Featured

on February 6, 2014 at 5:36 pm

The Current Landscape of Cybersecurity Policy: Legislative Issues in the 113th Congress

Mitchell S. Kominsky, Counsel for the U.S. House Committee on Oversight and Government Reform, discusses the state of cybersecurity legislation and the evolving nature of cyber policy. Image courtesy of Getty Images.

Read more ›
on February 3, 2014 at 3:07 pm

Shari’a Courts Move to the Battlefield: Jabhat al-Nusra Opens a Legal Front in the Syrian Civil War

Corri Zoli and Emily Schneider untangle the infighting between rival groups in Syria and the calls to use Shari’a to mediate the conflicts on the battlefield. Image courtesy of Wikimedia Commons.

Read more ›
on January 11, 2014 at 9:12 am

Volume 5, Issue 1

Volume 5, Issue 1 of the Harvard National Security Journal is now available online!

Read more ›
on October 24, 2013 at 8:35 pm

Lessons for Israel from Ancient Chinese Military Thought: Facing Iranian Nuclearization with Sun-Tzu

Professor Louis René Beres brings to bear two classical traditions to apply them to Israeli strategic planning. In this article, he takes a fresh look at Sun-Tzu’s The Art of War and weaves in Greek dialectical reasoning. Image courtesy of Wikimedia Commons.

Read more ›
on August 26, 2013 at 4:54 pm

Striking Hezbollah-Bound Weapons in Syria: Israel’s Actions Under International Law

Professor Louis René Beres considers Israeli actions in response to threats emanating from Syria, Lebanon, and Iran in the contexts of weapons transfers, missile attacks, and an increasingly volatile situation in Syria. Map courtesy of Google Maps.

Read more ›
on May 12, 2013 at 5:55 pm

On Wikipedia, Lawfare, Blogs, and Sources

Benjamin Wittes and Stephanie Leutert discuss the stifling effects of Wikipedia censorship on the national discussion of Lawfare. Photo courtesy of Reuters

Read more ›
on January 7, 2012 at 3:30 pm

Volume 3, Issue 1

Volume 3, Issue 1 of the Harvard National Security Journal is now available online. The articles will be available on Westlaw and HeinOnline shortly.  

Read more ›
on March 16, 2011 at 3:48 pm

Untangling Attribution

David D. Clark and Susan Landau consider how cyberexploitations and cyberattacks might be traced by linking people to packets and conclude that such a linkage would be a mistake. They discuss how other technical contributions to cyber attribution can only be contemplated in the larger regulatory context of various legal jurisdictions.

Read more ›
on March 1, 2011 at 5:54 am

Cybersecurity: Law, Privacy, and Warfare in a Digital World

A Harvard National Security Journal Symposium on March 4, 2011 (Live webcast)

Read more ›
on February 27, 2011 at 5:12 pm

Software: The Broken Door of Cyberspace Security

Harvard National Security Fellow Fred D. Taylor, Jr. suggests the government take a more active role in promoting quality software design and development.

Read more ›