Session 5: The Law of Cyber Offense:
Understanding Domestic and International Frameworks- Optional Readings | January 19, 2021
Megan Brown, Partner, Wiley Rein LLP; NSI Senior Fellow,
Adam Golodner, Former Chief of Staff, U.S. Department of Justice, Antitrust Division; NSI Visiting Fellow, &
Jamil N. Jaffer, NSI Founder and Executive Director
Orin S. Kerr, Norms of Computer Trespass, 116 Colum. L. Rev. 1143 (2016). (Available here).
Computer Fraud and Abuse Act, 18 U.S.C. § 1030. (Available here).
Digital Millennium Copyright Act, 17 U.S.C. § 1201(e). (Available here).
Sean L. Harrington, Cyber Security Active Defense: Playing with Fire or Sound Risk Management?, 20 Rich. J.L. & Tech. 12 (2014). (Available here).
Alice Tang, Hacking Back against Cyber Attacks, Chi. Pol’y Rev. (2015). (Available here).
Cong. Research Serv., R43941, Cybersecurity and Information Sharing: Legal Challenges and Solutions (Mar. 16, 2015). (Available here).
Rock Stevens & Jeffrey Biller, Offensive Digital Countermeasures: Exploring the Implications for Governments, Cyber Def. Rev. (2018). (Available here).
10 U.S.C. §§ 391–396 (DoD contractor obligations to report cyber incidents to DoD). (Available here).
Wyatt Hoffman et al., Cyber Norms Processes at a Crossroads, Lawfare (Feb. 26, 2020). (Available here).
U.S. Dep’t of State, Joint Statement on Advancing Responsible State Behavior in Cyberspace (Sept. 23, 2019). (Available here).
Emily O. Goldman, From Reaction to Action: Adopting a Competitive Posture in Cyber Diplomacy, Tex. Nat. Sec. Rev. (2020). (Available here).
Claire Cain Miller, Revelations of N.S.A. Spying Cost U.S. Tech Companies, N.Y. Times (Mar. 21, 2014). (Available here).
Sherisse Pham, China reportedly bans foreign technology in its government and public offices, CNN (Dec. 9, 2019). (Available here).
Office of Public Affairs, U.S. Dep’t of Commerce, Commerce Department Further Restricts Huawei Access to U.S. Technology and Adds Another 38 Affiliates to the Entity List (Aug. 17, 2020). (Available here).
Exec. Order No. 13942, 85 FR 48637 (2020) (Executive Order on addressing the threat posed by TikTok). (Available here).
Paul M. Nakasone & Michael Sulmeyer, How to Compete in Cyberspace, Foreign Affairs (Aug. 25, 2020) (“Ahead of the Curve” and “From Doctrine to Results” sections). (Available here).
Zak Doffman, CIA Hackers Accused of 11-Year Attack In New Chinese Cyber Report: This Is What’s Behind It, Forbes (Mar. 3, 2020). (Available here).
Samm Sacks & Manyi Kathy Li, How Chinese Cybersecurity Standards Impact Doing Business In China, CSIS (Aug. 2, 2018) (bulleted summary). (Available here).
Exec. Order No. 13943, 85 FR 48641 (2020) (Executive Order on addressing the threat posed by WeChat). (Available here).
E.U. Court of Justice, The Court of Justice invalidates Decision 2016/1250 on the adequacy of the protection provided by the EU-US Data Protection Shield (July 16, 2020). (Available here).
Cong. Research Serv., LSB10264, Google Fined for Violation of EU Data Protection Law (Feb. 22, 2019). (Available here).