Vol. 12 No. 3

CybersecurityEmerging Technology

A Multiverse of Metaverses

CybersecurityReligious Extremism

Social Media—A Tool for Terror?

CybercrimeCyberespionage

Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability

Foreign PolicyInternational Security

FDI Like You’re FDR: CFIUS Review Under the Biden Administration’s Rooseveltian Conception of National Security

Military Law

Apparent Unlawful Command Influence: An Unworkable Test for an Untenable Doctrine

CybercrimeCyberespionage

Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations

Defense PolicyForeign Policy

By, With, And Through: Section 1202 and the Future of Unconventional Warfare

COVID-19Human Rights

Guantanamo Detention in the Time of COVID-19

Terrorism and Counterterrorism

“Outside Experts”: Expertise and the Counterterrorism Industry in Social Media Content Moderation

Laws of WarThe Constitution

The Selling of a Precedent: The Past as Constraint on Congressional War Powers?

Law and Security in Space

Olive Branches or Fig Leaves: A Cooperation Dilemma for Great Power Competition in Space