{"id":6790,"date":"2022-12-22T08:12:16","date_gmt":"2022-12-22T08:12:14","guid":{"rendered":"https:\/\/harvardnsj.org\/?page_id=6790"},"modified":"2026-03-05T15:20:27","modified_gmt":"2026-03-05T20:20:27","slug":"volumes-2","status":"publish","type":"page","link":"https:\/\/journals.law.harvard.edu\/nsj\/volumes-2\/","title":{"rendered":"Volume Archive"},"content":{"rendered":"\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 17<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/12\/Modirzadeh_17-Harv.-Natl-Sec.-J.-1-2025.pdf\">\u201cViolent, Vicious, and Fast\u201d: LSCO Lawyering and the Transformation of American IHL<\/a><\/strong><br><em>by Naz Khatoon Modirzadeh<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/12\/Wu-17-Harv.-Natl-Sec.-J.-1-2025-1.pdf\">Techno-Federalism: How Regulatory Fragmentation Shapes the U.S.-China AI Race<\/a><\/strong><br><em>by Jason Jia-Xi Wu<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/12\/Maurer_17-Harv.-Natl-Sec.-J.-1-2025.pdf\">The Generals&#8217; Constitution <em>In Extremis<\/em>: Civil Rights, Civilian Supremacy, and a National Security Commitment &#8220;Most Severely Tested&#8221;<\/a><\/strong><br><em>by Dan Maurer<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 16<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/01\/Dickinson_16-Harvard-Natl-Security-J.-1-2025.pdf\">Protecting the U.S. National Security State from a Rogue President<\/a><\/strong><br><em>by<\/em> <em>Laura A. Dickinson<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/01\/Kim_16_Harvard_Natl_Sec_J._1-2025_.pdf\">Chip Security: Reconciling Industrial Subsidies with WTO Rules and the National Security Exception<\/a><\/strong><br><em>by \u201cMark\u201d Min Seong Kim<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/01\/Giannoni-Crystal_16_Harvard_Natl_Sec_J_1._2025.pdf\">The Legality of Defending National Activities on the Moon<\/a><\/strong><br><em>by Francesca Giannoni-Crystal<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/06\/Guthrie_16_Harvard_Natl_Security_J_1-v2.pdf\">Flying Saucers and the Ivory Dome: Congressional Oversight Concerning Unidentified Anomalous Phenomena<\/a><\/strong><br><em>by Dillon Guthrie<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/06\/Kazemi_16-Harvard-Natl-Security-J.-2-2025.pdf\"><strong>Starving the Beast: A New Vetting Model to Prevent Corruption in International Security Sector Assistance<\/strong><\/a><br><em>by Nahal Kazemi<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/06\/Bradford-Li-and-Waxman_16_Harvard-Natl_Security_J._2-2025.pdf\"><strong>How Domestic Institutions Shape Global Tech War<\/strong><\/a><br><em>by<\/em> <em>Anu Bradford, Eileen Li, &amp; Matthew C. Waxman<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/06\/Smith-16-Harvard-Natl-Security-J.-2-2025.pdf\"><strong>Chinese Lawfare in Conflict: The Threat to U.S. Operations<\/strong><\/a><br><em>by Crispin Smith<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2025\/11\/Lusthaus_16-Harvard-Natl-Security-J.-2-2025.pdf\"><strong>The Cybercrime Industry<\/strong><\/a><br><em>by Jonathan Lusthaus<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 15<\/summary>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/05\/Daugirdas-Linos_14-Harv.-Natl-Sec.-J.-181-2023.pdf\" data-type=\"attachment\" data-id=\"7104\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Back to Basics: The Benefits of Paradigmatic International Organizations<\/strong><\/a><br><em>by Kristina Daugirdas and Katerina Linos<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/05\/Fletcher_14-Harv.-Natl-Sec.-J.-254-2023.pdf\" data-type=\"attachment\" data-id=\"7105\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Strict Subordination: The Origins of Civil Control of Private Military Power in State Constitutions<\/strong><\/a><br><em>by Alden A. Fletcher<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/05\/Hathaway_14-Harv.-Natl-Sec.-J.-336-2023.pdf\" data-type=\"attachment\" data-id=\"7106\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>How the Erosion of U.S. War Powers Constraints Has Undermined International Law Constraints on the Use of Force<\/strong><\/a><br><em>by Oona A. Hathaway<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2024\/05\/Ahmed_15_Harvard_Natl_Security_J_2.pdf\">Book Review: Hidden in Plain Sight: Redefining the Field of National Security (reviewing Race and National Security<\/a><\/strong><br><em>by Aziza Ahmed<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2024\/05\/Sokol_15_Harvard_Natl_Security_J_2.pdf\">The Significance of a Judicial Power to Identify Major Questions and Shield State Secrets for the Future of Foreign Affairs and National Security Governance<\/a><\/strong><br><em>by Karen C. Sokol<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2024\/05\/Koplow_15_Harvard_Natl_Security_J_2.pdf\">Large Constellations of Small Satellites: The Good, the Bad, the Ugly, and the Illegal<\/a><\/strong><br><em>by David A. Koplow<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2024\/05\/Li_15_Harvard_Natl_Security_J_2.pdf\" data-type=\"link\" data-id=\"Li_15_Harvard_Natl_Security_J_2.pdf\">Performative Economic Sanctions: How Sanctions Work Without Economic Harm<\/a><\/strong><br><em>by Katniss Xuejiao Li<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2024\/01\/Jamshidi_15-Harvard-Natl-Security-J.-1-2023-3.pdf\" data-type=\"attachment\" data-id=\"7223\">How Private Actors Are Impacting U.S. Economic Sanctions<\/a><\/strong><br><em>by<\/em> <em>Maryam Jamshidi<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/12\/Heller_15-Harv.-Natl-Sec.-J.-1-2023.pdf\">The Concept of \u201cThe Human\u201d in the Critique of Autonomous Weapons<\/a><\/strong><br><em>by <\/em>Kevin Jon Heller<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/12\/Dunlap_15-Harv.-Natl-Sec.-J.-1-2023.pdf\">Return to Sender?: Analyzing the Senior Leader \u201cOpen Letter\u201d On Civilian Control of the Military<\/a><\/strong><br><em>by<\/em> <em>Maj. Gen. Charles J. Dunlap, Jr., USAF (Ret.<\/em>)<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2024\/01\/Mirasola_15-Harvard-Natl-Security-J.-1-2023.pdf\">Sovereignty, Article II, and the Military During Domestic Unrest<\/a><\/strong><br><em>by<\/em> Christopher Mirasola<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 14<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/12\/Gorton-Zhang_14-Harv.-Natl-Sec.-J.-1-2022.pdf\" data-type=\"attachment\" data-id=\"6945\">The Orkney Slew and Central Bank Digital Currencies<\/a><\/strong><br><em>by Gary B. Gorton and Jeffery Y. Zhang<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/12\/Singh_14-Harv.-Natl-Sec.-J.-49-2022.pdf\" data-type=\"attachment\" data-id=\"6946\">It\u2019s Not Just the Economics: Why U.S. Leadership on CBDCs Is a National Security Imperative<\/a><\/strong><br><em>by Daleep Singh<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/12\/Waller_14-Harv.-Natl-Sec.-J.-60-2022.pdf\" data-type=\"attachment\" data-id=\"6947\">The U.S. Dollar and Central Bank Digital Currencies<\/a><\/strong><br><em>by Christopher J. Waller<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/12\/Jackson-Schoar-Massad_14-Harv.-Natl-Sec.-J.-67-2022.pdf\" data-type=\"attachment\" data-id=\"6948\">A Meeting of Minds on Central Bank Digital Currencies for the United States: Commentaries from Participants in the Harvard National Security Journal\u2019s October 14, 2022 Symposium on Digital Currencies and National Security<\/a><\/strong><br><em>by Howell Jackson, Antionette Schoar, and Timothy Massad<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/12\/Fanti_14-Harv.-Natl-Sec.-J.-75-2022.pdf\" data-type=\"attachment\" data-id=\"6949\">An Apparent Trilemma for Cross-Border Central Bank Digital Currencies<\/a><\/strong><br><em>by Giulia Fanti<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/12\/Wagman_14-Harv.-Natl-Sec.-J.-87-2022.pdf\" data-type=\"attachment\" data-id=\"6950\">Cryptocurrencies and National Security: The Case of Money Laundering and Terrorism Financing<\/a><\/strong><br><em>by Shlomit Wagman<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/12\/Glennon_14-Harv.-Natl-Sec.-J.-102-2022.pdf\" data-type=\"attachment\" data-id=\"6951\">Symbiotic Security and Free Speech<\/a><\/strong><br><em>by Michael J. Glennon<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/05\/Daugirdas-Linos_14-Harv.-Natl-Sec.-J.-181-2023.pdf\" data-type=\"attachment\" data-id=\"7104\" target=\"_blank\" rel=\"noreferrer noopener\">Back to Basics: The Benefits of Paradigmatic International Organizations<\/a><\/strong><br><em>by Kristina Daugirdas and Katerina Linos<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/05\/Fletcher_14-Harv.-Natl-Sec.-J.-254-2023.pdf\" data-type=\"attachment\" data-id=\"7105\" target=\"_blank\" rel=\"noreferrer noopener\">Strict Subordination: The Origins of Civil Control of Private Military Power in State Constitutions<\/a><\/strong><br><em>by Alden A. Fletcher<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2023\/05\/Hathaway_14-Harv.-Natl-Sec.-J.-336-2023.pdf\" data-type=\"attachment\" data-id=\"7106\" target=\"_blank\" rel=\"noreferrer noopener\">How the Erosion of U.S. War Powers Constraints Has Undermined International Law Constraints on the Use of Force<\/a><\/strong><br><em>by Oona A. Hathaway<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 13<\/summary>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Eichensehr-CFIUSPreemption.pdf\"><strong>CFIUS Preemption<\/strong><\/a><br><em>by Kristen E. Eichensehr<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Koplow-ReverseDistinction.pdf\" data-type=\"attachment\" data-id=\"5515\"><strong>Reverse Distinction: A U.S. Violation of the Law of Armed Conflict in Space<\/strong><\/a><em><br>by David A. Koplow<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Yeini-IronDome.pdf\" data-type=\"attachment\" data-id=\"5533\"><strong>Iron Dome and&nbsp;Jus Ad Bellum Proportionality<\/strong><\/a><em><br>by Shelly Aviv Yeini<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/01\/HNSJ-Vol-13-Beller-401Forbidden.pdf\" data-type=\"attachment\" data-id=\"5534\"><strong>401\u2013Forbidden: An Empirical Study of Foreign Intelligence Surveillance Act Notices, 1990\u20132020<\/strong><\/a><em><br>by Sarah Beller<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf\" data-type=\"attachment\" data-id=\"5557\"><strong>Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process<\/strong><\/a><br><em>by Nadiya Kostyuk and Susan Landau<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Glazier_WithdrawalFromAfghanistan.pdf\" data-type=\"attachment\" data-id=\"5556\"><strong>Withdrawal from Afghanistan Marks Guant\u00e1namo\u2019s Endpoint<\/strong><\/a><br><em>by David Glazier<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Zarate-Watson_LexiconOfTerror.pdf\" data-type=\"attachment\" data-id=\"5558\"><strong>The Lexicon of Terror: Crystallization of the Definition of \u201cTerrorism\u201d Through the Lens of Terrorist Financing &amp; The Financial Action Task Force<\/strong><\/a><em><br>by Juan Zarate and Sarah Watson<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Cook_IsEsquireAHigherClearance.pdf\" data-type=\"attachment\" data-id=\"5559\"><strong>Is Esquire a Higher Clearance than Top Secret?: A Comparison of the Bar Admission and National Security Clearance Processes<\/strong><\/a><br><em>by John Cook<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 12<\/summary>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Guruli-Pro-Constitutional-Engagement.pdf\" data-type=\"attachment\" data-id=\"5377\"><strong>Pro-Constitutional Engagement: Judicial Review, Legislative Avoidance and Institutional Interdependence in National Security<\/strong><\/a><br><em>by Nino Guruli<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Jaycox-No-Oversight-No-Limits-No-Worries.pdf\" data-type=\"attachment\" data-id=\"5357\"><strong>No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order 12,333<\/strong><\/a><br>by Mark M. Jaycox<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Kiessling-Gray-Zone-Tactics-and-the-Principle-of-Non-Intervention.pdf\" data-type=\"attachment\" data-id=\"5358\"><strong>Gray Zone Tactics and the Principle of Non-Intervention: Can \u201cOne of the Vaguest Branches of International Law\u201d Solve the Gray Zone Problem?<\/strong><\/a><br>by Elizabeth K. Kiessling<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/HNSJ-Vol-12-Wallace-Reeves-and-Powell-Direct-Participation-in-Hostilities-in-the-Age-of-Cyber.pdf\" data-type=\"attachment\" data-id=\"5359\"><strong>Direct Participation in Hostilities in the Age of Cyber: Exploring the Fault Lines<\/strong><\/a><em><br>by Brig. Gen. (ret.) David Wallace, Col. Shane Reeves, and Maj. Trent Powell<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Donohue-The-Evolution-and-Jurisprudence-of-FISC-and-FISCR.pdf\" data-type=\"attachment\" data-id=\"5454\"><strong>The Evolution and Jurisprudence of the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review<\/strong><\/a><em><br>by Laura K. Donohue<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Krishnamurthy-and-Perez-Contemptuous-Speech.pdf\" data-type=\"attachment\" data-id=\"5455\"><strong>Contemptuous Speech: Rethinking the Balance Between Good Order and Discipline and the Free Speech Rights of Retired Military Officers<\/strong><\/a><em><br>by Pavan S. Krishnamurthy &amp; Javier Perez<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Larsen-Before-22National-Security22.pdf\" data-type=\"attachment\" data-id=\"5456\"><strong>Before \u201cNational Security\u201d: The Espionage Act of 1917 and the Concept of \u201cNational Defense\u201d<\/strong><\/a><em><br>by Daniel Larsen<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/07\/HNSJ-Vol-12-Schmitt-and-Watts-Collective-Cyber-Countermeasures.pdf\" data-type=\"attachment\" data-id=\"5457\"><strong>Collective Cyber Countermeasures?<\/strong><\/a><br><em>by Michael N. Schmitt and Sean Watts<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 11<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/CORCORAN_Vol.-11.1.pdf\" data-type=\"attachment\" data-id=\"5148\">Unnamed &amp; Uncharged: Next Friend Standing and the Anonymous Detainee<\/a><br><\/strong><em>by Scott Harman-Heath<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/06\/DAVIS_FINAL.pdf\">Bilateral Defense-Related Treaties and the Dilemma Posed by the Law of Neutrality<\/a><br><\/strong><em>by Jeremy K. Davis<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/CORCORAN_Vol.-11.1.pdf\" data-type=\"link\" data-id=\"CORCORAN_Vol.-11.1.pdf\">A Comparative Study of Domestic Laws Constraining Private Sector Active Defense Measures in Cyberspace<\/a><\/strong><br><em>by Brian Corcoran<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/STIGALL_Vol.-11.1-v3.pdf\" data-type=\"attachment\" data-id=\"5153\"><strong>The Syrian Detention Conundrum:&nbsp;International and Comparative Legal Complexities<\/strong><\/a><em><br>by Dan E. Stigall<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/KREBS_Vol.-11.1.pdf\" data-type=\"attachment\" data-id=\"5146\">Law Wars:&nbsp;Experimental Data on the Impact of Legal Labels on Wartime Event Beliefs<\/a><\/strong><em><br>by Shiri Krebs<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/01\/PROULX_Vol.-11.1.pdf\" data-type=\"attachment\" data-id=\"5145\">A Postmortem for International Criminal Law? Terrorism, Law and Politics, and the Reaffirmation of State Sovereignty<\/a><\/strong><em><br>by&nbsp;Vincent-Jo\u00ebl Proulx<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/04\/FIDLER_Vol.-11.2.pdf\"><strong>First Amendment Sentence Mitigation: Beyond a Public Accountability Defense for Whistleblowers<\/strong><\/a><em><br>by Mailyn Fidler<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/04\/PERLIN_Vol.-11.2.pdf\"><strong>Defense and Deference: Empirically Assessing Judicial Review of Freedom of Information Act\u2019s National Security Exemption<\/strong><\/a><em><br>by Paulina Perlin<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/06\/LANDAU_LUBIN_FINAL.pdf\">Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act\u2019s Metadata Program be Extended?<\/a><\/strong><em><br>by Susan Landau &amp; Asaf Lubin<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/06\/GHIOTTO_FINAL.pdf\">Defending Against the Military: The Posse Comitatus Act\u2019s Exclusionary Rule<\/a><\/strong><em><br>by Anthony J. Ghiotto<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/06\/HARMAN-HEATH_FINAL.pdf\">Unnamed &amp; Uncharged: Next Friend Standing and the Anonymous Detainee<\/a><\/strong><em><br>by Scott Harman-Heath<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/06\/DAVIS_FINAL.pdf\">Bilateral Defense-Related Treaties and the Dilemma Posed by the Law of Neutrality<\/a><\/strong><em><br>by Jeremy K. Davis<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 10<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Yemen-Is-the-U.S.-Breaking-the-Law.pdf\" data-type=\"attachment\" data-id=\"5033\">Yemen: Is the U.S. Breaking the Law?<\/a><\/strong><br><em>by Oona Hathaway,&nbsp;Aaron Haviland, Srinath Reddy Kethireddy and Alyssa T. Yamamoto<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Return-of-Gunboat-Diplomacy.pdf\" data-type=\"attachment\" data-id=\"5034\">The Return of Gunboat Diplomacy: How the West has Undermined the Ban on the Use of Force<\/a><\/strong><em><br>by Patrick C. R. Terry<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Uncertainty-in-the-Law-of-Targeting.pdf\" data-type=\"attachment\" data-id=\"5035\">Uncertainty in the Law of Targeting: Towards a Cognitive Framework<\/a><\/strong><em><br>by Michael N. Schmitt and Major Michael Schauss<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/War-Powers-far-from-a-Hot-Battlefield.pdf\" data-type=\"attachment\" data-id=\"5122\">War Powers far from a Hot Battlefield: Checks and Balances on Presidential War-Making through Individual and Unit Self-Defense<\/a><\/strong><br><em>by E. L. Gaston<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/02\/Fiduciary-Duty-Honor-Country.pdf\" data-type=\"attachment\" data-id=\"5037\">Fiduciary Duty, Honor, Country: Legislating a Theory of Agency into Strategic Civil-Military Relations<\/a><\/strong><em><br>by Major Dan Maurer<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Totemic-Functionalism-in-Foreign-Affairs-Law.pdf\" data-type=\"attachment\" data-id=\"5130\">Totemic Functionalism in Foreign Affairs Law<\/a><\/strong><em><br>by Elad D. Gil<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Getting-Past-the-Imperial-Presidency.pdf\" data-type=\"attachment\" data-id=\"5129\">Getting Past the Imperial Presidency<\/a><\/strong><br><em>by Deborah Pearlstein<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Mutual-Assistance-Clauses-of-the-North-Atlantic-and-EU-Treaties.pdf\" data-type=\"attachment\" data-id=\"5131\">The Mutual Assistance Clauses of the North Atlantic and EU Treaties: The Challenge of Hybrid Threats<\/a><\/strong><em><br>by Aurel Sari<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2019\/06\/Law-Enforcement-Paradigm-under-the-Laws-of-Armed-Conflict.pdf\" data-type=\"attachment\" data-id=\"5135\">The Law Enforcement Paradigm under the Laws of Armed Conflict: Conceptualizing Yesh Din v. IDF Chief of Staff<\/a><\/strong><em><br>by Shelly Aviv Yeini<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 9<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/1_Trenga_StateSecrets-2.pdf\" data-type=\"attachment\" data-id=\"4916\">What Judges Say and Do in Deciding National Security Cases: The Example of the State Secrets Privilege<br><\/a><\/strong><em>by Judge Anthony John Trenga<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/2_SchmittHighfill_Invisible-Injuries-1.pdf\" data-type=\"attachment\" data-id=\"4911\"><strong>Invisible Injuries: Concussive Effects and International Humanitarian Law<\/strong><\/a><em><a href=\"https:\/\/harvardnsj.org\/wp-content\/uploads\/sites\/13\/2018\/01\/2_SchmittHighfill_Invisible-Injuries-1.pdf\"><strong><br><\/strong><\/a>by Professor Michael N. Schmitt and Major Chad E. Highfill<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/3_Revkin_WhenTerroristsGovern-2.pdf\" data-type=\"attachment\" data-id=\"4915\"><strong>When Terrorists Govern: Protecting Civilians in Conflicts with State-Building Armed Groups<\/strong><\/a><em><a href=\"https:\/\/harvardnsj.org\/wp-content\/uploads\/sites\/13\/2018\/01\/3_Revkin_WhenTerroristsGovern-2.pdf\"><strong><br><\/strong><\/a>by Mara R. Revkin<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/4_Kilovaty_Doxfare-1.pdf\" data-type=\"attachment\" data-id=\"4909\"><strong>Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information<\/strong><\/a><em><a href=\"https:\/\/harvardnsj.org\/wp-content\/uploads\/sites\/13\/2018\/01\/4_Kilovaty_Doxfare-1.pdf\"><strong><br><\/strong><\/a>by Ido Kilovaty<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/01\/5_Lawless_StateofComplicity-1.pdf\" data-type=\"attachment\" data-id=\"4908\"><strong>A State of Complicity: How Russia\u2019s Persistent and Public Denial of Syrian Battlefield Atrocities Violates International Law<\/strong><\/a><em><a href=\"https:\/\/harvardnsj.org\/wp-content\/uploads\/sites\/13\/2018\/01\/5_Lawless_StateofComplicity-1.pdf\"><strong><br><\/strong><\/a>by Captain Robert Lawless<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/WakelyIndorf_CFIUS_05.28.18-1.pdf\" data-type=\"attachment\" data-id=\"4940\"><strong>Managing National Security Risk in an Open Economy: Reforming the Committee on Foreign Investment in the United States&nbsp;<\/strong><\/a><em><br>by Jonathan Wakely &amp; Andrew Indorf<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/2_Crootof_LimitsOfAnalogy_06.08.18.pdf\" data-type=\"attachment\" data-id=\"4943\">Autonomous Weapon Systems and the Limits of Analogy<\/a><\/strong><em><strong><br><\/strong>by Rebecca Crootof<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/3_Colangelo_DutyToDisobey_06.08.18.pdf\" data-type=\"attachment\" data-id=\"4944\"><strong>The Duty to Disobey Illegal Nuclear Strike Orders<\/strong><\/a><em><br>by Anthony J. Colangelo<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/4_Fabbrini_NatoObligations_06.08.18.pdf\" data-type=\"attachment\" data-id=\"4945\"><strong>Do NATO Obligations Trump European Budgetary Constraints?<\/strong><\/a><em><br>by Federico Fabbrini<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2018\/06\/5_Fahey_AccessControl_06.08.18.pdf\" data-type=\"attachment\" data-id=\"4946\">Access Control: Freedom of the Seas in the Arctic and the Russian Northern Sea Route Regime<\/a><\/strong><em><strong><br><\/strong>by Sean Fahey<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 8<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/1.-Berkell.pdf\" data-type=\"attachment\" data-id=\"4803\">Off-Ramp Opportunities in Material Support Cases<\/a><\/strong><br><em>by Kelly A. Berkell<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/2.-Klein_Flinn.pdf\" data-type=\"attachment\" data-id=\"4804\">Social Media Compliance Programs and the War Against Terrorism<\/a><\/strong><br><em>by Susan Klein and Crystal Flinn<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Casavant_MDLEA.pdf\" data-type=\"attachment\" data-id=\"4817\">In Defense of the U.S. Maritime Drug Law Enforcement Act: A Justification for the Law\u2019s Extraterritorial Reach<\/a><\/strong><br><em>by Lieutenant Commander Aaron J. Casavant<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/4.-Koplow.pdf\" data-type=\"attachment\" data-id=\"4806\">Eve of Destruction: Implementing Arms Control Treaty Obligations to Dismantle Weaponry<\/a><\/strong><br><em>by David A. Koplow<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Schmitt-NSJ-Vol-8.pdf\" data-type=\"attachment\" data-id=\"4835\">Peacetime Cyber Responses and and Wartime Cyber Operations under International Law: An Analytical&nbsp;<em>Vade Mecum<\/em><\/a><\/strong><br><em>by Michael N. Schmitt<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Gaston-NSJ-Vol-8.pdf\" data-type=\"attachment\" data-id=\"4836\">Reconceptualizing Individual or Unit Self-Defense as a Combatant Privilege<\/a><\/strong><br><em>by E. L. Gaston<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Beer-NSJ-Vol-8.pdf\" data-type=\"attachment\" data-id=\"4837\">Military Strategy: The Blind Spot of International Humanitarian Law<\/a><\/strong><br><em>by Yishai Beer<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Schuller-NSJ-Vol-8.pdf\" data-type=\"attachment\" data-id=\"4838\">At the Crossroads of Control: The Intersection of Artificial Intelligence in Autonomous Weapon Systems with International Humanitarian Law<\/a><\/strong><br><em>by Alan L. Schuller<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2017\/02\/Andresen-NSJ-Vol-8.pdf\" data-type=\"attachment\" data-id=\"4839\">Putting Lethal Force on the Table: How Drones Change the Alternative Space of War and Counterterrorism<\/a><\/strong><br><em>by Joshua Andresen<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 7<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Deeks-PUBLISH.pdf\" data-type=\"attachment\" data-id=\"4683\">Intelligence Communities, Peer Constraints and the Law<\/a><\/strong><br><em>by&nbsp;Ashley Deeks<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Fields-PUBLISH.pdf\" data-type=\"attachment\" data-id=\"4684\">Article 234 of the United Nations Convention on the Law of the Sea: the Overlooked Linchpin for Achieving Safety and Security in the U.S. Arctic?<\/a><\/strong><em><br>by Stanley P. Fields<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Almond-PUBLISH.pdf\" data-type=\"attachment\" data-id=\"4681\">Clearing the Air Above the East China Sea: the Primary Elements of Aircraft Defense Identification Zones<\/a><\/strong><em><br>by&nbsp;Roncevert Almond<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/02\/Avriel-PUBLISH.pdf\" data-type=\"attachment\" data-id=\"4682\">Terrorism 2.0: the Rise of the Civilitary Battlefield<\/a><\/strong><em><br>by&nbsp;Gil Avriel<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/05\/Rudesill-Secret-Law.pdf\" data-type=\"attachment\" data-id=\"4726\">Coming to Terms with Secret Law<\/a><\/strong><br><em>by Dakota S. Rudesill<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Carlin-FINAL.pdf\" data-type=\"attachment\" data-id=\"4734\">Detect, Disrupt, Deter: A Whole-of-Government Approach to&nbsp;National Security Cyber Threats<\/a><\/strong><em><br>by John P. Carlin<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Debarre-FINAL.pdf\" data-type=\"attachment\" data-id=\"4742\">U.S.-Hired Private Military and Security Companies in Armed Conflict: Indirect Participation and its Consequences<\/a><\/strong><em><br>by Alice S. Debarre<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Richemond-Barak-and-Feinberg-FINAL-JM.pdf\" data-type=\"attachment\" data-id=\"4737\">The Irony of the Iron Dome:&nbsp;Intelligent Defense Systems, Law, and Security<\/a><\/strong><em><br>by&nbsp;Daphn\u00e9 Richemond-Barak &amp;&nbsp;Ayal Feinberg<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Combe-FINAL.pdf\" data-type=\"attachment\" data-id=\"4743\">Traditional Military Activities in Cyberspace: The Scope of Conventional Military Authorities in the Unconventional Battlespace<\/a><\/strong><em><br>by&nbsp;Peter C. Combe II<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/06\/Whittemore.pdf\" data-type=\"attachment\" data-id=\"4748\">Proportionality Decision Making in Targeting: Heuristics, Cognitive Biases, and the Law<\/a><\/strong><em><br>by&nbsp;Luke A. Whittemore<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 6<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Brand.pdf\" data-type=\"attachment\" data-id=\"4565\" target=\"_blank\" rel=\"noreferrer noopener\">Eavesdropping On Our Founding Fathers: How a Return to the Republic\u2019s Core Democratic Values Can Help Us Resolve the Surveillance Crisis<\/a><\/strong><br><em>by Jeffrey Brand<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Greene-Vol6.pdf\" data-type=\"attachment\" data-id=\"4573\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Enforcement of Mass Involuntary Quarantines: Toward a Specialized Standing Rules for the Use of Force<\/a><\/strong><em><br>by Jesse T. Greene<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Schlanger.pdf\" data-type=\"attachment\" data-id=\"4566\" target=\"_blank\" rel=\"noreferrer noopener\">Intelligence Legalism and the National Security Agency\u2019s Civil Liberties Gap<\/a><\/strong><em><br>by Margo Schlanger<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Alcala-Vol6.pdf\" data-type=\"attachment\" data-id=\"4574\" target=\"_blank\" rel=\"noreferrer noopener\">Babylon Revisited: Reestablishing a Corps of Cultural Property Specialists for the Protection of Cultural Property in Armed Conflict<\/a><\/strong><em><br>by&nbsp;Ronald T.P. Alcala<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/02\/Pearlman.pdf\" data-type=\"attachment\" data-id=\"4624\" target=\"_blank\" rel=\"noreferrer noopener\">Meaningful Review and Process Due: How Guantanamo Detention is Changing the Battlefield<\/a><\/strong><em><br>by&nbsp;Adam Pearlman<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Sloane.pdf\" data-type=\"attachment\" data-id=\"4622\" target=\"_blank\" rel=\"noreferrer noopener\">Puzzles of Proportion and the \u201cReasonable Military Commander\u201d: Reflections on the Law, Ethics, and Geopolitics of Proportionality<\/a><\/strong><em><br>by Robert Sloane<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Curran.pdf\" data-type=\"attachment\" data-id=\"4619\" target=\"_blank\" rel=\"noreferrer noopener\">Spillover: Evolving Threats and Converging Legal Authorities in the Fight Against Mexican Drug Cartels<\/a><\/strong><em><br>by Christopher Curran<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Helal.pdf\" data-type=\"attachment\" data-id=\"4618\"><strong>Am I My Brother\u2019s Keeper? The Reality, Tragedy, and Future of Collective Security<\/strong><\/a><em><br>by Mohamed Helal<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/06\/Chayes.pdf\" data-type=\"attachment\" data-id=\"4620\"><strong>Rethinking Warfare: The Ambiguity of Cyber Attacks<\/strong><\/a><em><br>by Antonia Chayes<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 5<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Glennon-Final.pdf\" data-type=\"attachment\" data-id=\"4188\">National Security and Double Government<\/a><\/strong><br><em>by Michael J. Glennon<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Daskal-Vladeck-Final.pdf\" data-type=\"attachment\" data-id=\"4196\">After the AUMF<\/a><\/strong><br><em>by Jennifer Daskal and Stephen I. Vladeck<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Aziz-Final.pdf\" data-type=\"attachment\" data-id=\"4203\">Policing Terrorists in the Community<\/a><\/strong><br><em>by Sahar F. Aziz<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Modirzadeh-Final.pdf\" data-type=\"attachment\" data-id=\"4204\">Folk International Law: 9\/11 Lawyering and the Transformation of the Law of Armed Conflict to Human Rights Policy and Human Rights Law to War Governance<\/a><\/strong><em><br>by Naz K. Modirzadeh<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Chesney-Final.pdf\" data-type=\"attachment\" data-id=\"4205\">Postwar<\/a><\/strong><br><em>by Robert M. Chesney<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Harvey-Foreword.pdf\" data-type=\"attachment\" data-id=\"4446\">Foreword<\/a><\/strong><br><em>by Harvey Rishikof<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Schmitt-Wall-International-Law-of-Unconventional-Statecraft-1.pdf\" data-type=\"attachment\" data-id=\"5642\">The International Law of Unconventional Statecraft<\/a><\/strong><em><br>by Michael N. Schmitt and Andru E. Wall<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Adams-Jus-Extra-Bellum.pdf\" data-type=\"attachment\" data-id=\"4458\">Jus Extra Bellum: Reconstructing the Ordinary, Realistic Conditions of Peace<\/a><\/strong><em><br>by Michael Jefferson Adams<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Huntley-Levitz-Controlling-the-Use-of-Power-in-the-Shadows-1.pdf\" data-type=\"attachment\" data-id=\"5641\">Controlling the Use of Power in the Shadows: Challenges in the Application of Jus in Bello to Clandestine and Unconventional Warfare Activities<\/a><\/strong><em><br>by Todd C. Huntley and Andrew D. Levitz<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Bart-Special-Operations-Forces.pdf\" data-type=\"attachment\" data-id=\"4466\">Special Operations Forces and Responsibility for Surrogates\u2019 War Crimes<\/a><\/strong><em><br>by Gregory Raymond Bart<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/01\/Bahar-Presidential-Intervention-Principle.pdf\" data-type=\"attachment\" data-id=\"4459\">The Presidential Intervention Principle: The Domestic Use of the Military and the Power of the Several States<\/a><\/strong><em><br>by Michael Bahar<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 4<\/summary>\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/01\/Vol-4-Brown-FINAL.pdf\" data-type=\"attachment\" data-id=\"3616\">Notes on a Terrorism Trial \u2013 Preventive Prosecution, \u201cMaterial Support\u201d and The Role of The Judge after United States v. Mehanna<\/a><\/strong><br><em>by George D. Brown<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/01\/Vol.4-Abrams-FINAL.pdf\">Terrorism Prosecutions in U.S. Federal Court: Exceptions to Constitutional Evidence Rules and the Development of a Cabined Exception for Coerced Confessions<\/a><\/strong><em><br>by Norman Abrams<\/em><\/p>\n\n\n\n<p><em><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/01\/Vol.4-Harel-FINAL.pdf\" data-type=\"page\" data-id=\"3621\">Preventing Terrorist Attacks on Offshore Platforms: Do States Have Sufficient Legal Tools?<\/a><\/strong><br>by Assaf Harel<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/01\/Vol.4-Setty-FINAL.pdf\">National Security Interest Convergence<\/a><\/strong><br><em>by Sudha Setty<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/01\/Vol-4-Schmitt-Thurnher.pdf\" data-type=\"attachment\" data-id=\"4380\">\u201cOut of the Loop\u201d: Autonomous Weapon Systems and the Law of Armed Conflict<\/a><\/strong><em><br>by Michael N. Schmitt &amp; Jeffrey S. Thurnher<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/01\/Vol-4-Adelsberg-Pitts-Shebaya.pdf\" data-type=\"attachment\" data-id=\"4382\">The Chilling Effect of the \u201cMaterial Support\u201d Law on Humanitarian Aid: Causes, Consequences, and Proposed Reforms<\/a><\/strong><em><br>by Sam Adelsberg, Freya Pitts &amp; Sirine Shebaya<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/05\/Vol.4-Spain_Final-Revised3.pdf\" data-type=\"attachment\" data-id=\"4315\">The U.N. Security Council\u2019s Duty to Decide<\/a><\/strong><em><br>by Anna Spain<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2013\/05\/Vo.4-Moshirnia-Final.pdf\" data-type=\"attachment\" data-id=\"4005\">Valuing Speech and Open Source Intelligence in the Face of Judicial Deference<\/a><\/strong><em><br>by Andrew V. Moshirnia<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 3<\/summary>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Bellovin-et-al.pdf\" data-type=\"attachment\" data-id=\"4359\"><strong>Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure<\/strong><\/a><br><em>by Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, and Jennifer Rexford<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Brito-and-Watkins.pdf\" data-type=\"attachment\" data-id=\"4360\"><strong>Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy<\/strong><\/a><em><br>by Jerry Brito &amp; Tate Watkins<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Wall.pdf\" data-type=\"attachment\" data-id=\"4364\"><strong>Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities &amp; Covert Action<\/strong><\/a><em><br>by Andru E. Wall<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Robinson-and-Haque.pdf\" data-type=\"attachment\" data-id=\"4362\"><strong>Advantaging Aggressors: Justice &amp; Deterrence in International Law<\/strong><\/a><em><br>by Paul H. Robinson &amp; Adil Ahmad Haque<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Thravalos.pdf\" data-type=\"attachment\" data-id=\"4325\"><strong>History,&nbsp;Hamdan, and Happenstance: \u201cConspiracy by Two or More to Violate the Laws of War by Destroying Life or Property in Aid of the Enemy\u201d<\/strong><\/a><em><br>by Haridimos V. Thravalos<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Baraq-Erez.pdf\" data-type=\"attachment\" data-id=\"4358\"><strong>Distributive Justice in National Security Law<\/strong><\/a><em><br>by Daphne Barak-Erez<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Velandy.pdf\" data-type=\"attachment\" data-id=\"4367\"><strong>The Green Arms Race: Reorienting the Discussions on Climate Change, Energy Policy, and National Security<\/strong><\/a><em><br>by Siddhartha M. Velandy<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Creegan.pdf\" data-type=\"attachment\" data-id=\"4361\"><strong>National Security Crime<\/strong><\/a><br><em>by Erin Creegan<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Wallach.pdf\" data-type=\"attachment\" data-id=\"4365\"><strong>Pray Fire First Gentlemen of France: Has 21st Century Chivalry Been Subsumed by Humanitarian Law?<\/strong><\/a><em><br>by Judge Evan J. Wallach<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 2<\/summary>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/01\/Vol.-2_Barak-Erez_and_Scharia_Final1.pdf\" data-type=\"attachment\" data-id=\"4535\"><strong>Freedom of Speech, Support for Terrorism, and the Challenge of Global Constitutional Law<\/strong><\/a><br><em>by Daphne Barak-Erez and David Scharia<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol.-2_Schmitt_FINAL.pdf\" data-type=\"attachment\" data-id=\"4550\"><strong>Investigating Violations of International Law in Armed Conflict<\/strong><\/a><br>by Michael Schmitt<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol.-2_Klein-Wittes_Final-Published-Version.pdf\" data-type=\"attachment\" data-id=\"4549\"><strong>Preventive Detention in American Theory and Practice<\/strong><\/a><br>by Adam Klein and Benjamin Wittes<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol.-2_Rizer_Final-Version.pdf\" data-type=\"attachment\" data-id=\"4552\"><strong>The National Security Threat of Energy Dependence: A Call for a Nuclear Renaissance<\/strong><\/a><br>by Arthur Rizer<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Saulino_Final.pdf\" data-type=\"attachment\" data-id=\"4547\"><strong>Strategic Choices: Four Legal Models for Counterterrorism in Pakistan<\/strong><\/a><br>by James J. Saulino<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol.-2_Alston1.pdf\" data-type=\"attachment\" data-id=\"2903\"><strong>The CIA and Targeted Killings Beyond Borders<\/strong><\/a><br>by Philip Alston<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol.-2-Baehr-Jones1.pdf\" data-type=\"attachment\" data-id=\"4377\"><strong>Mission Possible: How Intelligence Evidence Rules Can Save UN Terrorist Sanctions<\/strong><\/a><br>by Vanessa Baehr-Jones<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol-2-Sandburg-Zakian1.pdf\" data-type=\"attachment\" data-id=\"4376\"><strong>Beyond Guantanamo: Two Constitutional Objections to Nonmilitary Preventive Detention<\/strong><\/a><br>by Eric Sandberg-Zakian<\/em><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><em><strong>ESSAYS<\/strong><\/em><\/h5>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol-2-Clark-Landau.pdf\" data-type=\"attachment\" data-id=\"4351\"><strong>Untangling Attribution<\/strong><\/a><br><em>by David D. Clark and Susan Landau<\/em><\/p>\n\n\n\n<p><em><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol-2-Heymann.pdf\" data-type=\"attachment\" data-id=\"4352\"><strong>Detention<\/strong><\/a><br>by Philip B. Heymann<\/em><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><em>REVIEW ESSAY<\/em><\/h5>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol-2-Kanwar.pdf\" data-type=\"attachment\" data-id=\"4354\"><strong>Post-Human Humanitarian Law: The Law of War in the Age of Robotic Weapons<\/strong><\/a><br><em>by Vik Kanwar<\/em><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><em><strong>SYMPOSIUM KEYNOTE ADDRESS<\/strong><\/em><\/h5>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/02\/Vol-2-Bradbury.pdf\" data-type=\"attachment\" data-id=\"4350\"><strong>The Developing Legal Framework for Defensive and Offensive Cyber Operations<\/strong><\/a><br><em>by Steven G. Bradbury<\/em><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VOLUME 1<\/summary>\n<p><em><strong>ARTICLES<\/strong><\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2011\/04\/Vol-1_Preface_Final.pdf\"><strong>Editors\u2019 Preface<\/strong><\/a><br><em>by Robert Williams and Anne Siders<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Volume-1_Minow_Final1.pdf\"><strong>Dialogue, Discourse, and Debate: Introducing the Harvard National Security Journal<\/strong><\/a><em><br>by Martha Minow, Jan. 11, 2010<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol.-1_Schmitt_Final.pdf\"><strong>The Interpretive Guidance on the Notion of Direct Participation in Hostilities: A Critical Analysis<\/strong><\/a><em><br>by Michael Schmitt, May 5, 2010<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol.-1_Blank-Guiora_Final.pdf\"><strong>Teaching an Old Dog New Tricks: Operationalizing the Law of Armed Conflict in New Warfare<\/strong><\/a><em><br>by Laurie Blank and Amos Guiora, May 13, 2010<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol.1_Glick_Final.pdf\"><strong>FISA\u2019s Significant Purpose Requirement and the Government\u2019s Ability to Protect National Security<\/strong><\/a><em><br>by Scott J. Glick, May 30, 2010<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol-1_Blum-Heymann_Final.pdf\"><strong>Law and Policy of Targeted Killing<\/strong><\/a><br><em>by Gabriella Blum and Philip Heymann, June 27, 2010<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Vol-1_Jenks-Jensen_Final-Corrected-Version.pdf\"><strong>All Human Rights Are Equal, But Some Are More Equal Than Others<\/strong><\/a><em><br>by Chris Jenks and Eric Talbot Jensen, November 12, 2010<\/em><\/p>\n\n\n\n<p><strong><em>ESSAYS<\/em><\/strong><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/01\/Volume-1_Geer_Final-Version.pdf\">Cybersecurity and National Policy<br><\/a><\/strong><em>by Dan Geer, Apr. 7, 2010<\/em><\/p>\n<\/details>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":212,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-6790","page","type-page","status-publish","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/PeZtUX-1Lw","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages\/6790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=6790"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/pages\/6790\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=6790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}