680 research outputs found

    Cybercrime and the Law: Challenges, Issues, and Outcomes

    Get PDF
    The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical differences that have long distinguished crime from terrorism and both from warfare

    Cyberthreats and the Posse Comitatus Act: Speculations

    Get PDF

    Cyberthreats and the Posse Comitatus Act: Speculations

    Get PDF

    Taking Blockchain Seriously

    Get PDF
    In the present techno-political moment it is clear that ignoring or dismissing the hype surrounding blockchain is unwise, and certainly for regulatory authorities and governments who must keep a grip on the technology and those promoting it, in order to ensure democratic accountability and regulatory legitimacy within the blockchain ecosystem and beyond. Blockchain is telling (and showing) us something very important about the evolution of capital and neoliberal economic reason, and the likely impact in the near future on forms and patterns of work, social organization, and, crucially, on communities and individuals who lack influence over the technologies and data that increasingly shape and control their lives. In this short essay I introduce some of the problems in the regulation of blockchain and offer counter-narratives aimed at cutting through the hype fuelling the ascendency of this most contemporary of technologies

    Cybercrime: Criminal Threats from Cyberspace

    Get PDF
    Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it. Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement’s ability to pursue cybercriminals and protecting the privacy of U.S. citizens. This book features a chronology that traces the emergence and evolution of cybercrime from the 1950s to the present and detailed descriptions and analysis of real cybercrime cases that illustrate what cybercrime is and how cybercriminals operate. It incorporates cases from the past 50 years into a detailed, easily understood explanation of what cybercrime is and why it is a matter of great concern to governments — and citizens — around the world. Cybercrime: Criminal Threats from Cyberspace provides a comprehensive legal, historical, and sociological treatment of cybercrime as an empirical phenomenon and explores measures we can all take to secure our property and ourselves

    At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare

    Get PDF

    Overcoming the conflict of jurisdiction in cybercrime

    Get PDF
    This study explores the different approaches to managing the conflict of criminal jurisdiction over cybercrime with the aim of comparing the advantages and disadvantages of each approach. It argues that the most effective solution to this dilemma is to determine certain factors to be considered and evaluated by a body established for such a purpose or by the concerned states themselves in order to decide which country will take the exclusive competence over the cybercrime in accordance with the facts of each individual case and taking into account the characteristics of cybercrime. Establishment of these factors should reflect the interests of the different stakeholders related to cybercrime that include like other crimes the interest of victim(s), criminal(s), and concerned states. As long as it is accepted internationally that the jurisdiction over cybercrime can be established based on territory, active and passive personality, as well as the protective principles, the suggested factors should also include the interests of the state where the crime is committed, the state of the offender\u27s nationality, the state of the victim\u27s nationality, and the state whose vital interests have been affected by the crime. In addition, these factors should contain the interest of criminal proceedings as it is a must to achieve the interests of all the stakeholders. In my opinion, these factors should not be given equal weight as many factors are more relevant than others in light of the cybercrime particularities and the decision in this regard should be reached on the basis of an aggregate balance of all these factors

    URGENSI PENINGKATAN KESADARAN MASYARAKAT TENTANG KASUS PENIPUAN ONLINE BERKEDOK KERJA PARUH WAKTU SEBAGAI ANCAMAN NEGARA

    Get PDF
    Ancaman terhadap negara yang muncul dari kejahatan dunia maya, terutama dalam bentuk penipuan online yang menggunakan modus pekerjaan paruh waktu, telah menjadi sangat serius. Meskipun kemajuan dalam keterampilan digital yang ditawarkan oleh era teknologi informasi memiliki potensi sebagai alat pemberdayaan, namun juga membuka celah bagi pelaku kejahatan untuk memanfaatkan ketidaktahuan dan kelengahan masyarakat. Tulisan ini membahas dengan rinci mengenai urgensi peningkatan kesadaran masyarakat terkait ancaman yang dihadirkan oleh kejahatan dunia maya, terutama dalam kasus penipuan online yang merangkap sebagai pekerjaan paruh waktu. Melalui pendekatan literasi digital, masyarakat mampu memahami risiko serta teknik manipulatif yang sering kali diterapkan dalam penipuan online. Dampak ancaman ini tidak hanya bersifat ekonomis dengan dampak yang merugikan individu dan sektor bisnis, melainkan juga memiliki potensi mengganggu stabilitas sosial dan kedaulatan negara. Oleh karena itu, keterlibatan pemerintah, lembaga pendidikan, dan sektor swasta dalam memperkuat kesadaran masyarakat terhadap ancaman ini menjadi sangat penting melalui pendidikan, kampanye literasi digital, serta kolaborasi erat antara berbagai pihak, masyarakat dapat menjadi lebih waspada dan berperan aktif, lebih waspada dan cerdas dalam berinteraksi di dunia maya maka perlunya tindakan segera untuk mengatasi ancaman kejahatan dunia maya demi menjaga integritas dan stabilitas negar

    Preserving the ‘Jewel of their Souls’: How North Carolina’s Common Law Could Save Cyber-Bullying Statutes

    Get PDF
    In State v. Bishop, the North Carolina Supreme Court struck down the state’s cyber-bullying statute on the grounds that it violated the First Amendment right to freedom of speech. Cyber-bullying, bullying that occurs through electronic technology, has become more prevalent in recent years as much of adolescent life shifts to social media and digital communications. Increasing evidence of cyber-bullying’s negative effects on children has prompted numerous state legislatures to take action. Many states have enacted generic policies for school personnel to take reasonable action to combat cyber-bullying during school hours. This note, however, argues for an alternative approach to combat cyber-bullying; one that looks to the common law torts of libel and intentional infliction of emotional distress as means to reframe the constitutional debate surrounding the issue. Given the Supreme Court’s established framework of dignitary tort jurisprudence, a carefully crafted cyber-bullying law could withstand the First Amendment challenges that rendered North Carolina’s law unconstitutional
    • …
    corecore