Main Content
Tyler Moore, et al., The Economics of Online Crime, Journal of Economic Perspectives, Vol 23, No 3, 2009
5.1.2
http://cyber.law.harvard.edu/cybersecurity/The_Economics_of_Online_Crime
United Nations Charter
6.2.1
http://treaties.un.org/doc/Publication/CTC/uncharter.pdf
U.S.-Canada Extradition Treaty
5.2.6
http://www.oas.org/juridico/mla/en/traites/en_traites-ext-can-usa4.html
US Secret Service, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, CERT, 2004
2.3.5.2.1
http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf
Uta Kohl, Jurisdiction and the Internet, Ch. 1, 2007
5.2.1.4
http://books.google.com/books?id=gdtbMKxkDq8C&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp360-367
2.1.2.1
http://www.nap.edu/catalog.php?record_id=12651
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, Chapte 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation, pp.79-158
3.1.2.1
http://www.nap.edu/chapterlist.php?record_id=1265
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; The Basic Technology of Cyberattack in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp82-91
2.1.1.1
http://www.nap.edu/catalog.php?record_id=12651
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; The Basic Technology of Cyberattack in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp.9-12,32.
3.1.1.1
http://www.nap.edu/catalog.php?record_id=12651
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors, Committee on Offensive Information Warfare, National Research Council; Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities; Pages 161-187, 2009
4.2.2.2.5
http://www.nap.edu/catalog.php?record_id=12651
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.