16 research outputs found
Technological Self-Help and Equality in Cyberspace
New technologies challenge the law in many ways, for example, they extend oneâs capacity to harm others and to defend oneself from harm by others. These changes require the law to decide whether we have legal rights to be free from those harms, and whether we may react against those harms extrajudicially through some form of self-help (e.g., self-defence or defence of third parties) or whether we must resort to legal mechanisms alone. These questions have been challenging to answer in the cyberspace context, where new interests and new harms have emerged. The legal limits on permissible self-defence have historically been a function of necessity and proportionality to the threat.However, this article argues that case law and historical commentary reveal that equality between individuals is also an important policy issue underlying the limits on self-defence. The use of technologies in self-defence brings the question of equality to the fore since technologies may sometimes neutralize an inequality in strength between an attacker and a defender. A legal approach that limits resort to technological tools in self-defence would ratify and preserve that inequality.However, the relationship between technology and human equality is complex, and this article proposes an analytical structure for understanding it. The objective is to understand which technologies promote equality while imposing the least social costs when used in self-defence. The article proposes principles (including explicit consideration of the effects on equality) for setting limits on technological self-help, and illustrates their use by applying them to several forms of cyberspace counter-strikes against hackers, phishers, spammers, and peer-to-peer networks.Les nouvelles technologies posent de nombreux dĂ©fis en droit. Ă titre dâexemple, elles augmentent la capacitĂ© des individus dâinfliger du mal Ă autrui, mais aussi leur capacitĂ© Ă se dĂ©fendre du mal. Ces changements exigent du droit de dĂ©cider si nous avons ou non le droit, juridiquement parlant, dâĂȘtre Ă lâabri du mal. Le droit doit aussi dĂ©cider si nous sommes libres de rĂ©agir au mal de façon extrajudiciaire, par lâentremise dâinitiatives personnelles (par exemple, lâauto-dĂ©fense ou la dĂ©fense des tierces parties) ou si au contraire nous devons nous en tenir aux mĂ©canismes juridiques. Ces questions posent un dĂ©fi particulier dans le contexte du cyberespace, dâoĂč Ă©mergent de nouvelles menaces et des intĂ©rĂȘts nouveaux. Les limites juridiques de lâautodĂ©fense permissible dĂ©pendent historiquement de la nĂ©cessitĂ© et de la proportionnalitĂ© de la rĂ©action face Ă la menace.Cet article soutient toutefois que la jurisprudence et les commentaires historiques rĂ©vĂšlent que lâĂ©galitĂ© entre individus constitue aussi une question de politique importante qui sous-tend les limites de lâautodĂ©fense. Lâutilisation des technologies dans lâautodĂ©fense porte donc au premier plan la question de lâĂ©galitĂ© puisque la technologie peut parfois neutraliser une inĂ©galitĂ© de force entre une personne qui attaque et une autre qui se dĂ©fend. Une approche juridique qui limiterait lâutilisation dâoutils technologiques dans lâautodĂ©fense entĂ©rinerait et prĂ©serverait cette inĂ©galitĂ©.Pourtant, la relation entre la technologie et lâĂ©galitĂ© entre humains est complexe. Cet article propose une structure analytique pour mieux saisir cette relation. Lâobjectif est de comprendre quelles technologies favorisent lâĂ©galitĂ© tout en imposant les coĂ»ts sociaux les moins Ă©levĂ©s lorsquâelles sont utilisĂ©es pour lâautodĂ©fense. Lâarticle propose des principes pour mettre en place certaines limites aux initiatives personnelles technologiques. Lâarticle illustre aussi lâutilisation de ces principes en les appliquant Ă de nombreuses formes de riposte contre les pirates informatiques, les hammeçonneurs, les polluposteurs et les rĂ©seaux pair Ă pair. Enfin, lâarticle considĂšre explicitement les effets de ces principes sur lâĂ©galitĂ©
The Internet of Things Connectivity Binge: What are the Implications?
Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services and opportunities
EXPLAINING STATE BEHAVIOUR DURING CYBER DISPUTES
This dissertation has the objective of answering two main research questions that tackle directly when and how states employ cyber weapons and engage in cyber disputes, namely: \u201cIs there a particular context within which cyber disputes take place?\u201d and \u201cWhat are the elements that influence the mechanisms of retaliation, and possible escalation, during cyber disputes?\u201d.
The when aims at researching the main condition that causes states to employ cyber weapons against each other. It starts from the hypothesis that cyber disputes are more likely to begin and end within contexts of political, military, diplomatic tension between states as an alternative mean to signal power and force posture without recurring to physical measures, intended as political accusations, economic sanctions and military interventions. The how concerns the characteristics of the behaviour or states in cyber space, and how self-restraining mechanisms and symmetry - or the lack thereof - between dyads of states involved in cyber disputes influences how states engage against each other.
This research presents two main original findings. The first finding is that, indeed, a condition of political tension or hostility, stemming from conflictual strategies and postures, between states - namely, the independent variable - is a condition common to all the analysed cases, namely dyads of states exchanging hostile CNOs, which represents the dependent variable. Counterfactually, there are no recorded cases in literature of allied countries engaging in cyber disputes. The second finding is that there is a causal mechanism between the states that confront each other in cyber space and the cyber weapon employed in such disputes. Retaliation between dyads of states constitutes the dependent variable of this research, and indeed it was shown clearly by this research how it is influenced by the two independent variables taken into consideration. In situations of asymmetry the most powerful state, both as an attacker as a responder to a previous attack, will show enough power to acquire a position of escalation dominance. Against this position the counterpart will be very likely to retaliate but in a less powerful way, de-escalating the intensity of the conflict, or surrender to the attack and avoid retaliating. In a situation of symmetry, the dynamics of attack are expected to follow a tit-for-tat movement, without increasing the intensity of the conflict. This, supposedly, to avoid an escalation into the physical realm that would easily create an impasse or a prolonged crisis, given the equality in power.
Due to the fact that states employ cyber weapons in an internationally unregulated environment, and the sophistication as well the number of states employing these new weapons is increasing, this dissertation will also provide policy suggestion to propose a modification of International Law in order to better address the issue under a normative point of view, for the sake of international security and stability
Computer use and misuse: the constellation of control
This study is concerned with the nature of computer misuse and the legal and extralegal responses to it. It explores what is meant by the term âcomputer misuseâ and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990. Having outlined the new criminal offences introduced by the 1990 Act, the study examines the extent to which the 1990 Act has been effective in controlling computer misuse, taking both prosecution rates and issues of judicial
interpretation into account. It further examines the amendments made to the 1990 Act by the Police and Justice Act 2006 and their potential ramifications when they come
into force. Having considered the position at domestic criminal law, the study turns to assess whether the solution to the effective regulation of computer misuse requires more than just the domestic criminal law. It explores the characteristics and purpose of the criminal law in the context of computer misuse and examines whether the domestic criminal law has limitations. The study then introduces theories of risk from realist, cultural and symbolic, ârisk societyâ and governmentality perspectives before considering the idea of a governance network as a means of responding to risk. It examines computer misuse and the role of the domestic criminal law in the light of these theories. Having established the theoretical governance framework, the study then explores the role of the law in general within this framework, examining potential new nodes of governance from the European Union, Council of Europe, Commonwealth, United Nations and Group of
Eight. It considers whether there might be advantages in moving beyond the domestic criminal law in the response to computer misuse. The study then broadens the discussion of potential means of governance beyond the law to encompass extra-legal initiatives. It establishes a typology of these extra-legal initiatives and examines the contribution made by each to the governance of computer misuse. Finally, this study concludes with an examination of the complex governance network built up throughout the work and considers whether the regulation of computer misuse is only viable in a global networked society by a networked response combining nodes of both legal and extra-legal governance
Risques technologiques et sécurité sur Internet : production d'un outil pour favoriser la prévention et fournir des pistes de solution
Ce mĂ©moire production vise, en premier lieu, Ă fournir des pistes d'explication sur la popularitĂ© et l'unicitĂ© du mĂ©dia Internet, pourtant jeune si on le compare aux autres grands mĂ©dias traditionnels (journaux, tĂ©lĂ©vision, radio). Ses caractĂ©ristiques intĂ©ressantes ont toutefois tendance à «éclipser» le risque omniprĂ©sent qui sĂ©vit sur le rĂ©seau. Les menaces sont non seulement plus nombreuses, mais aussi plus sournoises, dangereuses et potentiellement lourdes de consĂ©quences. Plusieurs ressources sont offertes aux utilisateurs pour les aider Ă se protĂ©ger sur Internet et, s'il est trop tard, pour formuler un diagnostic et obtenir une piste de solution. Quelques-unes de ces ressources, accessibles en ligne, ont Ă©tĂ© examinĂ©es pour juger de leur adĂ©quation au besoin en protection des internautes moyens. Force Ă©tait de constater qu'elles Ă©taient souvent pertinentes, mais qu'elles prĂ©sentaient Ă©galement souvent des lacunes d'utilitĂ© et d'utilisabilitĂ©; or celles-ci peuvent facilement rebuter les internautes Ă la recherche d'information et d'aide. Devant ce constat, il convenait, en second lieu, d'Ă©tablir un cadre mĂ©thodologique pour guider l'Ă©laboration d'un outil ergonomique pouvant ĂȘtre utilisĂ© par les internautes moyens pour combler leur besoin en protection. La plateforme du site Web a Ă©tĂ© privilĂ©giĂ©e, puisqu'elle facilite les mises Ă jour des contenus et des liens, un aspect essentiel pour assurer la pertinence de l'outil dans un univers virtuel en constante mutation. Ce site Web peut ĂȘtre consultĂ© Ă l'adresse http://pages.usherbrooke.ca/securite_internet101/. Un retour sur la production de cet outil a permis, en troisiĂšme lieu, de faire ressortir les diffĂ©rents obstacles rencontrĂ©s en cours de conception (lesquels ont Ă©tĂ© documentĂ©s) de mĂȘme que les solutions apportĂ©es pour les surmonter
The Legal Aspects of Cybercrime in Nigeria: An Analysis with the UK Provisions
Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions.
This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effectively answer questions raised by shortcomings on the implementation of cybercrime legislations, and critically reviews various laws in Nigeria relating or closely related to cybercrime.
This research will provide insight into current global cybercrime legislations and the shortfalls to their procedural enforcement; and further bares the cybercrime issues in Nigeria while analysing and proffering a critique to the provisions as provided in the recently enacted Nigerian Cybercrime (Prohibition and Prevention) Act 2015, in contradistinction to the existing legal framework in the United Kingdom and the other regional enactments like the Council of Europe Convention on Cybercrime, African Union Convention on Cybersecurity and Personal Data Protection 2014, and the ECOWAS Directive on Cybercrime 2011