Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang Jun 2017

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Computing and Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by economic …


Balancing Integrity With Privacy Interests: Fighting Cyber-Corruption With Background Checks, Robin J. Kempf, Chelsea Binns Jan 2017

Balancing Integrity With Privacy Interests: Fighting Cyber-Corruption With Background Checks, Robin J. Kempf, Chelsea Binns

Center for the Advancement of Public Integrity (Inactive)

Cybercrime is a serious threat to the public sector, especially as more of the public’s business is automated. In recent years, malicious actors have successfully infiltrated systems at the U.S. Department of Defense, the Navy, and the Environmental Protection Agency. Yet despite all the media attention on external hackers, especially those coming from foreign countries, employees remain the biggest cyber risk to governments. While background checks may promote employee integrity among those in public service, privacy concerns exist. This brief discusses how background checks are utilized to mitigate employee risk of cybercrime in the financial industry. The practices of this …


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams Jan 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams

Law Student Publications

George Orwell's dystopia, with the ever-watchful Big Brother, has seemingly become a reality with the recently passed amendments to Rule 41 of the Federal Rules of Criminal Procedure. Rule 41, governing searches and seizures, now permits magistrate judges to authorize agents- under a single warrant- to "remotely access," and simultaneously search, copy and seize information from an infinite number of unknown electronic devices in multiple districts anywhere in the country. The unlimited jurisdiction provision is triggered when a device's location is obscured through "technological means," or if agents are investigating computer crimes in five or more districts- regardless of whether …


Cross-Border Evidence Gathering In Transnational Criminal Investigation: Is The Microsoft Ireland Case The 'Next Frontier'?, Robert Currie Jan 2017

Cross-Border Evidence Gathering In Transnational Criminal Investigation: Is The Microsoft Ireland Case The 'Next Frontier'?, Robert Currie

Articles, Book Chapters, & Popular Press

A recent and prominent American appeals court case has revived a controversial international law question: can a state compel a person on its territory to obtain and produce material which the person owns or controls, but which is stored on the territory of a foreign state? The case involved, United States v. Microsoft, features electronic data stored offshore which was sought in the context of a criminal prosecution. It highlights the current legal complexity surrounding the cross-border gathering of electronic evidence, which has produced friction and divergent state practice. The author here contends that the problems involved are best understood—and …