{"id":8802,"date":"2022-10-25T22:17:10","date_gmt":"2022-10-25T22:17:10","guid":{"rendered":"https:\/\/ncjolt.org\/?p=8802"},"modified":"2022-10-25T22:17:10","modified_gmt":"2022-10-25T22:17:10","slug":"seeking-and-connecting-the-dots-legal-challenges-to-countering-foreign-cyberattacks-launched-from-within-u-s-domestic-cyberspace","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/volume-24\/volume-24-issue-1\/seeking-and-connecting-the-dots-legal-challenges-to-countering-foreign-cyberattacks-launched-from-within-u-s-domestic-cyberspace\/","title":{"rendered":"SEEKING AND CONNECTING THE DOTS: LEGAL CHALLENGES TO COUNTERING FOREIGN CYBERATTACKS LAUNCHED FROM WITHIN U.S. DOMESTIC CYBERSPACE"},"content":{"rendered":"<a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2022\/10\/Visger-Final.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-mobile-width=\"500\"  data-scrollbar=\"none\" data-download=\"off\" data-tracking=\"on\" data-newwindow=\"on\" data-pagetextbox=\"off\" data-scrolltotop=\"off\" data-startzoom=\"100\" data-startfpzoom=\"100\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Visger-Final<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><em>Last year, General Nakasone, Commanding General of U.S. Cyber\u00a0Command,\u00a0testified\u00a0to Congress\u00a0that\u00a0the\u00a0foreign\u00a0adversaries who conducted the SolarWinds hack utilized U.S. domestic cyberspace (consisting of leased Amazon Web Services cloud servers). Due to legal restrictions on U.S. Cyber Command operations in U.S. cyberspace, these foreign adversaries were able to avoid U.S. Cyber Command detection. ln the words of General Nakasone, American adversaries &#8220;exploit[ed} a gap.&#8221; As a result, he stated, &#8220;lt&#8217;s not that we can&#8217;t connect the dots. We can&#8217;t see all the dots.&#8221; This tactic and potential methods of addressing this gap raise serious concerns, from the perspective of the Fourth Amendment,\u00a0FlSA,\u00a0and\u00a0the\u00a0Executive\u00a0Powers.\u00a0This\u00a0Article\u00a0examines each\u00a0of\u00a0these\u00a0three\u00a0legal\u00a0lenses\u00a0and\u00a0their\u00a0intersections\u00a0as\u00a0applied\u00a0to this\u00a0new\u00a0tactic,\u00a0and\u00a0concludes with\u00a0considerations\u00a0for\u00a0lawmakers\u00a0to address in attempting to resolve this challenge.<\/em><\/p>\n\n\n\n<p><strong>Author: Lieutenant Colonel Mark A. Visger<\/strong><\/p>\n\n\n\n<p><strong>PDF<\/strong>: http:\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2022\/10\/Visger-Final.pdf<\/p>\n\n\n\n<p><strong>Volume 24, Issue 1<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last year, General Nakasone, Commanding General of U.S. Cyber\u00a0Command,\u00a0testified\u00a0to Congress\u00a0that\u00a0the\u00a0foreign\u00a0adversaries who conducted the SolarWinds hack utilized U.S. domestic cyberspace (consisting of leased Amazon Web Services cloud servers). Due to legal restrictions on U.S. Cyber Command operations in U.S. cyberspace, these foreign adversaries were able to avoid U.S. Cyber Command detection. ln the words of General <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/volume-24\/volume-24-issue-1\/seeking-and-connecting-the-dots-legal-challenges-to-countering-foreign-cyberattacks-launched-from-within-u-s-domestic-cyberspace\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[415],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8802"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=8802"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8802\/revisions"}],"predecessor-version":[{"id":8803,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8802\/revisions\/8803"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=8802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=8802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=8802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}