Journal of Law and Cyber War, Cyber Security, Cyber Terrorism

Current Issue

  • JLCW Volume 6, Summer 2017, Issue 1
      • Instegogram: A New Threat and Its Limits for Liability
        By Jennifer Deutsch & Daniel Garrie
      • A Democracy of Users
        By John Dever & James Dever
      • Is Uncle Sam Stalking You? Abandoning Warrantless Electronic Surveillance to Preclude Intrusive Government Searches
        By J. Alexandra Bruce
      • Cyber Enhanced Sanction Strategies: Do Options Exist?
        By Mark Peters
      • North Korea: The Cyber Wild Card 2.0
        By Rhea Siers
      • Privacy and Data Protection in India
        By Dhiraj R. Duraiswami


If you want back issues, please email

  • JLCW Volume 5, Winter 2017, Issue 2
      • It’s the Cyber Crime and its Sponsors (Not My Cyber-Security), Stupid
        By David Lawrence, Frances Townsend, Tim Murphy, Daniel Garrie, John Squires, Jeff Castelli, Eric Herschmann, Serina Vash, and Matthew Lawrence
      • Cognitive Active Cyber Defense: Finding Value Through Hacking Human Nature
        By Peter Cooper
      • Hunt: Securing the Commercial Sector Since 2013
        By Eric Hipkins, John Harbaugh, Michael Morris and David Aucsmith
      • Cybersecurity Games: Building Tomorrow’s Workforce
        By Monica Ricci and Jessica Gulick
      • Privacy and Data Protection in Brazil
      • Privacy and Data Protection in Russia
  • JLCW Volume 5, Summer 2016, Issue 1
      • Foreword
        By Daniel Garrie
      • No State is an Island in Cyberspace
        By Jessica “Zhanna” Malekos Smith
      • Measuring Autonomous Weapon Systems against International Humanitarian Law Rules
        By Dr. Thompson Chengeta
      • Congressional Cybersecurity Oversight: Who’s Who and How It Works
        By Lawrence J. Trautman
  • JLCW Volume 4, Winter 2015, Issue 3
      • The Rise of Nation State Attacks
        By Ponemon Institute
      • The Need for A New Approach to Address Employee Data Breaches in the American Workplace
        By Jeremy Barbanell
      • Cybersecurity and Anti-Satellite Capabilities (ASAT): New Threats and New Legal Responses
        By Deborah Housen-Couriel
      • Standing in the Aftermath of a Data Breach
        By Ariel Emmanuel
      • Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the UN Charter
        By Ido Kilovaty
  • JLCW Volume 4, Fall 2015, Issue 2
      • Counter terrorism Measures via Internet Intermediaries: A First Amendment & National Security Dilemma.
        By Mohamed H. Aziz
      • Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks
        By Elizabeth Mavropoulou
      • Legal Implications of Vulnerability Disclosure in International Conflict
        By Thomas Cross
      • Virtual Crimes, Actual Threats: Deterring National Security Offenses Committed Through Cyberspace
        By Asaf Wiener
  • JLCW Volume 4, Spring 2015, Issue 1
      • North Korea: The Cyber Wild Card
        By Rhea Siers
      • Hack, Attack or Whack; The Politics of Imprecision in Cyber Law
        By James E. McGhee
      • A Brave New World: Applying International Law of War to Cyber Attacks
        By Noah Simmons
      • Strengthening Director Duties of Care for Cybersecurity Oversight: Evolving Expectations of Existing Legal Doctrine
        By Brad Lunn
  • JLCW Volume 3, Winter 2014, Issue 1
      • Mitigating Moral Hazard in Cyber-Risk Insurance
        By Liam M.D. Bailey
      • The Deregulation and Swarming of Cyberwarfare: The Need for and Limitations of Law in Enabling Aggressive ‘Hacking-back’ and Pre-Emption
        By Dr. Mils Hills
      • Legal Considerations on Cyber-Weapons and Their Definition
        By Stefano Mele
      • Internet Communication Blackout: Attack Under Non-International Armed Conflict?
        By Cassondra Mix
      • Bitcoin Laundromats for Dirty Money: The Bank Secrecy Act’s (BSA) Inadequacies in Regulating and Enforcing Money Laundering Laws over Virtual Currencies and the Internet
        By Sheng Zhou
  • JLCW Volume 2, Spring 2013, Issue 1
      • Cyber Warfare and the Corporate Environment
        By Chris Colvin, Daniel Garrie, and Siddartha Rao
      • Cyberwarfare: Attribution, Preemption, and National Self Defense.
        By John Dever and James Dever
      • Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy.
        By James E. McGhee
      • Is Cyber Espionage a Form of Market Manipulation?
        By Noah Bledstein
  • JLCW Volume 1, Winter 2012, Issue 1
      • Cyber Warfare, What are the Rules?
        By Daniel B. Garrie
      • Cyber Attacks and the Laws of War
        By Michael Gervais
      • If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure From Cyber Warfare.
        By Michael Preciado
      • They Did it For the Lulz: Future Policy Considerations in the Wake of Lulz Security and Other Hacker Groups’ Attacks on Stored Private Customer Data
        By Jesse Noa
      • A New Perspective on the Achievement of Psychological Effects from Cyber Warfare Payloads: The Analogy of Parasitic Manipulation of Host Behavior
        By Dr. Mils Hills

If you are interested in reprints please e-mail