Vol. 8 No. 2

FISATerrorism and Counterterrorism

Sentencing Considerations & Their Implications on Foreign Policy

Laws of WarTerrorism and Counterterrorism

The Implications of Trying National Security Cases in Article III Courts

Cybersecurity

Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model

Laws of WarRemote Targeting/Targeted Killing

Dawn of the Intercontinental Sniper: The Drone’s Cascading Contribution to the Modern Battlefield’s Complexity

Big DataCybersecurity

Rethinking Privacy: Fourth Amendment “Papers” and the Third-Party Doctrine

Vol. 8 No. 1

Journal Placeholder Image

IntelligenceSecrecy

Can Technology Prevent Leaks?

Journal Placeholder Image

Laws of WarThe Constitution

No Place in the Military: The Judiciary’s Failure to Compensate Victims of Military Sexual Assault & a Suggested Path Forward Using Lessons from the Prison Context

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“Friend of Humans”: An Argument for Developing Autonomous Weapons Systems

Journal Placeholder Image

IntelligenceSecrecy

The Wasp’s Nest: Intelligence Community Whistleblowing & Source Protection

Journal Placeholder Image

Big DataIntelligence

A New Paradigm of Classified Disclosures

Journal Placeholder Image

Big DataSecrecy

Assessing the Leakers: Criminals or Heroes?

Journal Placeholder Image

Teaching National Security LawThe Constitution

The National Security Council Legal Adviser: Crafting Legal Positions on Matters of War & Peace

Vol. 7 No. 3

Journal Placeholder Image

Book ReviewsIntelligence

Setting the Record Straight: An In-Depth Review of “Duty” by Robert Gates

Journal Placeholder Image

IntelligenceSecrecy

A Proposal to Reduce Government Overclassification of Information Related to National Security

Journal Placeholder Image

CybersecuritySecrecy

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“On Target”: Precision & Balance in the Contemporary Law of Targeting

Journal Placeholder Image

Laws of War

Of Guns & Grotius

Journal Placeholder Image

International LawInternational Security

Addressing the Guantanamo “Legacy Problem”: Bringing Law-of-War Prolonged Military Detention & Criminal Prosecution into Closer Alignment

Vol. 7 No. 2

Journal Placeholder Image

Big DataCybersecurity

Symposium Introduction: Swimming in the Ocean of Big Data

Journal Placeholder Image

Big DataFISA

Charting the Future: What to Expect from Big Data

Journal Placeholder Image

Big DataFISA

Big Data Before and After Snowden

Journal Placeholder Image

Big DataCybersecurity

Big Data: It’s Not the Size That Matters

Journal Placeholder Image

Big DataCybersecurity

The Democratization of Big Data

Journal Placeholder Image

Big DataFISA

The NSA and Accountability in an Era of Big Data

Journal Placeholder Image

Big DataFISA

On the Bulk Collection of Tangible Things

Vol. 7 No. 1

Journal Placeholder Image

Secrecy

Discovering the Artichoke: How Mistakes & Omissions Have Blurred the Enabling Intent of the Classified Information Procedures Act

Journal Placeholder Image

Teaching National Security Law

Developing Client-Ready Practitioners: Learning How to Practice National Security Law at Military Law Schools

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Harmonizing Policy & Principle: A Hybrid Model for Counterterrorism

Journal Placeholder Image

International LawLaws of War

Legitimacy Versus Legality Redux: Arming the Syrian Rebels

Journal Placeholder Image

Cybersecurity

Easier Said than Done: Legal Reviews of Cyber Weapons