JLCW Volume 7, Fall 2018, Issue 1

JLCW Volume 7, Fall 2018, Issue 1 ARTICLES Cyber-World War III: Origins Jon M. Garon The Standard for Biometric Data Protection Fiona Q. Nguyen Legal Ethics and Cybersecurity: Managing Client Confidentiality in the Digital Age Natasha Babazadeh COMMENTS A Call to Congress: The Urgent Need for Cyberattack Amendments to the Foreign Sovereign Immunities Act Matthew…

JLCW Volume 6, Winter 2018, Issue 2

JLCW Volume 6, Winter 2018, Issue 2 Special Comment Resilience, Perseverance and Fortitude:  Lessons from My Parents Rhea Siers Articles Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community David Wallace & Mark Visger Does the Cryptographic Hashing of Passwords Qualify for Statutory Breach Notification…

JLCW Volume 6, Summer 2017, Issue 1

JLCW Volume 6, Summer 2017, Issue 1 SPECIAL COMMENT Instegogram: A New Threat and Its Limits for Liability By Jennifer Deutsch & Daniel Garrie ARTICLES A Democracy of Users By John Dever & James Dever Is Uncle Sam Stalking You? Abandoning Warrantless Electronic Surveillance to Preclude Intrusive Government Searches By J. Alexandra Bruce Cyber Enhanced…

JLCW Volume 1, Winter 2012, Issue 1

JLCW Volume 1, Winter 2012, Issue 1 FOREWORD Cyber Warfare, What are the Rules? By Daniel B. Garrie ARTICLES Cyber Attacks and the Laws of War By Michael Gervais If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure From Cyber Warfare. By Michael Preciado They…

JLCW Volume 2, Spring 2013, Issue 1

JLCW Volume 2, Spring 2013, Issue 1 FOREWORD Cyber Warfare and the Corporate EnvironmentBy Chris Colvin, Daniel Garrie, and Siddartha Rao ARTICLES Cyberwarfare: Attribution, Preemption, and National Self Defense.By John Dever and James Dever Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy.By James E. McGhee Is Cyber Espionage a Form of Market…