Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Susan Brenner

Computer Law

Articles 1 - 2 of 2

Full-Text Articles in Law

Law, Dissonance And Remote Computer Searches, Susan W. Brenner Jun 2012

Law, Dissonance And Remote Computer Searches, Susan W. Brenner

Susan Brenner

This article examines the rule dissonance that can arise when law enforcement officers from one jurisdiction, e.g., the United States, remotely search a computer in another jurisdiction, e.g., Russia. It explains that such a search occurred in 2000, when Federal Bureau of Investigation agents tricked two Russian cybercriminals to Seattle and tricked them into using laptops loaded with spyware to access their computer in Russia. The FBI agents then used the usernames and passwords the spyware recorded to access the Russian computer and download data, which was used to prosecute the Russians for violating U.S. cybercrime law. One moved to …


Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner Jun 2012

Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner

Susan Brenner

This article argues that the approach the United States, like other countries, uses to control threats in real-space is ill-suited for controlling cyberthreats, i.e., cybercrime, cyberterrorism and cyberwar. It explains that because this approach evolved to deal with threat activity in a physical environment, it is predicated on a bureaucratically organized response structure. It explains why this is not an effective way of approaching cyber-threat control and examines the two federal initiatives that are intended to improve the U.S. cybersecurity: legislative proposals put forward by four U.S. Senators and by the White House; and the military’s development of six distinct …