In the 2010s, America's adversaries conducted numerous damaging cyber operations inside the United States: the Office of Personnel Management breach, attacks on banks, persistent intellectual property theft by China, and the Russian intervention in the 2016 election. The US--possessor of the world's most powerful cyber arsenal--responded in 2018 by unveiling a new Defend Forward strategy. This volume, edited by Jack Goldsmith and featuring a cast of leading scholars in the field, provides an authoritative overview of the origins and operation of Defend Forward, and a comprehensive assessment of its legality.…mehr
In the 2010s, America's adversaries conducted numerous damaging cyber operations inside the United States: the Office of Personnel Management breach, attacks on banks, persistent intellectual property theft by China, and the Russian intervention in the 2016 election. The US--possessor of the world's most powerful cyber arsenal--responded in 2018 by unveiling a new Defend Forward strategy. This volume, edited by Jack Goldsmith and featuring a cast of leading scholars in the field, provides an authoritative overview of the origins and operation of Defend Forward, and a comprehensive assessment of its legality.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Jack Goldsmith is the Learned Hand Professor of Law at Harvard University. He is the author of After Trump: Reconstructing the Presidency, as well as numerous other books and articles on topics related to presidential power, terrorism, national security, international law, and internet law. Goldsmith previously served as Assistant Attorney General, Office of Legal Counsel (October 2003-July 2004) and Special Counsel to the General Counsel to the Department of Defense (September 2002-June 2003).
Inhaltsangabe
* Introduction by Jack Goldsmith * Part I: Background * 1. Defend Forward and Persistent Engagement by Gary Corn and Emily Goldman * 2. Scenarios for Defend Forward * 3. U.S. Cyber Command's First Decade by Michael Warner * Part II: Domestic Framework * 4. The Domestic Legal Framework for U.S. Military Cyber Operations by Robert Chesney * 5. Cyberattacks and the Constitution by Matthew C. Waxman * 6. Defend Forward and the FBI by James Baker and Matt Morris * Part III: International Law Framework * 7. Defend Forward and Sovereignty by Jack Goldsmith and Alex Loomis * 8. Defend Forward and Cyber Countermeasures by Ashley Deeks * 9. Covert Deception, Strategic Fraud, and the Rule of Prohibited Intervention by Gary Corn * 10. Due Diligence and Defend Forward by Eric Talbot Jensen and Sean Watts * 11. Defend Forward and Attribution by Kristen E. Eichensehr * Part IV. Comparative Perspectives * 12. Persistent Aggrandizement? Israel's Cyber Defense Architecture by Elena Chachko * 13. Defend Forward and the United Kingdom's Legal System by Robert Chesney
* Introduction by Jack Goldsmith * Part I: Background * 1. Defend Forward and Persistent Engagement by Gary Corn and Emily Goldman * 2. Scenarios for Defend Forward * 3. U.S. Cyber Command's First Decade by Michael Warner * Part II: Domestic Framework * 4. The Domestic Legal Framework for U.S. Military Cyber Operations by Robert Chesney * 5. Cyberattacks and the Constitution by Matthew C. Waxman * 6. Defend Forward and the FBI by James Baker and Matt Morris * Part III: International Law Framework * 7. Defend Forward and Sovereignty by Jack Goldsmith and Alex Loomis * 8. Defend Forward and Cyber Countermeasures by Ashley Deeks * 9. Covert Deception, Strategic Fraud, and the Rule of Prohibited Intervention by Gary Corn * 10. Due Diligence and Defend Forward by Eric Talbot Jensen and Sean Watts * 11. Defend Forward and Attribution by Kristen E. Eichensehr * Part IV. Comparative Perspectives * 12. Persistent Aggrandizement? Israel's Cyber Defense Architecture by Elena Chachko * 13. Defend Forward and the United Kingdom's Legal System by Robert Chesney
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826