Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (11)
- SelectedWorks (5)
- The Catholic University of America, Columbus School of Law (4)
- American University Washington College of Law (3)
- Notre Dame Law School (2)
-
- Barry University School of Law (1)
- Boston University School of Law (1)
- Case Western Reserve University School of Law (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Golden Gate University School of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Mitchell Hamline School of Law (1)
- Pace University (1)
- Penn State Dickinson Law (1)
- Penn State Law (1)
- Roger Williams University (1)
- St. John's University School of Law (1)
- University of Denver (1)
- University of Michigan Law School (1)
- University of San Diego (1)
- Vanderbilt University Law School (1)
- Publication Year
- Publication
-
- Articles by Maurer Faculty (10)
- Scott Shackelford (5)
- Catholic University Journal of Law and Technology (4)
- Faculty Scholarship (2)
- Notre Dame Journal of International & Comparative Law (2)
-
- American University International Law Review (1)
- Articles (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Barry Law Review (1)
- Case Western Reserve Journal of International Law (1)
- Cornell International Law Journal (1)
- Cybaris® (1)
- Dickinson Law Review (2017-Present) (1)
- Electronic Theses and Dissertations (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal of International and Comparative Law (1)
- Keep Up With the Latest News from the Law School (blog) (1)
- Life of the Law School (1993- ) (1)
- Loyola of Los Angeles Law Review (1)
- Pace Law Review (1)
- Penn State Journal of Law & International Affairs (1)
- San Diego International Law Journal (1)
- Theses and Dissertations (1)
- Vanderbilt Journal of Transnational Law (1)
- Publication Type
- File Type
Articles 1 - 30 of 42
Full-Text Articles in Law
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh
Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh
American University International Law Review
The continued increase in the use of ransomware by cyber criminals has had a costly impact on businesses and organizations around the world. Ransomware groups continue to initiate attacks on businesses and organizations, and states have become increasingly concerned over the potential impact it may have on their critical infrastructure and economies. The United States’ recent acknowledgement of cyber operations against ransomware groups highlights the seriousness of the issue and exposes areas of international law that are complicated when applied to cyber operations against these groups. This Comment explores the relevant international law as it applies to the United States …
Securing Patent Law, Charles Duan
Securing Patent Law, Charles Duan
Articles in Law Reviews & Other Academic Journals
A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …
The Law And Politics Of Ransomware, Asaf Lubin
The Law And Politics Of Ransomware, Asaf Lubin
Vanderbilt Journal of Transnational Law
What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between twenty thousand and thirty thousand per day in the United States alone. That is a ransomware attack every eleven seconds, each of which …
The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe
The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe
Theses and Dissertations
The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication. Internet users are spending increasing amounts of time online and undertaking a greater range of online and social networking activities. However, just like a double edged sword, the internet also presents opportunities to cybercrimes in the Information society. The nature of some ‘traditional’ crime types has been transformed by the use of computers and other information communications technology (ICT) in terms of its scale and reach, with risks extending to many aspects of social life, such …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd
Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd
Keep Up With the Latest News from the Law School (blog)
No abstract provided.
The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani
The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani
Catholic University Journal of Law and Technology
Under the non-commercial tort exception to the Foreign Sovereign Immunities Act (FSIA), a tort committed by a foreign state must occur wholly within the United States in order to trigger jurisdiction and liability in an American court. As such, cybercrimes which are committed abroad, even if targeted at and cause harm to U.S. citizens, fall outside this exception, leaving injured parties with no domestic avenue of redress. Potential solutions to closing this gap in the legal framework include the proposed Homeland and Cyber Threat Act (HACT), expansion of the FSIA's terrorism exception, or overruling the entire tort doctrine.
Law School News: Distinguished Research Professor: John Chung 05-24-2020, Michael M. Bowden
Law School News: Distinguished Research Professor: John Chung 05-24-2020, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
An Extraterritorial Human Right To Cybersecurity, Ido Kilovaty
An Extraterritorial Human Right To Cybersecurity, Ido Kilovaty
Notre Dame Journal of International & Comparative Law
Cybersecurity breaches have affected consumers and the landscape of politics globally. Legal developments have been reactive and incomprehensive. The fatal flaws of international law make it an ill-suited solution to these concerns because international law binds state actors and does not give individuals rights. International human rights law, however, provides the best solution because it does provide harmed individuals with rights and mechanisms to seek recourse. Cybersecurity relates to several key areas of human rights law and, therefore, its regulation is well suited to the existing international human rights regulatory scheme. This Article explores the possibility of using international human …
Domestic Law Responses To Transnational Cyberattacks And Other Online Harms: Internet Dreams Turned To Internet Nightmares And Back Again, Clive Walker, Ummi Hani Binti Masood
Domestic Law Responses To Transnational Cyberattacks And Other Online Harms: Internet Dreams Turned To Internet Nightmares And Back Again, Clive Walker, Ummi Hani Binti Masood
Notre Dame Journal of International & Comparative Law
Since its utilization has become widespread, the potential of the Internet has often been overshadowed by the harms it’s capable of bringing upon society. Regulation has not yet properly addressed the harms presented to individuals’ cybersecurity and the U.K. has focused and set objectives at a national security level, while ignoring the effects of attacks on individual citizens. This Article considers whether it is possible to create a domestic legal response to transnational cyberattacks and the appropriateness of law to address the threats, as they exist. The law must be efficient, effective, and fair, which are all aims it may …
An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher
An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher
Electronic Theses and Dissertations
Allusions to death delivered by bits and bytes have been in vogue since the Reagan administration. Yet, as the internet and its connected devices have since proliferated, cyber violence remains far more fiction than fact. Nevertheless, prominent U.S. officials have all but assured the eventuality of a devastating attack. In anticipation, political, legal, and industry experts are now seeking to codify and inculcate international norms to govern acts of war prosecuted via cyberspace. Two of the most prominent governance models to emerge are the Tallinn Manual and Microsoft’s Digital Geneva Convention. The driving thesis of this research argues that within …
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
Catholic University Journal of Law and Technology
Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …
The Threat Is Real: Protecting The Energy Infrastructure From Cyberattacks, Patricia Blotzer
The Threat Is Real: Protecting The Energy Infrastructure From Cyberattacks, Patricia Blotzer
Barry Law Review
No abstract provided.
Creating A National Data Privacy Law For The United States, Shaun G. Jamison
Creating A National Data Privacy Law For The United States, Shaun G. Jamison
Cybaris®
No abstract provided.
“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng
“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng
Cornell International Law Journal
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.
Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman
Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman
Faculty Scholarship
Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …
Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon
Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon
Penn State Journal of Law & International Affairs
No abstract provided.
Tallinn, Hacking, And Customary International Law, Ahmed Ghappour
Tallinn, Hacking, And Customary International Law, Ahmed Ghappour
Faculty Scholarship
Tallinn 2.0 grapples with the application of general international law principles through various hypothetical fact patterns addressed by its experts. In doing so, its commentary sections provide a nonbinding framework for thinking about sovereignty, raising important considerations for states as they begin to articulate norms to resolve the question of precisely what kinds of nonconsensual cyber activities violate well-established international laws — a question that will likely be the focus of international lawyers in this area for some time to come.
This essay focuses on one area of state practice where states are already dealing with these issues: the use …
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Journal of International and Comparative Law
No abstract provided.
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.
Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson
Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson
Articles
In this section: • Agreement on Iran Nuclear Program Goes into Effect • United States and China Reach Agreement Regarding Economic Espionage and International Cybersecurity Norms • United States Ratifies the International Convention for the Suppression of Acts of Nuclear Terrorism • United States Reaches Agreement with Turkey on Use of Incirlik Air Base for Strikes on ISIL; “Safe Zone” Not Part of the Deal
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford
Scott Shackelford
Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford
Scott Shackelford
Although the atmosphere and cyberspace are distinct arenas, they share similar problems of overuse, difficulties of enforcement, and the associated challenges of collective inaction and free riders. Moreover, “[m]illions of actors affect the global atmosphere[,]” just as they do the Internet. With weather patterns changing, global sea levels rising, and temperatures set to exceed 1.5 degrees Celsius by 2100, climate change is a problem affecting the entire world, but one in which the benefits are dispersed and the harms are often concentrated. Similarly, much of the cost of cyber attacks is focused in a relatively small number of nations even …
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller
Scott Shackelford
This Article analyzes recent business realities and regulatory trends shaping the proactive cybersecurity industry. To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations. We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric “global security assemblages.” Finally, we assess the emergence of proactive cybersecurity norms, both within industry and international law, and consider the implications of this movement on …
Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort
Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort
Scott Shackelford
According to Frank Montoya, the U.S. National Counterintelligence Chief, “We’re an information-based society now. Information is everything. That makes . . . company executives, the front line – not the support mechanism, the front line – in [determining] what comes.”[1] Chief Montoya’s remarks underscore the central role played by the private sector in ongoing efforts aimed at enhancing cybersecurity, much like the increasingly vital role firms are playing in fostering sustainability. For example, according to Accenture surveys, the number of managers who consider sustainability to be critical to the future success of their organizations jumped from fifty to more …
Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic
Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic
Scott Shackelford
There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Articles by Maurer Faculty
No abstract provided.