Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Was The Colonial Cyberattack The First Act Of Cyberwar Against The U.S.? Finding The Threshold Of War For Ransomware Attacks, Liam P. Bradley Mar 2023

Was The Colonial Cyberattack The First Act Of Cyberwar Against The U.S.? Finding The Threshold Of War For Ransomware Attacks, Liam P. Bradley

St. John's Law Review

(Excerpt)

On May 7, 2021, “DarkSide,” a foreign hacker group, conducted a ransomware attack against the Colonial Pipeline (“Colonial”). That morning, Colonial discovered a “ransom note demanding cryptocurrency.” The attack forced the shutdown of the Colonial Pipeline, stopping the daily delivery of 2.5 million barrels (MMBbls) of “gasoline, jet fuel and diesel” to the East Coast. The shutdown created fuel shortages, impacted financial markets, and panicked the public. The resulting fuel shortages and economic impacts “triggered a comprehensive federal response” on May 11, 2021. On May 12, CEO Joseph Blount paid a ransom of nearly $5 million in bitcoin to …


The Security And Cyber Defence Realities And Difficulties In Algeria, Kada Aicha Jan 2023

The Security And Cyber Defence Realities And Difficulties In Algeria, Kada Aicha

Journal of Police and Legal Sciences

This research paper aims to shed light on the digital challenge faced by Algeria as it enters the world of the knowledge society, which qualifies it to achieve cybersecurity and cyber defense against various forms and types of security threats, including cyber threats. The researcher used an analytical approach to understand the phenomenon under study and trace its causes, in addition to a case study method to study all aspects of the studied phenomenon and identify the characteristics of the case study - Algeria was chosen as the analysis unit. The study concluded several important results, including:

The deficiency of …


The Law And Politics Of Ransomware, Asaf Lubin Nov 2022

The Law And Politics Of Ransomware, Asaf Lubin

Vanderbilt Journal of Transnational Law

What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between twenty thousand and thirty thousand per day in the United States alone. That is a ransomware attack every eleven seconds, each of which …


Cybersecurity-The Internet Of Things, Amy J. Ramson Jul 2020

Cybersecurity-The Internet Of Things, Amy J. Ramson

Open Educational Resources

With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.


Cybersecurity-Corporate Espionage, Amy J. Ramson Jul 2020

Cybersecurity-Corporate Espionage, Amy J. Ramson

Open Educational Resources

The goals of this team activity in the area of criminal law, cybersecurity and cyber crime are to facilitate team work, critical thinking and presentation skills. Students will be grouped into two teams. As a team, they will analyze cases about corporate espionage committed by nation states and industry competitors through the questions presented in the activity. They will present their analysis to the class.


Cybersecurity-Fake News, Amy J. Ramson Jul 2020

Cybersecurity-Fake News, Amy J. Ramson

Open Educational Resources

This goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.


Cybersecurity-The Silk Road Market, Amy J. Ramson Jul 2020

Cybersecurity-The Silk Road Market, Amy J. Ramson

Open Educational Resources

This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.


Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson Jul 2020

Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson

Open Educational Resources

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.


Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist Oct 2019

Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist

Open Educational Resources

No abstract provided.


K-12 Cybersecurity Program Evaluation And Its Application, Tabitha Domeij May 2019

K-12 Cybersecurity Program Evaluation And Its Application, Tabitha Domeij

Honors Program Theses and Projects

As the use of the Internet and computers continues to increase, so does the prevalence of cybercrime. However, there is currently no global standard education curriculum guideline in place to prevent cybercrime or cybercrime victimization. The purpose of this study is to examine programs designed for students in grades K-12 that have already been implemented in communities across the country in order to determine the amount of information taught and to identify a global standard preventative program for all educational institutions. This project will be an exploratory study in which existing K-12 curriculum programs are reviewed qualitatively using a content …


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon Apr 2017

Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon

Penn State Journal of Law & International Affairs

No abstract provided.


What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer Jan 2016

What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer

University of Michigan Journal of Law Reform

This Note examines the challenges of corporate cyberdefense and suggests an approach to mitigate them. Part I outlines the background of the corporate cyberdefense quandary and various cyberdefense strategies. Part II explores the current landscape of cybersecurity law in the United States and the regulatory infrastructure that governs cybercrimes. Part II also surveys case law that illustrates the legal loopholes and ambiguities corporations face when implementing cybersecurity measures. Finally, Part III argues that the proposed active defense model fails to comport with practical concerns and established legal principles. This Note’s comparative analysis of common law ‘defense of property’ principles and …


Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas Sep 2014

Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas

Pace Law Review

This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …