Main Edition
The Lexicon of Terror: Crystallization of the Definition of “Terrorism” Through the Lens of Terrorist Financing & The Financial Action Task Force
Juan Zarate and Sarah Watson [*] [Full text of this Article in PDF is available at this link] Introduction It is widely assumed that there is no accepted international definition of terrorism, in part because global views on what constitutes terrorism are so...
Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process
Nadiya Kostyuk and Susan Landau [*] [Full text of this Article in PDF is available at this link] Introduction The Internet presents a serious conundrum. Though well known to have security problems, the network is globally relied upon for commerce and used to control...
Withdrawal from Afghanistan Marks Guantánamo’s Endpoint
David Glazier [*] [Full text of this Article in PDF is available at this link] Introduction The events of September 11, 2001 (9/11) represented a profound shock to both the American public and world legal order. For the first time, a terrorist group—traditionally...
Is Esquire a Higher Clearance than Top Secret?: A Comparison of the Bar Admission and National Security Clearance Processes
John Cook [*] [Full text of this Article in PDF is available at this link] . . . Introduction To work in either the national security field or the legal profession, candidates must endure the substantial hurdle of a highly invasive background check. Submission of the...
Iron Dome and Jus Ad Bellum Proportionality
Shelly Aviv Yeini [*] [Full text of this Article in PDF is available at this link] I. Introduction In earlier times, before the start of battle, soldiers with swords in hand quietly waited for the order to attack. Regardless of whether they won or lost, opposing...
Reverse Distinction: A U.S. Violation of the Law of Armed Conflict in Space
David A. Koplow [*] [Full text of this Article in PDF is available at this link] I. Introduction The theory and practice of “social distancing” were suddenly thrust upon a startled U.S. and global population by the novel coronavirus pandemic in spring 2020, as we...
CFIUS Preemption
Kristen E. Eichensehr [*] [Full text of this Article in PDF is available at this link] I. Introduction In June 2021, Texas enacted the Lone Star Infrastructure Protection Act (LSIPA) to prohibit both companies and Texas governmental entities from entering into...
401–Forbidden: An Empirical Study of Foreign Intelligence Surveillance Act Notices, 1990–2020
Sarah Beller [*] [Full text of this Article in PDF is available at this link] I. Introduction As Professor Xi Xiaoxing and his family slept, a dozen armed Federal Bureau of Investigation (“FBI”) agents broke into their house and arrested him.[1] The government...
Collective Cyber Countermeasures?
Michael N. Schmitt & Sean Watts[*] [Full text of this Article in PDF is available at this link] I. Introduction In May 2019, during remarks at the annual International Conference on Cyber Conflict, Estonian President Kersti Kaljulaid offered her government’s...
Before “National Security”: The Espionage Act of 1917 and the Concept of “National Defense”
Daniel Larsen[*] [Full text of this Article in PDF is available at this link] I. Introduction The Trump Administration’s 2019 indictment of Julian Assange[1] under the Espionage Act of 1917[2] set off a wave of alarm across the press.[3] A decade earlier, the Obama...