The Legal Aspects of Cybercrime in Nigeria

Total Page:16

File Type:pdf, Size:1020Kb

The Legal Aspects of Cybercrime in Nigeria The Legal Aspects of Cybercrime in Nigeria: An Analysis with the UK Provisions BY CHIBUKO RAPHAEL IBEKWE A Thesis Submitted to the School of Law, University of Stirling for the Degree of Doctor of Philosophy (PhD) JULY 2015 Abstract Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effectively answer questions raised by shortcomings on the implementation of cybercrime legislations, and critically reviews various laws in Nigeria relating or closely related to cybercrime. This research will provide insight into current global cybercrime legislations and the shortfalls to their procedural enforcement; and further bares the cybercrime issues in Nigeria while analysing and proffering a critique to the provisions as provided in the recently enacted Nigerian Cybercrime (Prohibition and Prevention) Act 2015, in contradistinction to the existing legal framework in the United Kingdom and the other regional enactments like the Council of Europe Convention on Cybercrime, African Union Convention on Cybersecurity and Personal Data Protection 2014, and the ECOWAS Directive on Cybercrime 2011. ii Acknowledgement I express my special appreciation and thanks to my supervisor Dr David McArdle. You have been a tremendous mentor for me. Thank you for your continuous encouragement and for allowing me to grow as a research scholar. Your advices have been invaluable. I am inesti- mably indebted to you. Special thanks to Mr T. George-Maria Tyendezwa, CFE (Head of the Nigerian Computer Crime Prosecution Unit). Your contribution to this research, and also throughout the entire legislative process for the Nigerian Cybercrime Act 2015 has been wonderful. I gratefully acknowledge the members of my PhD examination committee (Professor Chris Gale, Profes- sor Richard Haynes, and Dr Thomas Margoni) for their time and valuable feedback on a pre- liminary version of this thesis. A special thanks to my wife, Dr Maryrose Ibekwe for her continued support and understand- ing throughout the period of this research. I appreciate all your efforts. To my lovely children, Zikora, Dumebi and Maya… I love you guys so much. Thank you for being the best children, always cheering daddy up. And for my brother, Clement (Obisho), thank you for your con- tinued support. I cannot thank you enough for encouraging me throughout this experience. Words cannot express how grateful I am to my mother and father for their prayers and all of the sacrifices that they’ve made on my behalf. Finally I thank my God (my good Father) and blessed mother (Virgin Mary) for letting me through all the difficulties. I have experienced Your guidance day by day. Chibuko Raphael Ibekwe iii Table of Contents Abstract .................................................................................................................................. ii Acknowledgement ............................................................................................................... iii Table of Contents .................................................................................................................. iv Chapter One: GENERAL INTRODUCTION ................................................................... 1 1.1 Defining Cybercrime ............................................................................................. 10 1.2 The Research Aims ................................................................................................ 16 1.3 Methodology of the Study and Structure ............................................................... 17 Chapter Two: THE NIGERIAN CYBER-PLURALISM EXPERIENCE ........................ 22 2.1 Introduction ........................................................................................................... 22 2.2 What is Legal Pluralism? ....................................................................................... 25 2.3 Pluralisms in the Nigeria Cybercriminal Law ....................................................... 31 2.3i Statutory Pluralism............................................................................................. 32 2.3ii Investigative and Prosecutorial Pluralism .......................................................... 35 2.3iia Attorney-General ........................................................................................ 37 2.3iia1 Power to Institute and Undertake Criminal Proceedings ......................... 37 2.3iia2 Power to Takeover and Continue Proceedings ........................................ 39 2.3iia3 Power to Discontinue ............................................................................... 40 2.3iib Police .......................................................................................................... 43 2.3iic Private Persons ........................................................................................... 47 2.3iid Special Prosecutors ..................................................................................... 49 2.3iie Military ....................................................................................................... 51 2.4 Jurisdictional Pluralism ......................................................................................... 51 2.5 Conclusion ............................................................................................................. 53 Chapter Three: OFFENCES AGAINST THE STATE ..................................................... 55 3.1 Introduction ........................................................................................................... 55 3.2 Offences against the Critical National Infrastructure ............................................ 58 3.3 Cyber-Terrorism Offences ..................................................................................... 70 3.3i Metamorphosis of Terrorism and Cyberterrorism ............................................. 73 3.3ii Elements of Cyber-Terrorism ............................................................................ 77 3.3iii Critical Infrastructure offences and Cyberterrorism Differentiated ............... 82 3.3iiia Intention ...................................................................................................... 83 3.3iiib Motivation .................................................................................................. 84 3.4 Conclusion ............................................................................................................. 86 iv Chapter Four: OFFENCES AGAINST CONFIDENTIALITY, INTEGRITY AND AVAILABILITY OF COMPUTER DATA AND SYSTEMS ........................................... 89 4.1 Introduction ........................................................................................................... 89 4.2 Illegal Access ......................................................................................................... 90 4.2i Hacking .............................................................................................................. 93 4.2ii Hacking with the intent of obtaining computer data, securing access to any program, commercial or industrial secrets or confidential information ....................... 97 4.2iii Hacking while using a device to avoid detection or identification ................ 99 4.3 Illegal Interception ............................................................................................... 103 4.4 Data Interference ................................................................................................. 110 4.5 System Interference ............................................................................................. 114 4.6 Misuse of Devices ............................................................................................... 121 4.7 Conclusion ........................................................................................................... 125 Chapter Five: CYBERFRAUD AND OTHER RELATED OFFENCES ...................... 127 5.1 Introduction ......................................................................................................... 127 5.2 Computer-related Fraud ....................................................................................... 128 5.2i Things Capable of Being Stolen: Computer Data/Document? ........................ 136 5.2ii Computer Fraud by false representation .......................................................... 139 5.2iii Computer Fraud by failing to disclose information ..................................... 141 5.2iv Computer Fraud by abuse of position .......................................................... 144 5.2v The Elements of Computer-related Fraud ........................................................ 145 5.3 Computer-related Forgery ................................................................................... 146 5.4 Offences related to the Infringement of Copyrights and other related Rights ..... 153 5.4i Internet and Copyright ....................................................................................
Recommended publications
  • Explanatory Notes
    These notes refer to the Serious Crime Bill [HL] as introduced in the House of Lords on 5th June 2014 [HL Bill 1] SERIOUS CRIME BILL [HL] —————————— EXPLANATORY NOTES INTRODUCTION 1. These Explanatory Notes relate to the Serious Crime Bill [HL] as introduced into the House of Lords on 5th June 2014. They have been prepared by the Home Office in order to assist the reader of the Bill and to help inform debate on it. They do not form part of the Bill and have not been endorsed by Parliament. 2. The Notes need to be read in conjunction with the Bill. They are not, and are not meant to be, a comprehensive description of the Bill. So where a clause or part of a clause does not seem to require any explanation or comment, none is given. 3. A glossary of abbreviations and terms used in these Explanatory Notes is contained in Annex A to these Notes. OVERVIEW 4. Serious and organised crime includes drug trafficking, human trafficking, organised illegal immigration, child sexual exploitation, high value fraud and other financial crime, counterfeiting, organised acquisitive crime and cyber crime. Organised crime costs the United Kingdom at least £24 billion each year. As at December 2013, there are some 36,600 organised criminals in 5,300 groups currently operating in ways that directly affect the UK1. In October 2013, the Government published its Serious and Organised Crime Strategy (Cm 8715)2. The aim of the strategy is to reduce substantially the level of serious and organised crime affecting the UK and its interests.
    [Show full text]
  • 2.3 Holocaust Denial
    nm u Ottawa L'Universite eanadienne Canada's university mn FACULTE DES ETUDES SUPERIEURES 1=^1 FACULTY OF GRADUATE AND ET POSTOCTORALES U Ottawa POSDOCTORAL STUDIES L'Universite eanadienne Canada's university Johny-Angel Butera AUTEUR DE LA THESE / AUTHOR OF THESIS M.A. (Criminology) GRADE/DEGREE Department of Criminology FACULTE, ECOLE, DEPARTEMENT / FACULTY, SCHOOL, DEPARTMENT Genocide Denial on the Internet: The Cases of Armenia and Rwanda TITRE DE LA THESE / TITLE OF THESIS Maritza Felices-Luna DIRECTEUR (DIRECTRICE) DE LA THESE / THESIS SUPERVISOR CO-DIRECTEUR (CO-DIRECTRICE) DE LA THESE /THESIS CO-SUPERVISOR Daniel dos Santos Valerie Steeves Gary W. Slater Le Doyen de la Faculte des etudes superieures et postdoctorales / Dean of the Faculty of Graduate and Postdoctoral Studies GENOCIDE DENIAL ON THE INTERNET: THE CASES OF ARMENIA AND RWANDA Johny-Angel Butera Thesis submitted to the Faculty of Graduate and Postdoctoral Studies In partial fulfillment of the requirements For the MA degree in Criminology Department of Criminology Faculty of Social Sciences University of Ottawa © Johny-Angel Butera, Ottawa, Canada, 2010 Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre r&terence ISBN: 978-0-494-73798-9 Our file Notre r6f6rence ISBN: 978-0-494-73798-9 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license
    [Show full text]
  • Gigabit-Broadband in the UK: Government Targets and Policy
    BRIEFING PAPER Number CBP 8392, 30 April 2021 Gigabit-broadband in the By Georgina Hutton UK: Government targets and policy Contents: 1. Gigabit-capable broadband: what and why? 2. Gigabit-capable broadband in the UK 3. Government targets 4. Government policy: promoting a competitive market 5. Policy reforms to help build gigabit infrastructure Glossary www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary 2 Gigabit-broadband in the UK: Government targets and policy Contents Summary 3 1. Gigabit-capable broadband: what and why? 5 1.1 Background: superfast broadband 5 1.2 Do we need a digital infrastructure upgrade? 5 1.3 What is gigabit-capable broadband? 7 1.4 Is telecommunications a reserved power? 8 2. Gigabit-capable broadband in the UK 9 International comparisons 11 3. Government targets 12 3.1 May Government target (2018) 12 3.2 Johnson Government 12 4. Government policy: promoting a competitive market 16 4.1 Government policy approach 16 4.2 How much will a nationwide gigabit-capable network cost? 17 4.3 What can a competitive market deliver? 17 4.4 Where are commercial providers building networks? 18 5. Policy reforms to help build gigabit infrastructure 20 5.1 “Barrier Busting Task Force” 20 5.2 Fibre broadband to new builds 22 5.3 Tax relief 24 5.4 Ofcom’s work in promoting gigabit-broadband 25 5.5 Consumer take-up 27 5.6 Retiring the copper network 28 Glossary 31 ` Contributing Authors: Carl Baker, Section 2, Broadband coverage statistics Cover page image copyright: Blue Fiber by Michael Wyszomierski.
    [Show full text]
  • A Preliminary Report on Operation “Murambatsvina”
    Order out of Chaos, or Chaos out of Order? A Preliminary Report on Operation “Murambatsvina” A report by the Zimbabwe Human Rights NGO Forum June 2005 Executive Summary “Operation Murambatsvina” and “Operation Restore Order” are the code names used by the police for a massive operation that began in Zimbabwe towards the end of May. This nationwide campaign, which has been conducted in the cities and towns, in peri-urban areas, and on farms settled after land invasions, has led to the destruction of many thousands of houses and means of shelter, trading stalls and markets. Whatever the reasons behind this, none of which can be morally justified, this campaign has created a huge humanitarian disaster causing enormous hardship and suffering. Within the space of a few weeks, Operation Murambatsvina has produced a massive internal refugee population who are homeless and without the means to earn a living. By its mismanagement of the economy in pursuit of political ends, the Mugabe Government has created mass unemployment. As formal sector unemployment has risen, more and more people had to move into the informal trading sector to earn some sort of livelihood. Before Operation Murambatsvina, vast numbers of people were earning a living in the informal economic sector. Previously the Government encouraged the growth of the informal sector and allowed informal traders and vendors to carry out their activities. The authorities largely turned a blind eye to vendors and traders operating in violation of by-laws. Because of drastic housing shortages, hundreds of thousands of people were occupying shanty and makeshift dwellings in urban areas.
    [Show full text]
  • Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
    Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable Gibson Mba Jeremiah Onaolapo Royal Holloway University College London University of London Gianluca Stringhini Lorenzo Cavallaro University College London Royal Holloway University of London ABSTRACT ans living in Nigeria. While the long history and advanced Most of cyberscam-related studies focus on threats perpe- use of Information and Communication Technology (ICT) trated against the Western society, with a particular atten- in the Western societies justify the large body of literature tion to the USA and Europe. Regrettably, no research has dealing with its misuse, the absence of detailed studies on been done on scams targeting African countries, especially other regions, such as Africa, creates the impression that Nigeria, where the notorious and (in)famous 419 advanced- these societies are immune from cyber attacks. On the con- fee scam, targeted towards other countries, originated. How- trary, there is more happening out there that has not been ever, as we know, cybercrime is a global problem affecting brought to the attention of the concerned public. Our study all parties. In this study, we investigate a form of advance aims at bridging this gap, i.e., the paucity of African unique fee fraud scam unique to Nigeria and targeted at Nigerians, contribution to the global cybercrime, by studying in de- but unknown to the Western world. For the study, we rely tail a form of 419 (advance fee fraud) scam unknown to the substantially on almost two years worth of data harvested West but unique to Africa|Nigeria in particular|targeted from an online discussion forum used by criminals.
    [Show full text]
  • L'aula D'idioma Com a Mitjà D'integració I D'enriquiment
    L’AULA D’IDIOMA COM A MITJÀ D’INTEGRACIÓ I D’ENRIQUIMENT MULTICULCULTURAL José Luis Bartolomé Sánchez Curs 2004-2005 Centre de treball: IES Montsacopa (Olot, Garrotxa) Especialitat: Llengua anglesa Supervisió: Neus Serra (Servei Inspecció Delegació Territorial d’Educació de Girona) Llicència d’estudis retribuïda concedida pel Departament d’Educació de la Generalitat, Resolució del 16 de juliol de 2004 (DOGC núm. 4182 de 26.7. 2004) “The White Man Drew a Small Circle” The white man drew a small circle in the sand and told the red man, 'This is what the Indian knows,' and drawing a big circle around the small one, 'This is what the white man knows.' The Indian took the stick and swept an immense ring around both circles: 'This is where the white man and the red man know nothing.' Carl Sandburg « L'home blanc va dibuixar un cercle petit » L'home blanc va dibuixar un cerce petit a la sorra i va dir al pell roja: "Això és els que coneixeu els indis" i tot seguit va dibuixar un cercle gran al voltant del petit: "Això és el que coneixem els homes blancs." L'indi va agafar el pal i va escombrar un enorme cercle al voltant dels altres dos: "Això és on ni l'home blanc ni el pell roja no coneixen gens". 2 3 4 5 Índex Pàgina Introducció 7 Greencards for Cultural Integration 11 Readers 113 - Around the world in ten Tintin books 118 - Australia 129 - America 139 - Far and Middle East 155 - Africa 177 - Far East. China & India 217 Pop Songs 249 Movies 357 Conclusions 428 Bibliografia 433 6 INTRODUCCIÓ 7 L'experiència personal dels darrers anys com a docent d'institut en un municipi amb un augment espectacular de l'arribada de famílies i alumnes d'altres països m'ha fet veure que l'entrebanc principal de contacte amb aquestes persones -l'idioma- resulta de vegades paradoxal.
    [Show full text]
  • Future Identities: Changing Identities in the UK – the Next 10 Years DR 19: Identity Related Crime in the UK David S
    Future Identities: Changing identities in the UK – the next 10 years DR 19: Identity Related Crime in the UK David S. Wall Durham University January 2013 This review has been commissioned as part of the UK Government’s Foresight project, Future Identities: Changing identities in the UK – the next 10 years. The views expressed do not represent policy of any government or organisation DR19 Identity Related Crime in the UK Contents Identity Related Crime in the UK ............................................................................................................ 3 1. Introduction ......................................................................................................................................... 4 2. Identity Theft (theft of personal information) .................................................................................... 6 3. Creating a false identity ...................................................................................................................... 9 4. Committing Identity Fraud ................................................................................................................ 12 5. New forms of identity crime ............................................................................................................. 14 6. The law and identity crime................................................................................................................ 16 7. Conclusions ......................................................................................................................................
    [Show full text]
  • Combatting Online Harassment and Abuse: a Legal Guide for Journalists in England and Wales
    MLA Safety Guide COMBATTING ONLINE HARASSMENT AND ABUSE: A LEGAL GUIDE FOR JOURNALISTS IN ENGLAND AND WALES June 2021 DISCLAIMER: This guide is for educational purposes only. Every situation is different. A person experiencing an online safety threat should listen to their instincts, discuss their concerns with trusted allies and experts in law enforcement or security. This guide is and should not be relied upon as legal advice. Specialist legal advice should be sought based upon the particular circumstances in which it is needed. 1 MLA Safety Guide Acknowledgements This guide has been written by Beth Grossman, a barrister at Doughty Street Chambers specialising in media law. Strategic input has been provided by Caoilfhionn Gallagher QC, a leading expert in international human rights law and the safety of journalists. This guide draws upon her experience of having advised and assisted journalists dealing with online harassment and fearing for their safety. The guide was commissioned by the Media Lawyers’ Association (MLA) and the Department for Digital, Culture, Media and Sport (DCMS). The DCMS commissioned this report as part of its commitment to the National Action Plan for Journalists’ Safety. However, the guide is entirely independent of the DCMS. The MLA is an association of in-house media lawyers from newspapers, magazines, book publishers, broadcasters and news agencies. It was formed to promote and protect freedom of expression, and the right to receive and impart information, opinions and ideas. Its members include in-house lawyers from all of the major UK publishers and broadcasters as well as international news organisations. Our thanks go to Cian Murphy,Sophie Argent, Zoe Norden and John Battle for their assistance with the preparation of this guide.
    [Show full text]
  • Issues Paper on Cyber-Crime Affecting Personal Safety, Privacy and Reputation Including Cyber-Bullying (LRC IP 6-2014)
    Issues Paper on Cyber-crime affecting personal safety, privacy and reputation including cyber-bullying (LRC IP 6-2014) BACKGROUND TO THIS ISSUES PAPER AND THE QUESTIONS RAISED This Issues Paper forms part of the Commission’s Fourth Programme of Law Reform,1 which includes a project to review the law on cyber-crime affecting personal safety, privacy and reputation including cyber-bullying. The criminal law is important in this area, particularly as a deterrent, but civil remedies, including “take-down” orders, are also significant because victims of cyber-harassment need fast remedies once material has been posted online.2 The Commission seeks the views of interested parties on the following 5 issues. 1. Whether the harassment offence in section 10 of the Non-Fatal Offences Against the Person Act 1997 should be amended to incorporate a specific reference to cyber-harassment, including indirect cyber-harassment (the questions for which are on page 13); 2. Whether there should be an offence that involves a single serious interference, through cyber technology, with another person’s privacy (the questions for which are on page 23); 3. Whether current law on hate crime adequately addresses activity that uses cyber technology and social media (the questions for which are on page 26); 4. Whether current penalties for offences which can apply to cyber-harassment and related behaviour are adequate (the questions for which are on page 28); 5. The adequacy of civil law remedies to protect against cyber-harassment and to safeguard the right to privacy (the questions for which are on page 35); Cyber-harassment and other harmful cyber communications The emergence of cyber technology has transformed how we communicate with others.
    [Show full text]
  • A Timely History of Cheating and Fraud Following Ivey V Genting Casinos (UK)
    The honest cheat: a timely history of cheating and fraud following Ivey v Genting Casinos (UK) Ltd t/a Crockfords [2017] UKSC 67 Cerian Griffiths Lecturer in Criminal Law and Criminal Justice, Lancaster University Law School1 Author email: [email protected] Abstract: The UK Supreme Court took the opportunity in Ivey v Genting Casinos (UK) Ltd t/a Crockfords [2017] UKSC 67 to reverse the long-standing, but unpopular, test for dishonesty in R v Ghosh. It reduced the relevance of subjectivity in the test of dishonesty, and brought the civil and the criminal law approaches to dishonesty into line by adopting the test as laid down in Royal Brunei Airlines Sdn Bhd v Tan. This article employs extensive legal historical research to demonstrate that the Supreme Court in Ivey was too quick to dismiss the significance of the historical roots of dishonesty. Through an innovative and comprehensive historical framework of fraud, this article demonstrates that dishonesty has long been a central pillar of the actus reus of deceptive offences. The recognition of such significance permits us to situate the role of dishonesty in contemporary criminal property offences. This historical analysis further demonstrates that the Justices erroneously overlooked centuries of jurisprudence in their haste to unite civil and criminal law tests for dishonesty. 1 I would like to thank Lindsay Farmer, Dave Campbell, and Dave Ellis for giving very helpful feedback on earlier drafts of this article. I would also like to thank Angus MacCulloch, Phil Lawton, and the Lancaster Law School Peer Review College for their guidance in developing this paper.
    [Show full text]
  • Computer Misuse Act 1990 Is up to Date with All Changes Known to Be in Force on Or Before 03 August 2021
    Changes to legislation: Computer Misuse Act 1990 is up to date with all changes known to be in force on or before 03 August 2021. There are changes that may be brought into force at a future date. Changes that have been made appear in the content and are referenced with annotations. (See end of Document for details) View outstanding changes Computer Misuse Act 1990 1990 CHAPTER 18 An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes. [29th June 1990] Be it enacted by the Queen’s most Excellent Majesty, by and with the advice and consent of the Lords Spiritual and Temporal, and Commons, in this present Parliament assembled, and by the authority of the same, as follows:— Computer misuse offences 1 Unauthorised access to computer material. (1) A person is guilty of an offence if— (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer [F1, or to enable any such access to be secured] ; (b) the access he intends to secure [F2, or to enable to be secured,] is unauthorised; and (c) he knows at the time when he causes the computer to perform the function that that is the case. (2) The intent a person has to have to commit an offence under this section need not be directed at— (a) any particular program or data; (b) a program or data of any particular kind; or (c) a program or data held in any particular computer.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]