Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 11 of 11
Full-Text Articles in Law
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Articles by Maurer Faculty
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …
Transforming Election Cybersecurity, David P. Fidler
Transforming Election Cybersecurity, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler
Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney
Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney
Articles by Maurer Faculty
In the digital age, every part of federal government has critical cybersecurity interests. Many of those issues are brought into sharp focus by Edward Snowden's disclosure of sensitive government cyber intelligence programs conducted by the National Security Agency, the Federal Bureau of Investigation, and the Central Intelligence Agency. Courts are reviewing various constitutional and statutory challenges to those programs, two government review groups have reported on related legal and policy issues, and Congress is considering cyber intelligence reform proposals. All of this action comes on the heels of significant efforts by successive administrations to restructure government and pass comprehensive cybersecurity …
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Articles by Maurer Faculty
No abstract provided.
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Articles by Maurer Faculty
Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
Law In Cyberspace, Fred H. Cate