Cybersecurity and Cyberwarfare: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
No edit summary
No edit summary
Line 26: Line 26:


Description to come shortly ....
Description to come shortly ....
 
<onlyinclude>
== Readings ==
== Readings ==
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]
Line 32: Line 32:
== Optional Readings ==
== Optional Readings ==
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]
 
</onlyinclude>
== Class Discussion ==
== Class Discussion ==


== Links ==
== Links ==

Revision as of 14:22, 25 January 2011