Justin Malzac[*] [This essay is available in PDF at this link] “It’s always easier to stamp out a small ember than to put out a raging fire.” [1] — Lloyd Austin, Secretary of Defense Introduction Influence operations, including propaganda and psychological operations, have been a central aspect of international rivalry for over a century. Emphasis […]
The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China’s Culpability, Part IV: Questions for the Record—Federal Government Response to Coronavirus and U.S. Public Health Leadership Role
Chimène Keitner[*] [This essay is available in PDF at this link] Introduction On June 23, 2020, the Senate Judiciary Committee held a hearing on “The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China’s Culpability.”[1] Professor Chimène Keitner submitted written testimony, answered questions at the hearing, and provided written responses to follow-up Questions for the Record from […]
3D Printed Speech: 3D-Printer Code Under Constitutional Scrutiny
Andrew Huang[*] [This article is available in PDF at this link] I. Introduction In May 2013, at a remote firing range deep in central Texas, there was silence. Then, a sharp crack reverberated across the prairieland as engineers led by then-25-year-old Cody Wilson successfully test-fired the world’s first entirely 3D-printed gun for the very first […]
The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China’s Culpability, Part III: Questions for the Record—Private Litigation Will Likely Fail to Secure Relief for U.S. Victims
Chimène Keitner[*] [This essay is available in PDF at this link] Introduction On June 23, 2020, the Senate Judiciary Committee held a hearing on “The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China’s Culpability.”[1] Professor Chimène Keitner submitted written testimony, answered questions at the hearing, and provided written responses to follow-up Questions for the Record from […]
Shining Light on the “Going Dark” Phenomenon: U.S. Efforts to Overcome the Use of End-to-End Encryption by Islamic State Supporters
Ryan Pereira [*] [This article is available as a PDF at this link.] Introduction On May 3, 2015, two individuals committed to the Islamic State (IS) and armed with high-powered assault rifles opened fire at a contest for cartoon depictions of the Prophet Muhammad held in Garland, Texas.[1] The two gunmen injured an off-duty police […]
Postwar
Robert M. Chesney* The following is a re-posting of a Volume 5 print article by Robert M. Chesney, the full text of which is available at this link. The article is newly relevant in light of the current situation in Afghanistan. Abstract Does it really matter, from a legal perspective, whether the U.S. government continues […]