Laws of WarTerrorism and Counterterrorism
Outsourcing Covert Activities
International SecurityLaws of War
Shadow Wars
Laws of WarTerrorism and Counterterrorism
Basic Principles of the War Power
International LawLaws of War
The Great War Powers Misconstruction
SecrecyTerrorism and Counterterrorism
The Continuing Quandary of Covert Operations
International LawInternational Security
Conducting Shadow Wars
SecrecyTerrorism and Counterterrorism
Covert War and the Constitution
International LawLaws of War
Covert War and the Constitution: A Response
Laws of WarRemote Targeting/Targeted Killing
The Evolution of Law and Policy for CIA Targeted Killing
SecrecyTerrorism and Counterterrorism
White House Decisionmaking Involving Paramilitary Forces
Laws of WarThe Constitution
Law Enforcement as a Counterterrorism Tool
SurveillanceTeaching National Security Law
United States v. Klein: Judging Its Clarity and Application
Teaching National Security LawTerrorism and Counterterrorism
Why Klein (Still) Matters: Congressional Deception and the War on Terrorism
FISATeaching National Security Law
Constitutional Pathology, the War on Terror, and United States v. Klein
International LawInternational Security
Spies Without Borders: International Law and Intelligence Collection
International SecurityTeaching National Security Law
The Case of Colonel Abel
SecrecyTerrorism and Counterterrorism
Burn After Viewing: The CIA’s Destruction of the Abu Zubaydah Tapes and the Law of Federal Records
Teaching National Security LawThe Constitution
The Next Judge
International SecurityTeaching National Security Law
Balancing Security and Liberty in Germany
International LawInternational Security
The International Standardization of National Security Law
CybersecuritySurveillance
Foundational Questions Regarding the Federal Role in Cybersecurity
CyberespionageCybersecurity
A Comparative Study of the Information Security Policies of Japan and the United States
CyberespionageCybersecurity
U.S. International Policy for Cybersecurity: Five Issues That Won’t Go Away
CyberespionageCybersecurity
National Cyber Doctrine: The Missing Link in the Application of American Cyber Power
CybersecurityThe Constitution
Congress’s Role in Cyber Warfare
CybersecurityHuman Rights in Cyberspace
Square Legal Pegs in Round Cyber Holes: The NSA, Lawfulness, and the Protection of Privacy Rights and Civil Liberties in Cyberspace
CybersecurityTeaching National Security Law
Foreword
CybersecurityThe Constitution
Will There Be Cybersecurity Legislation?
CybersecurityHuman Rights in Cyberspace
Cybersecurity and Freedom on the Internet
Laws of WarTerrorism and Counterterrorism
‘This Is Not Your Father’s War’ Confronting the Moral Challenges of ‘Unconventional’ War
Religious ExtremismTeaching National Security Law
Confronting the Ideology of Radical Extremism
Religious ExtremismTerrorism and Counterterrorism
The “War on Terror” Is Over — Now What? Restoring the Four Freedoms as a Foundation for Peace and Security
International LawInternational Security
Charting America’s Return to Public International Law Under the Obama Administration
Terrorism and CounterterrorismThe Constitution
Police and National Security: American Local Law Enforcement and Counterterrorism After 9/11
International LawLaws of War
National Security Law Advice to the New Administration
FISATeaching National Security Law
National Security Advice for a New Administration: Initial Thoughts