Volume 13, Issue 2

Volume 13, Issue 2

Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process By Nadiya Kostyuk and Susan Landau In recent decades, the U.S. National Institute of Standards and Technology (NIST), which develops cryptographic standards for...
Volume 12, Issue 2

Volume 12, Issue 2

The Evolution and Jurisprudence of the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review by Laura K. Donohue The past eight years have witnessed an explosion in the number of publicly-available opinions and orders issued by...
Volume 13, Issue 2

Volume 12, Issue 1

Pro-Constitutional Engagement: Judicial Review, Legislative Avoidance and Institutional Interdependence in National Security by Nino Guruli This paper examines the role of legislatures and how judicial review can prompt legislative activity. In the national security...
Volume 11, Issue 3

Volume 11, Issue 3

Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act’s Metadata Program be Extended? by Susan Landau & Asaf Lubin Edward Snowden’s disclosure of National Security Agency (“NSA”) bulk collection of communications metadata was a highly...
Volume 11, Issue 1

Volume 11, Issue 1

A Comparative Study of Domestic Laws Constraining Private Sector Active Defense Measures in Cyberspace by Brian Corcoran The U.S. private sector is vulnerable in cyberspace. In response, an increasingly mainstream national security argument calls for amending U.S. law...
Volume 10, Issue 2

Volume 10, Issue 2

Issue 2 Totemic Functionalism in Foreign Affairs Law by Elad D. Gil In many Western democracies, and particularly in the United States, foreign affairs are primarily an executive enterprise. Owing to the executive’s relative institutional advantages over the...