Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty Dec 2000

Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty

Federal Communications Law Journal

Book Review: Tangled Web: Tales of Digital Crime From the Shadows of Cyberspace, Richard Power, Que, 2000, 450 pages.

Richard Power’s Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace presents a comprehensive account of computer crime. The book unveils and explores in meticulous detail the nature and scope, and—more importantly—the tremendous potential that common criminals, terrorists, and nation-states now have at their fingertips. This Review describes Tangled Web as a must-read for all cyber cops, prosecutors, and information technology heads and policy-makers.


Cyberspace And The "Devil's Hatband", Jonathan J. Rusch Jan 2000

Cyberspace And The "Devil's Hatband", Jonathan J. Rusch

Seattle University Law Review

In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …


Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post Jan 2000

Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post

Vanderbilt Journal of Entertainment & Technology Law

MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …