Main Content
Tyler Moore, et al., The Economics of Online Crime, Journal of Economic Perspectives, Vol 23, No 3, 2009
5.1.2
http://cyber.law.harvard.edu/cybersecurity/The_Economics_of_Online_Crime
United Nations Charter
6.2.1
http://treaties.un.org/doc/Publication/CTC/uncharter.pdf
U.S.-Canada Extradition Treaty
5.2.6
http://www.oas.org/juridico/mla/en/traites/en_traites-ext-can-usa4.html
US Secret Service, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, CERT, 2004
2.3.5.2.1
http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf
Uta Kohl, Jurisdiction and the Internet, Ch. 1, 2007
5.2.1.4
http://books.google.com/books?id=gdtbMKxkDq8C&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp360-367
2.1.2.1
http://www.nap.edu/catalog.php?record_id=12651
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, Chapte 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation, pp.79-158
3.1.2.1
http://www.nap.edu/chapterlist.php?record_id=1265
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; The Basic Technology of Cyberattack in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp82-91
2.1.1.1
http://www.nap.edu/catalog.php?record_id=12651
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; The Basic Technology of Cyberattack in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp.9-12,32.
3.1.1.1
http://www.nap.edu/catalog.php?record_id=12651
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors, Committee on Offensive Information Warfare, National Research Council; Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities; Pages 161-187, 2009
4.2.2.2.5
http://www.nap.edu/catalog.php?record_id=12651
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.