Vol. 9 No. 1

Laws of War

Totality of the Circumstances: The DOD Law of War Manual & the Evolving Notion of Direct Participation in Hostilities

Human RightsPublic Health

Global Health Security in an Era of Explosive Pandemic Potential

Surveillance

Terrorism, the Internet, & Propaganda: A Deadly Combination

Laws of WarTerrorism and Counterterrorism

The Covert Action Statute: The CIA’s Blank Check?

Laws of War

International Law & Military Strategy: Changes in the Strategic Operating Environment

Public Health

Public Health Emergencies as Threats to National Security

Vol. 8 No. 3

Big DataCyberespionage

Law Enforcement Access to Data Across Borders: The Evolving Security & Rights Issues

Surveillance

10 Standards for Oversight & Transparency of National Intelligence Services

CyberespionageCybersecurity

The 2014 Sony Hack and the Role of International Law

Human Rights in Cyberspace

How Technology Enhances the Right to Privacy: A Case Study on the Right to Hide Project of the Hungarian Civil Liberties Union

Big DataCyberespionage

Deterring Financially Motivated Cybercrime

Human Rights in Cyberspace

State Responsibility to Respect, Protect, & Fulfill Human Rights Obligations in Cyberspace

Big DataSurveillance

An Essay on Domestic Surveillance

FISAIntelligence

Trends & Predictions in Foreign Intelligence Surveillance: The FAA & Beyond

CyberespionageCybersecurity

Spying & Fighting in Cyberspace: What is Which?

Vol. 8 No. 2

FISATerrorism and Counterterrorism

Sentencing Considerations & Their Implications on Foreign Policy

Laws of WarTerrorism and Counterterrorism

The Implications of Trying National Security Cases in Article III Courts

Cybersecurity

Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model

Laws of WarRemote Targeting/Targeted Killing

Dawn of the Intercontinental Sniper: The Drone’s Cascading Contribution to the Modern Battlefield’s Complexity

Big DataCybersecurity

Rethinking Privacy: Fourth Amendment “Papers” and the Third-Party Doctrine

Vol. 8 No. 1

Journal Placeholder Image

IntelligenceSecrecy

Can Technology Prevent Leaks?

Journal Placeholder Image

Laws of WarThe Constitution

No Place in the Military: The Judiciary’s Failure to Compensate Victims of Military Sexual Assault & a Suggested Path Forward Using Lessons from the Prison Context

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“Friend of Humans”: An Argument for Developing Autonomous Weapons Systems

Journal Placeholder Image

IntelligenceSecrecy

The Wasp’s Nest: Intelligence Community Whistleblowing & Source Protection

Journal Placeholder Image

Big DataIntelligence

A New Paradigm of Classified Disclosures

Journal Placeholder Image

Big DataSecrecy

Assessing the Leakers: Criminals or Heroes?

Journal Placeholder Image

Teaching National Security LawThe Constitution

The National Security Council Legal Adviser: Crafting Legal Positions on Matters of War & Peace

Vol. 7 No. 3

Journal Placeholder Image

Book ReviewsIntelligence

Setting the Record Straight: An In-Depth Review of “Duty” by Robert Gates

Journal Placeholder Image

IntelligenceSecrecy

A Proposal to Reduce Government Overclassification of Information Related to National Security

Journal Placeholder Image

CybersecuritySecrecy

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“On Target”: Precision & Balance in the Contemporary Law of Targeting

Journal Placeholder Image

Laws of War

Of Guns & Grotius

Journal Placeholder Image

International LawInternational Security

Addressing the Guantanamo “Legacy Problem”: Bringing Law-of-War Prolonged Military Detention & Criminal Prosecution into Closer Alignment