A Sheep In Wolf’s Clothing: Assessing The Dangerous, Hidden, and Increasing Defects of the Iran Nuclear Agreement Review Act
Article
David Jonas provides “A Nuclear Nonproliferation Primer”
Book
National Security Intelligence and Ethics
Article
Are Your Export Classifications Up to Date? New Export Controls, Including on Cybersecurity Software and Technologies, May Impact International Business Opportunities
Managing Intellectual Property Relevant to Operating and Sustaining Major U.S. Air Force Weapon Systems
Data Rights Relevant to Weapon Systems in Air Force Special Operations Command
Building Cyber Walls: Executive Emergency Powers in Cyberspace
Article
United States sanctions against Myanmar’s military conglomerates
Article
Torture Evidence and the Guantanamo Military Commissions
Article
The Evolution and Jurisprudence of The Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review
Article
Federal Courts: Art. III(1), Art. I(8), Art. IV(3)(2), Art. II(2)/I(8)(3), and Art. II(1) Adjudication
Paper
Reverse Distinction: A U.S. Violation of the Law of Armed Conflict in Space
The Rise of the ‘Fifth Fight’ in Cyberspace: A New Legal Framework and Implications for Great Power Competition
Paper
Complicity and Lesser Evils: A Tale of Two Lawyers
Policies that support forestlandscape restoration
Pandemics and Human Rights
The President and Nuclear Weapons: Authorities, Limits, and Process
Paper
Personality Disruption as Mental Torture: The CIA, Interrogational Abuse, and the U.S. Torture Act
Book
Law of Armed Conflict: An Operational Approach
Paper
Functional Equivalence and Residual Rights Post-Carpenter: Framing a Test Consistent with Precedent and Original Meaning
Paper
The Illicit Antiquities Trade and Terrorism Financing: From the Khmer Rouge to Daesh
Paper
The Fourth Amendment in a Digital World
Article
The Case for Reforming Section 702 of U.S. Foreign Intelligence Surveillance Law
‘Blood Antiquities’: Protecting Cultural Heritage beyond Criminalization