The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries.
The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.
2014 Journal of Law & Cyber Warfare, Spring, Volume 3, Issue 1
- Mitigating Moral Hazard in Cyber-Risk Insurance
By Liam M.D. Bailey
- The Deregulation and Swarming of Cyberwarfare: The Need for and Limitations of Law in Enabling Aggressive ‘Hacking-back’ and Pre-Emption
By Dr. Mils Hills
- Legal Considerations on Cyber-Weapons and Their Definition
By Stefano Mele
- Internet Communication Blackout: Attack Under Non-International Armed Conflict?
By Cassondra Mix
- Bitcoin Laundromats for Dirty Money: The Bank Secrecy Act’s (BSA) Inadequacies in Regulating and Enforcing Money Laundering Laws over Virtual Currencies and the Internet
By Sheng Zhou
2013 Journal of Law & Cyber Warfare, Summer, Volume 2, Issue 1
- Cyber Warfare and the Corporate Environment
By Chris Colvin, Daniel Garrie, and Siddartha Rao
- Cyberwarfare: Attribution, Preemption, and National Self Defense.
By John Dever and James Dever
- Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy.
By James E. McGhee
- Is Cyber Espionage a Form of Market Manipulation?
By Noah Bledstein
2012 Journal of Law & Cyber Warfare, Winter, Volume 1, Issue 1
- Cyber Warfare, What are the Rules?
By Daniel B. Garrie
- Cyber Attacks and the Laws of War
By Michael Gervais
- If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure From Cyber Warfare.
By Michael Preciado
- They Did it For the Lulz: Future Policy Considerations in the Wake of Lulz Security and Other Hacker Groups’ Attacks on Stored Private Customer Data
By Jesse Noa
- A New Perspective on the Achievement of Psychological Effects from Cyber Warfare Payloads: The Analogy of Parasitic Manipulation of Host Behavior
By Dr. Mils Hills