Skip to main content

Currently Skimming:

Preventing and Responding to Cybercrime and Terrorism: Some International Dimensions
Pages 198-206

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 198...
... Department of Defense the entire network consisted of only 1000 host computers located in fewer than a half-dozen North Atlantic Treaty Organization (NATO) countries.
From page 199...
... More of the Internet is now outside the United States than inside. As of early 2001, there may have been tens of millions of host computers and 400 million users worldwide, with something like a quarter of the users located outside of the Organization for Economic Cooperation and Development (OECD)
From page 200...
... . But the pursuit of active defensive measures in an international context is more difficult and will get most of the attention in this paper.4 At the very least, active defense involves gathering intelligence information about the attacker.
From page 201...
... It will suffer serious blame in public opinion and elsewhere when its intrusions inevitably result in undesirable collateral or other damages. The United States is home to far more information systems and hosts much more of the Internet than any other country.
From page 202...
... Finally, international responses to transnational attacks would be covered under a near-universal umbrella convention that would permit timely action, among any combination of countries, under established procedures. Under these ideal circumstances, we might expect the following standard scenario if a serious cyber attack is launched from country X against targets in country A
From page 203...
... Each State Party to the convention must adopt a complete set of national laws defining and punishing serious crimes against computer networks. Although the wording of this set does not have to be identical for each country, each must establish all of the collectively defined malicious behavior specified in the agreement as felonies within the country.
From page 204...
... Say that an American citizen is suspected of attacking an Iranian system in a manner that is against the laws both countries have agreed upon in signing the convention. If the United States suspects that this person's human rights would be at risk if he were to be extradited to Iran, then the United States is obligated to try the person for that crime in the United States or to extradite him for trial to a third country that has a claim to jurisdiction but observes civil or human rights laws similar to those in the United States.
From page 205...
... We believe that some kind of extensive international convention is inevitable. Given the time scales involved and how long it takes to work out effective agreements, we also believe it is prudent to pursue serious deliberations on the matter, with the intent of developing an initial "greatest common denominator" that has a strong likelihood of finding broad acceptance among a large and diverse set of countries.
From page 206...
... Global connectivity enables too many countries. For N countries, a perfect set of bilateral agreements that would allow any two to work together would number N(N - 1)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.