Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson Dec 2014

Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson

Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant …


Unexpected Insights Into Terrorism And National Security Law Through Children’S Literature: Reading The Butter Battle Book As Monstrosity, Nick J. Sciullo Dec 2013

Unexpected Insights Into Terrorism And National Security Law Through Children’S Literature: Reading The Butter Battle Book As Monstrosity, Nick J. Sciullo

Nick J. Sciullo

Legal knowledge often comes from unexpected encounters with legal theory. In this Essay, I critically analyze Dr. Seuss’s The Butter Battle Book as a source of international legal knowledge. Although this text was originally written as a criticism of the Cold War, I find modern parallels to the evolution of terrorism and national security law theorizing in the United States. As a result of this investigation, I provide a unique window onto civil society, and our continued fascination with the specter of terrorism.


'Ecoterrorism': Terrorist Threat Or Political Ploy?, Cas Mudde, Sivan Hirsch-Hoefler Dec 2013

'Ecoterrorism': Terrorist Threat Or Political Ploy?, Cas Mudde, Sivan Hirsch-Hoefler

Cas Mudde

This article examines the phenomenon of “ecoterrorism” from a conceptual and empirical perspective. We explore the political and academic debates over the meaning and use of the term ecoterrorism, and assess the validity of the concept of “ecoterrorism” and of the alleged threat of the Radical Environmentalist and Animal Rights (REAR) movement by analyzing the characteristics of both the movement and its actions. Our analysis shows that the term ecoterrorism should only be used for a small proportion of the actions of REAR movement. Consequently, counterterrorist measures should only target these terrorist minorities, rather than all groups and the broader …


Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller Oct 2012

Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller

Jeffrey T Biller

Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have rung an alarm bell regarding the potential for acts of cyber-terrorism. However, there is no precise definition of cyber-terrorism under United States law or in practice among cyber-security academicians. The lack of a common starting point is one of the reasons existing law fails to …


Cyber Embargo: Countering The Internet Jihad, Gregory S. Mcneal Apr 2008

Cyber Embargo: Countering The Internet Jihad, Gregory S. Mcneal

Greg McNeal

Terrorists are engaged in an online jihad, characterized by the use of the internet to fundraise, distribute messages and directives, recruit and proselytize. It is impossible to shut down the entire presence of terrorists on the internet; however, this article details a proposal which can have a marked impact on the presence of terrorists on the internet. Using existing statutes, it is possible to regionalize terrorist websites, limiting them to an extremely small number of countries from which they may receive internet services. Once the terrorist message is limited to a particular region, a modification of current laws can allow …