Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in National Security Law

Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder Oct 2021

Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder

Dickinson Law Review (2017-Present)

Cyberattacks against U.S. targets are becoming increasingly common. To effectively combat these attacks, law enforcement officers need the tools to respond to and prevent cyberattacks before they can occur.

In recent years, hackers have launched cyberattacks against infrastructural targets such as power grids, oil and gas distribution computer systems, and telecommunications networks. Cyberattacks have also targeted U.S. government websites, including the U.S. Department of Transportation and the U.S. Department of Treasury. Recently, a cyberattack against SolarWinds, a Texas-based I.T. company, compromised the computer and network systems of federal, state, and local governments; critical infrastructure entities; and other private sector organizations. …


Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman Apr 2018

Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman

Dickinson Law Review (2017-Present)

In February 2015, the FBI discovered a website dedicated to child pornography located on the Tor Network, a network designed to protect its users’ identities on the Internet. Due to the structure of the Tor Network, the FBI could not take down the website and identify users who previously accessed the website. Instead, the FBI kept the website operational for 30 days and applied for a search warrant in the Eastern District of Virginia to use a device called a Network Investigative Technique (“NIT”). This device operated similarly to malware and “attached” to computers accessing the website, allowing the government …