21. July 2021

This article has been indexed from Lawfare

A Microsoft building at night. (Dale Lane, https://flic.kr/p/4rNvyH; CC BY-NC-SA 2.0, https://creativecommons.org/licenses/by-nc-sa/2.0/)

On June 17, a bipartisan group of U.S. senators reintroduced the International Cybercrime Prevention Act. If passed, this bill would grant federal prosecutors access to new tools in their fight against cybercrime. A section of the legislation would expand the government’s legal arsenal against global networks of compromised computers called botnets. Such botnets infect millions of global computers and “Internet of Things” (IoT) devices, hijacking them to participate in “distributed denial of service (DDoS) attacks, proxy and spam services, malware distribution, and other organized criminal activity” not to mention “covert intelligence collection” or attacks on “Internet-connected critical infrastructure.”

One rationale behind this bill is that while the U.S. is suffering from “a s

[…]

Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: Why Current Botnet Takedown Jurisprudence Should Not Be Replicated

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close