“On Target”: Precision & Balance in the Contemporary Law of Targeting

“On Target”: Precision & Balance in the Contemporary Law of Targeting

Schmitt and Widmar explore the law of targeting within international humanitarian law (IHL) and its application to international and non-international armed conflict. The article examines the “five elements” of a target operation, including the target, the weapon used, the execution of the attack, possible collateral damage and incidental injury, and location of the strike. The […]

Recently Published

Setting the Record Straight: An In-Depth Review of “Duty” by Robert Gates

Setting the Record Straight: An In-Depth Review of “Duty” by Robert Gates

Bowman “sets the record straight” with his review of Bob Gates’ new book, Duty. He states that Duty is not a “tell all,” but rather a highly personal and almost daily reflection of what Gates thought and experienced during his time as US Secretary of Defense. Ultimately, Bowman concludes that while the book is very […]

A Proposal to Reduce Government Overclassification of Information Related to National Security

A Proposal to Reduce Government Overclassification of Information Related to National Security

Lin explores the phenomenon of overclassification in American society and proposes a classification cost metric in order to create serious economic incentives to reduce classification. The metric would provide decision makers with a way to judge the relative importance of different classified documents and allow officials to classify documents on a more objective scale. The […]

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure

Landau explains the National Security Agency’s little-known function of providing communications security (COMSEC) to private companies, which has involved an improvement of security and privacy of the domestic communications infrastructure. She examines the history of the program and how the NSA’s behavior towards the private sector has shifted since the 1950’s, as well as the […]

Symposium Introduction: Swimming in the Ocean of Big Data

Symposium Introduction: Swimming in the Ocean of Big Data

This article introduces the topics to be discussed in the latest issue of JNSLP. The author argues that although readers will walk away with a greater understanding of “Big Data” generally, there still remains a need for a greater structural understanding of the subject in order to harness its power and direct its applications for […]

Charting the Future: What to Expect from Big Data

Charting the Future: What to Expect from Big Data

This article is modeled on a panel discussion at the symposium regarding two hypothetical case studies:  the first about detection technologies related to facial recognition and Terahertz detection and the second about passenger name recognition information created by airlines to manage travel reservations.  Through this conversation, the panelists discuss the relationship of big data collection […]

Big Data Before and After Snowden

Big Data Before and After Snowden

The author reflects on a symposium panel discussion on “Swimming in the Ocean of Big Data: National Security in the Age of Unlimited Information” that occurred before the Snowden disclosures. He analyzes the panel discussion in context of the time at which it occurred and compares it to what has become known since June 2013. […]