iOS app Android app

Scott J. Shackelford
GET UPDATES FROM Scott J. Shackelford
Professor Shackelford earned his Bachelor’s degree, summa cum laude, from Indiana University, his Masters in International Relations, with highest distinction, from the University of Cambridge as a Rotary Ambassadorial Scholar, and his J.D., with academic and pro bono distinction, from Stanford Law School where he was co-Editor-in-Chief of the Stanford Journal of International Law. Prior to joining the Kelley School faculty, Professor Shackelford worked at the multinational law firm Hogan Lovells, clerked at the NASA Office of General Counsel, and taught law to undergraduates at Stanford University. Professor Shackelford teaches cybersecurity, international business law, and sustainability among other courses, as well as being a fellow at the Center for Applied Cybersecurity Research. He has written more than 30 articles, essays, and book chapters that have been published in such publications as the New York University Environmental Law Journal, American Business Law Journal, Stanford Environmental Law Journal, and the Berkeley Journal of International Law. Professor Shackelford's research has also been covered by National Public Radio, the Atlantic, and USA Today. His academic work has been recognized with such awards as the Stanford Law School Steven Block Civil Liberties Award for Writing on Civil Rights, and in 2011 Professor Shackelford won the Indiana University Trustees’ Teaching Award for Excellence. A frequent speaker to a variety of audiences, Professor Shackelford has presented his research on cybersecurity at diverse forums, including Notre Dame, Georgetown, Australian National University, the Prime Minister and Cabinet Office of the Government of Australia, the Croatian Chamber of Commerce, NATO, the Swedish National Defense College, and the Indiana Counter Proliferation Task Force.

Entries by Scott J. Shackelford

On Climate Change and Cyber Attacks

(0) Comments | Posted November 30, 2015 | 10:35 AM

It is difficult to think of two issues with a greater potential to negatively impact both our environment and the global economy than climate change and cyber attacks. Though long-term estimates on both are notoriously tough to pin down, contested assessments on the cost of cyber attacks range...

Read Post

Seeking a Safe Harbor in a Widening Sea

(0) Comments | Posted November 5, 2015 | 11:32 AM

In a move that could cost the EU up to 1.3 percent of its gross domestic product, according to the American Chamber of Commerce to the European Union, on Oct. 6 the European Court of Justice invalidated the 15-year old EU-US Safe Harbor Agreement in Schrems v. Data...

Read Post

Another 'Back to the Future' Moment - 27 Years After the World's First Cyber Attack

(0) Comments | Posted October 30, 2015 | 12:06 PM

With the commemorations of Marty McFly and Doc Brown venturing from 1985 to "the future" of October 21, 2015 winding down, another back-to-the-future moment from the 1980s is on tap for this coming week. But unlike hover boards, flying cars, or Mr. Fusion, this time the view from the 1980s...

Read Post

Understanding Cybersecurity Due Diligence

(0) Comments | Posted September 16, 2015 | 1:14 PM

Rarely does a day go by in which some variety of cyber attack is not front-page news. From Ashley Madison and the U.S. Office of Personnel Management to Sony, Saudi Aramco, and the Ukraine crisis, cybersecurity is increasingly taking center stage in diverse arenas of geopolitics, international economics, security, and...

Read Post

Sustainable Cybersecurity

(0) Comments | Posted April 2, 2015 | 9:15 AM

The environmental situation facing many nations in the mid-to-late 20th century was bleak. Industrial waste caused the Cuyahoga River in Cleveland to catch fire in 1969. The Rhine River was long one of the most polluted waterways in Europe, similarly catching fire in 1986. School children...

Read Post

Could North Korea Take Over the Internet?

(1) Comments | Posted December 21, 2014 | 3:05 PM

The cyber attacks on Sony have given rise to much commentary on the sophistication of the North Korean state's cybersecurity program. The hermit kingdom is far from alone in its offensive and defensive cyber build up with numerous nations around the world seeking to join the list of the cyber...

Read Post

Toward a Positive Cyber Peace

(0) Comments | Posted June 23, 2014 | 12:13 PM

Given the deluge of reporting on cyber attacks splashed across the headlines, it is natural to throw up one's hands in exasperation, or even to seek a higher power. James Lewis of the Center for Strategic and International Studies, for example, has said, "We have a faith-based approach...

Read Post

Why Ignoring the NIST Framework Could Cost You

(0) Comments | Posted May 2, 2014 | 12:29 PM

Co-authored by Andrew Proia

Last week, the much anticipated (at least in the, let's face it, relatively small and quirky circles that pay attention to this stuff) NETmundial meeting on the future of Internet governance wrapped up in Brazil. The conference helped to entrench a growing consensus surrounding the

Read Post

On Zombies and Cyber Attacks

(0) Comments | Posted February 18, 2014 | 4:17 PM

During the winter of 2013-14, amidst the school delays and extreme weather conditions in much of the United States, the federal Emergency Alert System issued a warning, but perhaps not the one people expected: "Civil authorities in your area have reported that the bodies of the dead are rising from...

Read Post

Time for a South China Sea Council

(1) Comments | Posted June 18, 2013 | 6:05 PM

On the face of it, there seems to be little similarly between the Arctic and the South China Sea. The Arctic, after all, is ice-covered, limiting navigation at least for now, and the Arctic Circle is home to only some 4 million people, whereas the South...

Read Post

The Coming Age of Internet Sovereignty?

(11) Comments | Posted January 10, 2013 | 5:59 PM

In few places on Earth is censorship undertaken more vigorously than it is in the People's Republic of China (PRC). Take At one level,, allegedly the world's largest Chinese online bookstore, resembles its American counterpart, selling everything from the Twilight series to Battlestar Galactica. But dig deeper, and...

Read Post

How to Enhance Cybersecurity and Create American Jobs

(1) Comments | Posted July 16, 2012 | 2:10 PM

From Flame to the FBI's program of protecting users from the DNS Charger trojan, one critical component is often underappreciated amidst the deluge of coverage on cyber attacks -- hardware.

As its most basic level, the Internet is composed of a series of cables, computers, and routers. Innocent or...

Read Post

In Search of Cyber Peace: A Response to the Cybersecurity Act of 2012

(0) Comments | Posted March 27, 2012 | 11:37 AM

The Cybersecurity Act of 2012 recently introduced in the Senate Homeland Security and Governance Affairs Committee has been touted as the latest bipartisan attempt to enhance the nation's cybersecurity. If enacted, the bill would grant new powers to the Department of Homeland Security (DHS) to oversee...

Read Post