441 research outputs found

    State Cybercrime Legislation in the United States of America: A Survey

    Get PDF
    In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states\u27 ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues

    Cyber-threats and the Limits of Bureaucratic Control

    Get PDF
    For over half a decade, the author has been writing about how and why the institutions modern nation-states rely on to fend off the threats––war, crime, and terrorism––that can erode their ability to maintain order and compromise their viability as sovereign entities become ineffective when the threats migrate into cyberspace. In a succession of law review articles and books, the author refined her analysis of the essentially unprecedented challenges cybercrime, cyberterrorism and cyberwarfare pose for law enforcement and the military. The goal of this article is to go beyond critiquing the efficacy of the current threat-control structures and outline an alternative approach. The current approach, which appropriately focuses on remediating specific factors that contribute to the inefficacy with which current United States threat-control structures confront cyber-threats, is inadequate because it seeks to “update” systems that were developed to control threats that were simpler and more parochial than the ones we confront now. The author does not believe existing threat-control structures can be modified in ways that will make them effective against the twenty-first century threats many countries already confront, and most, if not all, will eventually confront. Like others, the author believes we need a new threat-control strategy: one that replaces the rigid, hierarchical structures on which we currently rely, with systems that mirror the lateral, networked structures that prosper in cyberspace. This article outlines how such a strategy could be structured and implemented

    Cyberthreats and the Posse Comitatus Act: Speculations

    Get PDF

    Communications, Technology, and Present Sense Impressions

    Get PDF

    Cyberthreats and the Posse Comitatus Act: Speculations

    Get PDF
    • …
    corecore