Vol. 11 No. 3

Military Law

Unequal Justice: Why Congress Should Expand the Supreme Court’s Jurisdiction to Review the Courts-Martial System

International LawInternational Security

Why Isn’t Outer Space a Global Commons?

The Constitution

National Security and Access, a Structural Perspective

Laws of WarTerrorism and Counterterrorism

“Until They Are Effectively Destroyed”: The U.S. Approach on the Temporal Scope of Armed Conflicts with Terrorist Organizations

Cybersecurity

Building Cyber Walls: Executive Emergency Powers in Cyberspace

Journal Placeholder Image

International LawLaws of War

Fighting in the Unknown: Lawful Measures to Neutralize Subterranean Threats

Human RightsSurveillance

Effective Oversight of Large-Scale Surveillance Activities: A Human Rights Perspective

International LawInternational Security

The Role of Transnational Private Actors in Ukraine International Flight 752 Crash in Iran Under Economic Sanctions Pressure

Vol. 11 No. 2

Nuclear Weapons

Nuclear Command and Statutory Control

Cybersecurity

Reordering the Law for a China World Order: China’s Legal Warfare Strategy in Outer Space and Cyberspace

Laws of War

The Citizenship Hook: Obligations to British and French Foreign Fighters Under the European Convention on Human Rights

Laws of WarRemote Targeting/Targeted Killing

Command Responsibility: A Model for Defining Meaningful Human Control

CybercrimeCyberespionage

Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity

The Constitution

The Militia Clauses and the Original War Powers

Military Law

It Takes a Family: How Military Spousal Laws and Policies Impact National Security

The Constitution

Paved with Good Intentions?: Civil-Military Norms, Breaches, and Why Mindset Matters

Vol. 11 No. 1—Special COVID-19 Issue

COVID-19Public Health

Special Issue: Law and the COVID-19 Pandemic

COVID-19Public Health

Leadership in a Time of Pandemic: Act Well the Given Part

COVID-19Public Health

The Roles of the State and Federal Governments in a Pandemic

COVID-19Public Health

Emergency Powers, Real and Imagined: How President Trump Used and Failed to Use Presidential Authority in the COVID-19 Crisis

COVID-19Public Health

A Historical Review of the State Police Powers and Their Relevance to the COVID-19 Pandemic of 2020

COVID-19Public Health

Domestic Military Operations and the Coronavirus Pandemic

COVID-19Public Health

Good Health and Good Privacy Go Hand-in-Hand

COVID-19Public Health

From Shortages to Stockpiles: How the Defense Production Act Can Be Used to Save Lives, Make America the Global Arsenal of Public Health, and Address the Security Challenges Ahead

COVID-19Public Health

Access to Public Records and the Role of the News Media in Providing Information About COVID-19

COVID-19Public Health

The Failing Federation: Why Canada Is Ineffective at COVID-19

COVID-19Public Health

Cyber Attacks and Cyber (Mis)information Operations During a Pandemic

COVID-19Public Health

U.N. Peacekeeping in a Time of Pandemic: Reconciling Armed Conflict Management While Helping to Fight COVID-19

COVID-19Public Health

Falsehoods and the Patois of Pandemics: A Playbook

Military LawPublic Health

COVID-19 & Military Law

Vol. 10 No. 3

CybercrimeCyberespionage

Transnational Government Hacking

Big DataCybercrime

Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime

Big DataCyberespionage

Challenges and Opportunities in State and Local Cybercrime Enforcement

Big DataCyberespionage

Full Count?: Crime Rate Swings, Cybercrime Misses and Why We Don’t Really Know the Score

CybercrimeCyberespionage

Advancing Accurate & Objective Cybercrime Metrics

Big DataCybersecurity

Defining the Scope of “Possession, Custody, or Control” for Privacy Issues and the CLOUD Act

CyberespionageCybersecurity

Persistent Enforcement: Criminal Charges as a Response to Nation-State Malicious Cyber Activity

Vol. 10 No. 2

International LawInternational Security

Nuclear Arms Control: Coming Back from Oblivion, Again

Foreign PolicyInternational Law

Shaking the Rust Off the Comprehensive Nuclear-Test-Ban Treaty Ratification Process

International LawInternational Security

Requesting a Challenge Inspection Against Syria Under the Chemical Weapons Convention: Venturing into Uncharted Territory

Big DataCyberespionage

Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

Book ReviewsCyberespionage

Projecting Power: How States Use Proxies in Cyberspace

CyberespionageIntelligence

Full Court Press: Preventing Foreign Adversaries from Exfiltrating National Security Technologies Through Bankruptcy Proceedings