Ghost in the Network
Cyberattacks are inevitable and widespread. Existing scholarship on cyberespionage and cyberwar is undermined by its futile obsession with preventing attacks.… Continue reading →
Cyberattacks are inevitable and widespread. Existing scholarship on cyberespionage and cyberwar is undermined by its futile obsession with preventing attacks.… Continue reading →
It has been over a hundred years since George Bernard Shaw wrote that “[a]ll professions are a conspiracy against the… Continue reading →
What good is Article V? The Constitution’s amendment rule renders the text inflexible, countermajoritarian, and insensitive to important contemporary constituencies.… Continue reading →
Letters of intent (LOIs) are fundamental building blocks of many corporate transactions. Although their form and terms vary, LOIs are… Continue reading →
A “reverse-Erie” problem arises when a state court is hearing a federal cause of action and confronts a situation in… Continue reading →