Artigo Revisado por pares

Constructing Norms for Global Cybersecurity

2016; Cambridge University Press; Volume: 110; Issue: 3 Linguagem: Inglês

10.1017/s0002930000016894

ISSN

2161-7953

Autores

Martha Finnemore, Duncan B. Hollis,

Tópico(s)

Global Peace and Security Dynamics

Resumo

On February 16, 2016, a U.S. court ordered Apple to circumvent the security features of an iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple refused. It argued that breaking encryption for one phone could not be done without undermining the security of encryption more generally. It made a public appeal for “everyone to step back and consider the implications” of having a “back door” key to unlock any phone—which governments (and others) could deploy to track users or access their data. The U.S. government eventually withdrew its suit after the F.B.I. hired an outside party to access the phone. But the incident sparked a wide-ranging debate over the appropriate standards of behavior for companies like Apple and for their customers in constructing and using information and communication technologies (ICTs). That debate, in turn, is part of a much larger conversation. Essential as the Internet is, “rules of the road” for cyberspace are often unclear and have become the focus of serious conflicts.

Referência(s)