Vol. 8 No. 3

Big DataCyberespionage

Law Enforcement Access to Data Across Borders: The Evolving Security & Rights Issues

Surveillance

10 Standards for Oversight & Transparency of National Intelligence Services

CyberespionageCybersecurity

The 2014 Sony Hack and the Role of International Law

Human Rights in Cyberspace

How Technology Enhances the Right to Privacy: A Case Study on the Right to Hide Project of the Hungarian Civil Liberties Union

Big DataCyberespionage

Deterring Financially Motivated Cybercrime

Human Rights in Cyberspace

State Responsibility to Respect, Protect, & Fulfill Human Rights Obligations in Cyberspace

Big DataSurveillance

An Essay on Domestic Surveillance

FISAIntelligence

Trends & Predictions in Foreign Intelligence Surveillance: The FAA & Beyond

CyberespionageCybersecurity

Spying & Fighting in Cyberspace: What is Which?

Vol. 8 No. 2

FISATerrorism and Counterterrorism

Sentencing Considerations & Their Implications on Foreign Policy

Laws of WarTerrorism and Counterterrorism

The Implications of Trying National Security Cases in Article III Courts

Cybersecurity

Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model

Laws of WarRemote Targeting/Targeted Killing

Dawn of the Intercontinental Sniper: The Drone’s Cascading Contribution to the Modern Battlefield’s Complexity

Big DataCybersecurity

Rethinking Privacy: Fourth Amendment “Papers” and the Third-Party Doctrine

Vol. 8 No. 1

Journal Placeholder Image

IntelligenceSecrecy

Can Technology Prevent Leaks?

Journal Placeholder Image

Laws of WarThe Constitution

No Place in the Military: The Judiciary’s Failure to Compensate Victims of Military Sexual Assault & a Suggested Path Forward Using Lessons from the Prison Context

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“Friend of Humans”: An Argument for Developing Autonomous Weapons Systems

Journal Placeholder Image

IntelligenceSecrecy

The Wasp’s Nest: Intelligence Community Whistleblowing & Source Protection

Journal Placeholder Image

Big DataIntelligence

A New Paradigm of Classified Disclosures

Journal Placeholder Image

Big DataSecrecy

Assessing the Leakers: Criminals or Heroes?

Journal Placeholder Image

Teaching National Security LawThe Constitution

The National Security Council Legal Adviser: Crafting Legal Positions on Matters of War & Peace

Vol. 7 No. 3

Journal Placeholder Image

Book ReviewsIntelligence

Setting the Record Straight: An In-Depth Review of “Duty” by Robert Gates

Journal Placeholder Image

IntelligenceSecrecy

A Proposal to Reduce Government Overclassification of Information Related to National Security

Journal Placeholder Image

CybersecuritySecrecy

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“On Target”: Precision & Balance in the Contemporary Law of Targeting

Journal Placeholder Image

Laws of War

Of Guns & Grotius

Journal Placeholder Image

International LawInternational Security

Addressing the Guantanamo “Legacy Problem”: Bringing Law-of-War Prolonged Military Detention & Criminal Prosecution into Closer Alignment

Vol. 7 No. 2

Journal Placeholder Image

Big DataCybersecurity

Symposium Introduction: Swimming in the Ocean of Big Data

Journal Placeholder Image

Big DataFISA

Charting the Future: What to Expect from Big Data

Journal Placeholder Image

Big DataFISA

Big Data Before and After Snowden

Journal Placeholder Image

Big DataCybersecurity

Big Data: It’s Not the Size That Matters

Journal Placeholder Image

Big DataCybersecurity

The Democratization of Big Data

Journal Placeholder Image

Big DataFISA

The NSA and Accountability in an Era of Big Data

Journal Placeholder Image

Big DataFISA

On the Bulk Collection of Tangible Things