Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 8 U.S.C. § 1189 (1)
- Computer (1)
- Computer hacking (1)
- Cyber law (1)
- Cyber threats (1)
-
- Cyber warfare (1)
- Cyberattacks (1)
- Cybercriminals (1)
- Cyberspace (1)
- Data collection (1)
- Data privacy (1)
- Data protection (1)
- EU (1)
- European Union (1)
- FTOs (1)
- Foreign Terrorist Organizations (1)
- Foreign organizations (1)
- Foreign ransomware (1)
- International law (1)
- Privacy (1)
- Ransomware (1)
- Ransomware gangs (1)
- Security (1)
- Security breach (1)
- Terrorism (1)
- War on Terror (1)
Articles 1 - 3 of 3
Full-Text Articles in Computer Law
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Pepperdine Law Review
The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …
In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang
In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang
Journal of the National Association of Administrative Law Judiciary
The first section of this paper examines the historical differences that have led to the American approach to privacy and the European approach to privacy. The second section will examine the current U.S. model, and the third section will examine the EU model. Next, the fourth section will compare and contrast the two models. Finally, the last section will argue that the U.S. should have a regulatory agency and describe how that should look and run.
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Journal of the National Association of Administrative Law Judiciary
No abstract provided.