iOS app Android app

Scott J. Shackelford
GET UPDATES FROM Scott J. Shackelford
Professor Shackelford earned his Bachelor’s degree, summa cum laude, from Indiana University, his Masters in International Relations, with highest distinction, from the University of Cambridge as a Rotary Ambassadorial Scholar, and his J.D., with academic and pro bono distinction, from Stanford Law School where he was co-Editor-in-Chief of the Stanford Journal of International Law. Prior to joining the Kelley School faculty, Professor Shackelford worked at the multinational law firm Hogan Lovells, clerked at the NASA Office of General Counsel, and taught law to undergraduates at Stanford University. Professor Shackelford teaches cybersecurity, international business law, and sustainability among other courses, as well as being a fellow at the Center for Applied Cybersecurity Research. He has written more than 30 articles, essays, and book chapters that have been published in such publications as the New York University Environmental Law Journal, American Business Law Journal, Stanford Environmental Law Journal, and the Berkeley Journal of International Law. Professor Shackelford's research has also been covered by National Public Radio, the Atlantic, and USA Today. His academic work has been recognized with such awards as the Stanford Law School Steven Block Civil Liberties Award for Writing on Civil Rights, and in 2011 Professor Shackelford won the Indiana University Trustees’ Teaching Award for Excellence. A frequent speaker to a variety of audiences, Professor Shackelford has presented his research on cybersecurity at diverse forums, including Notre Dame, Georgetown, Australian National University, the Prime Minister and Cabinet Office of the Government of Australia, the Croatian Chamber of Commerce, NATO, the Swedish National Defense College, and the Indiana Counter Proliferation Task Force.

Entries by Scott J. Shackelford

Could North Korea Take Over the Internet?

(1) Comments | Posted December 21, 2014 | 4:05 PM

The cyber attacks on Sony have given rise to much commentary on the sophistication of the North Korean state's cybersecurity program. The hermit kingdom is far from alone in its offensive and defensive cyber build up with numerous nations around the world seeking to join the list of the cyber...

Read Post

Toward a Positive Cyber Peace

(0) Comments | Posted June 23, 2014 | 1:13 PM

Given the deluge of reporting on cyber attacks splashed across the headlines, it is natural to throw up one's hands in exasperation, or even to seek a higher power. James Lewis of the Center for Strategic and International Studies, for example, has said, "We have a faith-based approach...

Read Post

Why Ignoring the NIST Framework Could Cost You

(0) Comments | Posted May 2, 2014 | 1:29 PM

Co-authored by Andrew Proia

Last week, the much anticipated (at least in the, let's face it, relatively small and quirky circles that pay attention to this stuff) NETmundial meeting on the future of Internet governance wrapped up in Brazil. The conference helped to entrench a growing consensus surrounding the

Read Post

On Zombies and Cyber Attacks

(0) Comments | Posted February 18, 2014 | 5:17 PM

During the winter of 2013-14, amidst the school delays and extreme weather conditions in much of the United States, the federal Emergency Alert System issued a warning, but perhaps not the one people expected: "Civil authorities in your area have reported that the bodies of the dead are rising from...

Read Post

Time for a South China Sea Council

(1) Comments | Posted June 18, 2013 | 7:05 PM

On the face of it, there seems to be little similarly between the Arctic and the South China Sea. The Arctic, after all, is ice-covered, limiting navigation at least for now, and the Arctic Circle is home to only some 4 million people, whereas the South...

Read Post

The Coming Age of Internet Sovereignty?

(11) Comments | Posted January 10, 2013 | 6:59 PM

In few places on Earth is censorship undertaken more vigorously than it is in the People's Republic of China (PRC). Take Amazon.com. At one level, Amazon.cn, allegedly the world's largest Chinese online bookstore, resembles its American counterpart, selling everything from the Twilight series to Battlestar Galactica. But dig deeper, and...

Read Post

How to Enhance Cybersecurity and Create American Jobs

(1) Comments | Posted July 16, 2012 | 3:10 PM

From Flame to the FBI's program of protecting users from the DNS Charger trojan, one critical component is often underappreciated amidst the deluge of coverage on cyber attacks -- hardware.

As its most basic level, the Internet is composed of a series of cables, computers, and routers. Innocent or...

Read Post

In Search of Cyber Peace: A Response to the Cybersecurity Act of 2012

(0) Comments | Posted March 27, 2012 | 12:37 PM

The Cybersecurity Act of 2012 recently introduced in the Senate Homeland Security and Governance Affairs Committee has been touted as the latest bipartisan attempt to enhance the nation's cybersecurity. If enacted, the bill would grant new powers to the Department of Homeland Security (DHS) to oversee...

Read Post