I need an explanation for this Business Law question to help me study.
1) The OPM incident has been linked to various elements, including Chinese hacking groups, the Chinese government, and many others. So, let us assume that there has been a certain amount of success in tracking down the actual hackers who committed the crime. You now get to investigate the various law, organizations, treaties, etc. that are going to be available to prosecute the hackers. Finally, can we make use of the technology of browser fingerprinting and other tools to identify the computers that may have been used for the attack? I want you to run a brief set of fingerprinting tests on your own computer and paste your results at the end of the assignment.
First, navigate to amiunique.org then select the “View my browser fingerprint” button to see the results.