Easier Said than Done: Legal Reviews of Cyber Weapons

Allegations that Stuxnet was part of a U.S. planned and led covert cyber operation and assertions that a nation-state used a cyber-attack in support of national security objectives reinvigorated the attention of cyber-law commentators. Military attorneys, however, must translate deeply theoretical discussions into concrete legal advice. This article concludes that treating all cyber techniques as… Continue reading Easier Said than Done: Legal Reviews of Cyber Weapons

Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources

The cybersecurity risks to the nation’s critical infrastructure and key resources are significant and increasing every day. While a sound legal basis exists for the government to use computer intrusion detection technology to protect its own networks, critical infrastructure and key resources, primarily owned by the private sector, are governed by a different set of constitutional principles and laws. This article… Continue reading Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources

The Publication of National Security Information in the Digital Age

In one of her speeches on Internet freedom, Secretary of State Hillary Rodham Clinton said that “[t]he fact that WikiLeaks used the internet is not the reason we criticized its actions.” Although Clinton is correct that it is essential to separate the technology WikiLeaks uses from its actions, the digital age has raised new concerns about the unauthorized dissemination of sensitive national security information.