Vol. 6 No.2

Journal Placeholder Image

Secrecy

Free Speech Aboard the Leaky Ship of State: Calibrating First Amendment Protections for Leakers of Classified Information

Journal Placeholder Image

International Security

Even If It Ain’t Broke, Why Not Fix It? Three Proposed Improvements to the Uniform Code of Military Justice

Journal Placeholder Image

Secrecy

Chutzpah

Journal Placeholder Image

International LawInternational Security

Train Wreck: The U.S. Violation of the Chemical Weapons Convention

Journal Placeholder Image

Teaching National Security Law

Educating National Security Lawyers for the Twenty-first Century: The Intersection of National Security Law and International Affairs

Journal Placeholder Image

Teaching National Security Law

National Security Law Pedagogy and the Role of Simulations

Journal Placeholder Image

CybersecurityInternational Security

The Dark Future of International Cybersecurity Regulation

Journal Placeholder Image

Book ReviewsSecrecy

Unknotting the Tangled Threads of Watergate Lore

Vol. 6 No. 1

Journal Placeholder Image

Human Rights

Preventive Detention in the Law of Armed Conflict: Throwing Away the Key?

Journal Placeholder Image

Human RightsTerrorism and Counterterrorism

Torture and the War on Terror: The Need for Consistent Definitions and Legal Remedies

Journal Placeholder Image

The Constitution

Self-Restraint and National Security

Journal Placeholder Image

International Security

The U.S.-China Incidents at Sea Agreement: A Recipe for Disaster

Journal Placeholder Image

International SecurityLaws of War

Can the President and Congress Establish a Legislative Veto Mechanism for Jointly Drawing Down a Long and Controversial War?

Journal Placeholder Image

FISA

From Executive Order to Judicial Approval: Tracing the History of Surveillance of U.S. Persons Abroad in Light of Recent Terrorism Investigations

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

CIA and the Rule of Law

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Dead Contractors: The Un-Examined Effect of Surrogates on the Public’s Casualty Sensitivity

Journal Placeholder Image

CybersecuritySurveillance

Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources

Vol. 5 No. 2

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Outsourcing Covert Activities

Journal Placeholder Image

International SecurityLaws of War

Shadow Wars

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Basic Principles of the War Power

Journal Placeholder Image

International LawLaws of War

The Great War Powers Misconstruction

Journal Placeholder Image

SecrecyTerrorism and Counterterrorism

The Continuing Quandary of Covert Operations

Journal Placeholder Image

International LawInternational Security

Conducting Shadow Wars

Journal Placeholder Image

SecrecyTerrorism and Counterterrorism

Covert War and the Constitution

Journal Placeholder Image

International LawLaws of War

Covert War and the Constitution: A Response

Journal Placeholder Image

Laws of WarSecrecy

The Constitutionality of Covert War: Rebuttals

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

The Evolution of Law and Policy for CIA Targeted Killing

Journal Placeholder Image

SecrecyTerrorism and Counterterrorism

White House Decisionmaking Involving Paramilitary Forces

Journal Placeholder Image

IntelligenceSecrecy

Intelligence Analysis and Planning for Paramilitary Operations

Journal Placeholder Image

SecrecyThe Constitution

Executive Branch Self-Policing in Times of Crisis: The Challenges for Conscientious Legal Analysis

Journal Placeholder Image

IntelligenceSecrecy

Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate

Vol. 5 No. 1

Journal Placeholder Image

Laws of WarThe Constitution

Law Enforcement as a Counterterrorism Tool

Journal Placeholder Image

CybersecuritySecrecy

The Publication of National Security Information in the Digital Age

Journal Placeholder Image

SurveillanceTeaching National Security Law

United States v. Klein: Judging Its Clarity and Application

Journal Placeholder Image

Teaching National Security LawTerrorism and Counterterrorism

Why Klein (Still) Matters: Congressional Deception and the War on Terrorism

Journal Placeholder Image

FISATeaching National Security Law

Constitutional Pathology, the War on Terror, and United States v. Klein

Journal Placeholder Image

International LawInternational Security

Spies Without Borders: International Law and Intelligence Collection

Journal Placeholder Image

International SecurityTeaching National Security Law

The Case of Colonel Abel

Journal Placeholder Image

SecrecyTerrorism and Counterterrorism

Burn After Viewing: The CIA’s Destruction of the Abu Zubaydah Tapes and the Law of Federal Records

Journal Placeholder Image

CybersecuritySecrecy

WikiLeaks, the Proposed SHIELD Act, and the First Amendment

Journal Placeholder Image

Teaching National Security LawThe Constitution

The Next Judge

Vol. 4 No. 2

Journal Placeholder Image

Secrecy

One Lantern in the Darkest Night: The CIA’s Inspector General

Journal Placeholder Image

Laws of War

The Laws of War as a Constitutional Limit on Military Jurisdiction

Journal Placeholder Image

International SecurityTeaching National Security Law

Balancing Security and Liberty in Germany

Journal Placeholder Image

International Security

Security First? Patterns and Lessons from China’s Use of Law To Address National Security Threats

Journal Placeholder Image

International LawInternational Security

The International Standardization of National Security Law

Journal Placeholder Image

Laws of WarTorture

The Sacrificial Yoo: Accounting for Torture in the OPR Report

Journal Placeholder Image

Book Reviews

A Knowledgeable Insider Warns of the Challenges in Shaping Counterterrorism Policies