More about Our Guest
https://researchers.anu.edu.au/researchers/grabosky-pn
From this Episode:
Michael A. Sussmann, (1999) The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium, 9 Duke Journal of Comparative & International Law 451-489
https://scholarship.law.duke.edu/djcil/vol9/iss2/5/
Kim Dotcom
https://en.wikipedia.org/wiki/Kim_Dotcom
Malaysian Cybercrime Law
Yew, Wong Malaysian Law and Computer Crime (SANS Reading Room Whitepaper)
https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670
Appudurai, J., & Ramalingam, C. L. (2007). Computer Crimes: A Case Study of What Malaysia Can Learn from Others?. Journal of Digital Forensics, Security and Law, 2(2), 1.
https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl
Drink or Die
https://en.wikipedia.org/wiki/DrinkOrDie
Sanger, David E. (2018)The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
Bruce Sterling The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992)