Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt Jan 2013

Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt

National Security Law Program

Cyberespionage has received even greater attention in the wake of reports of persistent and brazen cyberexploitation of U.S. and Canadian firms by the Chinese military. But the recent disclosures about NSA surveillance programs have made clear that a national program of cyberdefense of private firms' intellectual property is politically infeasible. Following the lead

of companies like Google, private corporations may increasingly resort to the use of self-defense, hacking back against cross-border incursions on the Internet. Most scholarship, however, has surprisingly viewed such actions as outside the ambit of international law. This Note provides a novel account of how international law …


Changing Tides: An Adaptable Prosecution Approach To Piracy’S Shifting Problem, Jessica Piquet Jan 2013

Changing Tides: An Adaptable Prosecution Approach To Piracy’S Shifting Problem, Jessica Piquet

National Security Law Program

Although piracy off the coast of Somalia has captured worldwide attention, attacks in this region are decreasing while other regions are experiencing increases in pirate activity. This Note expands upon prior research into prosecution models for combatting piracy off the coast of Somalia to determine the adaptability and sustainability of these methods as applied to piracy in other regions. In examining the three most common prosecution models currently used and proposed (prosecution by domestic courts in regional states, prosecution by the capturing state or by a state with a significant nexus to the attack, and prosecution by a specialized piracy …