All Journal: Technology & Cybersecurity items

CybercrimeCyberespionage

Zero-Day Delivery: Hacking Risks and the Use of Machine Learning for Military Logistics

Defense PolicyEmerging Technology

National Security and Competition: How Courts Evaluate National Security When Assessing a Merger

Defense PolicyEmerging Technology

Should the DoD Go Marching-in? US Innovation Leadership & DoD IP Rights

CyberespionageEmerging Technology

Deepfake 2024: Will Citizens United and Artificial Intelligence Together Destroy Representative Democracy?

CybersecurityDefense Policy

A New Framework for Cyber Operations: Reevaluating Traditional Military Activities and Intelligence Collection in the Digital Age

Big DataFISA

FISA Section 702’s Challenging Passage to Reauthorization in 2023

Emerging TechnologyNuclear Weapons

Advanced Reactors and Nuclear Terrorism: Rethinking the International Framework

International Law

US Commercial Space Regulation: The Rule of Three

CybercrimeCyberespionage

Why is the “Spectrum Model” of Internationally Wrongful Acts Problematic in Cyberspace?

CybercrimeCyberespionage

Shot in the Dark: Can Private Sector “Hackbacks” Work?

Big DataPrivacy

TikTok v. Trump and the Uncertain Future of National Security-based Restrictions on Data Trade

CyberespionageIntelligence

Willfulness and the Harm of Unlawful Retention of National Security Information

CybersecurityEmerging Technology

A Multiverse of Metaverses

CybersecurityReligious Extremism

Social Media—A Tool for Terror?

CybercrimeCyberespionage

Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability

CybercrimeCyberespionage

Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations

Emerging Technology

Deepfakes Perpetuating Disinformation in America

CyberespionageCybersecurity

Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy

Journal Placeholder Image

Big DataEmerging Technology

Layered Opacity: Criminal Legal Technology Exacerbates Disparate Impact Cycles and Prevents Trust

CybersecurityEmerging Technology

Comparing the Strength of SEP Patent Portfolios: Leadership Intelligence for the Intelligence Community

Surveillance

Is the Fourth Amendment Really for Sale? The Defense Intelligence Agency’s Purchase of Commercially Available Data

Cybersecurity

Building Cyber Walls: Executive Emergency Powers in Cyberspace

Cybersecurity

Reordering the Law for a China World Order: China’s Legal Warfare Strategy in Outer Space and Cyberspace

CybercrimeCyberespionage

Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity