Vol. 9 No. 2

Laws of War

Just War and Conduct in War: An Airman’s Reflection

Big DataSurveillance

Before Privacy, Power: The Structural Constitution & the Challenge of Mass Surveillance

CyberespionageCybersecurity

Understanding Cyber Collateral Damage

International LawLaws of War

Proxy War Ethics

SecrecySurveillance

Beyond Privacy & Security: The Role of the Telecommunications Industry in Electronic Surveillance

International LawInternational Security

Understanding the Challenge of Legal Interoperability in Coalition Operations

International LawLaws of War

Assessing US Justifications for Using Force in Response to Syria’s Chemical Attacks: An International Law Perspective

Vol. 9 No. 1

Laws of War

Totality of the Circumstances: The DOD Law of War Manual & the Evolving Notion of Direct Participation in Hostilities

Human RightsPublic Health

Global Health Security in an Era of Explosive Pandemic Potential

Surveillance

Terrorism, the Internet, & Propaganda: A Deadly Combination

Laws of WarTerrorism and Counterterrorism

The Covert Action Statute: The CIA’s Blank Check?

Laws of War

International Law & Military Strategy: Changes in the Strategic Operating Environment

Public Health

Public Health Emergencies as Threats to National Security

Vol. 8 No. 3

Big DataCyberespionage

Law Enforcement Access to Data Across Borders: The Evolving Security & Rights Issues

Surveillance

10 Standards for Oversight & Transparency of National Intelligence Services

CyberespionageCybersecurity

The 2014 Sony Hack and the Role of International Law

Human Rights in Cyberspace

How Technology Enhances the Right to Privacy: A Case Study on the Right to Hide Project of the Hungarian Civil Liberties Union

Big DataCyberespionage

Deterring Financially Motivated Cybercrime

Human Rights in Cyberspace

State Responsibility to Respect, Protect, & Fulfill Human Rights Obligations in Cyberspace

Big DataSurveillance

An Essay on Domestic Surveillance

FISAIntelligence

Trends & Predictions in Foreign Intelligence Surveillance: The FAA & Beyond

CyberespionageCybersecurity

Spying & Fighting in Cyberspace: What is Which?

Vol. 8 No. 2

FISATerrorism and Counterterrorism

Sentencing Considerations & Their Implications on Foreign Policy

Laws of WarTerrorism and Counterterrorism

The Implications of Trying National Security Cases in Article III Courts

Cybersecurity

Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model

Laws of WarRemote Targeting/Targeted Killing

Dawn of the Intercontinental Sniper: The Drone’s Cascading Contribution to the Modern Battlefield’s Complexity

Big DataCybersecurity

Rethinking Privacy: Fourth Amendment “Papers” and the Third-Party Doctrine

Vol. 8 No. 1

Journal Placeholder Image

IntelligenceSecrecy

Can Technology Prevent Leaks?

Journal Placeholder Image

Laws of WarThe Constitution

No Place in the Military: The Judiciary’s Failure to Compensate Victims of Military Sexual Assault & a Suggested Path Forward Using Lessons from the Prison Context

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“Friend of Humans”: An Argument for Developing Autonomous Weapons Systems

Journal Placeholder Image

IntelligenceSecrecy

The Wasp’s Nest: Intelligence Community Whistleblowing & Source Protection

Journal Placeholder Image

Big DataIntelligence

A New Paradigm of Classified Disclosures

Journal Placeholder Image

Big DataSecrecy

Assessing the Leakers: Criminals or Heroes?

Journal Placeholder Image

Teaching National Security LawThe Constitution

The National Security Council Legal Adviser: Crafting Legal Positions on Matters of War & Peace