Vol. 10 No. 1

International LawInternational Security

Building a Universal Counter-Proliferation Regime: The Institutional Limits of United Nations Security Council Resolution 1540

Big DataIntelligence

Gathering Intelligence: Drifting Meaning and the Modern Surveillance Apparatus

Book ReviewsHuman Rights

Requiem for Korematsu?

Book ReviewsHuman Rights

From Protecting Lives to Protecting States: Use of Force Across the Threat Continuum

Foreign PolicyHuman Rights

Countering the Prominence Effect: How US National Security Lawyers Can Fulfill Non-Prominent Humanitarian Objectives

Public Health

The National Security Impacts of Climate Change

Big DataCyberespionage

Sovereign Immunity in Cyber Space: Towards Defining a Cyber-Intrusion Exception to the Foreign Sovereign Immunities Act

Emerging TechnologyInternational Law

Machine Learning, Artificial Intelligence, and the Use of Force by States

Vol. 9 No. 3

Religious ExtremismTerrorism and Counterterrorism

Managing Terrorism

Big DataCyberespionage

Equi-Failure: The National Security Implications of the Equifax Hack and a Critical Proposal for Reform

Book ReviewsInternational Law

Military Justice: A Very Short Introduction (Book Review)

Human RightsInternational Law

Preventive Detention for National Security Purposes in Israel

International LawInternational Security

JCP-No-Way: A Critique of the Iran Nuclear Deal as a Non-Legally-Binding Political Commitment

IntelligenceSurveillance

Outsourcing Intelligence Analysis: Legal and Policy Risks

Teaching National Security LawThe Constitution

Replacing the “Sword of War” with the “Scales of Justice”: Henfield’s Case and the Origins of Lawfare in the United States

Intelligence

Rock or Island: It Was an UNCLOS Call

Human RightsInternational Law

The Border and Beyond: The National Security Implications of Migration, Refugees, and Asylum Under US and International Law

Book ReviewsFISA

A Review of “The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age” by Laura K. Donohue

Vol. 9 No. 2

Laws of War

Just War and Conduct in War: An Airman’s Reflection

Big DataSurveillance

Before Privacy, Power: The Structural Constitution & the Challenge of Mass Surveillance

CyberespionageCybersecurity

Understanding Cyber Collateral Damage

International LawLaws of War

Proxy War Ethics

SecrecySurveillance

Beyond Privacy & Security: The Role of the Telecommunications Industry in Electronic Surveillance

International LawInternational Security

Understanding the Challenge of Legal Interoperability in Coalition Operations

International LawLaws of War

Assessing US Justifications for Using Force in Response to Syria’s Chemical Attacks: An International Law Perspective

Vol. 9 No. 1

Laws of War

Totality of the Circumstances: The DOD Law of War Manual & the Evolving Notion of Direct Participation in Hostilities

Human RightsPublic Health

Global Health Security in an Era of Explosive Pandemic Potential

Surveillance

Terrorism, the Internet, & Propaganda: A Deadly Combination

Laws of WarTerrorism and Counterterrorism

The Covert Action Statute: The CIA’s Blank Check?

Laws of War

International Law & Military Strategy: Changes in the Strategic Operating Environment

Public Health

Public Health Emergencies as Threats to National Security

Vol. 8 No. 3

Big DataCyberespionage

Law Enforcement Access to Data Across Borders: The Evolving Security & Rights Issues

Surveillance

10 Standards for Oversight & Transparency of National Intelligence Services

CyberespionageCybersecurity

The 2014 Sony Hack and the Role of International Law

Human Rights in Cyberspace

How Technology Enhances the Right to Privacy: A Case Study on the Right to Hide Project of the Hungarian Civil Liberties Union

Big DataCyberespionage

Deterring Financially Motivated Cybercrime

Human Rights in Cyberspace

State Responsibility to Respect, Protect, & Fulfill Human Rights Obligations in Cyberspace

Big DataSurveillance

An Essay on Domestic Surveillance

FISAIntelligence

Trends & Predictions in Foreign Intelligence Surveillance: The FAA & Beyond

CyberespionageCybersecurity

Spying & Fighting in Cyberspace: What is Which?