Thomas Wingfield is the professor of international law at the George C. Marshall European Center for Security Studies.
Prior to his arrival at the Marshall Center, Professor Wingfield was deployed to Afghanistan as the civilian rule of law advisor to Gen. Stanley A. McChrystal's Counterinsurgency Advisory and Assistance Team from October 2009 to February 2010.
Professor Wingfield is a former naval officer who has worked in the private sector, think tanks and academia, as well as at the US Army’s Command and General Staff College from July 2006 to September 2009.
He is a former chair of the American Bar Association’s Committee on International Criminal Law, and the author of the legal text “The Law of Information Conflict: National Security Law in Cyberspace.”
Professor Wingfield holds a doctor of laws (J.D.) and a master of laws (LL.M.) in international and comparative law from the Georgetown University Law Center, and is completing his doctor of juridical science (S.J.D.) in national security law at the Law School of the University of Virginia.
- Lillich on the Forcible Protection of Nationals Abroad, International Law Studies Series (Blue Book), Editor, with Lt. Col. James Meyen, U.S. Naval War College, 250 pp., (2002).
- The Law of Information Conflict: National Security Law in Cyberspace, Aegis Press, 550 pp., (2000).
- Rule of Law Metrics, in U.S. Army Rule of Law Handbook, U.S. Army Center for Law and Military Operations: Charlottesville, Virginia, forthcoming.
- Integrating Legal and Policy Factors in Cyberpreparedness, with James Bret Michael, John F. Sarkasain, Georgios Dementis, and Goncalo Nuno Baptista de Sousa, IEEE Computer, April 2010, pp. 90-92.
- International Law and Information Operations, in Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz, eds., Cyberpower and National Security, Washington, DC: National Defense University, 2009, pp. 525-42.
- Optimizing Lawful Responses to Cyber Intrusions, with J.B. Michael and D. Wijesekera, in Proceedings of the 10th Int. Command and Control Research and Technology Symposium, Wash., D.C.: U.S. Dept. of Def. Command & Control Res. Prog. Publ. Ser., McLean, Va., June 2005, pp. 1-10.
- CNA and the Jus ad Bellum: An Introduction, in Karin Bystrom, ed. Proceedings of the Conference: International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, 17-19 November 2004, Stockholm, Sweden: Swedish National Defence College, 2005, pp. 88-100.
- The Role of Policy in Balancing Outsourcing and Homeland Security, with J.B. Michael, S.E. Roberts, and J.M. Voas, IEEE ITPro, July/Aug. 2005, pp. 27-31.
- An Introduction to Legal Aspects of Operations in Cyberspace, with J.B. Michael, Technical Report NPS-CS-04-005, Naval Postgraduate School, Department of Computer Science, Monterey, Calif., Apr. 28, 2004, pp. 1-28.
- The Convergence of Traditional Theory and Modern Reality: Just War Doctrine and Tyrannical Regimes, 2 A. M. L. Rev. 93, Spring 2004, pp. 93-122.
- THEMIS: Threat Evaluation Metamodel for Information Systems, with C. Farkas, J.B. Michael. and D. Wijesekera, in Chen, H., Moore, R., Zeng, D. D., and Leavitt, J., eds., Lecture Notes in Computer Science, Vol. 3073, New York: Springer-Verlag, 2004, pp. 307-321.
- The Role of Policy in Managing the Effect of Outsourcing Software Development on Homeland Security, with J.B. Michael, S.E. Roberts, and J.M. Voas, in Proceedings of the Workshop on Financial Systems and Cyber Security: A Public Policy Perspective, Amsterdam: Elsevier Science, College Park, Md., May 2004, pp. 1-4.
- Homeland Security’s Cyber Component: A Survey of Legal Issues, with J. B. Michael and S.E. Roberts, in Proceedings of the 27th Annual International. Computer Software and Applications Conference, IEEE, Dallas, Tex., Nov. 2003, pp. 24-25.
- Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System, with J.B. Michael and D. Wijesekera, in Proceedings of the 27th Annual International Computer Software and Applications Conference, IEEE (Dallas, Tex., Nov. 2003), pp. 622-627.
- Lawful Cyber Decoy Policy, with J.B. Michael, in S.D.C. Vimercati, P. Samarati, D. Gritzalis, and S. Katsikas, eds. Security and Privacy in the Age of Uncertainty, Norwell, MA: Kluwer Academic Publishers, 2003, pp. 483-88.
- Constitutional & Policy Issues Regarding Domestic US Enforcement of the Proposed Biological Warfare Convention Inspection Protocol, with Michael McDavid Coyne, 3 Engage Quarterly, Oct. 2002, pp. 79-83.
- Lillich on Interstellar Law: U.S. Naval Regulations, Star Trek, and the Use of Force in Space, 46 S.D. L. Rev. 72, 2001, pp. 72-101.
- Chivalry and the Use of Force, 32 Tol. L. Rev. 111, Winter 2001, pp. 111-136.
- You Do Not Give Answers That Please Me: A Comparison of the British and American Boards of Inquiry into the Sinking of the Titanic, The American Neptune, Winter 2000, pp. 265-86.
- Forcible Protection of Nationals Abroad, 104 Dick. L. Rev. 439, Spring 2000, pp. 439-469.
- Review of The Once and Future Security Council, Bruce Russett, Naval War College Review, Spring 2000, p. 130-31.
- The Chemical Weapons Convention and the Military Commander: Protecting Very Large Secrets in a Transparent Era, 162 Mil. L. Rev. 180, Dec. 1999, pp. 180-218.
- Review of A Century of U.S. Naval Intelligence, Wyman H. Packard, Naval War College Review, Winter 1999, p. 125.
- Legal Aspects of Offensive Information Operations in Space, 9 U.S.A.F. J. of Leg. Stu. 121, 1999, pp. 1-35.
- Targeting Regime Elites: Assassination, Tyrannicide, and the Clancy Doctrine, 22 Md. J. Int’l L. & Trade at 287, 1999, pp. 287-317.