Vol. 13 No. 3

Foreign PolicyThe Constitution

Congressional and Supreme Court Restraints on Treaty Termination Carried Out at the President’s “Lowest Ebb” of Authority

Emerging TechnologyNuclear Weapons

Advanced Reactors and Nuclear Terrorism: Rethinking the International Framework

Foreign PolicyThe Constitution

A Bellicose Founding Charter: The US and Providing for the “Common Defence”

Foreign PolicyInternational Law

China’s Anti-Monopoly Merger Control and National Security: Interactions with Foreign Investment Law and Beyond

International LawInternational Security

Lawfare and Sea Power: A Historical Perspective

Human RightsInternational Law

The Case for Attempted Perfidy: An “Attempt” to Enhance Deterrent Value

Vol. 13 No. 2

Terrorism and CounterterrorismThe Constitution

An Army Turned Inward: Reforming the Insurrection Act to Guard Against Abuse

International Law

US Commercial Space Regulation: The Rule of Three

Foreign PolicyInternational Security

Managing the Terrorism Threat with Drones

Defense PolicyForeign Policy

Endless War Challenges Analysis of Drone Strike Effectiveness

Defense PolicyInternational Security

Drone Strike—Analyzing Public Perceptions of Legitimacy

Defense PolicyInternational Law

Over-the Horizon Drone Strikes in an Ongoing Global War: Afghanistan and Beyond

International LawInternational Security

Analyzing the Legality and Effectiveness of US Targeted Killing

International SecurityReligious Extremism

Analyzing the Impacts of Targeted Killing: Lessons for the United States

Vol. 13 No. 1

CybercrimeCyberespionage

Why is the “Spectrum Model” of Internationally Wrongful Acts Problematic in Cyberspace?

CybercrimeCyberespionage

Shot in the Dark: Can Private Sector “Hackbacks” Work?

Human RightsInternational Law

ISIL as Salesmen? The Roles of Due Diligence and the Good Faith Purchaser in Illicit Artifact Trafficking

Military Law

On the Precipice: Democracy, Disaster, and the State Emergency Powers That Govern Elections in Crises

Human RightsInternational Law

Migrants as a Weapons System

Big DataPrivacy

TikTok v. Trump and the Uncertain Future of National Security-based Restrictions on Data Trade

Defense PolicyMilitary Law

The First Calling Forth Clause: The Constitution’s Non-Emergency Power to Call Forth the Militia to Execute the Laws

CyberespionageIntelligence

Willfulness and the Harm of Unlawful Retention of National Security Information

Vol. 12 No. 3

CybersecurityEmerging Technology

A Multiverse of Metaverses

CybersecurityReligious Extremism

Social Media—A Tool for Terror?

CybercrimeCyberespionage

Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability

Foreign PolicyInternational Security

FDI Like You’re FDR: CFIUS Review Under the Biden Administration’s Rooseveltian Conception of National Security

Military Law

Apparent Unlawful Command Influence: An Unworkable Test for an Untenable Doctrine

CybercrimeCyberespionage

Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations

Defense PolicyForeign Policy

By, With, And Through: Section 1202 and the Future of Unconventional Warfare

COVID-19Human Rights

Guantanamo Detention in the Time of COVID-19

Terrorism and Counterterrorism

“Outside Experts”: Expertise and the Counterterrorism Industry in Social Media Content Moderation

Laws of WarThe Constitution

The Selling of a Precedent: The Past as Constraint on Congressional War Powers?

Law and Security in Space

Olive Branches or Fig Leaves: A Cooperation Dilemma for Great Power Competition in Space

Vol. 12 No. 2

CyberespionageCybersecurity

Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy

Refugees and ImmigrationTerrorism and Counterterrorism

Turning US Vetting Capabilities and International Information-Sharing to Counter Foreign White Supremacist Terror Threats

Laws of War

War, What is it Good For? Almost Everything: Chinese Strategic Thought and a New U.S. Approach to Gray Zone Competition

Journal Placeholder Image

Big DataEmerging Technology

Layered Opacity: Criminal Legal Technology Exacerbates Disparate Impact Cycles and Prevents Trust

Foreign PolicyInternational Law

Assessment of National Security Concerns in the Acquisition of U.S. and U.K. Assets

Foreign PolicyIntelligence

Information Lawfare: Messaging and the Moral High Ground

The Constitution

Roosevelt’s “Limited” National Emergency: Crisis Powers in the Emergency Proclamation and Economic Studies of 1939

The Constitution

Reviving Liberal Constitutionalism With Originalism in Emergency Powers Doctrine

Journal Placeholder Image

Terrorism and Counterterrorism

Rethinking U.S. Efforts on Counterterrorism: Toward a Sustainable Plan Two Decades After 9/11