Cyber Crime and Cyber Terrorism


USE OF PRIVATE SECTOR TOOLS AND RESOURCES



Download 5,67 Mb.
Pdf ko'rish
bet188/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   184   185   186   187   188   189   190   191   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

USE OF PRIVATE SECTOR TOOLS AND RESOURCES
The second relationship concerns the use by the state of tools and resources from 
the private company for the purposes of organization and investigations. Given the 
vast oceans of Big Data, U.S. governmental authorities decided to turn to the pri-
vate sector, not only for purposes of software management but also in relation to 
management of the data itself. One example is the CTO’s Hadoop platform (
CTO 
labs, 2012
), which is capable of memorizing and storing data in relation to many 
law enforcement authorities in the United States. Similarly, a private cloud system 
has emerged which conveys the latest intelligence information in near-real time to 
U.S. troops stationed in Afghanistan (
Conway, 2014
). Another example is the facial 
recognition technology developed by Walt Disney for its park and sold to the U.S. 
military force (
Wolfe, 2012
).
Considering costs saving and massive computing power of a centralized cloud 
system, it is inevitable that law enforcement, military forces and government agen-
cies will progressively rely on this type of services. The afore-mentioned change will 
entail deducible legal issues in terms of jurisdiction, security and privacy regarding 
data management. The relevant legal issues might be solved through a private cloud 
within the State with exclusive customer key control. However, it is worth consider-
ing that, in this way, private entities will gain access to a highly important and ever 
expanding information asset. Therefore, they will be able to develop increasingly 
sophisticated and data mining tools, thanks to cloud systems’ potential. This sce-
nario, which is already a fact in the United States, might become reality also thanks 
to the impulse of the Digital Agenda for Europe and its promotion of Public Private 
Partnership initiatives on Cloud (
Commission of the European Communities, 2009

see also 
The European Cloud Partnership (ECP), 2013
). This is why it is important 
that European cloud services should be based on high standards of data protection, 
security, interoperability and transparency about service levels and government ac-
cess to information as it has recently been recognized by the European Commission 
(
European Commission, 2013
).
18 
See United States v. Miller (425 US 425 [1976]).



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   184   185   186   187   188   189   190   191   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish