Vol. 7 No. 3

Journal Placeholder Image

Book ReviewsIntelligence

Setting the Record Straight: An In-Depth Review of “Duty” by Robert Gates

Journal Placeholder Image

IntelligenceSecrecy

A Proposal to Reduce Government Overclassification of Information Related to National Security

Journal Placeholder Image

Cybersecurity

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Journal Placeholder Image

Laws of WarRemote Targeting/Targeted Killing

“On Target”: Precision & Balance in the Contemporary Law of Targeting

Journal Placeholder Image

Laws of War

Of Guns & Grotius

Journal Placeholder Image

International LawInternational Security

Addressing the Guantanamo “Legacy Problem”: Bringing Law-of-War Prolonged Military Detention & Criminal Prosecution into Closer Alignment

Vol. 7 No. 2

Journal Placeholder Image

Big DataCybersecurity

Symposium Introduction: Swimming in the Ocean of Big Data

Journal Placeholder Image

Big DataFISA

Charting the Future: What to Expect from Big Data

Journal Placeholder Image

Big DataFISA

Big Data Before and After Snowden

Journal Placeholder Image

Big DataCybersecurity

Big Data: It’s Not the Size That Matters

Journal Placeholder Image

Big DataCybersecurity

The Democratization of Big Data

Journal Placeholder Image

Big DataFISA

The NSA and Accountability in an Era of Big Data

Journal Placeholder Image

Big DataFISA

On the Bulk Collection of Tangible Things

Vol. 7 No. 1

Journal Placeholder Image

Secrecy

Discovering the Artichoke: How Mistakes & Omissions Have Blurred the Enabling Intent of the Classified Information Procedures Act

Journal Placeholder Image

Teaching National Security Law

Developing Client-Ready Practitioners: Learning How to Practice National Security Law at Military Law Schools

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Harmonizing Policy & Principle: A Hybrid Model for Counterterrorism

Journal Placeholder Image

International LawLaws of War

Legitimacy Versus Legality Redux: Arming the Syrian Rebels

Journal Placeholder Image

Cybersecurity

Easier Said than Done: Legal Reviews of Cyber Weapons

Vol. 6 No.2

Journal Placeholder Image

Secrecy

Free Speech Aboard the Leaky Ship of State: Calibrating First Amendment Protections for Leakers of Classified Information

Journal Placeholder Image

International Security

Even If It Ain’t Broke, Why Not Fix It? Three Proposed Improvements to the Uniform Code of Military Justice

Journal Placeholder Image

Secrecy

Chutzpah

Journal Placeholder Image

International LawInternational Security

Train Wreck: The U.S. Violation of the Chemical Weapons Convention

Journal Placeholder Image

Teaching National Security Law

Educating National Security Lawyers for the Twenty-first Century: The Intersection of National Security Law and International Affairs

Journal Placeholder Image

Teaching National Security Law

National Security Law Pedagogy and the Role of Simulations

Journal Placeholder Image

CybersecurityInternational Security

The Dark Future of International Cybersecurity Regulation

Journal Placeholder Image

Book ReviewsSecrecy

Unknotting the Tangled Threads of Watergate Lore

Vol. 6 No. 1

Journal Placeholder Image

Human Rights

Preventive Detention in the Law of Armed Conflict: Throwing Away the Key?

Journal Placeholder Image

Human RightsTerrorism and Counterterrorism

Torture and the War on Terror: The Need for Consistent Definitions and Legal Remedies

Journal Placeholder Image

The Constitution

Self-Restraint and National Security

Journal Placeholder Image

International Security

The U.S.-China Incidents at Sea Agreement: A Recipe for Disaster

Journal Placeholder Image

International SecurityLaws of War

Can the President and Congress Establish a Legislative Veto Mechanism for Jointly Drawing Down a Long and Controversial War?

Journal Placeholder Image

FISA

From Executive Order to Judicial Approval: Tracing the History of Surveillance of U.S. Persons Abroad in Light of Recent Terrorism Investigations

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

CIA and the Rule of Law

Journal Placeholder Image

Laws of WarTerrorism and Counterterrorism

Dead Contractors: The Un-Examined Effect of Surrogates on the Public’s Casualty Sensitivity

Journal Placeholder Image

CybersecuritySurveillance

Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources