-
Last month's coup in Gabon was just one of nine in the last three years in West and Central Africa, including one in Niger earlier this summer.
-
The unclassified document presents the overarching priorities of the department’s 2023 Cyber Strategy.
-
Evan Corcoran’s testimony is key to Trump’s trial—and Judge Cannon might exclude it.
-
-
Recent developments in the U.S. and Europe signal a shift in how governments are thinking of cybersecurity assistance.
-
Who is winning the tech war between the United States, the European Union, and China?
-
Improving the resilience and defense of undersea cables must be a national security priority.
-
Trump argues that Chutkan’s previous “negative” comments about him in other cases “unavoidably taint” the proceedings, and therefore she is not able to give him a fair trial.
-
-
Three petitions before the Israeli Supreme Court are transforming the usually slow month of September into a pivotal one in Israel’s ongoing judicial crisis.
-
The Strauss Center for International Security and Law at the University of Texas at Austin and Ohio Northern University’s Pettit College of Law (ONU), in consultation with the American Association of Law...
-
In its brief in the NetChoice cases, the solicitor general shortchanges the government’s interest in ensuring broad access to social media platforms.
-
How much influence do social media platforms have on American politics and society?
-
The United States can learn from what has worked in its effort to support the Ukrainian military.
-
Listen to this week's episode of "Lawfare Live: Trump's Trials and Tribulations."
-
Former chief of staff Mark Meadow’s bid to remove the Fulton County case against him to federal court was denied.
-
Your weekly summary of everything on the site.
-
Though less dramatic than the indictment, the report still gives rise to a number of insights into the case.
-
The report details alleged election interference committed by former President Donald Trump and others in the 2020 presidential election in Georgia.
-
Few consumers—or policy- or lawmakers—realize the extent of personal information revealed through this data that users unknowingly supply. The result is a privacy invasion that users have no ability to c...