R. v. Martin (Lewys Stephen)

Harmannat KourCase Summary

Appeal against the conviction in a case of launching DoS attacks on prestigious universities and a police force

R. v. Martin (Lewys Stephen) [2013] EWCA Crim 1420 In the Court of Appeal, Criminal Division Case Number 201302960 A7 Before Lord Justice Leveson, Justice Sharp DBE, and Justice Spencer Decided on July 31, 2013 Relevancy of the case: Appeal … Read More

R. v. Mudd (Adam Lewis)

Riya SinghCase Summary

Appeal against the conviction for launching large-scale DDoS attacks with autism as a mitigating factor

R. v. Mudd (Adam Lewis) [2017] EWCA Crim 1395 In the Court of Appeal, Criminal Division Case Number 2017/02350/A3 Before Justice Lord Gross, Justice Spencer, and Judge Marson, QC Decided on July 27, 2017 Relevance of the case: Appeal against the … Read More

Cyber attacks… a force majeure event?

Saatvika Reddy SathiLaw

Cyber attacks... a force majeure event?

Amidst the digital world, navigating transactional relationships enforces newer boundaries for parties. From investing in IT to using tech to facilitate seamless business, technology shifts how parties engage in transactions in many ways. However, it commonly provides a forward-looking approach … Read More

An Insight Into Digital Realpolitik

Saishya DuggalCyber Security

The best way to understand cyberpolitik is by evaluating the events that have underscored its importance: Stuxnet and beyond.

The word realpolitik often generates esoteric, perplexing worries in the mind of the average Joe, conjuring up images of an elaborate congress and combative political discourse. It’s me: I’m this average Joe. A little research, however, reveals a painfully less … Read More

A Beginner’s Guide to Cyber Terrorism in India

Yoshita PhaphatLaw

A Beginner's Guide to Cyber Terrorism in India

According to the Global Risks Report 2021, the failure of cyber security will be one of humanity’s most significant concerns in the coming decade. With a sizeable internet population, India has confronted significant cyber terrorism challenges in the last few … Read More

United States v. Trotter

Raj PagariyaCase Summary

Whether an attack on a not-for-profit organisation is covered under the Computer Fraud and Abuse Act?

United States v. Trotter 478 F.3d 918 In the United States Court of Appeals for the Eighth Circuit Case Number 05-4202 Before Circuit Judge Riley, Circuit Judge Melloy, and Circuit Judge Shepherd Decided on February 23, 2007 Relevancy of the … Read More

Warrick Fentiman v. Richard Marsh

Rugved MahamuniCase Summary

Defamation suit for allegations of launching a cyber attack

Warrick Fentiman v. Richard Marsh [2019] EWHC 2099 (QB) In the High Court of Justice, Queen’s Bench Division, Media and Communications List Case Number HQ18M00961 Before Deputy Judge Richard Spearman Decided on July 31, 2019 Relevancy of the Case: Defamation … Read More