Show simple item record  

dc.contributor.advisorRumbles, Wayne
dc.contributor.authorKoroniadis, Athanasios
dc.date.accessioned2020-03-08T22:18:04Z
dc.date.available2020-03-08T22:18:04Z
dc.date.issued2019
dc.identifier.citationKoroniadis, A. (2019). Law Enforcement Hack-back in New Zealand (Thesis, Master of Laws (LLM)). The University of Waikato, Hamilton, New Zealand. Retrieved from https://hdl.handle.net/10289/13495en
dc.identifier.urihttps://hdl.handle.net/10289/13495
dc.description.abstractThe Internet brings New Zealand closer to the world, but with this benefit comes increased dependency on its benefits of real time connectivity for individuals, organisations, and Government. The downside to this global communication is the increase in cyber-attacks and the ease a cyber-attacker has in hiding their true identity. These digital crimes are costing the worldwide economy billions of dollars which has prompted Governments all around the world into taking measures to implement cyber security strategies. While these strategies are passive in nature, they are proving to be of limited effect in addressing these threats to a State economy. In New Zealand the Minister of Communications in a press release in 2016, stated that “Cyber-crime cost the New Zealand economy $257 million”. Granted that the cyber-crime cost figure is a few years old, but, if compared to 2019, It would be fair to say that the cost of cybercrime to the New Zealand economy would be double the figure today, in the region of $500 million based on the exponential growth of the use of the Internet where 90 percent of New Zealanders are now using the Internet based on recent statistics provided by the Government. This thesis focuses on legalising Law Enforcement hack-back, with recommendations on law reform to existing law, guidelines and safeguards for its implementation. Law Enforcement hack-back is effectively a form of a digital counterstrike against a cyber-attacker and with the use of traceback this allows Law Enforcement the ability to identify the true TCP/IP address used by the cyber-attacker, once Law Enforcement have identified who the hacker is, they can then be able to prosecute the cyber-attacker based on forensic evidence collected using hack-back. Why is it important to legalise Law Enforcement hack-back? Referring to the current New Zealand Cyber Security Strategy for 2019 it makes the Governments position cristal clear “New Zealand must be ready to deter and respond to threats”.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherThe University of Waikato
dc.rightsAll items in Research Commons are provided for private study and research purposes and are protected by copyright with all rights reserved unless otherwise indicated.
dc.subjecthack-back
dc.titleLaw Enforcement Hack-back in New Zealand
dc.typeThesis
thesis.degree.grantorThe University of Waikato
thesis.degree.levelMasters
thesis.degree.nameMaster of Laws (LLM)
dc.date.updated2020-03-08T21:45:35Z
pubs.place-of-publicationHamilton, New Zealanden_NZ


Files in this item

This item appears in the following Collection(s)

Show simple item record