Archive of Prior Issues

  • JLCW Volume 4, Winter 2015, Issue 3
    • ARTICLES
      • The Rise of Nation State Attacks
        By Ponemon Institute
      • The Need for A New Approach to Address Employee Data Breaches in the American Workplace
        By Jeremy Barbanell
      • Cybersecurity and Anti-Satellite Capabilities (ASAT): New Threats and New Legal Responses
        By Deborah Housen-Couriel
      • Standing in the Aftermath of a Data Breach
        By Ariel Emmanuel
      • Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the UN Charter
        By Ido Kilovaty
  • JLCW Volume 4, Fall 2015, Issue 2
    • ARTICLES
      • Counter terrorism Measures via Internet Intermediaries: A First Amendment & National Security Dilemma.
        By Mohamed H. Aziz
      • Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks
        By Elizabeth Mavropoulou
      • Legal Implications of Vulnerability Disclosure in International Conflict
        By Thomas Cross
      • Virtual Crimes, Actual Threats: Deterring National Security Offenses Committed Through Cyberspace
        By Asaf Wiener
  • JLCW Volume 4, Spring 2015, Issue 1
    • ARTICLES
      • North Korea: The Cyber Wild Card
        By Rhea Siers
      • Hack, Attack or Whack; The Politics of Imprecision in Cyber Law
        By James E. McGhee
      • A Brave New World: Applying International Law of War to Cyber Attacks
        By Noah Simmons
      • Strengthening Director Duties of Care for Cybersecurity Oversight: Evolving Expectations of Existing Legal Doctrine
        By Brad Lunn
  • JLCW Volume 3, Winter 2014, Issue 1
    • ARTICLES
      • Mitigating Moral Hazard in Cyber-Risk Insurance
        By Liam M.D. Bailey
      • The Deregulation and Swarming of Cyberwarfare: The Need for and Limitations of Law in Enabling Aggressive ‘Hacking-back’ and Pre-Emption
        By Dr. Mils Hills
      • Legal Considerations on Cyber-Weapons and Their Definition
        By Stefano Mele
      • Internet Communication Blackout: Attack Under Non-International Armed Conflict?
        By Cassondra Mix
      • Bitcoin Laundromats for Dirty Money: The Bank Secrecy Act’s (BSA) Inadequacies in Regulating and Enforcing Money Laundering Laws over Virtual Currencies and the Internet
        By Sheng Zhou
  • JLCW Volume 2, Spring 2013, Issue 1
    • FOREWORD
      • Cyber Warfare and the Corporate Environment
        By Chris Colvin, Daniel Garrie, and Siddartha Rao
    • ARTICLES
      • Cyberwarfare: Attribution, Preemption, and National Self Defense.
        By John Dever and James Dever
      • Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy.
        By James E. McGhee
      • Is Cyber Espionage a Form of Market Manipulation?
        By Noah Bledstein
  • JLCW Volume 1, Winter 2012, Issue 1
    • FOREWORD
      • Cyber Warfare, What are the Rules?
        By Daniel B. Garrie
    • ARTICLES
      • Cyber Attacks and the Laws of War
        By Michael Gervais
      • If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure From Cyber Warfare.
        By Michael Preciado
      • They Did it For the Lulz: Future Policy Considerations in the Wake of Lulz Security and Other Hacker Groups’ Attacks on Stored Private Customer Data
        By Jesse Noa
      • A New Perspective on the Achievement of Psychological Effects from Cyber Warfare Payloads: The Analogy of Parasitic Manipulation of Host Behavior
        By Dr. Mils Hills

If you are interested in reprints please e-mail info@jlcw.org.