Abstract
We should not assume that security and freedom are constantly at war with each other. When a person or a population is considered safe, do they consider themselves free? Usually, the opposite is true. If it is not so, what kind of freedom are we talking about? In fact, insecurity mainly has two key precursors; those with adverse natural, immediate or catastrophic effects, and those that arise from criminal or pre-criminal activities. The former naturally limit or condition us, as we try to limit or reduce their consequences, but we are not able to master them as such. But we cannot forget that there are other aspects which have complicated the picture. The use of computer tools in the Internet environment forces us to work from a much more technical point of view when we analyze crime materials and risk, as well as types of criminals and the use of tests and expert reports. Today, although the problems have not been solved, we have incorporated cyber intelligence activities, which allow us to access open sources via the Internet, or to enter private networks. These actions can be used both for good and for evil, but we have to consider and know them to have a slightly clearer idea of what we are really dealing with today when we are talking about cybercrime and cyber espionage. The current cyberspace world in which we live shows us the disadvantages we have in obtaining this freedom and, therefore, reaching equilibrium with safety, but they are not opposite concepts.
Submitted: 3.10.16; Accepted: 12.12.16.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Some examples about this technological anonymity evolution are the new Virtual Private Networks (VPN), such as Cyberghost VPN, Droid VPN, Free VPN 1.8, and The Onion Router (TOR). All of them are used to hide IP address and their respective origin. Also I2P (routers and tunnels), distributed and dynamic with encryption EIGamal, AES, ST, and PROXIES to hinder the investigations. Other options and tools are VPN clients routing through the Jon Do network (old JAP). For file sharing purposes, they use Freenet, TUVPN, WOT or Duck Duck Go finder.
- 2.
Some examples include: Endomondo, iDoctus, Medisafe, SIG: OruxMaps, QGis, Collector for ArcGIS, Google Maps, OSM, Fulcrum, Waze Social, Couple, Cozi, Facebook, Pplkpr, Swiftkey, Amazon; as well as Magnetoresistive random-access memory.
References
Alvarez Caro M (2015) El Derecho al Olvido en Internet. Editorial REUS
BBC (2006) Magnetic memory chip unveiled. BBC News, 07 Oct 2006
BOE (2015) Código del Derecho al Olvido. BOLETIN OFICIAL DEL ESTADO (last versión 2017/24/01)
Brock G (2016) Right to be forgotten. George Brock I.B., Tauris
Bueno F (2012) FODERTICS estudios sobre Derecho y nuevas TecnologÃas. Editorial Andavira
Chadwick R (2014) The right to know and the right not to know. Cambridge University Press, Cambridge
Davara MA (2015) Manual de Derecho Informático Thomson Reuters Aranzadi, 11 edn
De Salvador Carrasco L (2012) Redes de Anonimización en Internet: Cómo funcionan y cuándo son sus lÃmites. Revista Instituto Español de Estudios Estratégicos N.16 of 2012 ieee.es
Touriño, A. (2014). El Derecho al Olvido y a la Intimidad en Internet. La Catarata
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Cortijo, B. (2017). A Conceptual and Legal Approach to the Cyberspace: The Dilemma Security Versus Freedom. In: RamÃrez, J., GarcÃa-Segura, L. (eds) Cyberspace. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-54975-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-54975-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54974-3
Online ISBN: 978-3-319-54975-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)