ABSTRACT

Introduction to Legal Aspects of Operations in Cyberspace   [open pdf - 105KB]

"There are three legal paradigms through which to characterize computer intrusion. These paradigms overlap each other. In addition, an intrusion can fit into any two or all three of the paradigms. These are: law enforcement, intelligence collection, and military operations. The legal challenge in any computer intrusion is properly characterizing the intruders' categorical legal identity. This will determine whether one or more of the above paradigms are applicable. Each as has strengths, weaknesses, and limitations. Each also requires that an intrusion be dealt with according to its own precise standards."

Report Number:
NPS-CS-04-005
Author:
Publisher:
Date:
2004-04-28
Copyright:
Public Domain
Retrieved From:
Naval Postgraduate School, Dudley Knox Library: http://www.nps.edu/Library/index.aspx
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations