Research Paper
Research Paper
- Cyber security initiatives such as the IRR, or Internet Routing Registries and the Resource Public Key Infrastructure or RPKI, add an element of cryptography in order to create a more secure scenario focused on creating a more secure routing service (Mueller and Schmidt, 2013). Including such legislation as the Cyber security Enhancement Act of 2007 and the National Commission on American Cyber security Act of 2008 and finally the Cyber security Act of 2012, there is a sustained interest in creating a secure internet environment (Lee, 2013).
International energy as well as corporations around the globe is adopting FOSS, or free and open source software, in the drive to increase underlying security (Kuechler, Jensen and Bryant, 2013). Funded by the American Reinvestment and Recovery Act of 2009, the modernization of the power sector is a primary concern of the next era.
- The Mutual Legal Assistance Treaties or MLAT’s, were created in a direct effort to have an impact on the rising rate of cyber-crime (Fidler, 2013). These treaties between nations allow for a legal recourse in the event of cross border criminal actions. For example the MLAT that exists between the Chinese nation and America allowed for the pursuit and successful prosecution of a Chinese diplomat caught spying (Fidler, 2013).
A secondary aspect of the Mutual Legal Assistance Treaties rests in the application of maritime crimes that include piracy and international related issues (Cheah, 2013). With many legal tools failing to be applicable to crimes related to piracy, the strengthening of the MLAT’s between nations is argued to be the best solution to the enforcement of civil standards. The UN has recognized that regulation without national backing is largely ignored, thereby creating the necessity for instruments such as MLAT’s.
References
Cheah, W. (2013). Extradition and Mutual Legal Assistance in the Prosecution of Serious Maritime Crimes. Hague Centre for Studies and Research , 1 (1), pp.1-5.
Fidler, D. (2013). Economic Cyber Espionage and International Law . American Society of International Law, 17 (10), pp.1-5.
Kuechler, V., Jensen, C. and Bryant, D. (2013). Misconceptions and Barriers to Adoption of FOSS in the US Energy Industry. School of Electrical Engineering and Computer Science, 1 (1), pp.1-5.
Lee, N. (2013). Counterterrorism and cybersecurity. New York, NY: Springer. p. 119-123
Mueller, M and Schmidt, A (2013) Internet Security and Networked Governance in International Relations. International Studies Review. 15(1) p. 86-104.