Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in National Security Law

Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman Jul 2021

Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes Jan 2014

Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes

Articles by Maurer Faculty

No abstract provided.


National Security In The Information Age, Rosa Brooks Jan 2012

National Security In The Information Age, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The information environment has been changing right along with the broader security environment. Today, the information environment connects almost everyone, almost everywhere, almost instantaneously. The media environment has become global, and there’s no longer such thing as “the news cycle” —everything is 24/7. Barriers between US and global publics have virtual disappeared: Everything and anything can “go viral” instantly, and it’s no longer possible to say one thing to a US audience and another thing to a foreign audience and assume no one will ever set the statements side by side. The Pakistani military has a very clear idea of …


Preempting Justice: Precrime In Fiction And In Fact, Mark Niles Jan 2010

Preempting Justice: Precrime In Fiction And In Fact, Mark Niles

Articles in Law Reviews & Other Academic Journals

No abstract provided.


The National Information Infrastructure: Policymaking And Policymakers, Fred H. Cate Jan 1994

The National Information Infrastructure: Policymaking And Policymakers, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.