Cybersecurity Law: Legal Jurisdiction and Authority

06/19/2022
by   Feras A. Batarseh, et al.
0

Cybersecurity threats affect all aspects of society; critical infrastructures (such as networks, corporate systems, water supply systems, and intelligent transportation systems) are especially prone to attacks and can have tangible negative consequences on society. However, these critical cyber systems are generally governed by multiple jurisdictions, for instance the Metro in the Washington, D.C. area is managed by the states of Virginia and Maryland, as well as the District of Columbia (DC) through Washington Metropolitan Area Transit Authority (WMATA). Additionally, the water treatment infrastructure managed by DC Water consists of waste water input from Fairfax and Arlington counties, and the district (i.e. DC). Additionally, cyber attacks usually launch from unknown sources, through unknown switches and servers, and end up at the destination without much knowledge on their source or path. Certain infrastructures are shared amongst multiple countries, another idiosyncrasy that exacerbates the issue of governance. This law paper however, is not concerned with the general governance of these infrastructures, rather with the ambiguity in the relevant laws or doctrines about which authority would prevail in the context of a cyber threat or a cyber-attack, with a focus on federal vs. state issues, international law involvement, federal preemption, technical aspects that could affect lawmaking, and conflicting responsibilities in cases of cyber crime. A legal analysis of previous cases is presented, as well as an extended discussion addressing different sides of the argument.

READ FULL TEXT

page 10

page 12

research
05/24/2019

Cyber Warfare: Terms, Issues, Laws and Controversies

Recent years have shown us the importance of cybersecurity. Especially, ...
research
01/12/2019

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

As Critical National Infrastructures are becoming more vulnerable to cyb...
research
01/25/2020

A Review of Cybersecurity Incidents in the Water Sector

This study presents a critical review of disclosed, documented, and mali...
research
08/28/2018

Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening

As the Industrial Internet of Things (IIot) becomes more prevalent in cr...
research
12/06/2021

Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense Vulnerability

Academia, homeland security, defense, and media have accepted the percep...
research
03/26/2019

Data Protection by Design for Cybersecurity Systems in a Smart Home Environment

The present paper deals with the elucidation and implementation of the D...
research
08/06/2022

Preventing or Mitigating Adversarial Supply Chain Attacks; a legal analysis

The world is currently strongly connected through both the internet at l...

Please sign up or login with your details

Forgot password? Click here to reset