Skip to content
Journal of national Security Law and Policy

Journal of National Security Law & Policy

  • About JNSLP
    • Editorial Team
  • Topics
  • Issue Archive
    • Volumes 11-15
      • Vol. 15 No. 1
      • Vol. 14 No. 3
      • Vol. 14 No. 2
      • Vol. 14 No. 1
      • Vol. 13 No. 3
      • Vol. 13 No. 2
      • Vol. 13 No. 1
      • Vol. 12 No. 3
      • Vol. 12 No. 2
      • Vol. 12 No. 1—Special 9/11 20th Anniversary Issue
      • Vol. 11 No. 3
      • Vol. 11 No. 2
      • Vol. 11 No. 1—Special COVID-19 Issue
      • Special Online Issue: Capitol Insurrection 2021
    • Volumes 6-10
      • Vol. 10 No. 3
      • Vol. 10 No. 2
      • Vol. 10 No. 1
      • Vol. 9 No. 3
      • Vol. 9 No. 2
      • Vol. 9 No. 1
      • Vol. 8 No. 3
      • Vol. 8 No. 2
      • Vol. 8 No. 1
      • Vol. 7 No. 3
      • Vol. 7 No. 2
      • Vol. 7 No. 1
      • Vol. 6 No. 2
      • Vol. 6 No 1
    • Volumes 1-5
      • Vol. 5 No. 2
      • Vol. 5 No. 1
      • Vol. 4 No. 2
      • Vol. 4 No. 1
      • Vol. 3 No. 2
      • Vol. 3 No. 1
      • Vol. 2 No. 2
      • Vol. 2 No. 1
      • Vol. 1 No. 2
      • Vol. 1 No. 1
  • Online Supplement
  • JNSLP Symposium
    • Symposium on Military Justice | October 2021
  • Submissions

Category: Vol. 4 No. 1

Cybersecurity: National Leadership, Individual Responsibility | This issue contributes to the national debate on cyber-related issues by supplying some of the missing pieces of the discussion, focusing on the largest and most difficult sub-set: cybersecurity.

Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line

The Internet seems to offer the promise of everything to everyone. For global and local business, it lowers costs while increasing innovation, invention, effectiveness, and efficiencies.

Published August 13, 2010
Categorized as Cybersecurity, Vol. 4 No. 1 Tagged Cyberespionage, Cybersecurity, Sept. 11, 2001

History Repeats Itself: The 60-Day Cyberspace Policy Review in Context

On February 9, 2009, President Obama gave his National Security and Homeland Security Advisors 60 days to conduct a Cyberspace Policy Review.

Published August 13, 2010
Categorized as Cybersecurity, Vol. 4 No. 1 Tagged Cyberespionage, Cybersecurity, Executive Power, Homeland Security, National Security, Office of Legal Counsel (OLC)

Offensive Cyber Operations and the Use of Force

Hostile actions against a computer system or network can take two forms. One form – a cyber attack – is destructive in nature. An example of such a hostile action is erasure by a computer virus resident on the hard disk of any infected computer.

Published August 13, 2010
Categorized as Cybersecurity, Vol. 4 No. 1 Tagged Cyberespionage, Cybersecurity, Executive Power, War Powers

Posts pagination

Newer posts Page 1 … Page 4 Page 5 Older posts
  • LinkedIn
  • Facebook
  • Twitter

Produced by: Georgetown Law Center on National Security
Hosted by: Syracuse University Institute for Security Policy and Law

POPULAR POSTS

  • Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure 7.6k views
  • The Implications of Trying National Security Cases in Article III Courts 7.2k views
  • Willfulness and the Harm of Unlawful Retention of National Security Information 6.7k views
  • Free Speech Aboard the Leaky Ship of State: Calibrating First Amendment Protections for Leakers of Classified Information 6.6k views
  • Terrorism, the Internet, & Propaganda: A Deadly Combination 6.5k views

Afghanistan Al Qaeda Big Data Capitol Insurrection 2021 Central Intelligence Agency Combatant Counterterrorism Law COVID-19 Cyber Attacks Cyberespionage Cybersecurity Defense Policy Detainee Executive Power Executive Privilege FISA Foreign Policy GITMO Habeas Corpus Homeland Security Human Rights Intelligence International Humanitarian Law International Law Interrogation Latest Issue Law of Armed Conflict Laws of War Military Commissions Military Law National Security Office of Legal Counsel (OLC) PATRIOT Act Preventive Detention Privacy Public Health Secrecy Separation of Powers Sept. 11, 2001 Surveillance Taliban Teaching National Security Law Torture War on Terror War Powers

  • Contact
  • Subscribe
  • Accessibility
  • Privacy
Journal of national Security Law and Policy
Copyright by the Journal of National Security Law and Policy.