preview

Hacking: Annotated Bibliography: NFL

Better Essays

Hacking: An Annotated Bibliography Darlington, Jeff. "Touch Football." NFL.com. N.p., 13 July 2012. Web. 19 Feb. 2015. In this article, Darlington discusses how and when the NFL will be implementing the iPad for playbook and film use. First, he goes into detail about all of the beneficial functions of an iPad. Two examples of their usefulness are they can be used for playbooks and watching game film while at home. Next, he describes the software development used for making apps. Organizations are teaming up with software companies to create apps that will hold playbooks and game film. Another main point that is mentioned is the security of these devices. IPads are secure because they are able to be remotely wiped if a player loses it. In …show more content…

She starts off with the fact that these groups have hacked organizations that were thought to be impenetrable. During this explanation, she adds how the hackers actually get into the network and the code they send in to shut it down. Next, she compares the two most known hacking groups in America, “Anonymous” and “LulzSec.” She states that these groups have the same goals. They both want true freedom of speech on the internet and they like to hack for fun. Also, the author explains these groups have found a hole in the Cyber law. Since they are not showing any signs of cyber terrorism and they have an unknown number of people the US government cannot convict them. This means that Congress has to find a way to rewrite the laws, which were written in 1986, so they can take this case to court. This article concludes by stating these hacking collectives are not a threat to the security of the US and the government should consider hiring …show more content…

He starts with the company “LinkedIn” and their civil court case against a hacking group, who was not named for legal reasons. They won the case, despite the odds being against them. Next, he writes about the difficulties of taking a hacker to court because the evidence is difficult to use against the accused. For example, it is possible to present the computers that have logged into the server, but the defense attorney can have the rebuttal that these logs have been changed by the company and the judge will drop the case. This makes hackers difficult to convict. Piper then brings up the method of catching a hacker by alerting the authorities as soon as you have been hacked. This helps your chances in court, but the downside is the organization has no control of how the case will be presented. Piper then leads his audience to the businesses’ preferred way of handling a case. As stated earlier, that is to take the case to civil court, but this also has a downside because of jurisdiction. Their assets may be impossible to get to because extradition laws may be different where the defendant lives, making it a waste of time and resources for the plaintiff. At last, Piper states the decision for businesses to make, which is whether they should disclose. If they take the accused to court then they must disclose confidential information and still may not even win the

Get Access