Book Review - Research handbook on International Law and Cyberspace
dc.contributor.author | Grabosky, Peter | |
dc.date.accessioned | 2021-05-14T01:25:43Z | |
dc.date.issued | 2017 | |
dc.date.updated | 2020-11-23T10:15:53Z | |
dc.description.abstract | A quarter of a century ago, it had already become trite to suggest that cyberspace knew no boundaries. Subsequent developments have hardly challenged this assertion. Recent years have seen a wide variety of questionable cross-border digital activities by a diverse range of actors. In 2000, a 15-year-old Canadian boy engineered distributed denial of service attacks against major e-retailers in the United States. A succession of transnational child pornography rings continue to exchange images of abused children. Thriving online markets facilitate international trade in malicious software and credit card details. Sophisticated criminal gangs operating from the other side of the globe have engaged in fraud against financial institutions and their customers. U.S. and Israeli security services have disrupted Iranian nuclear enrichment operations. In retaliation, Iranian hackers have attacked financial institutions and have allegedly infiltrated the control system of a small dam near New York City. Officers of the People’s Liberation Army have engaged in global economic espionage. Russian “patriotic hackers” have degraded communications and information systems in Estonia and elsewhere. Russian agents attacked the servers of the Democratic National Committee prior to the 2016 US presidential election. One could go on. Activities such as these raise a spate of difficult issues. First and foremost is that of attribution ̵̶ determining the identity and location of the offender. This may require the assistance of authorities in the jurisdiction from which the offending conduct appears to have been initiated. Suffice it to say that the requisite cooperation is not always forthcoming. Indeed, states themselves may be the source of the problem, rather than any solution. In the absence of such cooperation, does the jurisdiction against which the offending activity was targeted have any recourse? | en_AU |
dc.description.sponsorship | This item was commisioned by Rutgers School of Law and Rutgers School of Criminal Justice | en_AU |
dc.format.mimetype | application/pdf | en_AU |
dc.identifier.uri | http://hdl.handle.net/1885/233052 | |
dc.language.iso | en_AU | en_AU |
dc.publisher | Rutgers | en_AU |
dc.rights | © 2017 Rutgers | en_AU |
dc.source.uri | http://clcjbooks.rutgers.edu/books/research-handbook-on-international-law-and-cyberspace-2/ | en_AU |
dc.title | Book Review - Research handbook on International Law and Cyberspace | en_AU |
dc.type | Blog post | en_AU |
dcterms.accessRights | Open Access via publisher website | en_AU |
local.bibliographicCitation.placeofpublication | New Jersey, USA. | |
local.contributor.affiliation | Grabosky, Peter, College of Asia and the Pacific, ANU | en_AU |
local.contributor.authoremail | u4032886@anu.edu.au | en_AU |
local.contributor.authoruid | Grabosky, Peter, u4032886 | en_AU |
local.description.embargo | 2099-12-31 | |
local.description.notes | Imported from ARIES | en_AU |
local.identifier.absfor | 160299 - Criminology not elsewhere classified | en_AU |
local.identifier.absseo | 940499 - Justice and the Law not elsewhere classified | en_AU |
local.identifier.ariespublication | u1026210xPUB102 | en_AU |
local.identifier.uidSubmittedBy | u1026210 | en_AU |
local.publisher.url | http://clcjbooks.rutgers.edu | en_AU |
local.type.status | Published Version | en_AU |
Downloads
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 01_Grabosky_BOOK_REVIEW_-_Research_2017.pdf
- Size:
- 873.92 KB
- Format:
- Adobe Portable Document Format