Main Edition

Starving the Beast: A New Vetting Model to Prevent Corruption in International Security Sector Assistance

Nahal Kazemi* [This essay is available in PDF at this link] Abstract In 2021, the United States government identified countering corruption as a core national security interest for the first time. However, corrupt police and military forces supported by the United States in countries including Iraq, Afghanistan, and Nigeria, actively undermine security and reveal a profound weakness in the previous administration’s strategic anti-corruption priorities. Where the recipient government lacks the will to combat corruption, traditional...

How Domestic Institutions Shape the Global Tech War

Anu Bradford,* Eileen Li,** & Matthew C. Waxman*** [This essay is available in PDF at this link] Abstract The United States (U.S.), China, and the European Union (EU) are engaged in a national security-driven economic competition over advanced technology. Many scholars and commentators focus on the external dimension of this geopolitical contest; that is, they describe the strategic choices by each actor in terms of geopolitical realities, threat perceptions, and relative power. However, this Article brings to the fore the...

Chinese Lawfare in Conflict: The Threat to U.S. Operations

Crispin Smith* [This essay is available in PDF at this link] Abstract The United States military and intelligence communities are sounding the alarm about the escalating risk of interstate conflict with the People’s Republic of China. China is already a premier practitioner of “lawfare” in the context of interstate competition, but the impact of Chinese lawfare in potential active conflict scenarios could be even more profound. Indeed, Chinese lawfare could set the conditions for U.S. or allied forces' defeat before a single shot is...

Volume 16, Issue 1

Articles Protecting the U.S. National Security State from a Rogue President By Laura A. Dickinson The presidency of Donald Trump revealed weaknesses in the U.S. constitutional structure and its legal rules, weaknesses that had been covered over for most of our history because presidents of all political parties voluntarily obeyed norms of behavior that kept the presidency within the bounds of constitutional democratic governance. Unfortunately, there is no guarantee that such norms have been permanently restored. Thus, scholars,...

Protecting the U.S. National Security State from a Rogue President

Laura A. Dickinson* [This essay is available in PDF at this link] Abstract The presidency of Donald Trump revealed weaknesses in the U.S. constitutional structure and its legal rules, weaknesses that had been covered over for most of our history because presidents of all political parties voluntarily obeyed norms of behavior that kept the presidency within the bounds of constitutional democratic governance. Unfortunately, there is no guarantee that such norms have been permanently restored. Thus, scholars, policymakers, and judges...

Chip Security: Reconciling Industrial Subsidies with WTO Rules and National Security Exception

"Mark" Min Seong Kim* [This essay is available in PDF at this link] Abstract Justified as a national security law, the CHIPS and Science Act (“CHIPS Act”) channels an unprecedented $53 billion federal investment to reshore semiconductor production and reduce dependence on chips manufactured in China. This article documents the unique supply chain risks and institutional history that have led the United States to recognize the semiconductor supply chain as a matter of national security. Despite its success in incentivizing $450...