Volume 4, Issue 2 – Spring/Summer 2016 (PDF; 2 MB) – Download the entire issue!
Published May 13, 2016
- Dawn K. Zoldi, Joseph M. Groff, and Gregory R. Speirs, State Rights . . . or Just Wrong? A Discussion of Drone Laws and National Security Through the Lens of Federal Pre-Emption, 4 NAT’L SEC. L.J. 168 (2016).
- John M. Bickers, Asculum Defeats: Prosecution Losses in the Military Commissions and How They Help the United States, 4 NAT’L SEC. L.J. 201 (2016).
- Matthew McCormack, Dr. Nicholas Rostow, and Tom Bowman, Symposium Panel, Policy By Other Means: A Review of DOD’s Law of War Manual, 4 NAT’L SEC. L.J. 259 (2016).
- Jameson A. Goodell, Comment, The Revival of Treason: Why Homegrown Terrorists Should Be Tried as Traitors, 4 NAT’L SEC. L.J. 311 (2016).
- Chelsea C. Smith, Comment, Hacking Federal Cybersecurity Legislation: Reforming Legislation to Promote the Effective security of Federal Information Systems, 4 NAT’L SEC. L.J. 345 (2016).
This spring, in partnership with the George Mason University Law and Economic Center, the National Security Law Journal is excited to host Data Breach at the University: Preparing Our Networks, a Cybersecurity Tabletop Legal Exercise.
With over 700 data breaches identified at educational institutions between 2005-2014, it is clear that colleges and universities are a prime target for cyber attacks. University networks serve a wide variety of user groups and house a wealth of information. According to the Ponemon Institute, the per capita cost of a university data breach is second highest only to the healthcare industry.
The scenario for this day-long tabletop focuses on a data breach at a public university that has partnered with the Department of Homeland Security on research and development. Participants include representatives from the Department of Homeland Security, Department of Justice, Department of Defense, Department of Education, the Virginia Governor’s office, the MS-ISAC, and several local universities. During this tabletop exercise, we will explore the unique cyber security challenges of a university environment, interdependencies with other sectors, and the potential legal implications of a data breach.
The event will take place on Wednesday, April 13, 2016; however, please note that attendance and participation in the event is by invitation only. Mason Law students who are interested in volunteering at the event should e-mail email@example.com for more information.
The print edition of Volume 4, Issue 1 is now available on Amazon.com and Barnes & Noble. In this issue, Major Patrick Walsh, Associate Law Professor at the Army’s Judge Advocate General’s School, analyzes a framework where national security professionals can predict changes to the Foreign Intelligence Surveillance Act to determine which programs are at risk of removal by future executive, legislative or judicial action; and Jesse Medlong, an Associate at DLA Piper LLP (US), uses quantum theory to examine the unique legal role of delegated authority and standard operating procedures in the military. This issue also contains two comments by George Mason Univ. School of Law students: Stephen Jackson proposes designating Mexican drug cartels as foreign terrorist organizations to facilitate prosecution; and Molly Picard examines potential civil liabilities for U.S. military personnel engaged in the cyberspace battlefield. Each copy is only $12.95 and eligible for free shipping with Amazon Prime.