{"id":5832,"date":"2022-01-17T07:13:26","date_gmt":"2022-01-17T07:13:26","guid":{"rendered":"http:\/\/box2067.temp.domains\/~vbnebjmy\/?page_id=5832"},"modified":"2025-11-07T11:32:19","modified_gmt":"2025-11-07T16:32:19","slug":"online-edition","status":"publish","type":"page","link":"https:\/\/journals.law.harvard.edu\/nsj\/online-edition\/","title":{"rendered":"Online Edition"},"content":{"rendered":"<ul class=\"wp-block-latest-posts__list has-dates wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/06\/a-foreign-organ-courts-martial-as-an-alternative-to-the-9-11-military-commissions\/\">A Foreign Organ: Courts-Martial as an Alternative to the 9\/11 Military Commissions<\/a><time datetime=\"2025-06-17T21:01:25-04:00\" class=\"wp-block-latest-posts__post-date\">June 17, 2025<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Benjamin Sonnenberg* [This essay is available in PDF at\u00a0this link] Introduction Almost 3,000 Americans died on September 11, 2001.[1]&nbsp;In response to the disaster, and&nbsp;shortly following the U.S.-led invasion of Afghanistan, President Bush issued a Military Order&nbsp;pertaining to the \u201cdetention, treatment, and trial\u201d of non-citizens in the War on Terror.[2]&nbsp;This&nbsp;Order established the modern system of military commissions at the Guantanamo Bay Naval&nbsp;Base (GTMO). The Order authorized trial by military tribunal for non-U.S. citizens who were members\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/06\/a-foreign-organ-courts-martial-as-an-alternative-to-the-9-11-military-commissions\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: A Foreign Organ: Courts-Martial as an Alternative to the 9\/11 Military Commissions<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/the-fetishization-of-the-human-in-the-critique-of-autonomous-weapons\/\">THE FETISHIZATION OF \u201cTHE HUMAN\u201d IN THE\u00a0CRITIQUE OF AUTONOMOUS WEAPONS<\/a><time datetime=\"2025-05-24T13:11:21-04:00\" class=\"wp-block-latest-posts__post-date\">May 24, 2025<\/time><div class=\"wp-block-latest-posts__post-excerpt\">* This article is the last in a symposium on Kevin Jon Heller\u2019s \u201cThe Concept of \u201cthe Human\u201d in the Critique of Autonomous Weapons,\u201d published in this journal in 2023. It responds to prior articles in the symposium which can be found in the Harvard National Security Journal Online at https:\/\/harvardnsj.org\/onlineedition.&nbsp; Kevin Jon Heller [**] [This essay is available in PDF at\u00a0this link] INTRODUCTION At the beginning of their response to my article, Elke Schwarz\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/the-fetishization-of-the-human-in-the-critique-of-autonomous-weapons\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: THE FETISHIZATION OF \u201cTHE HUMAN\u201d IN THE\u00a0CRITIQUE OF AUTONOMOUS WEAPONS<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/countering-the-humans-vs-aws-narrative-and-the-inevitable-accountability-gaps-for-mistakes-in-targeting-a-reply-to-kevin-jon-heller\/\">Countering the \u201cHumans vs. AWS\u201d Narrative and the Inevitable Accountability Gaps for Mistakes in Targeting: A Reply to Kevin Jon Heller<\/a><time datetime=\"2025-05-24T13:02:58-04:00\" class=\"wp-block-latest-posts__post-date\">May 24, 2025<\/time><div class=\"wp-block-latest-posts__post-excerpt\">*This article is part of a symposium on Kevin Jon Heller\u2019s \u201cThe Concept of \u201cthe Human\u201d in the Critique of Autonomous Weapons,\u201d published in this journal in 2023. All articles in the symposium can be found in the Harvard National Security Journal Online at https:\/\/harvardnsj.org\/onlineedition.&nbsp;&nbsp; Dr. Marta Bo[**] [This essay is available in PDF at\u00a0this link] I.&nbsp;Introduction&nbsp; In this reply, I challenge the \u201cHumans vs. AWS\u201d narrative, which claims that AWS will achieve unprecedented targeting\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/countering-the-humans-vs-aws-narrative-and-the-inevitable-accountability-gaps-for-mistakes-in-targeting-a-reply-to-kevin-jon-heller\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Countering the \u201cHumans vs. AWS\u201d Narrative and the Inevitable Accountability Gaps for Mistakes in Targeting: A Reply to Kevin Jon Heller<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/the-image-of-combat-not-community-a-critique-on-law-enforcement-use-of-military-equipment\/\">The Image of Combat, Not Community: A Critique on Law Enforcement Use of Military Equipment<\/a><time datetime=\"2025-05-23T15:17:52-04:00\" class=\"wp-block-latest-posts__post-date\">May 23, 2025<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Editors\u2019 Note: The author researched and wrote this piece the summer after her first-year of law school, in 2020. The piece was accepted as an anonymous student submission shortly thereafter. Since then, the author obtained her J.D. from Harvard Law School in 2022 and is now a practicing attorney in New York. Natassia Velez* [This essay is available in PDF at this link] Introduction Her breath caught in her throat as she saw the scene\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/the-image-of-combat-not-community-a-critique-on-law-enforcement-use-of-military-equipment\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Image of Combat, Not Community: A Critique on Law Enforcement Use of Military Equipment<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/on-the-pitfalls-of-technophilic-reason-a-commentary-on-kevin-jon-hellers-the-concept-of-the-human-in-the-critique-of-autonomous-weapons\/\">On the Pitfalls of Technophilic Reason: A Commentary on Kevin Jon Heller\u2019s \u201cThe Concept of \u2018the Human\u2019 in the Critique of Autonomous Weapons&#8221;<\/a><time datetime=\"2025-05-23T14:46:05-04:00\" class=\"wp-block-latest-posts__post-date\">May 23, 2025<\/time><div class=\"wp-block-latest-posts__post-excerpt\">* This article is part of a symposium on Kevin Jon Heller\u2019s \u201cThe Concept of \u201cthe Human\u201d in the Critique of Autonomous Weapons,\u201d published in this journal in 2023. All articles in the symposium can be found in the Harvard National Security Journal Online at https:\/\/harvardnsj.org\/onlineedition.&nbsp;&nbsp; Elke Schwarz[**] Neil Renic[***] [This essay is available in PDF at\u00a0this link] I. Introduction Critiquing a critique is a delicate matter. One risk is that the intention of the\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/05\/on-the-pitfalls-of-technophilic-reason-a-commentary-on-kevin-jon-hellers-the-concept-of-the-human-in-the-critique-of-autonomous-weapons\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: On the Pitfalls of Technophilic Reason: A Commentary on Kevin Jon Heller\u2019s \u201cThe Concept of \u2018the Human\u2019 in the Critique of Autonomous Weapons&#8221;<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/03\/using-the-force-against-rebel-scum-the-application-of-international-humanitarian-law-in-outer-space-against-non-state-actors\/\">\u201cUsing the Force\u201d Against \u201cRebel Scum\u201d: The Application of International Humanitarian Law in Outer Space Against Non-State Actors<\/a><time datetime=\"2025-03-24T20:39:09-04:00\" class=\"wp-block-latest-posts__post-date\">March 24, 2025<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Haldor Mercado* [This essay is available in PDF at\u00a0this link] I.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Introduction &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;As an enormous superweapon known as the \u201cDeath Star\u201d orbits the Earth-like planet of Alderaan, the commander gives the order to \u201cfire when ready\u201d; with the press of a button and the pull of a lever, a beam of energy obliterates the planet.[1]&nbsp;&nbsp;Since&nbsp;Star Wars&nbsp;was first released in 1977, that scene and others like it have remained fanciful; there has not yet been the kind\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2025\/03\/using-the-force-against-rebel-scum-the-application-of-international-humanitarian-law-in-outer-space-against-non-state-actors\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: \u201cUsing the Force\u201d Against \u201cRebel Scum\u201d: The Application of International Humanitarian Law in Outer Space Against Non-State Actors<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2024\/10\/impractical-and-unconstitutional-the-stored-communications-act-post-carpenter\/\">Impractical and Unconstitutional: The Stored Communications Act Post-Carpenter<\/a><time datetime=\"2024-10-17T23:31:44-04:00\" class=\"wp-block-latest-posts__post-date\">October 17, 2024<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Richard McCutcheon*1 [This essay is available in PDF at this link] Introduction The Stored Communications Act (SCA)[1]&nbsp;has generated numerous practical headaches for academics and judges as digital technology advances in scope and importance.[2]&nbsp;Created in 1986 as part of the Electronic Communications Privacy Act (ECPA), the SCA established the statutory regime that governs access to stored electronic communications by the government and third parties.[3]&nbsp;The SCA has been repeatedly criticized for being outdated and ill-suited for modern\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2024\/10\/impractical-and-unconstitutional-the-stored-communications-act-post-carpenter\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Impractical and Unconstitutional: The Stored Communications Act Post-Carpenter<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2023\/03\/brzozowski-national-security-and-domestic-terrorism\/\">National Security and Domestic Terrorism: The Legal and Legal Policy Implications of Creating a Domestic Terrorism Organization List<\/a><time datetime=\"2023-03-29T14:06:33-04:00\" class=\"wp-block-latest-posts__post-date\">March 29, 2023<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Thomas Edward Brzozowski[1]* [This essay is available in PDF at this&nbsp;link] I. Introduction The terrorist attacks of 9\/11 radically altered the U.S. counter-terrorism apparatus and resulted in the creation of a host of new governmental departments and agencies tasked with safeguarding the country against the scourge of international terrorism. By many accounts, however, domestic terrorism remains the greater threat. According to a recently released Office of the Director of National Intelligence (ODNI) report on domestic\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2023\/03\/brzozowski-national-security-and-domestic-terrorism\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: National Security and Domestic Terrorism: The Legal and Legal Policy Implications of Creating a Domestic Terrorism Organization List<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2023\/01\/exporing-the-application-of-force-majeure-for-ai-mistakes-in-armed-conflict\/\">Exploring the Application of Force Majeure for AI Mistakes in Armed Conflict<\/a><time datetime=\"2023-01-29T08:03:12-05:00\" class=\"wp-block-latest-posts__post-date\">January 29, 2023<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Fatemah Albader[*] [This essay is available in PDF at this&nbsp;link] Introduction With the fast-evolving and increasing reliance on artificial intelligence (AI) technology in armed conflict, the question of when a state may be held responsible for AI mistakes is no longer a question for science fiction. Today, every sector \u2013 public or private \u2013 displays some dependency on AI. The healthcare industry utilizes AI to perform surgical tasks.[1] The education sector uses AI to provide\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2023\/01\/exporing-the-application-of-force-majeure-for-ai-mistakes-in-armed-conflict\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Exploring the Application of Force Majeure for AI Mistakes in Armed Conflict<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2022\/04\/expanding-lawful-influence-operations\/\">Expanding Lawful Influence Operations<\/a><time datetime=\"2022-04-12T20:42:58-04:00\" class=\"wp-block-latest-posts__post-date\">April 12, 2022<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Justin Malzac[*] [This essay is available in PDF at this link] \u201cIt\u2019s always easier to stamp out a small ember than to put out a raging fire.\u201d [1] \u2014 Lloyd Austin, Secretary of Defense Introduction Influence operations, including propaganda and psychological operations, have been a central aspect of international rivalry for over a century. Emphasis on this particular form of grey zone diplomacy and competition faded after the fall of the Soviet Union and the\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2022\/04\/expanding-lawful-influence-operations\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Expanding Lawful Influence Operations<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2022\/03\/the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-iv-questions-for-the-record-federal-government-response-to-coronavirus-and-u-s-public-he\/\">The Foreign Sovereign Immunities Act, Coronavirus, and Addressing  China\u2019s Culpability, Part IV: Questions for the Record\u2014Federal  Government Response to Coronavirus and U.S. Public Health Leadership Role<\/a><time datetime=\"2022-03-03T08:00:45-05:00\" class=\"wp-block-latest-posts__post-date\">March 3, 2022<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Chim\u00e8ne Keitner[*] [This essay is available in PDF at this link] Introduction On June 23, 2020, the Senate Judiciary Committee held a hearing on \u201cThe Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability.\u201d[1]\u00a0Professor Chim\u00e8ne Keitner submitted written testimony, answered questions at the hearing, and provided written responses to follow-up Questions for the Record from committee members. This is Part IV in a series of works by Professor Keitner that the\u00a0Harvard National Security Journal\u00a0has published\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2022\/03\/the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-iv-questions-for-the-record-federal-government-response-to-coronavirus-and-u-s-public-he\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Foreign Sovereign Immunities Act, Coronavirus, and Addressing  China\u2019s Culpability, Part IV: Questions for the Record\u2014Federal  Government Response to Coronavirus and U.S. Public Health Leadership Role<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2022\/02\/3d-printed-speech-3d-printer-code-under-constitutional-scrutiny\/\">3D Printed Speech: 3D-Printer Code Under Constitutional Scrutiny<\/a><time datetime=\"2022-02-13T12:55:10-05:00\" class=\"wp-block-latest-posts__post-date\">February 13, 2022<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Andrew Huang[*] [This article is available in PDF at this link] I. Introduction In May 2013, at a remote firing range deep in central Texas, there was silence. Then, a sharp crack reverberated across the prairieland as engineers led by then-25-year-old Cody Wilson successfully test-fired the world\u2019s first entirely 3D-printed gun for the very first time.[1] \u201cFuckin\u2019 A!\u201d they exclaimed; not quite the Bhagavad Gita verse recalled[2] by Robert Oppenheimer after the Trinity nuclear test,\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2022\/02\/3d-printed-speech-3d-printer-code-under-constitutional-scrutiny\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: 3D Printed Speech: 3D-Printer Code Under Constitutional Scrutiny<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/10\/20-wp-content-uploads-sites-keitner_the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-iii-pdf\/\">The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability, Part III: Questions for the Record\u2014Private Litigation Will Likely Fail to Secure Relief for U.S. Victims<\/a><time datetime=\"2021-10-20T09:18:05-04:00\" class=\"wp-block-latest-posts__post-date\">October 20, 2021<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Chim\u00e8ne Keitner[*] [This essay is available in PDF at this link] Introduction On June 23, 2020, the Senate Judiciary Committee held a hearing on \u201cThe Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability.\u201d[1]\u00a0Professor Chim\u00e8ne Keitner submitted written testimony, answered questions at the hearing, and provided written responses to follow-up Questions for the Record from committee members. This is Part III in a series of works by Professor Keitner that the\u00a0Harvard National Security Journal\u00a0will publish\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/10\/20-wp-content-uploads-sites-keitner_the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-iii-pdf\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability, Part III: Questions for the Record\u2014Private Litigation Will Likely Fail to Secure Relief for U.S. Victims<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/09\/shining-light-on-the-going-dark-phenomenon-u-s-efforts-to-overcome-the-use-of-end-to-end-encryption-by-islamic-state-supporters\/\">Shining Light on the \u201cGoing Dark\u201d Phenomenon: U.S. Efforts to Overcome the Use of End-to-End Encryption by Islamic State Supporters<\/a><time datetime=\"2021-09-03T15:50:57-04:00\" class=\"wp-block-latest-posts__post-date\">September 3, 2021<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Ryan Pereira [*] [This article is available as a PDF at this link.] Introduction On May 3, 2015, two individuals committed to the Islamic State (IS) and armed with high-powered assault rifles opened fire at a contest for cartoon depictions of the Prophet Muhammad held in Garland, Texas.[1] The two gunmen injured an off-duty police officer before another officer shot and killed them.[2] After the attack, the U.S. government disclosed that Elton Simpson, one of\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/09\/shining-light-on-the-going-dark-phenomenon-u-s-efforts-to-overcome-the-use-of-end-to-end-encryption-by-islamic-state-supporters\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Shining Light on the \u201cGoing Dark\u201d Phenomenon: U.S. Efforts to Overcome the Use of End-to-End Encryption by Islamic State Supporters<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/08\/postwar\/\">Postwar<\/a><time datetime=\"2021-08-20T10:45:20-04:00\" class=\"wp-block-latest-posts__post-date\">August 20, 2021<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Robert M. Chesney* The following is a re-posting of a Volume 5 print article by Robert M. Chesney, the full text of which is available at this link. The article is newly relevant in light of the current situation in Afghanistan. Abstract Does it really matter, from a legal perspective, whether the U.S. government continues to maintain that it is in an armed conflict with al Qaeda? Critics of the status quo regarding the use\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/08\/postwar\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Postwar<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/03\/the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-ii-questions-for-the-record-benefits-to-the-united-states-from-foreign-sovereign-immunity\/\">The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability, Part II: Questions for the Record\u2014Benefits to the United States from Foreign Sovereign Immunity<\/a><time datetime=\"2021-03-30T17:00:24-04:00\" class=\"wp-block-latest-posts__post-date\">March 30, 2021<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Chim\u00e8ne Keitner[*] [This essay is available in PDF at\u00a0this link] Introduction On June 23, 2020, the Senate Judiciary Committee held a hearing on \u201cThe Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability.\u201d[1] Professor Chim\u00e8ne Keitner submitted written testimony, answered questions at the hearing, and provided written responses to follow-up Questions for the Record from committee members. This is Part II in a series of works by Professor Keitner that the Harvard National Security Journal\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/03\/the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-ii-questions-for-the-record-benefits-to-the-united-states-from-foreign-sovereign-immunity\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability, Part II: Questions for the Record\u2014Benefits to the United States from Foreign Sovereign Immunity<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/03\/thank-me-for-my-service-an-ethics-oversight-in-department-of-defense-social-media-policy\/\">Thank Me for My Service: An Ethics Oversight in Department of Defense Social Media Policy<\/a><time datetime=\"2021-03-02T20:06:18-05:00\" class=\"wp-block-latest-posts__post-date\">March 2, 2021<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Matthew Fitzgerald[*] [This essay is available at this link] Introduction I think it might be edifying to you if you all had Facebook pages, because you might understand how it\u2019s being used and misused.[1] In 2019, prominent \u201cYouTuber\u201d Austen Alexander posted a video titled \u201cWhy I Was Investigated by the Navy (not clickbait).\u201d[2] The author\u2019s YouTube channel features his creative commentary and insider\u2019s take on employment as an active duty sailor.[3] The author earns thousands\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/03\/thank-me-for-my-service-an-ethics-oversight-in-department-of-defense-social-media-policy\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Thank Me for My Service: An Ethics Oversight in Department of Defense Social Media Policy<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/02\/the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-i-written-testimony\/\">The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability, Part I: Written Testimony<\/a><time datetime=\"2021-02-23T18:57:06-05:00\" class=\"wp-block-latest-posts__post-date\">February 23, 2021<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Chim\u00e8ne Keitner[*] [This essay is available in PDF at\u00a0this link] Introduction On June 23, 2020, the Senate Judiciary Committee held a hearing on \u201cThe Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability.\u201d[1] This article memorializes the written testimony of Professor Chim\u00e8ne Keitner submitted in advance of that hearing.[2] This is the first part in a series of works by Professor Keitner that the National Security Journal will publish in the coming weeks. In the\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/02\/the-foreign-sovereign-immunities-act-coronavirus-and-addressing-chinas-culpability-part-i-written-testimony\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China\u2019s Culpability, Part I: Written Testimony<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/02\/updating-the-fourth-amendment-analysis-of-u-s-person-communications-incidentally-collected-under-fisa-section-702\/\">Updating the Fourth Amendment Analysis of U.S. Person Communications Incidentally Collected Under FISA Section 702<\/a><time datetime=\"2021-02-07T18:49:48-05:00\" class=\"wp-block-latest-posts__post-date\">February 7, 2021<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Peter G. Machtiger[*] [Full text of this Article in PDF is available at\u00a0this link] Introduction Following the terrorist attacks of September 11, 2001, the United States government rallied around its national security apparatus to improve its ability to detect and prevent future acts of terrorism. As part of this mission, the Intelligence Community was asked to \u201cidentify and target plotters in some of the most remote parts of the world and to anticipate the actions\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2021\/02\/updating-the-fourth-amendment-analysis-of-u-s-person-communications-incidentally-collected-under-fisa-section-702\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Updating the Fourth Amendment Analysis of U.S. Person Communications Incidentally Collected Under FISA Section 702<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/10\/legal-dialogue-on-human-rights-obligations\/\">Legal Dialogue on Human Rights Obligations: NATO&#8217;s Aegean Sea Activity as a Case Study<\/a><time datetime=\"2020-10-28T23:57:15-04:00\" class=\"wp-block-latest-posts__post-date\">October 28, 2020<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Steven Hill[*] &amp; Benjamin Bastomski[\u2020] [This essay is available in PDF at\u00a0this link] Introduction This Article examines the background, design, and early execution of NATO\u2019s naval deployment in the Aegean Sea in support of broader international efforts to address the 2016 crisis involving persons crossing or attempting to cross waters in that area.[1] That crisis was often popularly referred to interchangeably as a \u201crefugee crisis\u201d or \u201cmigrant crisis.\u201d[2] For the purposes of this Article, we\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/10\/legal-dialogue-on-human-rights-obligations\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Legal Dialogue on Human Rights Obligations: NATO&#8217;s Aegean Sea Activity as a Case Study<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/05\/a-new-ai-strategy-to-combat-domestic-terrorism-and-violent-extremism\/\">A New AI Strategy to Combat Domestic Terrorism and Violent Extremism<\/a><time datetime=\"2020-05-06T13:45:06-04:00\" class=\"wp-block-latest-posts__post-date\">May 6, 2020<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Jonathan Fischbach[*] [This essay is available in PDF at\u00a0this link] Introduction: A Revealing Inversion Data scientists utilize artificial intelligence (AI) in thousands of different contexts, ranging from analytics that design culinary masterpieces and identify illegal fishing, to algorithms that diagnose cancerous tumors, virtually compose symphonies, and predict vehicle failures.[1] Two communities within this expansive field, acting independently and without coordination, are currently experimenting with AI for the same narrow purpose\u2014to determine whether machine-learning algorithms can\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/05\/a-new-ai-strategy-to-combat-domestic-terrorism-and-violent-extremism\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: A New AI Strategy to Combat Domestic Terrorism and Violent Extremism<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/04\/why-strict-cabinet-succession-is-always-bad-policy-a-response-to-professor-jack-goldsmith-and-ben-miller-gootnick\/\">Why Strict Cabinet Succession Is Always Bad Policy: A Response to Professor Jack Goldsmith and Ben Miller-Gootnick<\/a><time datetime=\"2020-04-08T13:19:41-04:00\" class=\"wp-block-latest-posts__post-date\">April 8, 2020<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Seth Barrett Tillman[*] [This essay is available in PDF at this link] In their Lawfare post,[1] Professor Jack Goldsmith and Ben Miller-Gootnick put forward the traditional argument that legislative-officer succession, as permitted by the Presidential Succession Act of 1947 (1947 Act),[2] leads to undesirable and destabilizing changes in party control. Quoting a report of the Continuity in Government Commission, Goldsmith and Miller-Gootnick write: [A] \u201cpolitical zealot might seek to change the party in the executive\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/04\/why-strict-cabinet-succession-is-always-bad-policy-a-response-to-professor-jack-goldsmith-and-ben-miller-gootnick\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Why Strict Cabinet Succession Is Always Bad Policy: A Response to Professor Jack Goldsmith and Ben Miller-Gootnick<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/03\/yes-trumps-shakedown-of-ukraine-was-impeachable-bribery\/\">Yes, Trump\u2019s Shakedown of Ukraine Was Impeachable \u201cBribery\u201d<\/a><time datetime=\"2020-03-27T18:04:20-04:00\" class=\"wp-block-latest-posts__post-date\">March 27, 2020<\/time><div class=\"wp-block-latest-posts__post-excerpt\">A Government Lawyer[*] [This essay is available in PDF at this link] Introduction About two weeks before the U.S. House of Representatives impeached President Trump, Professor Josh Blackman and Seth Barrett Tillman published an article on Lawfare. In it, they argue that Trump\u2019s withholding from Ukraine of military aid and a White House meeting, meant to pressure it to announce an investigation of Joe and Hunter Biden, did not amount to bribery for impeachment purposes.[1]\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/03\/yes-trumps-shakedown-of-ukraine-was-impeachable-bribery\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Yes, Trump\u2019s Shakedown of Ukraine Was Impeachable \u201cBribery\u201d<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/03\/complex-determinations-deciphering-enemy-nuclear-intentions\/\">Complex Determinations: Deciphering Enemy Nuclear Intentions<\/a><time datetime=\"2020-03-24T17:26:27-04:00\" class=\"wp-block-latest-posts__post-date\">March 24, 2020<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Louis Ren\u00e9 Beres[*] [This essay is available in PDF at this link] Introduction In early May 2019, U.S. President Donald Trump\u2014responding to Kim Jung-un\u2019s latest round of missile tests\u2014sought to reassure the American public. His seat-of-the-pants comments, however, were based entirely upon the presumed importance of his personal relationship with Kim Jung-un and had nothing to do with any measurably refined strategic assessments or \u201cpreparation.\u201d In these public comments, Trump has stressed that \u201cattitude,\u201d not\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/03\/complex-determinations-deciphering-enemy-nuclear-intentions\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Complex Determinations: Deciphering Enemy Nuclear Intentions<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/02\/perfidy-in-cyberspace-the-requirement-for-human-confidence\/\">Perfidy in Cyberspace: The Requirement for Human Confidence<\/a><time datetime=\"2020-02-21T14:10:32-05:00\" class=\"wp-block-latest-posts__post-date\">February 21, 2020<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Sean K. Price[*] [This article is available in PDF at this link] Introduction The United States is under attack. In the months leading up to hostilities, the enemy\u2019s intelligence agencies have identified key U.S. and allied military officials who use cloud-connected artificial pacemakers[1] or implantable cardiac defibrillators (ICD).[2] Immediately preceding offensive operations in the physical domains, the adversary\u2019s cyber force pushes malware to those officials\u2019 pacemakers, which accept it as authentic firmware updates produced by\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2020\/02\/perfidy-in-cyberspace-the-requirement-for-human-confidence\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Perfidy in Cyberspace: The Requirement for Human Confidence<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2019\/09\/five-legal-takeaways-from-the-syrian-war\/\">Five Legal Takeaways from the Syrian War<\/a><time datetime=\"2019-09-30T14:09:39-04:00\" class=\"wp-block-latest-posts__post-date\">September 30, 2019<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Shane R. Reeves[*] &amp; Ronald T. P. Alcala[\u2020] [This essay is available in PDF at this link] On December 19, 2018, President Trump ordered the withdrawal of U.S. forces from Syria.[3] While U.S. troops have not completely left Syria,[4] the slow drawdown provides an opportunity to reflect on some of the legal challenges that arose during the conflict. The U.S. Army regularly uses after action reports (AAR) to record observations and capture lessons learned from\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2019\/09\/five-legal-takeaways-from-the-syrian-war\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Five Legal Takeaways from the Syrian War<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2019\/04\/the-united-states-court-of-appeals-for-veterans-claims-the-newest-federal-court-experiment-past-present-and-future\/\">Speech\u2014The United States Court of Appeals for Veterans Claims: The Newest Federal Court Experiment, Past, Present, and Future<\/a><time datetime=\"2019-04-11T18:28:37-04:00\" class=\"wp-block-latest-posts__post-date\">April 11, 2019<\/time><div class=\"wp-block-latest-posts__post-excerpt\">[*] Chief Judge Robert N. Davis[\u2020] I\u2019m going to ask you to join me in a walk through the past, present, and a step into the future of the United States Court of Appeals for Veterans Claims, and when we get to the future I\u2019m going to challenge you to make a system that is terribly flawed right now a better one for veterans processing claims. But as I begin in our step to the\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2019\/04\/the-united-states-court-of-appeals-for-veterans-claims-the-newest-federal-court-experiment-past-present-and-future\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Speech\u2014The United States Court of Appeals for Veterans Claims: The Newest Federal Court Experiment, Past, Present, and Future<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/11\/a-quantum-leap-in-international-law-on-cyberwarfare-an-analysis-on-the-need-for-international-cooperation-with-quantum-computing-on-the-horizon\/\">A Quantum Leap in International Law on Cyberwarfare: An Analysis of International Cooperation with Quantum Computing on the Horizon<\/a><time datetime=\"2018-11-08T17:59:28-05:00\" class=\"wp-block-latest-posts__post-date\">November 8, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">In our latest Student Article, Dominic Rota, Belmont University College of Law &#8217;18, discusses the implications of the advent of quantum computing on the international legal regulation of cyberwarfare. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/09\/intelligence-collection-of-the-people-by-the-people-and-for-the-people-how-crowdsourcing-the-detection-of-wmds-could-change-the-way-we-protect-ourselves\/\">Intelligence Collection of the People, by the People and for the People: How Crowdsourcing the Detection of WMDs Could Change the Way We Protect Ourselves<\/a><time datetime=\"2018-09-05T08:54:06-04:00\" class=\"wp-block-latest-posts__post-date\">September 5, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">by Jonathan Fischbach<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/08\/not-your-grandfathers-zone-of-twilight-civil-military-relationships-in-debatably-legal-precision-strikes\/\">Not Your Grandfather&#8217;s Zone of Twilight: Civil Military Relationships in Debatably Legal Precision Strikes<\/a><time datetime=\"2018-08-27T09:42:44-04:00\" class=\"wp-block-latest-posts__post-date\">August 27, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">by Major Dan Maurer\u2014Limited strikes of debatable legality, such as the Trump Administration&#8217;s strike against Syrian chemical weapons facilities last spring, are likely to continue happening. Major Dan Maurer of the U.S. Army outlines 13 generic questions to guide senior military officers as they discuss planning these missions with civilian decision-makers.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/07\/5g-standard-setting-and-national-security\/\">5G, Standard-Setting, and National Security<\/a><time datetime=\"2018-07-03T10:26:22-04:00\" class=\"wp-block-latest-posts__post-date\">July 3, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">by Eli Greenbaum\u2014The Trump Administration recently blocked Broadcom&#8217;s proposed acquisition of Qualcomm, citing concerns about Chinese involvement in the process of establishing a technical standard for 5G networks. Eli Greenbaum of Yigal Arnon &#038; Co. argues that these concerns defy longstanding U.S. positions and are unfounded.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/06\/overseeing-or-interfering-a-functional-alternative-to-congressional-oversight-in-intelligence-and-operations\/\">Overseeing or Interfering? A Functional Alternative to Congressional Oversight in Intelligence and Operations<\/a><time datetime=\"2018-06-13T10:30:45-04:00\" class=\"wp-block-latest-posts__post-date\">June 13, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">by Major Sean B. Zehtab\u2014How should we design oversight of cyber-operations and intelligence gathering as such operations will increasingly take place at the tactical level? Major Sean B. Zehtab of the U.S. Army argues that we should look to the Command Operations Review Board of the U.S. Special Operations Command for guidance.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/05\/water-scarcity-the-most-understated-global-security-risk\/\">Water Scarcity: The Most Understated Global Security Risk<\/a><time datetime=\"2018-05-18T11:43:45-04:00\" class=\"wp-block-latest-posts__post-date\">May 18, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Major David J. Stuckenberg and Dr. Anthony L. Contento \u2014 This Article examines the global state of freshwater scarcity and the often-neglected linkages of water scarcity to economic, social, political, legal, and security consequences arising from disruptions, failures, or attacks on water access and distribution systems. Poorly understood links between access to adequate water and national stability pose severe global security risks.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/01\/the-ebola-fighters-uncharted-territory-or-a-repeat-of-past-shortcomings\/\">The Ebola Fighters:  Uncharted Territory, or a Repeat of Past Shortcomings?<\/a><time datetime=\"2018-01-11T11:42:03-05:00\" class=\"wp-block-latest-posts__post-date\">January 11, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Maj. Richard Hossfeld; Brooke Hossfeld; Maj. David Dixon &#8212; Instead of waiting passively for effective WHO reform, the United States Government\u2014which currently provides more funding to the WHO than any other member\u2014should act as the authority to influence disease response coordination and declare epidemic and\/or pandemic outbreak on behalf of the world.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2018\/01\/drones-as-crime-fighting-tools-in-2020-legal-and-normative-considerations\/\">Drones as Crime-Fighting Tools in 2020: Legal and Normative Considerations<\/a><time datetime=\"2018-01-08T10:57:44-05:00\" class=\"wp-block-latest-posts__post-date\">January 8, 2018<\/time><div class=\"wp-block-latest-posts__post-excerpt\">It\u2019s 2020 and Boston has become a haven for homicide. Believing that an uptick in drug trafficking is responsible for the uptick in homicides\u2014and left behind by its inability to break into the traffickers\u2019 encrypted devices and communications\u2014the Boston Police Department has a potential solution to its unsolved homicide problem: drones.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2017\/09\/indias-distressed-justice-sector-a-matter-of-u-s-national-security-concern\/\">India&#8217;s Distressed Justice Sector:  A Matter of U.S. National Security Concern<\/a><time datetime=\"2017-09-14T12:50:09-04:00\" class=\"wp-block-latest-posts__post-date\">September 14, 2017<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Dan E. Stigall \u2014 This Article highlights the degree to which institutional frailty in the Indian justice sector poses a national security risk to the United States, and illuminates policy choices that can serve to mitigate this potential threat to U.S. persons and national interests. In particular, this Article demonstrates that a revitalized Indian justice sector would help create a bulwark against regional instability and the pernicious threat posed by global jihadist groups currently seeking a foothold in South Asia.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2017\/04\/the-aviation-insider-threat-an-assessment-of-vulnerabilities-and-countermeasures\/\">The Aviation Insider Threat: An Assessment of Vulnerabilities and Countermeasures<\/a><time datetime=\"2017-04-24T14:46:39-04:00\" class=\"wp-block-latest-posts__post-date\">April 24, 2017<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Threats against aviation change constantly; countermeasures developed to combat emergent threats will become obsolete as new threats appear. Therefore, it is imperative for security practitioners to stay ahead of their enemies by identifying potential threats. This Article discusses ways in which current procedures fall short and should be reassessed.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2017\/02\/who-watches-the-watchlisters\/\">Quis custodiet ipsos custodies?: Who Watches the Watchlisters?<\/a><time datetime=\"2017-02-01T15:49:32-05:00\" class=\"wp-block-latest-posts__post-date\">February 1, 2017<\/time><div class=\"wp-block-latest-posts__post-excerpt\">This article summarizes the nature and purpose of the government&#8217;s terrorist watchlists, discusses the rules followed by agency screeners, explores the civil liberties implications of watchlisting, and identifies the need for oversight of the process.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2016\/08\/why-declarations-of-war-matter\/\">Why Declarations of War Matter<\/a><time datetime=\"2016-08-30T20:19:50-04:00\" class=\"wp-block-latest-posts__post-date\">August 30, 2016<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Maj. Gen. Charles J. Dunlap, Jr., USAF (Ret.)* The Washington Post recently ran a story entitled \u201cWould declaring \u2018war\u2019 on ISIS make victory more certain\u2014or would it even matter?\u201d[1] Among other things, it stated that today, \u201c[m]ost legal scholars find a war declaration irrelevant.\u201d Maybe so, but I\u2019m not one of them. One scholar was quoted as saying that \u201c[d]eclaring war does not serve any real function under modern international law, and it is\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2016\/08\/why-declarations-of-war-matter\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Why Declarations of War Matter<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2016\/03\/religious-freedom-as-a-national-security-imperative\/\">Religious Freedom as a National Security Imperative: A New Paradigm<\/a><time datetime=\"2016-03-22T20:54:08-04:00\" class=\"wp-block-latest-posts__post-date\">March 22, 2016<\/time><div class=\"wp-block-latest-posts__post-excerpt\">This Article proffers a hitherto understated mechanism for the establishment, maintenance and cogent analysis of national security: the establishment and maintenance of religious pluralism. To date, official positions and scholarship sparingly comment on this assertion. To address these gaps and to offer a fresh perspective on this subject, this Article undertakes a legal analysis to buttress the notion that U.S. national security interests can be best served by working towards the establishment of religious pluralism around the globe. Due to its strategic relevance for U.S. national security, the case of Pakistan \u2013 and the constitutional and legal apparatus that undergirds its view of religious minorities \u2013 serves as a blueprint for understanding this new national security paradigm (\u201cNNSP\u201d).\r\nPhoto courtesy of Wikimedia Commons<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2016\/03\/us-v-al-bahlul\/\">U.S. v. Al Bahlul: Where It\u2019s Been and Where It\u2019s Going<\/a><time datetime=\"2016-03-22T20:28:17-04:00\" class=\"wp-block-latest-posts__post-date\">March 22, 2016<\/time><div class=\"wp-block-latest-posts__post-excerpt\">On November 13, 2001 then-President George W. Bush issued a military order that would forever be remembered.  His military order \u201ccalled for the [S]ecretary of [D]efense to detain non-citizens accused of international terrorism.\u201d  Specially, the order applied to members of al Qaeda, and \u201call those who have engaged in, aided, or conspired to commit international terrorist acts against the United States or its citizens.\u201d  The Secretary of Defense \u201c[was] charged with establishing military tribunals (also called military commissions) to conduct trials of non-citizens accused of terrorism either in the United States or in other parts of the world.\u201d  Then-President Bush\u2019s military order created the United States (U.S.) Military Commissions that have been the center of continued national and international criticism.\r\nPhoto courtesy of Wikimedia Commons<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/12\/so-youre-telling-me-theres-a-chance-how-the-articles-on-state-responsibility-could-empower-corporate-responses-to-state-sponsored-cyber-attacks\/\">So You\u2019re Telling Me There\u2019s A Chance: How the Articles on State Responsibility Could Empower Corporate Responses to State-Sponsored Cyber Attacks<\/a><time datetime=\"2015-12-17T08:05:52-05:00\" class=\"wp-block-latest-posts__post-date\">December 17, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Daniel Garrie and Shane R. Reeves[1] Click here to read the full text as a PDF. \u201c[U.S] information systems face thousands of attacks a day from criminals, terrorist organizations, and more recently from more than 100 foreign intelligence organizations.\u201d[2] Looking forward, if the pace and intensity of attacks increase and are not met with improved defenses, a backlash against digitization could occur, with large negative economic implications. Using MGI data on the technologies that\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/12\/so-youre-telling-me-theres-a-chance-how-the-articles-on-state-responsibility-could-empower-corporate-responses-to-state-sponsored-cyber-attacks\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: So You\u2019re Telling Me There\u2019s A Chance: How the Articles on State Responsibility Could Empower Corporate Responses to State-Sponsored Cyber Attacks<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/12\/assistant-attorney-general-for-national-security-john-p-carlin-delivers-remarks-on-the-national-security-cyber-threat-at-harvard-law-school\/\">Assistant Attorney General for National Security John P. Carlin Delivers Remarks on the National Security Cyber Threat at Harvard Law School<\/a><time datetime=\"2015-12-04T08:38:50-05:00\" class=\"wp-block-latest-posts__post-date\">December 4, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Assistant Attorney General for National Security John P. Carlin delivered remarks at Harvard Law School on Thursday, December 3rd at an event hosted by the Harvard National Security Journal.  <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/11\/john-bellinger-visits-harvard-law-school\/\">John Bellinger Visits Harvard Law School<\/a><time datetime=\"2015-11-16T00:18:07-05:00\" class=\"wp-block-latest-posts__post-date\">November 16, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">In wide-ranging remarks at Harvard Law School on Friday October 16 2015 John Bellinger, now a partner Arnold &#038; Porter LLP, reflected on his 29-year legal career in both the public and the private sectors, discussed international law, and encouraged students to pursue careers in national security.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/10\/mediterranean-migrant-crisis\/\">The Mediterranean Migrant Crisis: Key Considerations for the UN Security Council<\/a><time datetime=\"2015-10-07T10:34:56-04:00\" class=\"wp-block-latest-posts__post-date\">October 7, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">The recent tragedies involving migrants in the Mediterranean have stoked urgent calls for UN action. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/09\/the-historic-opening-to-china-what-hath-nixon-wrought\/\">The Historic Opening to China: What Hath Nixon Wrought?<\/a><time datetime=\"2015-09-25T16:03:05-04:00\" class=\"wp-block-latest-posts__post-date\">September 25, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">When President Obama hosts Chinese leader Xi Jinping at the White House this week, he will do so as the eighth US president, starting with Richard Nixon, to engage with China based on a failed strategy.  This article revisits a   Foreign Affairs article\u2014&#8221;Asia After Vietnam&#8221;\u2014authored by Richard Nixon in October 1967.  <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/09\/cross-eyed-planning-when-host-nation-and-intervener-rule-of-law-strategies-are-unaligned\/\">Cross-eyed: Planning When Host-Nation and Intervener Rule of Law Strategies are Unaligned<\/a><time datetime=\"2015-09-16T16:34:34-04:00\" class=\"wp-block-latest-posts__post-date\">September 16, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Major Dan Maurer* This essay imagines a fictional future ground conflict pitting the United States and a host country against a non-state militant terrorist organization that has seized territory. This hypothetical scenario imagines a \u201crule of law\u201d mission in the immediate wake of conventional combat, but suggests that this task will be, ultimately and inevitably, hampered when the intervening and host nation have different strategic understandings and intentions for their rule of law activities.\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/09\/cross-eyed-planning-when-host-nation-and-intervener-rule-of-law-strategies-are-unaligned\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Cross-eyed: Planning When Host-Nation and Intervener Rule of Law Strategies are Unaligned<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/06\/core-synergies-in-israels-strategic-planning-when-the-adversarial-whole-is-greater-than-the-sum-of-its-parts\/\">Core Synergies in Israel&#8217;s Strategic Planning: When the Adversarial Whole Is Greater Than the Sum of Its Parts<\/a><time datetime=\"2015-06-02T00:10:32-04:00\" class=\"wp-block-latest-posts__post-date\">June 2, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">To best serve Israel, the country\u2019s strategic studies community should favor more conceptual or \u201cmolecular\u201d assessments of expected security perils. \r\nPhoto courtesy of Wikimedia Commons<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/04\/the-hidden-cost-of-drone-combat-soldiers-mental-health\/\">The Hidden Cost of Drone Combat: Soldiers\u2019 Mental Health<\/a><time datetime=\"2015-04-24T15:36:01-04:00\" class=\"wp-block-latest-posts__post-date\">April 24, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">While policymakers may argue that military drone combat presents no risk to American forces, the battle scars for drone operators are more psychological than physical. We should support the mental health of those soldiers we task with operating drones.\r\nPhoto courtesy of Wikimedia Commons<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/03\/why-the-us-should-ratify-unclos-a-view-from-the-south-and-east-china-seas\/\">Why the US Should Ratify UNCLOS: A View from the South and East China Seas<\/a><time datetime=\"2015-03-15T17:53:57-04:00\" class=\"wp-block-latest-posts__post-date\">March 15, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Photo courtesy of Wikimedia Commons.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/03\/five-maritime-security-developments-that-will-resonate-for-a-generation\/\">Five Maritime Security Developments That Will Resonate For A Generation<\/a><time datetime=\"2015-03-11T08:06:15-04:00\" class=\"wp-block-latest-posts__post-date\">March 11, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Captain Brian Wilson discusses treaty developments, trends, successes and challenges in maritime security.\r\nPhoto courtesy of Wikimedia Commons. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/02\/the-lost-dimension-food-security-and-the-south-china-sea-disputes\/\">The Lost Dimension: Food Security and the South China Sea Disputes<\/a><time datetime=\"2015-02-26T16:20:34-05:00\" class=\"wp-block-latest-posts__post-date\">February 26, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Food security was a key driver behind the development of the current framework governing the law of the sea. This matters for why&#8211;and how&#8211;the Chinese are contesting claims in the South China Sea.\r\nPhoto courtesy of Reuters. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/02\/drones-in-the-u-s-national-airspace-system-a-safety-and-security-assessment\/\">Drones in the U.S. National Airspace System: A Safety and Security Assessment<\/a><time datetime=\"2015-02-24T10:53:24-05:00\" class=\"wp-block-latest-posts__post-date\">February 24, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">3 areas continue to hold our national security at risk and plague drone integration efforts: (1) inadequate safety systems, (2) inadequate statutes, and (3) incomplete threat analyses. The authors discuss each area in detail along with proposed solutions. <i> Photo courtesy of Wikimedia <\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/02\/expert-interviews-for-drones-in-the-u-s-national-airspace-system-a-safety-and-security-assessment\/\">Expert Interviews for Drones in the U.S. National Airspace System: A Safety and Security Assessment<\/a><time datetime=\"2015-02-24T10:52:17-05:00\" class=\"wp-block-latest-posts__post-date\">February 24, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">I. Introduction In 2012, the U.S. Congress passed the FAA Revitalization and Reform Act which among other provisions called for the integration of drones into the U.S. national airspace. While the statutory provision was an attempt to meet the needs of an emerging industry which includes the defense sector, Congress inadvertently failed to examine many of the potential problems relating to the use of domestic drones. In spite of industry and government efforts to mitigate\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/02\/expert-interviews-for-drones-in-the-u-s-national-airspace-system-a-safety-and-security-assessment\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Expert Interviews for Drones in the U.S. National Airspace System: A Safety and Security Assessment<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/02\/meaningful-transparency-the-missing-numbers-the-nsa-and-fisc-should-reveal\/\">Meaningful Transparency: The Missing Numbers the NSA and FISC Should Reveal<\/a><time datetime=\"2015-02-17T14:58:37-05:00\" class=\"wp-block-latest-posts__post-date\">February 17, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Many Americans are skeptical or distrustful of U.S. Government intelligence collection methods. Increasing transparency by presenting additional data in an accessible way could help.  <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/01\/problematic-alternatives-mlat-reform-for-the-digital-age\/\">Problematic Alternatives: MLAT Reform for the Digital Age<\/a><time datetime=\"2015-01-28T13:05:28-05:00\" class=\"wp-block-latest-posts__post-date\">January 28, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Data travels across the globe instantly, but the current system for sharing information across jurisdictions is inadequate. Here&#8217;s why we need reform, and what that reform should look like. By Jonah Force Hill. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2015\/01\/restricted-reporting-on-california-military-installations-the-unnecessary-and-unwise-state-law-exception\/\">Restricted Reporting on California Military Installations: The Unnecessary and Unwise State Law Exception<\/a><time datetime=\"2015-01-15T15:40:08-05:00\" class=\"wp-block-latest-posts__post-date\">January 15, 2015<\/time><div class=\"wp-block-latest-posts__post-excerpt\">The military&#8217;s restricted reporting policy for sexual assaults&#8211;permitting members of the armed services to seek help without initiating a formal investigation&#8211;has helped victims and investigators alike. But state law exceptions, like California&#8217;s, counteract some of these gains. Here&#8217;s why, and how, the exception should be overturned.  <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/11\/the-best-way-to-honor-veterans-decide-carefully-about-the-next-war\/\">The Best Way to Honor Veterans: Decide Carefully About the Next War<\/a><time datetime=\"2014-11-11T14:24:28-05:00\" class=\"wp-block-latest-posts__post-date\">November 11, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Tony Carr* &nbsp; As Congress returns for a lame-duck session that promises to be equal parts theatrical and unproductive, President Obama is making a promise of his own: to pursue a new Authorization for the Use of Military Force (AUMF) legitimizing action against ISIS. Notwithstanding the division and skepticism of the current political moment, the AUMF represents a critical opportunity to unify Americans around an important policy goal: grounding an unmoored foreign policy while reestablishing\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/11\/the-best-way-to-honor-veterans-decide-carefully-about-the-next-war\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Best Way to Honor Veterans: Decide Carefully About the Next War<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/10\/the-case-for-export-control-reform-and-what-it-means-for-america\/\">The Case for Export Control Reform, and What it Means for America<\/a><time datetime=\"2014-10-19T19:26:46-04:00\" class=\"wp-block-latest-posts__post-date\">October 19, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Brandt Pasco* A signature national security priority of President Barack Obama\u2019s Administration, and an area that has generated rare broad-based bipartisan support, is export control reform.\u00a0 At the request of Secretary of Defense Robert Gates, in August 2009 President Obama directed the National Security Council and National Economic Council to jointly review the overall export control system.[1]\u00a0 Now five years in the making, initial implementation of export control reform went into effect on October\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/10\/the-case-for-export-control-reform-and-what-it-means-for-america\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: The Case for Export Control Reform, and What it Means for America<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/09\/protecting-whistleblowers-and-secrets-in-the-intelligence-community\/\">Protecting Whistleblowers and Secrets in the Intelligence Community<\/a><time datetime=\"2014-09-29T21:01:32-04:00\" class=\"wp-block-latest-posts__post-date\">September 29, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Daniel D&#8217;Isidoro* Introduction Members of the intelligence community receive different whistleblower protections than most federal employees, in large part due to the classified nature of their work. Though recent reforms have sought to shore up whistleblower protections, regulatory gaps remain. The following piece explores some of those gaps through examples, and suggests reforms to address them. Needed reforms include providing financial incentives to whistleblowers who identify massive fraud or waste in government programs; giving employees\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/09\/protecting-whistleblowers-and-secrets-in-the-intelligence-community\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Protecting Whistleblowers and Secrets in the Intelligence Community<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/06\/staying-strong-enhancing-israels-essential-strategic-options-2\/\">Staying Strong: Enhancing Israel&#8217;s Essential Strategic Options<\/a><time datetime=\"2014-06-13T08:18:15-04:00\" class=\"wp-block-latest-posts__post-date\">June 13, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Louis Ren\u00e9 Beres* In early 2014, Washington and Moscow competed openly for influence in Egypt: Putin even promised expansive arms packages to now-President Sisi. With this in mind, Sisi is apt to play the U.S. and Russia off against each other, a cold war strategy that has implications for Israel&#8217;s security doctrine, including perhaps its nuclear doctrine.(1) Israel operates within a global system(2) that appears to be falling back into some form of earlier\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/06\/staying-strong-enhancing-israels-essential-strategic-options-2\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Staying Strong: Enhancing Israel&#8217;s Essential Strategic Options<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/05\/ukraines-crisis-part-3-the-principle-of-distinction-and-loacs-key-goals\/\">Ukraine&#8217;s Crisis Part 3:  The Principle of Distinction and LOAC\u2019s Key Goals<\/a><time datetime=\"2014-05-29T09:43:46-04:00\" class=\"wp-block-latest-posts__post-date\">May 29, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Laurie R. Blank* This is the final\u00a0article in a three-part series on the Ukrainian crisis&#8217;s\u00a0implications and lessons for the international law of armed conflict.\u00a0You can read Part 1 and Part 2 here.\u00a0 Recent events in eastern Ukraine highlight the challenges of identifying the groups involved. Pro-Russian separatists, militants, pro-Ukrainian \u201cstreet fighters\u201d, nationalists, terrorists \u2014 many terms have been used in media reports. Many such groups wear no identifying uniform and others have deliberately covered\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/05\/ukraines-crisis-part-3-the-principle-of-distinction-and-loacs-key-goals\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Ukraine&#8217;s Crisis Part 3:  The Principle of Distinction and LOAC\u2019s Key Goals<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/05\/ukraines-crisis-part-2-loacs-threshold-for-international-armed-conflict\/\">Ukraine\u2019s Crisis Part 2: LOAC&#8217;s Threshold for International Armed Conflict<\/a><time datetime=\"2014-05-25T10:37:59-04:00\" class=\"wp-block-latest-posts__post-date\">May 25, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Series Introduction\u00a0 Following a new outbreak of violence in eastern Ukraine on Thursday, tensions in Ukraine and between Russia and the United States and NATO countries are high ahead of Ukraine\u2019s presidential elections Sunday. Russian troops remain along Ukraine\u2019s eastern border,\u00a0notwithstanding Moscow\u2019s promise\u00a0of withdrawal. In this murky situation, however, it is crucial to rely on several foundational principles of international law to protect persons, sovereignty, and national security. The conflict in Ukraine demonstrates the importance\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/05\/ukraines-crisis-part-2-loacs-threshold-for-international-armed-conflict\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Ukraine\u2019s Crisis Part 2: LOAC&#8217;s Threshold for International Armed Conflict<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/05\/ukraines-crisis-implications-for-the-law-of-armed-conflict\/\">Ukraine&#8217;s Crisis: Implications for the Law of Armed Conflict<\/a><time datetime=\"2014-05-24T08:29:54-04:00\" class=\"wp-block-latest-posts__post-date\">May 24, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Emory Law Professor Laurie R. Blank argues that the conflict in Ukraine demonstrates the importance of sustaining the strict separation between the law of armed conflict (LOAC) and the jus ad bellum, a low threshold for recognition of international armed conflict, and the principle of distinction in today\u2019s conflicts. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/03\/hostage-takers-and-fleeing-felons-questioning-two-analogies-to-the-imminent-threat-of-terrorist-attack-from-abroad\/\">Hostage-Takers and Fleeing Felons: Questioning Two Analogies to the \u201cImminent Threat\u201d of Terrorist Attack from Abroad<\/a><time datetime=\"2014-03-31T22:36:26-04:00\" class=\"wp-block-latest-posts__post-date\">March 31, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Amien Kacou, attorney at GPI Law PLLC, argues that analogies from the use of lethal force against hostage-takers or fleeing felons to justify targeted killings of suspected al Qaeda terrorists are misguided. <i>Image courtesy of Marie-Lan Nguyen \/ Wikimedia Commons \/ CC-BY 2.5.<\/i> <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/03\/crimean-diplomacy\/\">Crimean Diplomacy<\/a><time datetime=\"2014-03-18T11:03:45-04:00\" class=\"wp-block-latest-posts__post-date\">March 18, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Katherine Earle of AEI discusses the recent Crimean referendum to join Russia and the associated security implications.  <i>Image courtesy of Getty Images.<\/i> <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/03\/monthly-national-security-forum-february-2014\/\">Monthly National Security Forum: February 2014<\/a><time datetime=\"2014-03-03T15:14:58-05:00\" class=\"wp-block-latest-posts__post-date\">March 3, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">The Harvard National Security Journal is launching a new initiative. Each month, panelists will comment on a question posed by the NSJ staff. This month&#8217;s topic: metadata. <i>Image courtesy of NASA.<\/i> <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/02\/the-current-landscape-of-cybersecurity-policy-legislative-issues-in-the-113th-congress\/\">The Current Landscape of Cybersecurity Policy: Legislative Issues in the 113th Congress<\/a><time datetime=\"2014-02-06T17:36:31-05:00\" class=\"wp-block-latest-posts__post-date\">February 6, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Mitchell S. Kominsky, Counsel for the U.S. House Committee on Oversight and Government Reform, discusses the state of cybersecurity legislation and the evolving nature of cyber policy.  <i>Image courtesy of Getty Images.<\/i> <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2014\/02\/sharia-courts-move-to-the-battlefield-jabhat-al-nusra-opens-a-legal-front-in-the-syrian-civil-war\/\">Shari\u2019a Courts Move to the Battlefield:  Jabhat al-Nusra Opens a Legal Front in the Syrian Civil War<\/a><time datetime=\"2014-02-03T15:07:53-05:00\" class=\"wp-block-latest-posts__post-date\">February 3, 2014<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Corri Zoli and Emily Schneider untangle the infighting between rival groups in Syria and the calls to use Shari&#8217;a to mediate the conflicts on the battlefield. <i>Image courtesy of Wikimedia Commons.<\/i> <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/11\/the-reverse-draft-bringing-the-military-and-society-back-together\/\">The Reverse Draft: Bringing the Military and Society Back Together<\/a><time datetime=\"2013-11-18T13:13:53-05:00\" class=\"wp-block-latest-posts__post-date\">November 18, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Lieutenant Joseph Hatfield discusses the merits of a &#8220;reverse draft&#8221; in bridging the growing disconnect between civilian society and the military. <i>Photo courtesy of Wikimedia<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/10\/lessons-for-israel-from-ancient-chinese-military-thought-facing-iranian-nuclearization-with-sun-tzu\/\">Lessons for Israel from Ancient Chinese Military Thought: Facing Iranian Nuclearization with Sun-Tzu<\/a><time datetime=\"2013-10-24T20:35:40-04:00\" class=\"wp-block-latest-posts__post-date\">October 24, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Professor Louis Ren\u00e9 Beres brings to bear two classical traditions to apply them to Israeli strategic planning. In this article, he takes a fresh look at Sun-Tzu\u2019s <i>The Art of War<\/i> and weaves in Greek dialectical reasoning. <i>Image courtesy of Wikimedia Commons.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/09\/reforming-fisc-legislative-proposals-for-creating-a-more-balanced-fisa-court\/\">Reforming FISC: Legislative Proposals for Creating a More Balanced FISA Court<\/a><time datetime=\"2013-09-08T13:24:58-04:00\" class=\"wp-block-latest-posts__post-date\">September 8, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Harvard Law Student Menno Goedman discusses critiques of the FISC appointment process in light of the increased public scrutiny of American intelligence operations.  <i>Photo courtesy of Wikimedia<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/08\/striking-hezbollah-bound-weapons-in-syria-israels-actions-under-international-law\/\">Striking Hezbollah-Bound Weapons in Syria: Israel&#8217;s Actions Under International Law<\/a><time datetime=\"2013-08-26T16:54:19-04:00\" class=\"wp-block-latest-posts__post-date\">August 26, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Professor Louis Ren\u00e9 Beres considers Israeli actions in response to threats emanating from Syria, Lebanon, and Iran in the contexts of weapons transfers, missile attacks, and an increasingly volatile situation in Syria. <i>Map courtesy of Google Maps.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/08\/the-future-of-drone-warfare\/\">The Future of Drone Warfare<\/a><time datetime=\"2013-08-13T09:37:31-04:00\" class=\"wp-block-latest-posts__post-date\">August 13, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">University of Virginia Law Professor Frederick Hitz discusses his theories regarding what he terms the &#8220;relentless non-humanity&#8221; of drone warfare.  <i>Photo courtesy of Getty Images<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/07\/the-nsa-surveillance-controversy-how-the-ratchet-effect-can-impact-anti-terrorism-laws\/\">The NSA Surveillance Controversy: How the Ratchet Effect Can Impact Anti-Terrorism Laws<\/a><time datetime=\"2013-07-02T19:11:07-04:00\" class=\"wp-block-latest-posts__post-date\">July 2, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">King&#8217;s College London PhD student Austen D. Givens explores some of the ways in which the &#8220;ratchet effect&#8221; can impact anti-terrorism laws, making them difficult to scale back, and offers a set of policy recommendations to mitigate its effects. <i>Photo courtesy of Getty Images<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/06\/are-we-reaching-a-tipping-point-how-contemporary-challenges-are-affecting-the-military-necessity-humanity-balance\/\">Are We Reaching a Tipping Point? How Contemporary Challenges Are Affecting the Military Necessity-Humanity Balance<\/a><time datetime=\"2013-06-24T06:31:26-04:00\" class=\"wp-block-latest-posts__post-date\">June 24, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Major Shane R. Reeves and Lieutenant Colonel Jeffrey S. Thurnher address the relationship between the principles of military necessity and humanity, and warn that an overemphasis on humanity may be unfolding in the contexts of the &#8220;capture or kill&#8221; debate, autonomous weapons systems, and cyber warfare. <i>Photo courtesy of the U.S. Air Force<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/05\/on-wikipedia-lawfare-blogs-and-sources\/\">On Wikipedia, Lawfare, Blogs, and Sources<\/a><time datetime=\"2013-05-12T17:55:31-04:00\" class=\"wp-block-latest-posts__post-date\">May 12, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Benjamin Wittes and Stephanie Leutert discuss the stifling effects of Wikipedia censorship on the national discussion of Lawfare. <i>Photo courtesy of Reuters<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/03\/recent-developments-in-courtroom-lawfare\/\">Recent Developments in Courtroom Lawfare<\/a><time datetime=\"2013-03-25T18:36:10-04:00\" class=\"wp-block-latest-posts__post-date\">March 25, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Gerard J. Kennedy, Innokenty Pyetranker, and Manik Suri shed light on two recent Second Circuit opinions that will likely have an enduring impact on civil terrorism-related lawsuits.  <i>Photo courtesy of Twin Cities Business.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/03\/u-s-cements-presence-in-west-africa\/\">U.S. Cements Presence in West Africa<\/a><time datetime=\"2013-03-09T13:27:52-05:00\" class=\"wp-block-latest-posts__post-date\">March 9, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Michael Robertson: A new drone base in West Africa raises questions about the future of U.S. national security policy in this volatile region. <i>Photo courtesy of Lonely Planet.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/02\/the-new-tools-of-counterterrorism-combating-illicit-finance-and-imposing-sanctions\/\">The New Tools of Counterterrorism:  Combating Illicit Finance and Imposing Sanctions<\/a><time datetime=\"2013-02-22T19:00:58-05:00\" class=\"wp-block-latest-posts__post-date\">February 22, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Menno Goedman explains how one Treasury office has become a potent weapon in fighting terrorism and destabilizing regimes.  <i>Photo Courtesy of AP.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/02\/are-all-terrorizers-terrorists\/\">Are All Terrorizers \u201cTerrorists\u201d?<\/a><time datetime=\"2013-02-07T13:17:19-05:00\" class=\"wp-block-latest-posts__post-date\">February 7, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Sean K. Driscoll:  The New York State Court of Appeals has made clear that the definition of &#8220;terrorism&#8221; does not encompass gang violence. <i>Photo courtesy of Getty Images.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/02\/autonomous-weapon-systems-and-international-humanitarian-law-a-reply-to-the-critics\/\">Autonomous Weapon Systems and International Humanitarian Law: A Reply to the Critics<\/a><time datetime=\"2013-02-05T14:07:40-05:00\" class=\"wp-block-latest-posts__post-date\">February 5, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Prof. Michael N. Schmitt responds to the recent Human Rights Watch report, <i>Losing Humanity<\/i>, and argues it blurs the distinction between international humanitarian law\u2019s prohibitions on weapons per se and those on the unlawful use of otherwise lawful weapons. <i>Photo courtesy Sandia National Laboratories<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/01\/women-in-combat-ready-willing-and-able\/\">Women in Combat:  Ready, Willing and Able?<\/a><time datetime=\"2013-01-30T17:30:42-05:00\" class=\"wp-block-latest-posts__post-date\">January 30, 2013<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Laura Johnston:  Allowing women to serve in combat roles is overdue, and brings the United States in line with the trend in modern democracies.  <i>Photo courtesy of Reuters.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/12\/the-perilous-position-of-the-laws-of-war\/\">The Perilous Position of the Laws of War<\/a><time datetime=\"2012-12-06T15:12:12-05:00\" class=\"wp-block-latest-posts__post-date\">December 6, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Major Charles G. Kels argues that the current standoff over legal regimes applicable to counterterrorism operations misconstrues the law of armed conflict and risks undermining its moral force. <i>Photo courtesy of Judge Advocate General&#8217;s Legal Center and School.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/11\/targeting-in-outer-space-legal-aspects-of-operational-military-actions-in-space\/\">Targeting in Outer Space: Legal Aspects of Operational Military Actions in Space<\/a><time datetime=\"2012-11-25T09:56:35-05:00\" class=\"wp-block-latest-posts__post-date\">November 25, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">P.J. Blount, Research Counsel at the National Center for Remote Sensing, Air, and Space Law, explores the complicated legal landscape of targeting in space. <i>Photo courtesy of NASA.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/11\/tsa-turns-eleven-as-travelers-queue-up-for-thanksgiving\/\">TSA Turns Eleven as Travelers Queue Up for Thanksgiving<\/a><time datetime=\"2012-11-20T06:25:00-05:00\" class=\"wp-block-latest-posts__post-date\">November 20, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Catherine Arney: As one of the busiest travel periods of the year approaches, the trials and tribulations faced by the Transportation Security Administration merit attention and retrospection. <i>Photo courtesy of the Associated Press.<\/i><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/11\/strong-navy-needed-for-21st-century-challenges\/\">Strong Navy Needed for 21st Century Challenges<\/a><time datetime=\"2012-11-10T21:30:01-05:00\" class=\"wp-block-latest-posts__post-date\">November 10, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Jonathan H. Levy:  The United States Navy plays an critical role, and must not be underfunded in dangerous times. Photo courtesy of US Navy\/ Mass Communication Specialist 3rd Class Kenneth Abbate\/Released.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/10\/americas-greatest-threat-the-debt-crisis\/\">America\u2019s Greatest Threat?  The Debt Crisis<\/a><time datetime=\"2012-10-24T02:44:49-04:00\" class=\"wp-block-latest-posts__post-date\">October 24, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Roderick Miller: America&#8217;s national security has been imperiled by its mountain of public debt.  Photo courtesy of TIME.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/10\/united-states-v-jones-why-the-whole-court-is-calling-for-congressional-action\/\">United States v. Jones: Why the Whole Court is Calling for Congressional Action<\/a><time datetime=\"2012-10-14T15:41:34-04:00\" class=\"wp-block-latest-posts__post-date\">October 14, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Kait Michaud: The Supreme Court docket for 2012-2013 reveals the continued role that Fourth Amendment questions will play in future constitutional jurisprudence.  Until Congress takes action, it is likely that the Court will continue to deny without comment Fourth Amendment cases concerning new technological devices.  Photo courtesy of PBS.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/10\/john-kiriakou-reckless-lawbreaker-or-bold-whistleblower\/\">John Kiriakou: Reckless Lawbreaker or Bold Whistleblower?<\/a><time datetime=\"2012-10-07T11:00:03-04:00\" class=\"wp-block-latest-posts__post-date\">October 7, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Sara Slavin: The prosecution of CIA whistleblower John Kiriakou blurs the line between protecting our national security interests and chilling legitimate whistleblowing.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/10\/iran-sanctions-unprecedented-and-crippling-but-are-they-effective\/\">Iran Sanctions Unprecedented and Crippling; But Are They Effective?<\/a><time datetime=\"2012-10-06T10:00:44-04:00\" class=\"wp-block-latest-posts__post-date\">October 6, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Ronak D. Desai: The impact of the sanctions&#8211;and whether they will ultimately force Tehran to abandon its nuclear weapons program&#8211;remains to be seen.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/09\/afghanistan-and-the-future-of-the-good-war\/\">Afghanistan and the Future of the \u201cGood War\u201d<\/a><time datetime=\"2012-09-30T12:30:30-04:00\" class=\"wp-block-latest-posts__post-date\">September 30, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Should the U.S. &#038; NATO accelerate the withdrawal from Afghanistan or &#8220;stay the course?&#8221;<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/09\/national-security-by-the-numbers-why-we-should-redouble-efforts-to-express-analytic-certainty\/\">National Security by the Numbers: Why We Should Redouble Efforts to Express Analytic Certainty<\/a><time datetime=\"2012-09-03T09:00:14-04:00\" class=\"wp-block-latest-posts__post-date\">September 3, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By Manik V. Suri<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/08\/blurring-the-civilian-combatant-line-legal-implications-of-deploying-u-s-civilian-mariners-in-the-libyan-theater\/\">Blurring the Civilian-Combatant Line: Legal Implications of Deploying U.S. Civilian Mariners in the Libyan Theater<\/a><time datetime=\"2012-08-16T09:03:40-04:00\" class=\"wp-block-latest-posts__post-date\">August 16, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">LT Elan R. Ghazal and Manik V. Suri explore the growing civilian integration in the U.S. armed forces<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/07\/restraining-habeas-boumediene-kiyemba-and-the-limits-of-remedial-authority\/\">Restraining Habeas: Boumediene, Kiyemba, and the Limits of Remedial Authority<\/a><time datetime=\"2012-07-22T13:15:07-04:00\" class=\"wp-block-latest-posts__post-date\">July 22, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">As three Uighurs remain in Guantanamo, Daniel J. Feith finds that the D.C. Circuit ruling that kept them there is surprisingly consistent with Boumediene. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/06\/obama-peacemaker-to-warrior\/\">Obama: Peacemaker to Warrior?<\/a><time datetime=\"2012-06-06T20:07:52-04:00\" class=\"wp-block-latest-posts__post-date\">June 6, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">From Obama the peacemaker and winner of the Nobel Peace Prize to fearsome warrior ruthlessly killing terrorists<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/05\/history-hamdan-and-happenstance-conspiracy-by-two-or-more-to-violate-the-laws-of-war-by-destroying-life-or-property-in-aid-of-the-enemy\/\">History, Hamdan, and Happenstance: \u201cConspiracy by Two or More To Violate the Laws of War by Destroying Life or Property in Aid of the Enemy\u201d<\/a><time datetime=\"2012-05-13T14:50:27-04:00\" class=\"wp-block-latest-posts__post-date\">May 13, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">In June 2006, a plurality of the Supreme Court in Hamdan v. Rumsfeld determined that the Government failed to make a colorable case for the inclusion of conspiracy among those offenses cognizable by law-of-war military commission. The plurality\u2019s reasoning was largely based on its survey of domestic law sources and precedents. That survey, however, was inaccurate and incomplete.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/04\/dana-priests-keynote\/\">Dana Priest&#8217;s Keynote<\/a><time datetime=\"2012-04-14T14:56:13-04:00\" class=\"wp-block-latest-posts__post-date\">April 14, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">On April 6, the National Security Journal hosted its 2012 symposium: The Law and Policy of Covert Operations: Current &amp; Future Challenges. Dana Priest of the Washington Post gave the keynote address at the symposium. A video of her keynote address is available here.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/04\/offensive-lawfare-and-the-current-conflict\/\">Offensive Lawfare and the Current Conflict<\/a><time datetime=\"2012-04-10T01:17:06-04:00\" class=\"wp-block-latest-posts__post-date\">April 10, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">By\u00a0 Colonel Mark W. Holzer * &#8212; Click here to read the full text as a PDF Abstract The term \u201clawfare\u201d has become part of the lexicon of the current global conflict and although it is defined in various ways, it is essentially a way to describe legal activities within the context of armed conflict. To date, the term has not been applied to legal activities focused on negatively impacting United States\u2019 adversaries. This article\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/04\/offensive-lawfare-and-the-current-conflict\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Offensive Lawfare and the Current Conflict<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/journals.law.harvard.edu\/nsj\/2012\/04\/nypd-counterterror-investigations\/\">NYPD Counterterror Investigations<\/a><time datetime=\"2012-04-10T00:24:23-04:00\" class=\"wp-block-latest-posts__post-date\">April 10, 2012<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Ben White: The NYPD counter-radicalization strategy is an example of the often-inconsistent approaches of various federal, state, and local law enforcement agencies to combating radicalization.<\/div><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"","protected":false},"author":212,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"boxed","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-5832","page","type-page","status-publish","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/PeZtUX-1w4","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages\/5832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=5832"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages\/5832\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=5832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}