Vol. 7 No. 2

Journal Placeholder Image

Big DataCybersecurity

Symposium Introduction: Swimming in the Ocean of Big Data

Journal Placeholder Image

Big DataFISA

Charting the Future: What to Expect from Big Data

Journal Placeholder Image

Big DataFISA

Big Data Before and After Snowden

Journal Placeholder Image

Big DataCybersecurity

Big Data: It’s Not the Size That Matters

Journal Placeholder Image

Big DataCybersecurity

The Democratization of Big Data

Journal Placeholder Image

Big DataFISA

The NSA and Accountability in an Era of Big Data

Journal Placeholder Image

Big DataFISA

On the Bulk Collection of Tangible Things

Vol. 7 No. 1

Journal Placeholder Image

Secrecy

Discovering the Artichoke: How Mistakes & Omissions Have Blurred the Enabling Intent of the Classified Information Procedures Act

Journal Placeholder Image

Teaching National Security Law

Developing Client-Ready Practitioners: Learning How to Practice National Security Law at Military Law Schools

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Harmonizing Policy & Principle: A Hybrid Model for Counterterrorism

Journal Placeholder Image

International LawLaws of War

Legitimacy Versus Legality Redux: Arming the Syrian Rebels

Journal Placeholder Image

Cybersecurity

Easier Said than Done: Legal Reviews of Cyber Weapons

Vol. 6 No.2

Journal Placeholder Image

Secrecy

Free Speech Aboard the Leaky Ship of State: Calibrating First Amendment Protections for Leakers of Classified Information

Journal Placeholder Image

International Security

Even If It Ain’t Broke, Why Not Fix It? Three Proposed Improvements to the Uniform Code of Military Justice

Journal Placeholder Image

Secrecy

Chutzpah

Journal Placeholder Image

International LawInternational Security

Train Wreck: The U.S. Violation of the Chemical Weapons Convention

Journal Placeholder Image

Teaching National Security Law

Educating National Security Lawyers for the Twenty-first Century: The Intersection of National Security Law and International Affairs

Journal Placeholder Image

Teaching National Security Law

National Security Law Pedagogy and the Role of Simulations

Journal Placeholder Image

CybersecurityInternational Security

The Dark Future of International Cybersecurity Regulation

Journal Placeholder Image

Book ReviewsSecrecy

Unknotting the Tangled Threads of Watergate Lore

Vol. 6 No. 1

Journal Placeholder Image

Human Rights

Preventive Detention in the Law of Armed Conflict: Throwing Away the Key?

Journal Placeholder Image

Human RightsTerrorism and Counterterrorism

Torture and the War on Terror: The Need for Consistent Definitions and Legal Remedies

Journal Placeholder Image

The Constitution

Self-Restraint and National Security

Journal Placeholder Image

International Security

The U.S.-China Incidents at Sea Agreement: A Recipe for Disaster

Journal Placeholder Image

International SecurityLaws of War

Can the President and Congress Establish a Legislative Veto Mechanism for Jointly Drawing Down a Long and Controversial War?

Journal Placeholder Image

FISA

From Executive Order to Judicial Approval: Tracing the History of Surveillance of U.S. Persons Abroad in Light of Recent Terrorism Investigations

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

CIA and the Rule of Law

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Dead Contractors: The Un-Examined Effect of Surrogates on the Public’s Casualty Sensitivity

Journal Placeholder Image

CybersecuritySurveillance

Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources

Vol. 5 No. 2

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Outsourcing Covert Activities

Journal Placeholder Image

International SecurityLaws of War

Shadow Wars

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Basic Principles of the War Power

Journal Placeholder Image

International LawLaws of War

The Great War Powers Misconstruction

Journal Placeholder Image

SecrecyTerrorism and Counterterrorism

The Continuing Quandary of Covert Operations

Journal Placeholder Image

International LawInternational Security

Conducting Shadow Wars

Journal Placeholder Image

SecrecyTerrorism and Counterterrorism

Covert War and the Constitution

Journal Placeholder Image

International LawLaws of War

Covert War and the Constitution: A Response

Journal Placeholder Image

Laws of WarSecrecy

The Constitutionality of Covert War: Rebuttals

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

The Evolution of Law and Policy for CIA Targeted Killing

Journal Placeholder Image

SecrecyTerrorism and Counterterrorism

White House Decisionmaking Involving Paramilitary Forces

Journal Placeholder Image

IntelligenceSecrecy

Intelligence Analysis and Planning for Paramilitary Operations

Journal Placeholder Image

SecrecyThe Constitution

Executive Branch Self-Policing in Times of Crisis: The Challenges for Conscientious Legal Analysis

Journal Placeholder Image

IntelligenceSecrecy

Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate