Vol. 11 No. 1—Special COVID-19 Issue

COVID-19Public Health

Special Issue: Law and the COVID-19 Pandemic

COVID-19Public Health

Leadership in a Time of Pandemic: Act Well the Given Part

COVID-19Public Health

The Roles of the State and Federal Governments in a Pandemic

COVID-19Public Health

Emergency Powers, Real and Imagined: How President Trump Used and Failed to Use Presidential Authority in the COVID-19 Crisis

COVID-19Public Health

A Historical Review of the State Police Powers and Their Relevance to the COVID-19 Pandemic of 2020

COVID-19Public Health

Domestic Military Operations and the Coronavirus Pandemic

COVID-19Public Health

Good Health and Good Privacy Go Hand-in-Hand

COVID-19Public Health

From Shortages to Stockpiles: How the Defense Production Act Can Be Used to Save Lives, Make America the Global Arsenal of Public Health, and Address the Security Challenges Ahead

COVID-19Public Health

Access to Public Records and the Role of the News Media in Providing Information About COVID-19

COVID-19Public Health

The Failing Federation: Why Canada Is Ineffective at COVID-19

COVID-19Public Health

Cyber Attacks and Cyber (Mis)information Operations During a Pandemic

COVID-19Public Health

U.N. Peacekeeping in a Time of Pandemic: Reconciling Armed Conflict Management While Helping to Fight COVID-19

COVID-19Public Health

Falsehoods and the Patois of Pandemics: A Playbook

Military LawPublic Health

COVID-19 & Military Law

Vol. 10 No. 3

CybercrimeCyberespionage

Transnational Government Hacking

Big DataCybercrime

Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime

Big DataCyberespionage

Challenges and Opportunities in State and Local Cybercrime Enforcement

Big DataCyberespionage

Full Count?: Crime Rate Swings, Cybercrime Misses and Why We Don’t Really Know the Score

CybercrimeCyberespionage

Advancing Accurate & Objective Cybercrime Metrics

Big DataCybersecurity

Defining the Scope of “Possession, Custody, or Control” for Privacy Issues and the CLOUD Act

CyberespionageCybersecurity

Persistent Enforcement: Criminal Charges as a Response to Nation-State Malicious Cyber Activity

Vol. 10 No. 2

International LawInternational Security

Nuclear Arms Control: Coming Back from Oblivion, Again

Foreign PolicyInternational Law

Shaking the Rust Off the Comprehensive Nuclear-Test-Ban Treaty Ratification Process

International LawInternational Security

Requesting a Challenge Inspection Against Syria Under the Chemical Weapons Convention: Venturing into Uncharted Territory

Big DataCyberespionage

Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

Book ReviewsCyberespionage

Projecting Power: How States Use Proxies in Cyberspace

International Security

Full Court Press: Preventing Foreign Adversaries from Exfiltrating National Security Technologies Through Bankruptcy Proceedings

Vol. 10 No. 1

International LawInternational Security

Building a Universal Counter-Proliferation Regime: The Institutional Limits of United Nations Security Council Resolution 1540

Big DataIntelligence

Gathering Intelligence: Drifting Meaning and the Modern Surveillance Apparatus

Book ReviewsHuman Rights

Requiem for Korematsu?

Book ReviewsHuman Rights

From Protecting Lives to Protecting States: Use of Force Across the Threat Continuum

Foreign PolicyHuman Rights

Countering the Prominence Effect: How US National Security Lawyers Can Fulfill Non-Prominent Humanitarian Objectives

Public Health

The National Security Impacts of Climate Change

Big DataCyberespionage

Sovereign Immunity in Cyber Space: Towards Defining a Cyber-Intrusion Exception to the Foreign Sovereign Immunities Act

Emerging TechnologyInternational Law

Machine Learning, Artificial Intelligence, and the Use of Force by States

Vol. 9 No. 3

Religious ExtremismTerrorism and Counterterrorism

Managing Terrorism

Big DataCyberespionage

Equi-Failure: The National Security Implications of the Equifax Hack and a Critical Proposal for Reform

Book ReviewsInternational Law

Military Justice: A Very Short Introduction (Book Review)

Human RightsInternational Law

Preventive Detention for National Security Purposes in Israel

International LawInternational Security

JCP-No-Way: A Critique of the Iran Nuclear Deal as a Non-Legally-Binding Political Commitment

IntelligenceSurveillance

Outsourcing Intelligence Analysis: Legal and Policy Risks

Teaching National Security LawThe Constitution

Replacing the “Sword of War” with the “Scales of Justice”: Henfield’s Case and the Origins of Lawfare in the United States

Intelligence

Rock or Island: It Was an UNCLOS Call

Human RightsInternational Law

The Border and Beyond: The National Security Implications of Migration, Refugees, and Asylum Under US and International Law

Book ReviewsFISA

A Review of “The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age” by Laura K. Donohue