Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen Dec 2002

Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen

Faculty Scholarship

Computer networks create tremendously increased capabilities but also represent equally increased vulnerabilities. These vulnerabilites are especially acute in relation to potential attacks on critical national infrasturucture. This Article proposes that international law must evolve to recognize that attacks against a nation's critical national infrastructure from any source constitute a use of force. Such attacks, therefore, give the victim state the right to proportional self-defense - including anticipatory self-defense - even if the computer network attack is not an armed attack under Article 51 of the United Nations Charter. Due to the instantaneous nature of computer network attacks, the right to …


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …