Main Edition
Collective Cyber Countermeasures?
Michael N. Schmitt & Sean Watts[*] [Full text of this Article in PDF is available at this link] I. Introduction In May 2019, during remarks at the annual International Conference on Cyber Conflict, Estonian President Kersti Kaljulaid offered her government’s...
Before “National Security”: The Espionage Act of 1917 and the Concept of “National Defense”
Daniel Larsen[*] [Full text of this Article in PDF is available at this link] I. Introduction The Trump Administration’s 2019 indictment of Julian Assange[1] under the Espionage Act of 1917[2] set off a wave of alarm across the press.[3] A decade earlier, the Obama...
Contemptuous Speech: Rethinking the Balance Between Good Order and Discipline and the Free Speech Rights of Retired Military Officers
Pavan S. Krishnamurthy & Javier Perez[*] [Full text of this Article in PDF is available at this link] I. Introduction On June 3, 2020, General (ret.) James Mattis addressed protesters who were physically dispersed from Lafayette Square to facilitate what he...
The Evolution and Jurisprudence of the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review
Laura K. Donohue[*] [Full text of this Article in PDF is available at this link] I. Introduction In 1978, Congress passed the Foreign Intelligence Surveillance Act (FISA) to govern domestic electronic intercepts undertaken for foreign intelligence purposes.[1] The...
Direct Participation in Hostilities in the Age of Cyber: Exploring the Fault Lines
Brig. Gen. (ret.) David Wallace, Col. Shane Reeves, and Maj. Trent Powell [*] [Full text of this Article in PDF is available at this link] I. Introduction Civilians contribute to nearly every war effort, and always have. Throughout history, non-military personnel...
Gray Zone Tactics and the Principle of Non-Intervention: Can “One of the Vaguest Branches of International Law” Solve the Gray Zone Problem?
Elizabeth K. Kiessling[*] [Full text of this Article in PDF is available at this link] I. Introduction States increasingly use their military forces to execute “gray zone tactics” in pursuit of strategic objectives.[1] These tactics exceed the limits of accepted...
No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order 12,333
Mark M. Jaycox[*] [Full text of this Article in PDF is available at this link] I. Introduction In 2013, investigative journalists disclosed that the U.S. government had used section 215 of the USA PATRIOT Act as authorization for a now-defunct surveillance program...
Pro-Constitutional Engagement
Nino Guruli[*] [Full text of this Article in PDF is available at this link] I. Introduction There is a common refrain in U.S. legal scholarship that an assertive exercise of judicial power in matters of national security jeopardizes established institutional...
Bilateral Defense-Related Treaties and the Dilemma Posed by the Law of Neutrality
Jeremy K. Davis[*] [Full text of this Article in PDF is available at this link] I. Introduction In the early morning hours of January 3, 2020, an American MQ-9 Reaper drone fired several missiles into a motor vehicle convoy leaving Baghdad International Airport.[1]...
Unnamed & Uncharged: Next Friend Standing and the Anonymous Detainee
Scott Harman-Heath[*] [Full text of this Article in PDF is available at this link] Introduction For nearly three months beginning in September 2017, the United States detained a U.S. citizen “unnamed, uncharged, and, despite his request, without access to...