Vol. 13 No. 2

Terrorism and CounterterrorismThe Constitution

An Army Turned Inward: Reforming the Insurrection Act to Guard Against Abuse

International Law

US Commercial Space Regulation: The Rule of Three

Foreign PolicyInternational Security

Managing the Terrorism Threat with Drones

Defense PolicyForeign Policy

Endless War Challenges Analysis of Drone Strike Effectiveness

Defense PolicyInternational Security

Drone Strike—Analyzing Public Perceptions of Legitimacy

Defense PolicyInternational Law

Over-the Horizon Drone Strikes in an Ongoing Global War: Afghanistan and Beyond

International LawInternational Security

Analyzing the Legality and Effectiveness of US Targeted Killing

International SecurityReligious Extremism

Analyzing the Impacts of Targeted Killing: Lessons for the United States

Vol. 13 No. 1

CybercrimeCyberespionage

Why is the “Spectrum Model” of Internationally Wrongful Acts Problematic in Cyberspace?

CybercrimeCyberespionage

Shot in the Dark: Can Private Sector “Hackbacks” Work?

Human RightsInternational Law

ISIL as Salesmen? The Roles of Due Diligence and the Good Faith Purchaser in Illicit Artifact Trafficking

Military Law

On the Precipice: Democracy, Disaster, and the State Emergency Powers That Govern Elections in Crises

Human RightsInternational Law

Migrants as a Weapons System

Big DataPrivacy

TikTok v. Trump and the Uncertain Future of National Security-based Restrictions on Data Trade

Defense PolicyMilitary Law

The First Calling Forth Clause: The Constitution’s Non-Emergency Power to Call Forth the Militia to Execute the Laws

CyberespionageIntelligence

Willfulness and the Harm of Unlawful Retention of National Security Information

Vol. 12 No. 3

CybersecurityEmerging Technology

A Multiverse of Metaverses

CybersecurityReligious Extremism

Social Media—A Tool for Terror?

CybercrimeCyberespionage

Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability

Foreign PolicyInternational Security

FDI Like You’re FDR: CFIUS Review Under the Biden Administration’s Rooseveltian Conception of National Security

Military Law

Apparent Unlawful Command Influence: An Unworkable Test for an Untenable Doctrine

CybercrimeCyberespionage

Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations

Defense PolicyForeign Policy

By, With, And Through: Section 1202 and the Future of Unconventional Warfare

COVID-19Human Rights

Guantanamo Detention in the Time of COVID-19

Terrorism and Counterterrorism

“Outside Experts”: Expertise and the Counterterrorism Industry in Social Media Content Moderation

Laws of WarThe Constitution

The Selling of a Precedent: The Past as Constraint on Congressional War Powers?

Law and Security in Space

Olive Branches or Fig Leaves: A Cooperation Dilemma for Great Power Competition in Space

Vol. 12 No. 2

CyberespionageCybersecurity

Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy

Refugees and ImmigrationTerrorism and Counterterrorism

Turning US Vetting Capabilities and International Information-Sharing to Counter Foreign White Supremacist Terror Threats

Laws of War

War, What is it Good For? Almost Everything: Chinese Strategic Thought and a New U.S. Approach to Gray Zone Competition

Journal Placeholder Image

Big DataEmerging Technology

Layered Opacity: Criminal Legal Technology Exacerbates Disparate Impact Cycles and Prevents Trust

Foreign PolicyInternational Law

Assessment of National Security Concerns in the Acquisition of U.S. and U.K. Assets

Foreign PolicyIntelligence

Information Lawfare: Messaging and the Moral High Ground

The Constitution

Roosevelt’s “Limited” National Emergency: Crisis Powers in the Emergency Proclamation and Economic Studies of 1939

The Constitution

Reviving Liberal Constitutionalism With Originalism in Emergency Powers Doctrine

Journal Placeholder Image

Terrorism and Counterterrorism

Rethinking U.S. Efforts on Counterterrorism: Toward a Sustainable Plan Two Decades After 9/11

Special Online Issue: Capitol Insurrection 2021

Special Online Issue: Capitol Insurrection 2021The Constitution

Introduction to the Special Online Issue on the 2021 Capitol Insurrection

Special Online Issue: Capitol Insurrection 2021The Constitution

The Attack on the Capitol Calls for a Measured Response

Special Online Issue: Capitol Insurrection 2021The Constitution

A Besieged Capitol: The Need to Objectively Assess the Nature of the Violence

Special Online Issue: Capitol Insurrection 2021The Constitution

The Capitol Insurrection and Pineapples on Pizza

Special Online Issue: Capitol Insurrection 2021The Constitution

From 9-11 to January 6: The Limits of Surveillance Authority and the Democratic State

Special Online Issue: Capitol Insurrection 2021The Constitution

Taking Congress and the Capitol Seriously as National Security Institutions

Special Online Issue: Capitol Insurrection 2021The Constitution

The January 6, 2021, Capitol Riots: Resisting Calls for More Terrorism Laws

Special Online Issue: Capitol Insurrection 2021The Constitution

Will Brandenburg Provide Protection for Donald Trump in the Second Impeachment Trial?

Special Online Issue: Capitol Insurrection 2021The Constitution

The Capitol Invasion and the Framing of Political Violence

Special Online Issue: Capitol Insurrection 2021The Constitution

Stepping Back from the Brink?

Special Online Issue: Capitol Insurrection 2021The Constitution

Perception and Reality: The Urgency of Finding and Fixing Extremism and Racial Bias in the Armed Forces