Main Edition
Symbiotic Security and Free Speech
Michael J. Glennon [*] [Full text of this Article in PDF is available at this link] Introduction It has long been axiomatic that the Constitution limits only action by the state. Private actors cannot abridge freedom of speech; only the government can be charged with...
Volume 13, Issue 2
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process By Nadiya Kostyuk and Susan Landau In recent decades, the U.S. National Institute of Standards and Technology (NIST), which develops cryptographic standards for...
The Lexicon of Terror: Crystallization of the Definition of “Terrorism” Through the Lens of Terrorist Financing & The Financial Action Task Force
Juan Zarate and Sarah Watson [*] [Full text of this Article in PDF is available at this link] Introduction It is widely assumed that there is no accepted international definition of terrorism, in part because global views on what constitutes terrorism are so...
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
Nadiya Kostyuk and Susan Landau [*] [Full text of this Article in PDF is available at this link] Introduction The Internet presents a serious conundrum. Though well known to have security problems, the network is globally relied upon for commerce and used to control...
Withdrawal from Afghanistan Marks Guantánamo’s Endpoint
David Glazier [*] [Full text of this Article in PDF is available at this link] Introduction The events of September 11, 2001 (9/11) represented a profound shock to both the American public and world legal order. For the first time, a terrorist group—traditionally...
Is Esquire a Higher Clearance than Top Secret?: A Comparison of the Bar Admission and National Security Clearance Processes
John Cook [*] [Full text of this Article in PDF is available at this link] . . . Introduction To work in either the national security field or the legal profession, candidates must endure the substantial hurdle of a highly invasive background check. Submission of the...
Iron Dome and Jus Ad Bellum Proportionality
Shelly Aviv Yeini [*] [Full text of this Article in PDF is available at this link] I. Introduction In earlier times, before the start of battle, soldiers with swords in hand quietly waited for the order to attack. Regardless of whether they won or lost, opposing...
Reverse Distinction: A U.S. Violation of the Law of Armed Conflict in Space
David A. Koplow [*] [Full text of this Article in PDF is available at this link] I. Introduction The theory and practice of “social distancing” were suddenly thrust upon a startled U.S. and global population by the novel coronavirus pandemic in spring 2020, as we...
CFIUS Preemption
Kristen E. Eichensehr [*] [Full text of this Article in PDF is available at this link] I. Introduction In June 2021, Texas enacted the Lone Star Infrastructure Protection Act (LSIPA) to prohibit both companies and Texas governmental entities from entering into...
401–Forbidden: An Empirical Study of Foreign Intelligence Surveillance Act Notices, 1990–2020
Sarah Beller [*] [Full text of this Article in PDF is available at this link] I. Introduction As Professor Xi Xiaoxing and his family slept, a dozen armed Federal Bureau of Investigation (“FBI”) agents broke into their house and arrested him.[1] The government...