Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder Oct 2021

Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder

Dickinson Law Review (2017-Present)

Cyberattacks against U.S. targets are becoming increasingly common. To effectively combat these attacks, law enforcement officers need the tools to respond to and prevent cyberattacks before they can occur.

In recent years, hackers have launched cyberattacks against infrastructural targets such as power grids, oil and gas distribution computer systems, and telecommunications networks. Cyberattacks have also targeted U.S. government websites, including the U.S. Department of Transportation and the U.S. Department of Treasury. Recently, a cyberattack against SolarWinds, a Texas-based I.T. company, compromised the computer and network systems of federal, state, and local governments; critical infrastructure entities; and other private sector organizations. …


Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin May 2019

Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.


"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr. Jan 2017

"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.

Faculty Scholarship

If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?

Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed …


Cyberwar To Wikiwar: Battles For Cyberspace, Paul Rexton Kan Sep 2013

Cyberwar To Wikiwar: Battles For Cyberspace, Paul Rexton Kan

The US Army War College Quarterly: Parameters

No abstract provided.


Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


Responses To The Five Questions, Charles J. Dunlap Jr. Jan 2012

Responses To The Five Questions, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


The Intersection Of Law And Ethics In Cyberwar: Some Reflections, Charles J. Dunlap Jr. Jan 2012

The Intersection Of Law And Ethics In Cyberwar: Some Reflections, Charles J. Dunlap Jr.

Faculty Scholarship

The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be forgotten that the law of war, wherever it began at all, began mainly as a matter of religion and ethics . . . “It began in ethics” Best says “and it has kept one foot in ethics ever since.” Understanding that relationship is vital to appreciating the full scope of the responsibilities of a cyber-warrior in the 21st century.


Towards A Cyberspace Legal Regime In The Twenty-First Century: Considerations For American Cyber-Warriors, Charles J. Dunlap Jr. Jan 2009

Towards A Cyberspace Legal Regime In The Twenty-First Century: Considerations For American Cyber-Warriors, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Funding Bin Laden's Avatar: A Proposal For The Regulation Of Virtual Hawalas, Stephen I. Landman Jan 2009

Funding Bin Laden's Avatar: A Proposal For The Regulation Of Virtual Hawalas, Stephen I. Landman

William Mitchell Law Review

No abstract provided.


Technology And The 21st Century Battlefield: Recomplicating Moral Life For The Statesman And The Soldier, Charles J. Dunlap Jr. Jan 1999

Technology And The 21st Century Battlefield: Recomplicating Moral Life For The Statesman And The Soldier, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


The Law Of Cyberwar: A Case Study From The Future, Charles J. Dunlap Jr. Jan 1998

The Law Of Cyberwar: A Case Study From The Future, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Cyberattack! Are We At War?, Charles J. Dunlap Jr. Jan 1996

Cyberattack! Are We At War?, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.