Hacker States by Luca Follis & Adam Fish
Author:Luca Follis & Adam Fish [Follis, Luca & Fish, Adam]
Language: eng
Format: epub
Tags: Computers, internet, General, Political Science, Political Process, Media & Internet, Law, Computer & Internet
ISBN: 9780262043601
Google: QuzVDwAAQBAJ
Publisher: MIT Press
Published: 2020-04-21T00:36:13.255013+00:00
Hacking Civil Law: Lauri Love v. National Crime Agency
Lauri Loveâs case, much like that of McKinnon, illustrates the powerful offline resources that remain available to states when projecting authority through mutual assistance frameworks and claims of extraterritorial jurisdiction. On Friday, October 25, 2013, the NCA executed a search warrant at Loveâs home in Suffolk, in connection with violations of sections 1(1) and 1(3) of the Computer Misuse Act. In a ruse designed to get him out of the house before he could trigger the encryption on his computer, an agent posed as a UPS courier and insisted that Love come to the door to sign for a package. Once Loveâs identity was confirmed, he was handcuffed and left on the porch as fourteen officers invaded the home and spent the next five hours searching the house. The officers seized twenty-nine items of computer equipment and arrested Love. On Saturday afternoon, after a brief morning interview with police during which he was asked (and declined) to provide the encryption keys to the protected devices, he was released on bail with the condition that he surrender his passport and avoid connecting to the internet via âthird partiesâ (e.g., encryption, VPN, etc.).
Although the District of New Jersey had issued a sealed criminal complaint against Love as early as May 16, 2013, Loveâs arrest flowed directly from an ongoing investigation by the UKâs NCA and was followed two days later by a series of joint press announcements from the US Attorneyâs Offices in the District of New Jersey and the Eastern District of Virginia (US Attorneyâs Office 2014a, 2014b). The NCA wrote to the US Department of Justice before the press releases were issued asking that Love not be identified, as this could taint the case and complicate a UK-based prosecution. US authorities singled out the NCA for its bilateral support in apprehending Love, but the UK investigation formed part of a larger, sprawling list of parallel investigations, including those of the Computer Crime Unit of the US Armyâs Criminal Investigation Division, FBI field offices in Washington and Newark, and the Offices of Inspector General for NASA, the Department of Energy, the Environmental Protection Agency, and the Department of Health and Human Services.
Commenting on the arrest, the director of the US Armyâs Computer Crime Unit, Daniel Andrews, emphasized the national security and military risks posed by computer intrusions and argued that âthe borderless nature of internet-based crime underscores the need for robust law enforcement alliances across the globeâ (New Jersey US Attorneyâs Office 2013, 2). The existence of three parallel investigations in the United States, an investigation in the UK, and one in Australia (where two alleged co-conspirators were located) illustrates the hybrid, swarmlike tactics of cross-national law enforcement cases. Significant jurisdictional ambiguity also surrounds these cases, since despite appearing to be jointly pursued investigations, local law enforcement serve as proxies for US interests and investigative priorities.
Although most of the computer equipment seized was returned to the Love family, six items of computer hardware remained in the custody of authorities.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25281)
Hello! Python by Anthony Briggs(24334)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23419)
Kotlin in Action by Dmitry Jemerov(22503)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21959)
Dependency Injection in .NET by Mark Seemann(21837)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20704)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18594)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17028)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13683)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11850)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9185)
The Kubernetes Operator Framework Book by Michael Dame(8561)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8357)