JLCW Volume 7, Fall 2018, Issue 1

ARTICLES

  • Cyber-World War III: Origins
    Jon M. Garon
  • The Standard for Biometric Data Protection
    Fiona Q. Nguyen
  • Legal Ethics and Cybersecurity: Managing Client Confidentiality in the Digital Age
    Natasha Babazadeh

COMMENTS

  • A Call to Congress: The Urgent Need for Cyberattack Amendments to the Foreign Sovereign Immunities Act
    Matthew A. Powell
  • An International Cyber Warfare Treaty: Historical Analogies and Future Prospects
    Alexi Franklin

Purchase on Amazon

Share

JLCW Volume 6, Winter 2018, Issue 2

Special Comment

  • Resilience, Perseverance and Fortitude:  Lessons from My Parents
    Rhea Siers

Articles

  • Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community
    David Wallace & Mark Visger
  • Does the Cryptographic Hashing of Passwords Qualify for Statutory Breach Notification Safe Harbor?
    Jason R. Wool
  • “Playing With Fire” An Inter-Agency Working Group Proposal for Connected Vehicle Technology and the DSRC Mandate
    Christopher Kolezynski

Briefings

  • The Ransomware Assault on the Healthcare Sector
    Malcolm Harkins & Anthony M. Freed
  • German IT Security Law
    John A. Foulks

Purchase on Amazon

Share
  • JLCW Volume 6, Summer 2017, Issue 1
    • SPECIAL COMMENT
      • Instegogram: A New Threat and Its Limits for Liability
        By Jennifer Deutsch & Daniel Garrie
    • ARTICLES
      • A Democracy of Users
        By John Dever & James Dever
      • Is Uncle Sam Stalking You? Abandoning Warrantless Electronic Surveillance to Preclude Intrusive Government Searches
        By J. Alexandra Bruce
      • Cyber Enhanced Sanction Strategies: Do Options Exist?
        By Mark Peters
    • COUNTRY BRIEFINGS 
      • North Korea: The Cyber Wild Card 2.0
        By Rhea Siers
      • Privacy and Data Protection in India
        By Dhiraj R. Duraiswami

 

View the Issue:

Share

JLCW Volume 1, Winter 2012, Issue 1

  • FOREWORD
    • Cyber Warfare, What are the Rules?
      By Daniel B. Garrie
  • ARTICLES
    • Cyber Attacks and the Laws of War
      By Michael Gervais
    • If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure From Cyber Warfare.
      By Michael Preciado
    • They Did it For the Lulz: Future Policy Considerations in the Wake of Lulz Security and Other Hacker Groups’ Attacks on Stored Private Customer Data
      By Jesse Noa
    • A New Perspective on the Achievement of Psychological Effects from Cyber Warfare Payloads: The Analogy of Parasitic Manipulation of Host Behavior
      By Dr. Mils Hills

Purchase on Amazon

Share

JLCW Volume 2, Spring 2013, Issue 1

  • FOREWORD
    • Cyber Warfare and the Corporate Environment
      By Chris Colvin, Daniel Garrie, and Siddartha Rao
  • ARTICLES
    • Cyberwarfare: Attribution, Preemption, and National Self Defense.
      By John Dever and James Dever
    • Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy.
      By James E. McGhee
    • Is Cyber Espionage a Form of Market Manipulation?
      By Noah Bledstein

Purchase on Amazon

Share