BELLOVIN, Steven / BLAZE, Matt / BRICKELL, Ernest / BROOKS, Clinton / CERF, Victor / DIFFIE, Whitfield / LANDAU, Susan / PETERSON, Jon / TREICHLER,...
BELLOVIN, Steven M. / BLAZE, Matt / CLARK, Sandy / LANDAU, Susan (2013): “Going bright: Wiretapping without weakening communications infrastructure”,...
BELLOVIN, Steven M. / BLAZE, Matt / CLARK, Sandy / LANDAU, Susan (2014): “Lawful hacking: Using existing vulnerabilities for wiretapping on...
BELLOVIN, Steven M. / BLAZE, Matt / LANDAU, Susan (2016): “Insecure surveillance: Technical issues with remote computer searches”, en Computer...
BLANCO, Hernán (2020), Tecnología informática e investigación criminal, La Ley, Buenos Aires.
BOJARSKI, Kamil (2015): “Dealer, hacker, lawyer, spy. Modern techniques and legal boundaries of counter-cybercrime operations”, en The European...
BRENNER, Susan W. (2012): “Law, dissonance, and remote computer searches”, en North Carolina Journal of Law & Technology, Vol. 14, N°...
GASSER, Urs / GERTNER, Nancy / GOLDSMITH, Jack / LANDAU, Susan / NYE, Joseph / O’BRIEN, David R. / OLSEN, Matthew G. / RENAN, Daphna / SÁNCHEZ,...
GELLER, Eric (2016): “A complete guide to the new ‘Crypto Wars’”, en Daily Dot, publicado el 26/4/2016.
GHAPPOUR, Ahmed (2017): “Searching places unknown: Law enforcement jurisdiction on the dark web”, en Stanford Law Review, Vol. 69, N° 4, págs....
GOLDE, Nico / REDON, Kevin / BORGAONKAR, Ravishankar (2012): “Weaponizing femtocells: The effect of rogue devices on mobile telecommunication”,...
GOLDSMITH, Jack L. (1999): “Against cyberanarchy”, University of Chicago Law Schoolm Occasional Papers, N°40.
GREENBERG, Andy (2014): “Whatsapp just switched on end-to-end encryption for hundreds of millions of users” en Wired, publicado el 18/11/2014.
GUTHRIE FERGUSON, Andrew (2016): “The Internet of Things and the fourth amendment of effects”, en California Law Review, Vol. 104, N° 4, págs....
HAMMEL SCHULTZ, David (2001): “Unrestricted federal agent: Carnivore and the need to revise the PenRegister Statute”, en Notre Dame Law Review,...
HENNESSEY, Susan (2017): “The elephant in the room: Addressing child exploitation and going dark”, Aegis Paper Series, Hoover Institution,...
HERN, Alex (2017): “The dilemma of the dark web: Protecting neo-nazis and dissidents alike”, en The Guardian, publicado el 23/8/2017.
ISENSEE, Josef (2014), El derecho constitucional a la seguridad. Sobre los deberes de protección del Estado constitucional liberal, Rubinzal-Culzoni,...
KERR, Orin (2005) “Congress, the courts, and new technologies: A response to Professor Solove”, en Fordham Law Review, Vol. 72, N° 2, págs....
KERR, Orin S. / MURPHY, Sean D. (2017): “Government hacking to light the dark web. What risks to international relations and international...
KOOPS, Bert-Jaap / GOODWIN, Morag (2014): “Cyberspace, the cloud, and cross-border criminal investigation. The limits and possibilities of...
KOOPS, Bert-Jaap / BEKKERS, Rudi (2017): “Interceptability of telecommunications: Is US and Dutch law prepared for the future?”, en Telecommunications...
MAYER, Jonathan (2016): “Constitutional malware”, en Social Sciences Research Network (SSRN), publicado el 14/11/2016.
MITNICK, Kevin D. / SIMON, William L. (2002), The art of deception. Controlling the human element of security, John Wiley & Sons, New...
MONTIERI, Antonio / ACETO, Giuseppe / CIUONZO, Domenico / PESCAPÉ, Antonio (2018): “Anonymity services TOR, I2P, JonDonym: Classifying in...
MURPHY, Angela (2002): “Cracking the code to privacy: How far can the FBI go?”, en Duke Law & Technology Review, Vol. 1, págs. 1/6.
NAKASHIMA, Ellen (2015): “Meet the woman in charge of the FBI’s most controversial high-tech tools”, en The Washington Post, publicado el...
NOSSITER, Adam (2020): “When police are hackers: Hundreds charged as encrypted network is broken”, en The New York Times, publicado el 2/7/2020.
NUÑEZ, Michael (2017): “FBI drops all charges in child porn case to keep sketchy spying methods secret” en Gizmodo, publicado el 7/3/2017.
La Vanguardia: “Pegasus: el móvil de Torrent fue espiado por un programa que solo se vende a gobiernos”, publicado el 14/7/2020.
LERNER, Zach (2017): “A warrant to hack: An analysis of the proposed amendments to rule 41 of the Federal Rules of Criminal Procedure”, en...