves and there is no provision of basic social amenities by a defined body hence it is important to have a central governing body be it political, religious or hierarchical and which is charged through its machinery to uphold the rule of law and ensure that every member of society under its governance is able to access the basic social amenities that is education, affordable health care and a shelter to live in (Schulze, 1994)....
10 Pages (2500 words) Essay

Entry Strategy for the Company into Bahrain

From then, Sheikh Hamad had initiated many reforms like scrapping the restrictive state security laws and giving women the right to vote.... The paper “Entry Strategy for the Company into Bahrain” focuses on Precision Photonics Corporation, a Colorado-based firm that manufactures optical components, assemblies, and coatings....
8 Pages (2000 words) Case Study

The Measures of Governments to Counter-Terrorism and Their Effect on Human Rights

Human rights are universal values and legal guarantees that protect individuals and groups against actions and omissions primarily by state agents that interfere with fundamental freedoms, entitlements and human dignity1.... Terrorism refers to the acts of violence that target… The issue of terrorism and how to counter it has led to the development of various laws on human rights.... In 2000, counter terror laws were passed which had serious drawbacks in relation to human rights....
28 Pages (7000 words) Essay

The Rights of Man by Thomas Paine

The author examines the book, “Common Sense, The Rights of Man and Other Essential Writings” by Thomas Paine in which he compares the villainy of the hereditary governments while profusely praising and defending the benefits of a constitutional republic.... nbsp;… The reactions to the book were on the anticipated lines....
11 Pages (2750 words) Book Report/Review

Effectiveness of Bilateral Transnational Policing as Compared to Multilateral Approaches

The two approaches have limited applications and benefits but bilateral approaches have been favored in the right against terrorism and transnational security threat.... These complications have affected the approaches developed in the fight against insecurity and led to the development of transnational policing approaches like bilateral and multilateral approaches....
16 Pages (4000 words) Essay

The Origins of the Contemporary Political Ideologies

hellip; anarchy system has certain advantages and these are; is the search for complete freedom as people work all by themselves.... The negative side of the anarchy system is that there are no rules and regulations to stop the people from committing terrible acts such as murder....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us