For over half a decade, the author has been writing about how and why the institutions modern nation-states rely on to fend off the threats––war, crime, and terrorism––that can erode their ability to maintain order and compromise their viability as sovereign entities become ineffective when the threats migrate into cyberspace. In a succession of law review articles and books, the author refined her analysis of the essentially unprecedented challenges cybercrime, cyberterrorism and cyberwarfare pose for law enforcement and the military. The goal of this article is to go beyond critiquing the efficacy of the current threat-control structures and outline an alternative approach. The current approach, which appropriately focuses on remediatin...
The threats residing in cyber-space are becoming well understood by policymakers and security expert...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
The United States is heavily reliant on information technology and cyberspace to function at the soc...
The Occidental Societies are becoming increasingly vulnerable to cybernetic attacks due to their hea...
As new technologies develop, terrorist groups are developing new methods of attack by using the Inte...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Computers and the Internet have changed and are continuing to change the way governments, militaries...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
Current approaches to cyber-security are not working. Rather than producing more security, we seem t...
Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become t...
The threats residing in cyber-space are becoming well understood by policymakers and security expert...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, co...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
The United States is heavily reliant on information technology and cyberspace to function at the soc...
The Occidental Societies are becoming increasingly vulnerable to cybernetic attacks due to their hea...
As new technologies develop, terrorist groups are developing new methods of attack by using the Inte...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Computers and the Internet have changed and are continuing to change the way governments, militaries...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
Current approaches to cyber-security are not working. Rather than producing more security, we seem t...
Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become t...
The threats residing in cyber-space are becoming well understood by policymakers and security expert...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations ass...