Book Review - Research handbook on International Law and Cyberspace

dc.contributor.authorGrabosky, Peter
dc.date.accessioned2021-05-14T01:25:43Z
dc.date.issued2017
dc.date.updated2020-11-23T10:15:53Z
dc.description.abstractA quarter of a century ago, it had already become trite to suggest that cyberspace knew no boundaries. Subsequent developments have hardly challenged this assertion. Recent years have seen a wide variety of questionable cross-border digital activities by a diverse range of actors. In 2000, a 15-year-old Canadian boy engineered distributed denial of service attacks against major e-retailers in the United States. A succession of transnational child pornography rings continue to exchange images of abused children. Thriving online markets facilitate international trade in malicious software and credit card details. Sophisticated criminal gangs operating from the other side of the globe have engaged in fraud against financial institutions and their customers. U.S. and Israeli security services have disrupted Iranian nuclear enrichment operations. In retaliation, Iranian hackers have attacked financial institutions and have allegedly infiltrated the control system of a small dam near New York City. Officers of the People’s Liberation Army have engaged in global economic espionage. Russian “patriotic hackers” have degraded communications and information systems in Estonia and elsewhere. Russian agents attacked the servers of the Democratic National Committee prior to the 2016 US presidential election. One could go on. Activities such as these raise a spate of difficult issues. First and foremost is that of attribution ̵̶ determining the identity and location of the offender. This may require the assistance of authorities in the jurisdiction from which the offending conduct appears to have been initiated. Suffice it to say that the requisite cooperation is not always forthcoming. Indeed, states themselves may be the source of the problem, rather than any solution. In the absence of such cooperation, does the jurisdiction against which the offending activity was targeted have any recourse?en_AU
dc.description.sponsorshipThis item was commisioned by Rutgers School of Law and Rutgers School of Criminal Justiceen_AU
dc.format.mimetypeapplication/pdfen_AU
dc.identifier.urihttp://hdl.handle.net/1885/233052
dc.language.isoen_AUen_AU
dc.publisherRutgersen_AU
dc.rights© 2017 Rutgersen_AU
dc.source.urihttp://clcjbooks.rutgers.edu/books/research-handbook-on-international-law-and-cyberspace-2/en_AU
dc.titleBook Review - Research handbook on International Law and Cyberspaceen_AU
dc.typeBlog posten_AU
dcterms.accessRightsOpen Access via publisher websiteen_AU
local.bibliographicCitation.placeofpublicationNew Jersey, USA.
local.contributor.affiliationGrabosky, Peter, College of Asia and the Pacific, ANUen_AU
local.contributor.authoremailu4032886@anu.edu.auen_AU
local.contributor.authoruidGrabosky, Peter, u4032886en_AU
local.description.embargo2099-12-31
local.description.notesImported from ARIESen_AU
local.identifier.absfor160299 - Criminology not elsewhere classifieden_AU
local.identifier.absseo940499 - Justice and the Law not elsewhere classifieden_AU
local.identifier.ariespublicationu1026210xPUB102en_AU
local.identifier.uidSubmittedByu1026210en_AU
local.publisher.urlhttp://clcjbooks.rutgers.eduen_AU
local.type.statusPublished Versionen_AU

Downloads

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
01_Grabosky_BOOK_REVIEW_-_Research_2017.pdf
Size:
873.92 KB
Format:
Adobe Portable Document Format