Vol. 10 No. 2

International LawInternational Security

Nuclear Arms Control: Coming Back from Oblivion, Again

Foreign PolicyInternational Law

Shaking the Rust Off the Comprehensive Nuclear-Test-Ban Treaty Ratification Process

International LawInternational Security

Requesting a Challenge Inspection Against Syria Under the Chemical Weapons Convention: Venturing into Uncharted Territory

Big DataCyberespionage

Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

Book ReviewsCyberespionage

Projecting Power: How States Use Proxies in Cyberspace

CyberespionageIntelligence

Full Court Press: Preventing Foreign Adversaries from Exfiltrating National Security Technologies Through Bankruptcy Proceedings

Vol. 10 No. 1

International LawInternational Security

Building a Universal Counter-Proliferation Regime: The Institutional Limits of United Nations Security Council Resolution 1540

Big DataIntelligence

Gathering Intelligence: Drifting Meaning and the Modern Surveillance Apparatus

Book ReviewsHuman Rights

Requiem for Korematsu?

Book ReviewsHuman Rights

From Protecting Lives to Protecting States: Use of Force Across the Threat Continuum

Foreign PolicyHuman Rights

Countering the Prominence Effect: How US National Security Lawyers Can Fulfill Non-Prominent Humanitarian Objectives

Public Health

The National Security Impacts of Climate Change

Big DataCyberespionage

Sovereign Immunity in Cyber Space: Towards Defining a Cyber-Intrusion Exception to the Foreign Sovereign Immunities Act

Emerging TechnologyInternational Law

Machine Learning, Artificial Intelligence, and the Use of Force by States

Vol. 9 No. 3

Religious ExtremismTerrorism and Counterterrorism

Managing Terrorism

Big DataCyberespionage

Equi-Failure: The National Security Implications of the Equifax Hack and a Critical Proposal for Reform

Book ReviewsInternational Law

Military Justice: A Very Short Introduction (Book Review)

Human RightsInternational Law

Preventive Detention for National Security Purposes in Israel

International LawInternational Security

JCP-No-Way: A Critique of the Iran Nuclear Deal as a Non-Legally-Binding Political Commitment

IntelligenceSurveillance

Outsourcing Intelligence Analysis: Legal and Policy Risks

Teaching National Security LawThe Constitution

Replacing the “Sword of War” with the “Scales of Justice”: Henfield’s Case and the Origins of Lawfare in the United States

Intelligence

Rock or Island: It Was an UNCLOS Call

Human RightsInternational Law

The Border and Beyond: The National Security Implications of Migration, Refugees, and Asylum Under US and International Law

Book ReviewsFISA

A Review of “The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age” by Laura K. Donohue

Vol. 9 No. 2

Laws of War

Just War and Conduct in War: An Airman’s Reflection

Big DataSurveillance

Before Privacy, Power: The Structural Constitution & the Challenge of Mass Surveillance

CyberespionageCybersecurity

Understanding Cyber Collateral Damage

International LawLaws of War

Proxy War Ethics

SecrecySurveillance

Beyond Privacy & Security: The Role of the Telecommunications Industry in Electronic Surveillance

International LawInternational Security

Understanding the Challenge of Legal Interoperability in Coalition Operations

International LawLaws of War

Assessing US Justifications for Using Force in Response to Syria’s Chemical Attacks: An International Law Perspective

Vol. 9 No. 1

Laws of War

Totality of the Circumstances: The DOD Law of War Manual & the Evolving Notion of Direct Participation in Hostilities

Human RightsPublic Health

Global Health Security in an Era of Explosive Pandemic Potential

Surveillance

Terrorism, the Internet, & Propaganda: A Deadly Combination

Laws of WarTerrorism and Counterterrorism

The Covert Action Statute: The CIA’s Blank Check?

Laws of War

International Law & Military Strategy: Changes in the Strategic Operating Environment

Public Health

Public Health Emergencies as Threats to National Security