-
A dispatch from Judge Tanya Chutkan’s courtroom
-
The new special counsel appointment will not enhance the legitimacy of David Weiss’s investigation, but does enhance the political dangers for the president.
-
Your weekly summary of everything on the site
-
-
In the brief, Gov. Greg Abbott invokes the “invasion clause” of the U.S. constitution, among other statutory arguments.
-
Members of Congress want their information removed from data brokers’ databases—but not that of their constituents.
-
It's more complicated than one would originally assume.
-
From “Who enforces?” to “How are disputes adjudicated?” prosaic procedural questions may make the difference between regulatory impact and irrelevance.
-
Benjamin Wittes joins Charlie Sykes for this week's episode of "The Trump Trials."
-
This week, Alan, Quinta, and Scott beat back the heat to dig into the week's big national security news stories.
-
Benjamin Wittes talks to Kate Benner about her experience covering the Justice Department and how it has changed.
-
Changes to U.S. surveillance safeguards will test the practical limits of the EU court’s abstract principles.
-
What are the challenges to scaling trust and safety to new information ecosystems?
-
Donald Trump requests the ability to review evidence that includes classified material in locations other than the designated SCIFs.
-
The U.S. Court of Appeals for the District of Columbia Circuit affirmed a district court decision to hold Twitter in contempt and impose a $350,000 fine.
-
With civil and criminal cases underway in New York, Florida, D.C., and potentially Georgia—how is this all supposed to work?
-
The fifth class of Lawfare's cybersecurity and hacking course is now available to the public.
-
The Strauss-Clements Intelligence Studies Project at the University of Texas at Austin is pleased to announce the winner and two semifinalists in the ninth-annual competition recognizing outstanding stud...
-
Only a binding multistakeholder legal framework can effectively regulate a legitimate and efficiently controlled market for spyware.
-
Given the increasingly pervasive use of spyware by governments to spy, how should it be regulated?