Secondary Titles (7)
- Indiana Center for Applied Cyber Security Research : Fellow
- Indiana University Center for the Study of Global Change : Affiliated Faculty
- Indiana University Global and International Studies Program : Affiliated Faculty
- Indiana University Integrated Program in the Environment : Affiliated Faculty
- Russian and East European Institute : Affiliated Faculty
- University of Notre Dame, Emerging Technologies of National Security and Intelligence (ETNSI) : Affiliated Faculty
- Institute for National Security Studies : Researcher
Scott J. Shackelford is an assistant professor in the Kelley School of Business Department of Business Law and Ethics. He has authored more than 30 articles, book chapters, reports, and essays in the fields of international law and relations, environmental law, property rights, and cybersecurity law and policy.
A frequent speaker to a variety of local, national, and global audiences, Prof. Shackelford's current research grows from his doctoral dissertation on the governance of global common pool resources and focuses on cybersecurity and privacy. He is in the process of finalizing a book for Cambridge University Press entitled, Cyber Peace: Managing Cyber Attacks in International Law, Business, and Relations.
Prior to joining the IU faculty, Prof. Shackelford worked for several multinational law firms, consulted for the U.N. Development Program in India, clerked at the NASA Office of General Counsel, helped create an elder law pro bono program at the San Mateo Legal Aid Society in California, and taught law to undergraduates at both Stanford University and Indiana University. Prof. Shackelford currently teaches business law, international business law, and a new course on sustainability law and policy at the Kelley School. He was recognized as being within the top three percent of instructors at Kelley based on student evaluations in the 2010-11 academic year.
Prof. Shackelford earned his Bachelor's degree, summa cum laude with honors in Economics and Political Science, from Indiana University along with the Elvis J. Stahr Distinguished Senior Award. He then went on to earn a Masters of Philosophy in International Relations with highest distinction from the University of Cambridge as a Rotary Ambassadorial Scholar, and a J.D., with academic and pro bono distinction, from Stanford Law School where he was co-Editor-in-Chief of the Stanford Journal of International Law. Prof. Shackelford successfully defended his doctoral dissertation, Governing the Global Commons in International Law and Relations, for a Ph.D. in Politics and International Studies from the University of Cambridge in November 2011.
Industry Expertise (5)
Areas of Expertise (8)
U.S. Department of Education Grant (professional)
Awarded for work with the Indiana University Center for International Business Education and Research (CIBER).
Overseas Research Grant (professional)
Awarded by Indiana University Office of the Vice President for International Affairs.
Steven Block Civil Liberties Award (professional)
Awarded by Stanford Law School for writing on civil rights.
International Conflict and Negotiation Fellowship (professional)
Awarded by the Stanford Center on International Conflict.
Rotary Ambassadorial Scholarship (professional)
Awarded by the State of Indiana.
Stanford Law School: J.D., Law 2009
Graduated with Academic and Pro Bono Distinction; Jessup Moot Court Best Oralist Award.
University of Cambridge: M.Phil, Ph.D., International Relations 2011
Graduated with First Class Honors (Highest Distinction).
Indiana University: B.A., Economics and Political Science 2005
Graduated summa cum laude.
Media Appearances (7)
Net Neutrality Decision Could Mean More Big Brother Oversight
The FCC's ruling is a big deal for consumers, said Scott Shackelford, an assistant professor of law and ethics at Indiana University’s Kelley School of Business in Bloomington. “What it basically means is that the U.S. is joining the ranks of nations from the Netherlands to Chile that treat the Internet as the basic infrastructure that it is to our modern lives, classifying it as a public utility vital to both business and society,” he said...
Opinion: After high-profile hacks, it's time for a bolder approach to cybersecurity
The Christian Science Monitor online
In the wake of the Sony Pictures hack, the cybersecurity firm FireEye demonstrated that the sort of breach that Sony experienced is not likely preventable with conventional network defenses. Instead, the firm noted that “organizations must consider a new approach to securing their IT assets ... [they] can’t afford to passively wait for attacks. Instead, they should take a lean-forward approach that actively hunts for new and unseen threats.”...
Snowden on Cyberwar: America Is Its Own Worst Enemy
Scott Shackelford, an assistant professor of business, law and ethics at Indiana University, says that Snowden “has a point,” and that Stuxnet, because of its sophistication, did set a precedent. But he stressed that the U.S. didn’t invent cyberattacks. “States,” he said, “have been doing this for a while.”...
Could North Korea Take Over the Internet
The Huffington Post online
The cyber attacks on Sony have given rise to much commentary on the sophistication of the North Korean state's cybersecurity program. The hermit kingdom is far from alone in its offensive and defensive cyber build up with numerous nations around the world seeking to join the list of the cyber powers. But just how much damage could North Korea do? To help answer that question, let's go to Dr. Charlie Miller, who says that he can crash the Internet and take control of some of the most protected computer systems in the world...
If the Sony hackers are North Korean, good luck prosecuting
“It’s tough to force governments to do anything they don’t want to do without resorting to a type of force that we don’t really resort to in these types of cases," Scott Shackelford, a cybersecurity and international business law professor at Indiana University, told Mashable. If prosecution isn't possible, the U.S. could just indict the Sony hackers, assuming it can identify them...
The Coming Age of Internet Sovereignty
The Huffington Post online
In few places on Earth is censorship undertaken more vigorously than it is in the People's Republic of China (PRC). Take Amazon.com. At one level, Amazon.cn, allegedly the world's largest Chinese online bookstore, resembles its American counterpart, selling everything from the Twilight series to Battlestar Galactica. But dig deeper, and differences multiply. A search in early 2011 revealed only a single hit for "human rights in China": Alexandra Harney's The China Price. Perhaps most telling was a query conducted by the New York Times in 2010 for "censorship" and "China," that returned a result for a book entitled, When China Rules the World...
How to Enhance Cybersecurity and Create American Jobs
The Huffington Post online
From Flame to the FBI's program of protecting users from the DNS Charger trojan, one critical component is often underappreciated amidst the deluge of coverage on cyber attacks -- hardware. As its most basic level, the Internet is composed of a series of cables, computers, and routers. Innocent or malicious hardware flaws in this physical infrastructure can give rise to myriad vulnerabilities. As Richard Clarke and Robert Knake explain in Cyber War: "What can be done to millions of lines of code can also be done with millions of circuits imprinted on computer chips inside computers, routers, and servers." In other words, hackers can not only attack your computer system by sending you a virus-infected email, but also by altering a tiny circuit in a chip you'll very likely never even see...
Governing the Final Frontier: A Polycentric Approach to Managing Space Weaponization and DebrisAmerican Business Law Journal
In 2007, China performed a successful anti-satellite (ASAT) test and destroyed an aging weather satellite at an altitude of some five hundred miles. This event contributed more than 35,000 pieces of space debris, increasing at a stroke the amount of total orbital ...
Should your firm invest in cyber risk insurance?Business Horizons
Firms have increasingly been turning to cyber risk insurance in order to better manage cyber threats and any resulting legal liability from data breaches. But how useful is this tactic? Herein, I analyze the impact of cyber attacks on firms, some of the applicable US law ...
Toward Cyberpeace: Managing Cyberattacks through Polycentric GovernanceAmerican University Law Review
Epsilon and its customers, including JPMorgan Chase, Verizon, Sony, the International Monetary Fund, Sega, Citigroup, and more, were hit by cyberattacks in just three months, from April to June 2011.2 More recently, in March 2013 what has been billed as the ...
State Responsibility for Cyber Attacks: Competing Standards for a Growing ProblemGeorgetown Journal of International Law
At the height of the Cold War in June 1982, an American earlywarning satellite detected a large blast in Siberia. A Soviet gas pipeline had exploded. The explosion was the result of a CIA-sponsored logic bomb planted in software that Soviet spies had stolen from a ...
The Tragedy of the Common Heritage of MankindStanford Environmental Law Journal
Territorial sovereignty has in large part defined both international relations and international law since the 1648 Treaty of Westphalia.'The primary exception to this principle is the international commons. In these areas, which include the deep international seabed, the ...