International LawInternational Security
Building a Universal Counter-Proliferation Regime: The Institutional Limits of United Nations Security Council Resolution 1540
Foreign PolicyHuman Rights
Countering the Prominence Effect: How US National Security Lawyers Can Fulfill Non-Prominent Humanitarian Objectives
Emerging TechnologyInternational Law
Machine Learning, Artificial Intelligence, and the Use of Force by States
Religious ExtremismTerrorism and Counterterrorism
Managing Terrorism
Book ReviewsInternational Law
Military Justice: A Very Short Introduction (Book Review)
Human RightsInternational Law
Preventive Detention for National Security Purposes in Israel
International LawInternational Security
JCP-No-Way: A Critique of the Iran Nuclear Deal as a Non-Legally-Binding Political Commitment
Teaching National Security LawThe Constitution
Replacing the “Sword of War” with the “Scales of Justice”: Henfield’s Case and the Origins of Lawfare in the United States
Human RightsInternational Law
The Border and Beyond: The National Security Implications of Migration, Refugees, and Asylum Under US and International Law
CyberespionageCybersecurity
Understanding Cyber Collateral Damage
International LawLaws of War
Proxy War Ethics
International LawInternational Security
Understanding the Challenge of Legal Interoperability in Coalition Operations
International LawLaws of War
Assessing US Justifications for Using Force in Response to Syria’s Chemical Attacks: An International Law Perspective
Human RightsPublic Health
Global Health Security in an Era of Explosive Pandemic Potential
Laws of WarTerrorism and Counterterrorism
The Covert Action Statute: The CIA’s Blank Check?
CyberespionageCybersecurity
The 2014 Sony Hack and the Role of International Law
Human Rights in Cyberspace
How Technology Enhances the Right to Privacy: A Case Study on the Right to Hide Project of the Hungarian Civil Liberties Union
Human Rights in Cyberspace
State Responsibility to Respect, Protect, & Fulfill Human Rights Obligations in Cyberspace
CyberespionageCybersecurity
Spying & Fighting in Cyberspace: What is Which?