Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader Nov 2022

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader

Vanderbilt Journal of Transnational Law

On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …


The Law And Politics Of Ransomware, Asaf Lubin Nov 2022

The Law And Politics Of Ransomware, Asaf Lubin

Vanderbilt Journal of Transnational Law

What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between twenty thousand and thirty thousand per day in the United States alone. That is a ransomware attack every eleven seconds, each of which …


Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee May 2022

Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee

Vanderbilt Journal of Transnational Law

This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. The two laws both converge and diverge. Their convergences include the stringent regulation of banned acts, network operators, critical infrastructure, data localization, and personal data. These are all shaped by the immediate diffusion of China's Cybersecurity Law in Vietnam and broader structural factors: namely, the common features of the socialist state, socialist legality, and the statist approach to human rights. The foundational divergence is between the Chinese notion of cybersecurity sovereignty and the Vietnamese notion of national cyberspace, which is …


The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse Jan 2017

The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse

Vanderbilt Journal of Transnational Law

The proceeds of cybercrime are typically laundered by money mules--people used by criminal organizations to interrupt the financial paper trail by transferring money for the criminals. This Article analyzes the discursive construction of the money mule in documents of national and international anti-money laundering authorities such as Financial Intelligence Units (FIUs), Europol, and the Financial Action Task Force (FATF). It shows how case study narratives, visualizations, and metaphors contribute to an understanding of the money mule as an innocent victim of organized crime networks from West Africa and Eastern Europe, supported by money remittance companies like Western Union. These constructions …


Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan Jan 2017

Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan

Vanderbilt Journal of Transnational Law

This Note examines the applicability of the law of armed conflict, and particularly the concept of proportionality, to cyber attacks. After exploring deviations in terminology that may lead to confusion in the field, it considers the difficulties associated with applying an area of law first implemented in the post-World War II era to technologies that have only become vitally important in recent years. Delving into some of the facets of cyber technology that make it unique as a potential battleground, this Note examines why those qualities make the law of proportionality particularly difficult to apply. Acknowledging that the law of …


Hidden By Sovereign Shadows: Improving The Domestic Framework For Deterring State-Sponsored Cybercrime, Eric Blinderman, Myra Din Jan 2017

Hidden By Sovereign Shadows: Improving The Domestic Framework For Deterring State-Sponsored Cybercrime, Eric Blinderman, Myra Din

Vanderbilt Journal of Transnational Law

This Article analyzes the domestic legal framework applicable to state-sponsored cybercrime. The Article describes several instances where state sovereigns perpetrated cybercrimes in the United States. It then outlines the legal framework that the US government utilizes to hold accountable those who perpetrate such crimes. This Article argues that the current legal framework does not have a deterrence effect on sovereign states engaged in such activity and that prosecutors who seek to apply the current framework against state sovereigns or who misattribute the source of such attacks could negatively impact US foreign policy. To remedy these defects, this Article asserts that …


Up In The Cloud: Finding Common Ground In Providing For Law Enforcement Access To Data Held By Cloud Computing Service Providers, Matthew Mckenna Jan 2016

Up In The Cloud: Finding Common Ground In Providing For Law Enforcement Access To Data Held By Cloud Computing Service Providers, Matthew Mckenna

Vanderbilt Journal of Transnational Law

Cloud computing is an everyday part of the modern world; a technology that is increasingly transcending international borders. Disregarding international borders allows cloud computing to operate more efficiently and thus provides better service to users. Yet, the global nature of cloud computing raises a question--what happens if multiple countries apply facially similar laws to cloud computing providers differently? This scenario is common, especially in the context of law enforcement seeking access to cloud computing data. The United States and the United Kingdom have similar laws regarding the government's ability to acquire users' data. Importantly, neither law explicitly addresses the question …


Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard Jan 2014

Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard

Vanderbilt Journal of Transnational Law

Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics holds that if the effects or consequences of such intrusions are sufficiently damaging, international humanitarian law (IHL) should generally govern them--and recourse to armed force may also be justified against states responsible for these actions under the jus ad bellum. This Article argues, however, that there are serious problems and perils in relying on analogies with physical armed force to extend these legal regimes to most events in cyberspace. Armed conflict models applied to the use of information as a weapon and a target are instead likely to …


Cyber-Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly A. Gable Jan 2010

Cyber-Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly A. Gable

Vanderbilt Journal of Transnational Law

Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and cyberattacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyberterrorist acts. It is clear that the international community may only ignore cyberterrorism at its peril.

The primary security threat posed by the Internet is caused by an inherent weakness in the TCP/IP Protocol, which is the technology underlying the structure of the Internet and …


Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke

Vanderbilt Journal of Transnational Law

Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation's infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their …


An International-Comparative Perspective On Peer-To-Peer File-Sharing And Third Party Liability In Copyright Law, Guy Pessach Jan 2007

An International-Comparative Perspective On Peer-To-Peer File-Sharing And Third Party Liability In Copyright Law, Guy Pessach

Vanderbilt Journal of Transnational Law

In the last decade, the phenomenon of peer-to-peer file-sharing and its various legal aspects have been dealt with extensively by legal scholarship. The purpose of this Article is to take a closer inspection of several particular legal aspects that are related to peer-to-peer file-sharing as a comparative, social, economic, and cultural phenomenon. The Article begins by providing critical comparative analysis of distinct paradigms that different legal systems have offered regarding the question of third party liability for copyright infringements that occur through peer-to-peer file-sharing platforms. The Article then presents three focal policy considerations that should serve as copyright law's compass …


The Ec Directive On The Legal Protection Of Computer Programs, Linda G. Morrison May 1992

The Ec Directive On The Legal Protection Of Computer Programs, Linda G. Morrison

Vanderbilt Journal of Transnational Law

The evolution of computer technology has launched questions regarding the proper scope of protection for computer software. The European Community (EC) recently adopted a Council Directive on the Legal Protection of Computer Programs (the Directive), which protects computer software under the copyright paradigm. The path to final adoption of the Directive, however, was marked by debates between diametrically opposed lobbying groups regarding the propriety of a reverse engineering exception to the exclusive right of reproduction. This Note discusses the lobbying efforts that led to a compromise and analyzes the Directive through a comparison to United States law. Next, the Note …