{"id":514,"date":"2009-11-17T14:49:09","date_gmt":"2009-11-17T21:49:09","guid":{"rendered":"http:\/\/www.harvardnsj.com\/?page_id=514"},"modified":"2022-08-19T10:27:27","modified_gmt":"2022-08-19T14:27:27","slug":"volumes","status":"publish","type":"page","link":"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/","title":{"rendered":"In the Journal"},"content":{"rendered":"<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-13\">Volume 13<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Eichensehr-CFIUSPreemption.pdf\">CFIUS Preemption<\/a><br \/>\nby Kristen E. Eichensehr<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Koplow-ReverseDistinction.pdf\">Reverse Distinction: A U.S. Violation of the Law of Armed Conflict in Space<\/a><br \/>\nby David A. Koplow<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Yeini-IronDome.pdf\">Iron Dome and\u00a0<em>Jus Ad Bellum<\/em>\u00a0Proportionality<\/a><br \/>\nby Shelly Aviv Yeini<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Beller-401Forbidden.pdf\">401\u2013Forbidden: An Empirical Study of Foreign Intelligence Surveillance Act Notices, 1990\u20132020<\/a><br \/>\nby Sarah Beller<\/p>\n<h1><strong>Issue 2<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf\">Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process<\/a><br \/>\nby Nadiya Kostyuk and Susan Landau<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Glazier_WithdrawalFromAfghanistan.pdf\">Withdrawal from Afghanistan Marks Guant\u00e1namo\u2019s Endpoint<\/a><br \/>\nby David Glazier<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Zarate-Watson_LexiconOfTerror.pdf\">The Lexicon of Terror: Crystallization of the Definition of \u201cTerrorism\u201d Through the Lens of Terrorist Financing &amp; The Financial Action Task Force<\/a><br \/>\nby Juan Zarate and Sarah Watson<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Cook_IsEsquireAHigherClearance.pdf\">Is Esquire a Higher Clearance than Top Secret?: A Comparison of the Bar Admission and National Security Clearance Processes<\/a><br \/>\nby John Cook<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-12\">Volume 12<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Guruli-Pro-Constitutional-Engagement.pdf\">Pro-Constitutional Engagement: Judicial Review, Legislative Avoidance and Institutional Interdependence in National Security<\/a><br \/>\nby Nino Guruli<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Jaycox-No-Oversight-No-Limits-No-Worries.pdf\">No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order 12,333<\/a><br \/>\nby Mark M. Jaycox<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Kiessling-Gray-Zone-Tactics-and-the-Principle-of-Non-Intervention.pdf\">Gray Zone Tactics and the Principle of Non-Intervention: Can \u201cOne of the Vaguest Branches of International Law\u201d Solve the Gray Zone Problem?<\/a><br \/>\nby Elizabeth K. Kiessling<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Wallace-Reeves-and-Powell-Direct-Participation-in-Hostilities-in-the-Age-of-Cyber.pdf\">Direct Participation in Hostilities in the Age of Cyber: Exploring the Fault Lines<\/a><br \/>\nby Brig. Gen. (ret.) David Wallace, Col. Shane Reeves, and Maj. Trent Powell<\/p>\n<h1>Issue 2<\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Donohue-The-Evolution-and-Jurisprudence-of-FISC-and-FISCR.pdf\">The Evolution and Jurisprudence of the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review<\/a><br \/>\nby Laura K. Donohue<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Krishnamurthy-and-Perez-Contemptuous-Speech.pdf\">Contemptuous Speech: Rethinking the Balance Between Good Order and Discipline and the Free Speech Rights of Retired Military Officers<\/a><br \/>\nby Pavan S. Krishnamurthy &amp; Javier Perez<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Larsen-Before-22National-Security22.pdf\">Before \u201cNational Security\u201d: The Espionage Act of 1917 and the Concept of \u201cNational Defense\u201d<\/a><br \/>\nby Daniel Larsen<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Schmitt-and-Watts-Collective-Cyber-Countermeasures.pdf\">Collective Cyber Countermeasures?<\/a><br \/>\nby Michael N. Schmitt and Sean Watts<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-11\/\">Volume 11<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/CORCORAN_Vol.-11.1.pdf\">A Comparative Study of Domestic Laws Constraining Private Sector Active Defense Measures in Cyberspace<\/a><br \/>\nby Brian Corcoran<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/STIGALL_Vol.-11.1-v3.pdf\">The Syrian Detention Conundrum:\u00a0International and Comparative Legal Complexities<\/a><br \/>\nby Dan E. Stigall<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/KREBS_Vol.-11.1.pdf\">Law Wars:\u00a0Experimental Data on the Impact of Legal Labels on Wartime Event Beliefs<\/a><br \/>\nby Shiri Krebs<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/PROULX_Vol.-11.1.pdf\">A Postmortem for International Criminal Law? Terrorism, Law and Politics, and the Reaffirmation of State Sovereignty<\/a><br \/>\nby\u00a0Vincent-Jo\u00ebl Proulx<\/p>\n<h1>Issue 2: Student Articles Edition<\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/04\/first-amendment-sentence-mitigation-beyond-a-public-accountability-defense-for-whistleblowers\/\">First Amendment Sentence Mitigation: Beyond a Public Accountability Defense for Whistleblowers<\/a><br \/>\nby Mailyn Fidler<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/04\/defense-and-deference-empirically-assessing-judicial-review-of-freedom-of-information-acts-national-security-exemption\/\">Defense and Deference: Empirically Assessing Judicial Review of Freedom of Information Act\u2019s National Security Exemption<\/a><br \/>\nby Paulina Perlin<\/p>\n<h1>Issue 3<\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/06\/examining-the-anomalies-explaining-the-value-should-the-usa-freedom-acts-metadata-program-be-extended\/\">Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act\u2019s Metadata Program be Extended?<\/a><br \/>\nby\u00a0Susan Landau &amp; Asaf Lubin<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/06\/defending-against-the-military-the-posse-comitatus-acts-exclusionary-rule\/\">Defending Against the Military: The Posse Comitatus Act\u2019s Exclusionary Rule<\/a><br \/>\nby\u00a0Anthony J. Ghiotto<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/06\/unnamed-uncharged-next-friend-standing-and-the-anonymous-detainee\/\">Unnamed &amp; Uncharged: Next Friend Standing and the Anonymous Detainee<\/a><br \/>\nby Scott Harman-Heath<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/06\/bilateral-defense-related-treaties-and-the-dilemma-posed-by-the-law-of-neutrality\/\">Bilateral Defense-Related Treaties and the Dilemma Posed by the Law of Neutrality<\/a><br \/>\nby Jeremy K. Davis<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-10\/\">Volume 10<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Yemen-Is-the-U.S.-Breaking-the-Law.pdf\">Yemen: Is the U.S. Breaking the Law?<\/a><br \/>\nby Oona Hathaway,\u00a0Aaron Haviland, Srinath Reddy Kethireddy and Alyssa T. Yamamoto<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Return-of-Gunboat-Diplomacy.pdf\">The Return of Gunboat Diplomacy: How the West has Undermined the Ban on the Use of Force<\/a><br \/>\nby Patrick C. R. Terry<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Uncertainty-in-the-Law-of-Targeting.pdf\">Uncertainty in the Law of Targeting: Towards a Cognitive Framework<\/a><br \/>\nby Michael N. Schmitt and Major Michael Schauss<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/War-Powers-far-from-a-Hot-Battlefield.pdf\">War Powers far from a Hot Battlefield: Checks and Balances on Presidential War-Making through Individual and Unit Self-Defense<\/a><br \/>\nby E. L. Gaston<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Fiduciary-Duty-Honor-Country.pdf\">Fiduciary Duty, Honor, Country: Legislating a Theory of Agency into Strategic Civil-Military Relations<\/a><br \/>\nby Major Dan Maurer<\/p>\n<h1><strong>Issue 2<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Totemic-Functionalism-in-Foreign-Affairs-Law.pdf\">Totemic Functionalism in Foreign Affairs Law<\/a><br \/>\nby Elad D. Gil<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Getting-Past-the-Imperial-Presidency.pdf\">Getting Past the Imperial Presidency<\/a><br \/>\nby Deborah Pearlstein<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Mutual-Assistance-Clauses-of-the-North-Atlantic-and-EU-Treaties.pdf\">The Mutual Assistance Clauses of the North Atlantic and EU Treaties: The Challenge of Hybrid Threats<\/a><br \/>\nby Aurel Sari<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Law-Enforcement-Paradigm-under-the-Laws-of-Armed-Conflict.pdf\">The Law Enforcement Paradigm under the Laws of Armed Conflict: Conceptualizing Yesh Din v. IDF Chief of Staff<\/a><br \/>\nby Shelly Aviv Yeini<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-9\/\">Volume 9<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/1_Trenga_StateSecrets-2.pdf\">What Judges Say and Do in Deciding National Security Cases: The Example of the State Secrets Privilege<br \/>\n<\/a>by Judge Anthony John Trenga<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/2_SchmittHighfill_Invisible-Injuries-1.pdf\">Invisible Injuries: Concussive Effects and International Humanitarian Law<br \/>\n<\/a>by Professor Michael N. Schmitt and Major Chad E. Highfill<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/3_Revkin_WhenTerroristsGovern-2.pdf\">When Terrorists Govern: Protecting Civilians in Conflicts with State-Building Armed Groups<br \/>\n<\/a>by Mara R. Revkin<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/4_Kilovaty_Doxfare-1.pdf\">Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information<br \/>\n<\/a>by Ido Kilovaty<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/5_Lawless_StateofComplicity-1.pdf\">A State of Complicity: How Russia\u2019s Persistent and Public Denial of Syrian Battlefield Atrocities Violates International Law<br \/>\n<\/a>by Captain Robert Lawless<\/p>\n<h2><strong>Issue 2<\/strong><\/h2>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/WakelyIndorf_CFIUS_05.28.18.pdf\">Managing National Security Risk in an Open Economy: Reforming the Committee on Foreign Investment in the United States<\/a><br \/>\nby Jonathan Wakely &amp; Andrew Indorf<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/2_Crootof_LimitsOfAnalogy_06.08.18.pdf\">Autonomous Weapon Systems and the Limits of Analogy<\/a><br \/>\nby Rebecca Crootof<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/3_Colangelo_DutyToDisobey_06.08.18.pdf\">The Duty to Disobey Illegal Nuclear Strike Orders<\/a><br \/>\nby Anthony J. Colangelo<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/4_Fabbrini_NatoObligations_06.08.18.pdf\">Do NATO Obligations Trump European Budgetary Constraints?<\/a><br \/>\nby Federico Fabbrini<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/5_Fahey_AccessControl_06.08.18.pdf\">Access Control: Freedom of the Seas in the Arctic and the Russian Northern Sea Route Regime<\/a><br \/>\nby Sean Fahey<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-8\/\">Volume 8<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/1.-Berkell.pdf\">Off-Ramp Opportunities in Material Support Cases<\/a><br \/>\nby Kelly A. Berkell<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/2.-Klein_Flinn.pdf\">Social Media Compliance Programs and the War Against Terrorism<\/a><br \/>\nby Susan Klein and Crystal Flinn<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Casavant_MDLEA.pdf\">In Defense of the U.S. Maritime Drug Law Enforcement Act: A Justification for the Law\u2019s Extraterritorial Reach<\/a><br \/>\nby Lieutenant Commander Aaron J. Casavant<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/4.-Koplow.pdf\">Eve of Destruction: Implementing Arms Control Treaty Obligations to Dismantle Weaponry<\/a><br \/>\nby David A. Koplow<\/p>\n<h2>Issue 2<\/h2>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Schmitt-NSJ-Vol-8.pdf\">Peacetime Cyber Responses and and Wartime Cyber Operations under International Law: An Analytical\u00a0<em>Vade Mecum<\/em><br \/>\n<\/a>by Michael N. Schmitt<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Gaston-NSJ-Vol-8.pdf\">Reconceptualizing Individual or Unit Self-Defense as a Combatant Privilege<\/a><br \/>\nby E. L. Gaston<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Beer-NSJ-Vol-8.pdf\">Military Strategy: The Blind Spot of International Humanitarian Law<\/a><br \/>\nby Yishai Beer<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Schuller-NSJ-Vol-8.pdf\">At the Crossroads of Control: The Intersection of Artificial Intelligence in Autonomous Weapon Systems with International Humanitarian Law<\/a><br \/>\nby Alan L. Schuller<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Andresen-NSJ-Vol-8.pdf\">Putting Lethal Force on the Table: How Drones Change the Alternative Space of War and Counterterrorism<\/a><br \/>\nby Joshua Andresen<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-7\/\">Volume 7<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Deeks-PUBLISH.pdf\">Intelligence Communities, Peer Constraints and the Law<\/a><br \/>\nby\u00a0Ashley Deeks<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Fields-PUBLISH.pdf\">Article 234 of the United Nations Convention on the Law of the Sea: the Overlooked Linchpin for Achieving Safety and Security in the U.S. Arctic?<\/a><br \/>\nby Stanley P. Fields<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Almond-PUBLISH.pdf\">Clearing the Air Above the East China Sea: the Primary Elements of Aircraft Defense Identification Zones<\/a><br \/>\nby\u00a0Roncevert Almond<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Avriel-PUBLISH.pdf\">Terrorism 2.0: the Rise of the Civilitary Battlefield<\/a><br \/>\nby\u00a0Gil Avriel<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/05\/Rudesill-Secret-Law.pdf\">Coming to Terms with Secret Law<\/a><br \/>\nby Dakota S. Rudesill<\/p>\n<h2>Issue 2<\/h2>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Carlin-FINAL.pdf\">Detect, Disrupt, Deter: A Whole-of-Government Approach to\u00a0National Security Cyber Threats<\/a><br \/>\nby John P. Carlin<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Debarre-FINAL.pdf\">U.S.-Hired Private Military and Security Companies in Armed Conflict: Indirect Participation and its Consequences<\/a><br \/>\nby Alice S. Debarre<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Richemond-Barak-and-Feinberg-FINAL-JM.pdf\">The Irony of the Iron Dome:\u00a0Intelligent Defense Systems, Law, and Security<\/a><br \/>\nby\u00a0Daphn\u00e9 Richemond-Barak &amp;\u00a0Ayal Feinberg<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Combe-FINAL.pdf\">Traditional Military Activities in Cyberspace: The Scope of Conventional Military Authorities in the Unconventional Battlespace<\/a><br \/>\nby\u00a0Peter C. Combe II<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Whittemore.pdf\">Proportionality Decision Making in Targeting: Heuristics, Cognitive Biases, and the Law<\/a><br \/>\nby\u00a0Luke A. Whittemore<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volumes\/volume-6\/\">Volume 6<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Brand.pdf\">Eavesdropping On Our Founding Fathers: How a Return to the Republic\u2019s Core Democratic Values Can Help Us Resolve the Surveillance Crisis<\/a><br \/>\nby Jeffrey Brand<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Greene-Vol6.pdf\">Federal Enforcement of Mass Involuntary Quarantines: Toward a Specialized Standing Rules for the Use of Force<\/a><br \/>\nby Jesse T. Greene<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Schlanger.pdf\">Intelligence Legalism and the National Security Agency\u2019s Civil Liberties Gap<\/a><br \/>\nby Margo Schlanger<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Alcala-Vol6.pdf\">Babylon Revisited: Reestablishing a Corps of Cultural Property Specialists for the Protection of Cultural Property in Armed Conflict<\/a><br \/>\nby\u00a0Ronald T.P. Alcala<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Pearlman.pdf\">Meaningful Review and Process Due: How Guantanamo Detention is Changing the Battlefield<\/a><br \/>\nby\u00a0Adam Pearlman<\/p>\n<h2>Issue 2<\/h2>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Sloane.pdf\">Puzzles of Proportion and the \u201cReasonable Military Commander\u201d: Reflections on the Law, Ethics, and Geopolitics of Proportionality<\/a><br \/>\nby Robert Sloane<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Curran.pdf\">Spillover: Evolving Threats and Converging Legal Authorities in the Fight Against Mexican Drug Cartels<\/a><br \/>\nby Christopher Curran<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Helal1.pdf\">Am I My Brother\u2019s Keeper? The Reality, Tragedy, and Future of Collective Security<\/a><br \/>\nby Mohamed Helal<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Chayes.pdf\">Rethinking Warfare: The Ambiguity of Cyber Attacks<\/a><br \/>\nby Antonia Chayes<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volume5\/\">Volume 5<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Glennon-Final.pdf\">National Security and Double Government<\/a><br \/>\nby Michael J. Glennon<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Daskal-Vladeck-Final1.pdf\">After the AUMF<\/a><br \/>\nby Jennifer Daskal and Stephen I. Vladeck<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Aziz-Final.pdf\">Policing Terrorists in the Community<\/a><br \/>\nby Sahar F. Aziz<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Modirzadeh-Final.pdf\">Folk International Law: 9\/11 Lawyering and the Transformation of the Law of Armed Conflict to Human Rights Policy and Human Rights Law to War Governance<\/a><br \/>\nby Naz K. Modirzadeh<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Chesney-Final.pdf\">Postwar<\/a><br \/>\nby Robert M. Chesney<\/p>\n<h1><strong>Issue 2<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Harvey-Foreword.pdf\">Foreword<\/a><br \/>\nby Harvey Rishikof<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Schmitt-Wall-International-Law-of-Unconventional-Statecraft.pdf\">The International Law of Unconventional Statecraft<\/a><br \/>\nby Michael N. Schmitt and Andru E. Wall<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Adams-Jus-Extra-Bellum.pdf\">Jus Extra Bellum: Reconstructing the Ordinary, Realistic Conditions of Peace<\/a><br \/>\nby Michael Jefferson Adams<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Huntley-Levitz-Controlling-the-Use-of-Power-in-the-Shadows.pdf\">Controlling the Use of Power in the Shadows: Challenges in the Application of Jus in Bello to Clandestine and Unconventional Warfare Activities<\/a><br \/>\nby Todd C. Huntley and Andrew D. Levitz<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Bart-Special-Operations-Forces.pdf\">Special Operations Forces and Responsibility for Surrogates\u2019 War Crimes<\/a><br \/>\nby Gregory Raymond Bart<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Bahar-Presidential-Intervention-Principle.pdf\">The Presidential Intervention Principle: The Domestic Use of the Military and the Power of the Several States<\/a><br \/>\nby Michael Bahar<\/p>\n<h1><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/volume-4\/\">Volume 4<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/01\/Vol-4-Brown-FINAL.pdf\">Notes on a Terrorism Trial \u2013 Preventive Prosecution, \u201cMaterial Support\u201d and The Role of The Judge after United States v. Mehanna<\/a><br \/>\nby George D. Brown<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/01\/terrorism-prosecutions-in-u-s-federal-court\/\">Terrorism Prosecutions in U.S. Federal Court: Exceptions to Constitutional Evidence Rules and the Development of a Cabined Exception for Coerced Confessions<\/a><br \/>\nby Norman Abrams<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/01\/preventing-terrorist-attacks-on-offshore-platforms-do-states-have-sufficient-legal-tools\/\">Preventing Terrorist Attacks on Offshore Platforms: Do States Have Sufficient Legal Tools?<\/a><br \/>\nby Assaf Harel<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/01\/national-security-interest-convergence\/\">National Security Interest Convergence<\/a><br \/>\nby Sudha Setty<\/p>\n<h1><strong>Issue 2<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/05\/out-of-the-loop-autonomous-weapon-systems-and-the-law-of-armed-conflict\/\">\u201cOut of the Loop\u201d: Autonomous Weapon Systems and the Law of Armed Conflict<\/a><br \/>\nby Michael N. Schmitt &amp; Jeffrey S. Thurnher<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/05\/the-chilling-effect-of-the-material-support-law-on-humanitarian-aid-causes-consequences-and-proposed-reforms\/\">The Chilling Effect of the \u201cMaterial Support\u201d Law on Humanitarian Aid: Causes, Consequences, and Proposed Reforms<\/a><br \/>\nby Sam Adelsberg, Freya Pitts &amp; Sirine Shebaya<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/05\/the-u-n-security-councils-duty-to-decide\/\">The U.N. Security Council\u2019s Duty to Decide<\/a><br \/>\nby Anna Spain<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/05\/valuing-speech-and-open-source-intelligence-in-the-face-of-judicial-deference\/\">Valuing Speech and Open Source Intelligence in the Face of Judicial Deference<\/a><br \/>\nby Andrew V. Moshirnia<\/p>\n<h1><a href=\"http:\/\/https\/journals.law.harvard.edu\/nsj\/volume-3\/\">Volume 3<\/a><\/h1>\n<h2>Issue 1<\/h2>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol.-3_Bellovin_Bradner_Diffie_Landau_Rexford1.pdf\">Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure<\/a><br \/>\nby Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, and Jennifer Rexford<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol.-3_Brito_Watkins1.pdf\">Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy<\/a><br \/>\nby Jerry Brito &amp; Tate Watkins<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol.-3_Wall1.pdf\">Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities &amp; Covert Action<\/a><br \/>\nby Andru E. Wall<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol.-3_Robinson_Haque1.pdf\">Advantaging Aggressors: Justice &amp; Deterrence in International Law<\/a><br \/>\nby Paul H. Robinson &amp; Adil Ahmad Haque<\/p>\n<h2>Issue 2<\/h2>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol.-3-Thravalos-final-edits2.pdf\">History,\u00a0<em>Hamdan<\/em>, and Happenstance: \u201cConspiracy by Two or More to Violate the Laws of War by Destroying Life or Property in Aid of the Enemy\u201d<\/a><br \/>\nby Haridimos V. Thravalos<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Barak-Erez-Final-Sept-20-2corrections.pdf\">Distributive Justice in National Security Law<\/a><br \/>\nby Daphne Barak-Erez<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Velandy-FINAL.pdf\">The Green Arms Race: Reorienting the Discussions on Climate Change, Energy Policy, and National Security<\/a><br \/>\nby Siddhartha M. Velandy<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Creegan-FINAL.pdf\">National Security Crime<\/a><br \/>\nby Erin Creegan<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/02\/Vol.3-Wallach-FINAL.pdf\">Pray Fire First Gentlemen of France: Has 21st Century Chivalry Been Subsumed by Humanitarian Law?<\/a><br \/>\nby Judge Evan J. Wallach<\/p>\n<h1><strong><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/volume-2\/\">Volume 2<\/a><\/strong><\/h1>\n<h1><strong>Issue 1<\/strong><\/h1>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2011\/01\/freedom-of-speech-support-for-terrorism-and-the-challenge-of-global-constitutional-law\/\">Freedom of Speech, Support for Terrorism, and the Challenge of Global Constitutional Law<\/a><br \/>\nby Daphne Barak-Erez and David Scharia<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2011\/01\/investigating-violations-of-international-law-in-armed-conflict\/\">Investigating Violations of International Law in Armed Conflict<\/a><br \/>\nby Michael Schmitt<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2011\/01\/preventative-detention-in-american-theory-and-practice\/\">Preventive Detention in American Theory and Practice<\/a><br \/>\nby Adam Klein and Benjamin Wittes<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2011\/02\/the-national-security-threat-of-energy-dependence-a-call-for-a-nuclear-renaissance\/\">The National Security Threat of Energy Dependence: A Call for a Nuclear Renaissance<\/a><br \/>\nby Arthur Rizer<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2011\/01\/strategic-choices-four-legal-models-for-counterterrorism-in-pakistan\/\">Strategic Choices: Four Legal Models for Counterterrorism in Pakistan<\/a><br \/>\nby James J. Saulino<\/p>\n<h1><strong>Issue 2<\/strong><\/h1>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2011\/06\/the-cia-and-targeted-killings-beyond-borders-2\/\">The CIA and Targeted Killings Beyond Borders<\/a><br \/>\nby Philip Alston<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol-2_Baehr_Jones_Final1.pdf\">Mission Possible: How Intelligence Evidence Rules Can Save UN Terrorist Sanctions<\/a><br \/>\nby Vanessa Baehr-Jones<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol.-2_Sandberg-Zakian_Final-EIC-Edits1.pdf\">Beyond Guantanamo: Two Constitutional Objections to Nonmilitary Preventive Detention<\/a><br \/>\nby Eric Sandberg-Zakian<\/p>\n<p><strong><em>ESSAYS<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol.-2_Clark-Landau_Final-Version1.pdf\">Untangling Attribution<\/a><br \/>\nby David D. Clark and Susan Landau<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol.-2_Heymann_Final-EIC-Edits1.pdf\">Detention<\/a><br \/>\nby Philip B. Heymann<\/p>\n<p><strong><em>REVIEW ESSAY<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol.-2_Kanwar-Final1.pdf\">Post-Human Humanitarian Law: The Law of War in the Age of Robotic Weapons<\/a><br \/>\nby Vik Kanwar<\/p>\n<p><strong><em>SYMPOSIUM KEYNOTE ADDRESS<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol.-2_Bradbury_Final1.pdf\">The Developing Legal Framework for Defensive and Offensive Cyber Operations<\/a><br \/>\nby Steven G. Bradbury<\/p>\n<h1><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/volumes\/vol1\/\">Volume 1<\/a><\/h1>\n<p><strong><em>ARTICLES<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2011\/04\/volume-1-editors-preface\/\">Editors\u2019 Preface<\/a><br \/>\nby Robert Williams and Anne Siders<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2010\/01\/minow\/\">Dialogue, Discourse, and Debate: Introducing the Harvard National Security Journal<\/a><br \/>\nby Martha Minow, Jan. 11, 2010<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2010\/05\/the-interpretive-guidance-on-the-notion-of-direct-participation-in-hostilities-a-critical-analysis\/\">The Interpretive Guidance on the Notion of Direct Participation in Hostilities: A Critical Analysis<\/a><br \/>\nby Michael Schmitt, May 5, 2010<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2010\/05\/teaching-an-old-dog-new-tricks-operationalizing-the-law-of-armed-conflict-in-new-warfare\/\">Teaching an Old Dog New Tricks: Operationalizing the Law of Armed Conflict in New Warfare<\/a><br \/>\nby Laurie Blank and Amos Guiora, May 13, 2010<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2010\/05\/glick\/\">FISA\u2019s Significant Purpose Requirement and the Government\u2019s Ability to Protect National Security<\/a><br \/>\nby Scott J. Glick, May 30, 2010<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/2010\/06\/law-and-policy-of-targeted-killing\/\">Law and Policy of Targeted Killing<\/a><br \/>\nby Gabriella Blum and Philip Heymann, June 27, 2010<\/p>\n<p><a href=\"http:\/\/www.journals.law.harvard.edu\/nsj\/?p=1667\">All Human Rights Are Equal, But Some Are More Equal Than Others<\/a><br \/>\nby Chris Jenks and Eric Talbot Jensen, November 12, 2010<\/p>\n<p><strong><em>ESSAYS<\/em><\/strong><\/p>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2011\/01\/cybersecurity-and-national-policy\/\">Cybersecurity and National Policy<\/a><\/strong><strong><em><br \/>\n<\/em><\/strong>by Dan Geer, Apr. 7, 2010<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Volume 13 Issue 1 CFIUS Preemption by Kristen E. Eichensehr Reverse Distinction: A U.S. Violation of the Law of Armed Conflict in Space by David A. Koplow Iron Dome and\u00a0Jus Ad Bellum\u00a0Proportionality by Shelly Aviv Yeini 401\u2013Forbidden: An Empirical Study of Foreign Intelligence Surveillance Act Notices, 1990\u20132020 by Sarah Beller Issue 2 Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process by Nadiya Kostyuk and Susan Landau Withdrawal from Afghanistan Marks Guant\u00e1namo\u2019s Endpoint by David Glazier The Lexicon of Terror: Crystallization of the Definition of \u201cTerrorism\u201d Through the Lens of Terrorist Financing &amp; The Financial Action Task Force [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"open","ping_status":"open","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-514","page","type-page","status-publish","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/PeZtUX-8i","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages\/514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=514"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages\/514\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}