In May 2012, Book Review Editor Kenneth Anderson announced the launch of the Lawfare Research Paper Series. The papers posted in this series are selected by Lawfare editors as particularly beneficial to the literature on national security law and explore topics at greater length and in more scholarly form than Lawfare‘s more typical content. The papers appear on an occasional basis and cover a wide range of topics. Wrote Anderson,
Lawfare Research Papers might be working papers; working papers intended for submission for publication in some other venue (authors are encouraged to take papers to regular publication venues as well; the Research Paper Series is not intended to be preclusive, but quite the opposite); or papers that have their final publication as Lawfare’s own. [While there is a page] for hosting its Research Paper Series here on the blog . . . we also encourage authors to post them to SSRN or other open source repositories. We strongly encourage editors of journals and law reviews to be aware of these papers and to consider inviting the authors to publish revised and finalized papers. . . .
Unlike a law review, the research paper series is not run by students. We focus only on scholarship we think is actually useful and important to policymakers and national security practitioners. To submit an article for consideration, please email Matt Danzer.
The Lawfare Research Papers are listed below in reverse chronological order:
7) Jonah Force Hill, “The Growth of Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Industry Leaders,” Vol. 2, No. 3, July 21, 2014.
6) Russell Wheeler, “The Changing Composition of the Foreign Intelligence Surveillance Court and What If Anything To Do About It,” Vol. 2, No. 2, June 4, 2014.
5) Joel Brenner, “Mr. Wemmick’s Condition; Or, Privacy as a Disposition, Complete with Skeptical Observations Regarding Various Regulatory Enthusiasms,” Vol. 2, No. 1, January 2, 2014.
4) David S. Kris, “On the Bulk Collection of Tangible Things,” Vol. 1, No. 4, September 29, 2013.
3) Steven G. Bradbury, “Understanding the NSA Programs: Bulk Acquisition of Telephone Metadata Under Section 215 and Foreign-Targeted Collection Under Section 702,” Vol. 1, No. 3, September 1, 2013.
2) Nathan Myhrvold, “Strategic Terrorism: A Call to Action,” Vol. 1, No. 2, July 2013
1) William C. Marra and Sonia K. McNeil, “Understanding ‘The Loop’: Autonomy, System Decision-Making, and the Next Generation of War Machines,” Vol. 1, No. 1, May 2012.