Vol. 12 No. 2

CyberespionageCybersecurity

Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy

Refugees and ImmigrationTerrorism and Counterterrorism

Turning US Vetting Capabilities and International Information-Sharing to Counter Foreign White Supremacist Terror Threats

Laws of War

War, What is it Good For? Almost Everything: Chinese Strategic Thought and a New U.S. Approach to Gray Zone Competition

Journal Placeholder Image

Big DataEmerging Technology

Layered Opacity: Criminal Legal Technology Exacerbates Disparate Impact Cycles and Prevents Trust

Foreign PolicyInternational Law

Assessment of National Security Concerns in the Acquisition of U.S. and U.K. Assets

Foreign PolicyIntelligence

Information Lawfare: Messaging and the Moral High Ground

The Constitution

Roosevelt’s “Limited” National Emergency: Crisis Powers in the Emergency Proclamation and Economic Studies of 1939

The Constitution

Reviving Liberal Constitutionalism With Originalism in Emergency Powers Doctrine

Journal Placeholder Image

Terrorism and Counterterrorism

Rethinking U.S. Efforts on Counterterrorism: Toward a Sustainable Plan Two Decades After 9/11