Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

International Law

Cybersecurity

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 42

Full-Text Articles in Law

Two Visions Of Digital Sovereignty, Sujit Raman Sep 2023

Two Visions Of Digital Sovereignty, Sujit Raman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh Jan 2023

Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh

American University International Law Review

The continued increase in the use of ransomware by cyber criminals has had a costly impact on businesses and organizations around the world. Ransomware groups continue to initiate attacks on businesses and organizations, and states have become increasingly concerned over the potential impact it may have on their critical infrastructure and economies. The United States’ recent acknowledgement of cyber operations against ransomware groups highlights the seriousness of the issue and exposes areas of international law that are complicated when applied to cyber operations against these groups. This Comment explores the relevant international law as it applies to the United States …


Securing Patent Law, Charles Duan Jan 2023

Securing Patent Law, Charles Duan

Articles in Law Reviews & Other Academic Journals

A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …


The Law And Politics Of Ransomware, Asaf Lubin Nov 2022

The Law And Politics Of Ransomware, Asaf Lubin

Vanderbilt Journal of Transnational Law

What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between twenty thousand and thirty thousand per day in the United States alone. That is a ransomware attack every eleven seconds, each of which …


The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe Feb 2022

The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe

Theses and Dissertations

The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication. Internet users are spending increasing amounts of time online and undertaking a greater range of online and social networking activities. However, just like a double edged sword, the internet also presents opportunities to cybercrimes in the Information society. The nature of some ‘traditional’ crime types has been transformed by the use of computers and other information communications technology (ICT) in terms of its scale and reach, with risks extending to many aspects of social life, such …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd Dec 2021

Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd

Keep Up With the Latest News from the Law School (blog)

No abstract provided.


The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani Jan 2021

The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani

Catholic University Journal of Law and Technology

Under the non-commercial tort exception to the Foreign Sovereign Immunities Act (FSIA), a tort committed by a foreign state must occur wholly within the United States in order to trigger jurisdiction and liability in an American court. As such, cybercrimes which are committed abroad, even if targeted at and cause harm to U.S. citizens, fall outside this exception, leaving injured parties with no domestic avenue of redress. Potential solutions to closing this gap in the legal framework include the proposed Homeland and Cyber Threat Act (HACT), expansion of the FSIA's terrorism exception, or overruling the entire tort doctrine.


Law School News: Distinguished Research Professor: John Chung 05-24-2020, Michael M. Bowden May 2020

Law School News: Distinguished Research Professor: John Chung 05-24-2020, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


An Extraterritorial Human Right To Cybersecurity, Ido Kilovaty Jan 2020

An Extraterritorial Human Right To Cybersecurity, Ido Kilovaty

Notre Dame Journal of International & Comparative Law

Cybersecurity breaches have affected consumers and the landscape of politics globally. Legal developments have been reactive and incomprehensive. The fatal flaws of international law make it an ill-suited solution to these concerns because international law binds state actors and does not give individuals rights. International human rights law, however, provides the best solution because it does provide harmed individuals with rights and mechanisms to seek recourse. Cybersecurity relates to several key areas of human rights law and, therefore, its regulation is well suited to the existing international human rights regulatory scheme. This Article explores the possibility of using international human …


Domestic Law Responses To Transnational Cyberattacks And Other Online Harms: Internet Dreams Turned To Internet Nightmares And Back Again, Clive Walker, Ummi Hani Binti Masood Jan 2020

Domestic Law Responses To Transnational Cyberattacks And Other Online Harms: Internet Dreams Turned To Internet Nightmares And Back Again, Clive Walker, Ummi Hani Binti Masood

Notre Dame Journal of International & Comparative Law

Since its utilization has become widespread, the potential of the Internet has often been overshadowed by the harms it’s capable of bringing upon society. Regulation has not yet properly addressed the harms presented to individuals’ cybersecurity and the U.K. has focused and set objectives at a national security level, while ignoring the effects of attacks on individual citizens. This Article considers whether it is possible to create a domestic legal response to transnational cyberattacks and the appropriateness of law to address the threats, as they exist. The law must be efficient, effective, and fair, which are all aims it may …


An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher Jan 2020

An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher

Electronic Theses and Dissertations

Allusions to death delivered by bits and bytes have been in vogue since the Reagan administration. Yet, as the internet and its connected devices have since proliferated, cyber violence remains far more fiction than fact. Nevertheless, prominent U.S. officials have all but assured the eventuality of a devastating attack. In anticipation, political, legal, and industry experts are now seeking to codify and inculcate international norms to govern acts of war prosecuted via cyberspace. Two of the most prominent governance models to emerge are the Tallinn Manual and Microsoft’s Digital Geneva Convention. The driving thesis of this research argues that within …


The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland Jan 2020

The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland

Catholic University Journal of Law and Technology

Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …


The Threat Is Real: Protecting The Energy Infrastructure From Cyberattacks, Patricia Blotzer Jan 2019

The Threat Is Real: Protecting The Energy Infrastructure From Cyberattacks, Patricia Blotzer

Barry Law Review

No abstract provided.


Creating A National Data Privacy Law For The United States, Shaun G. Jamison Jan 2019

Creating A National Data Privacy Law For The United States, Shaun G. Jamison

Cybaris®

No abstract provided.


“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng Apr 2018

“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng

Cornell International Law Journal

We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon Apr 2017

Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon

Penn State Journal of Law & International Affairs

No abstract provided.


Tallinn, Hacking, And Customary International Law, Ahmed Ghappour Jan 2017

Tallinn, Hacking, And Customary International Law, Ahmed Ghappour

Faculty Scholarship

Tallinn 2.0 grapples with the application of general international law principles through various hypothetical fact patterns addressed by its experts. In doing so, its commentary sections provide a nonbinding framework for thinking about sovereignty, raising important considerations for states as they begin to articulate norms to resolve the question of precisely what kinds of nonconsensual cyber activities violate well-established international laws — a question that will likely be the focus of international lawyers in this area for some time to come.

This essay focuses on one area of state practice where states are already dealing with these issues: the use …


Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme Mar 2016

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Journal of International and Comparative Law

No abstract provided.


Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.


Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson Oct 2015

Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: • Agreement on Iran Nuclear Program Goes into Effect • United States and China Reach Agreement Regarding Economic Espionage and International Cybersecurity Norms • United States Ratifies the International Convention for the Suppression of Acts of Nuclear Terrorism • United States Reaches Agreement with Turkey on Use of Incirlik Air Base for Strikes on ISIL; “Safe Zone” Not Part of the Deal


Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford Aug 2015

Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford

Scott Shackelford

Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …


On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford Aug 2015

On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford

Scott Shackelford

Although the atmosphere and cyberspace are distinct arenas, they share similar problems of overuse, difficulties of enforcement, and the associated challenges of collective inaction and free riders. Moreover, “[m]illions of actors affect the global atmosphere[,]” just as they do the Internet. With weather patterns changing, global sea levels rising, and temperatures set to exceed 1.5 degrees Celsius by 2100, climate change is a problem affecting the entire world, but one in which the benefits are dispersed and the harms are often concentrated. Similarly, much of the cost of cyber attacks is focused in a relatively small number of nations even …


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller Feb 2015

Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller

Scott Shackelford

This Article analyzes recent business realities and regulatory trends shaping the proactive cybersecurity industry. To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations. We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric “global security assemblages.” Finally, we assess the emergence of proactive cybersecurity norms, both within industry and international law, and consider the implications of this movement on …


Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort Jan 2015

Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort

Scott Shackelford

According to Frank Montoya, the U.S. National Counterintelligence Chief, “We’re an information-based society now. Information is everything. That makes . . . company executives, the front line – not the support mechanism, the front line – in [determining] what comes.”[1] Chief Montoya’s remarks underscore the central role played by the private sector in ongoing efforts aimed at enhancing cybersecurity, much like the increasingly vital role firms are playing in fostering sustainability. For example, according to Accenture surveys, the number of managers who consider sustainability to be critical to the future success of their organizations jumped from fifty to more …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler Jan 2015

Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler

Articles by Maurer Faculty

No abstract provided.