|
Showing 1 - 5 of
5 matches in All Departments
Cybercrime is remarkably varied and widespread, and financial
losses range from a few hundred dollars being extorted to
multi-million dollar cyberfraud cases. Increasingly, cybercrime
also involves the risk of terrorist attacks bringing down a major
part of the Internet. Countries are discovering that it may be
impossible for them to prosecute cybercriminals. Cybercrimes,
unlike 'ordinary' crimes, are transnational in nature and it is
often difficult to say just where they take place. This causes
legal problems, since jurisdiction is usually still confined to the
place where the crime was committed. A related issue is to what
extent the police can investigate cybercrimes across borders,
through the Internet: do they infringe the sovereignty of other
countries? This book surveys how these issues in cybercrime
jurisdiction are dealt with by countries around the world,
including the US, Japan, Korea, India, Brazil, Chile, Australia,
New Zealand, Italy, Germany, Belgium, Denmark, and the UK. A score
of experts assess how well the laws of their countries and the
Cybercrime Convention deal with transnational cybercrime, and how
jurisdiction conflicts should be resolved. With this in-depth
survey of views and practices of cybercrime jurisdiction, the
authors hope to contribute to a more concerted international effort
towards effectively fighting cybercrime. The book is therefore
highly recommended to policy-makers, members of the judiciary,
academics and practitioners. Bert-Jaap Koops is Professor of
Regulation & Technology at the Tilburg Institute for Law,
Technology, and Society (TILT) of Tilburg University, The
Netherlands. Susan W. Brenner is NCR Distinguished Professor of Law
& Technology, University of Dayton School of Law, Ohio, US.
This fascinating and timely book traces the emergence and evolution
of cybercrime as an increasingly intransigent threat to society.
Cybercrime: Criminal Threats from Cyberspace is intended to explain
two things: what cybercrime is and why the average citizen should
care about it. To accomplish that task, the book offers an overview
of cybercrime and an in-depth discussion of the legal and policy
issues surrounding it. Enhancing her narrative with real-life
stories, author Susan W. Brenner traces the rise of cybercrime from
mainframe computer hacking in the 1950s to the organized,
professional, and often transnational cybercrime that has become
the norm in the 21st century. She explains the many different types
of computer-facilitated crime, including identity theft, stalking,
extortion, and the use of viruses and worms to damage computers,
and outlines and analyzes the challenges cybercrime poses for law
enforcement officers at the national and international levels.
Finally, she considers the inherent tension between improving law
enforcement's ability to pursue cybercriminals and protecting the
privacy of U.S. citizens.
This book explores the extraordinary difficulties a nation-state's
law enforcement and military face in attempting to prevent
cyber-attacks. In the wake of recent assaults including the denial
of service attack on Estonia in 2007 and the widespread use of the
Zeus Trojan Horse software, Susan W. Brenner explores how
traditional categories and procedures inherent in law enforcement
and military agencies can obstruct efforts to respond to
cyberthreats. Brenner argues that the use of a territorially-based
system of sovereignty to combat cyberthreats is ineffective, as
cyberspace erodes the import of territory. This problem is
compounded by the nature of cybercrime as a continually evolving
phenomenon driven by rapid and complex technological change.
Following an evaluation of the efficacy of the nation-state, the
book goes on to explore how individuals and corporations could be
integrated into a more decentralized, distributed system of
cyberthreat control. Looking at initiatives in Estonia and Sweden
which have attempted to incorporate civilians into their
cyber-response efforts, Brenner suggests that civilian involvement
may mediate the rigid hierarchies that exist among formal agencies
and increase the flexibility of any response. This book will be of
great interest to students and researchers of information
technological law and security studies.
This book explores the extraordinary difficulties a nation-state's
law enforcement and military face in attempting to prevent
cyber-attacks. In the wake of recent assaults including the denial
of service attack on Estonia in 2007 and the widespread use of the
Zeus Trojan Horse software, Susan W. Brenner explores how
traditional categories and procedures inherent in law enforcement
and military agencies can obstruct efforts to respond to
cyberthreats. Brenner argues that the use of a territorially-based
system of sovereignty to combat cyberthreats is ineffective, as
cyberspace erodes the import of territory. This problem is
compounded by the nature of cybercrime as a continually evolving
phenomenon driven by rapid and complex technological change.
Following an evaluation of the efficacy of the nation-state, the
book goes on to explore how individuals and corporations could be
integrated into a more decentralized, distributed system of
cyberthreat control. Looking at initiatives in Estonia and Sweden
which have attempted to incorporate civilians into their
cyber-response efforts, Brenner suggests that civilian involvement
may mediate the rigid hierarchies that exist among formal agencies
and increase the flexibility of any response. This book will be of
great interest to students and researchers of information
technological law and security studies.
As new technologies develop, terrorist groups are developing new
methods of attack by using the Internet, and by using cyberspace as
a battlefield, it has become increasingly difficult to discover the
identity of attackers and bring them to justice. The seemingly
limitless boundaries of cyberspace has allowed virtually anyone to
launch an attack from a remote and anonymous location. But once
these attacks occur, it raises several important questions; who
should respond, and how?; how should nation-states effectively deal
with a cyber-attack?; and will the United States and other
nation-states be able to survive in a world where virtual
boundaries are limitless?
In Cyberthreats: The Emerging Fault Lines of the Nation State
Susan Brenner gives a thorough explanation of how military and law
enforcement personnel respond to these attacks and why bringing
cyber-terrorist to justice can be difficult and sometimes
impossible.
|
|