-
Heavy Lies the Crown: The Survival of Arab Monarchies, 10 Years After the Arab Spring
Monarchs escaped the uprisings relatively unscathed, but now face mounting problems and are turning to more repressive policies to limit dissent. -
Fighting Domestic Extremism: Lessons From Germany
The clear threat of right-wing extremism demonstrates the need for a broad-based approach to CVE. -
The Week that Was: All of Lawfare in One Post
Your weekly summary of everything on the site. -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
FBI Warns That Deepfakes Will Be Used Increasingly in Foreign Influence Operations
On Mar. 10, the FBI’s Cyber Division released a Private Industry Notification (PIN) warning that “Malicious actors almost certainly will leverage synthetic content for cyber and foreign influence operati... -
The Lawfare Podcast: War Powers and the Biden Administration
-
No, Florida Can’t Regulate Online Speech
Republican Governor Ron DeSantis has promised that Florida will soon enact “the most ambitious reforms yet proposed” for “holding ‘Big Tech’ accountable.” There’s just one problem: It’s unconstitutional. -
How Should the U.S. Respond to the SolarWinds and Microsoft Exchange Hacks?
If the SolarWinds/Holiday Bear campaign was a minimally invasive arthroscopic incision into vulnerable networks, the Microsoft Exchange hack was a full-limb amputation: untargeted, reckless and extremely... -
France, Cyber Operations and Sovereignty: The ‘Purist’ Approach to Sovereignty and Contradictory State Practice
The rule of sovereignty that France asserts applies to cyberspace is incompatible with several of its own operations. The “purist” approach to a rule of sovereignty for cyber operations is at odds with t... -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: Content Moderation and the First Amendment for Dummies
-
Commission Criticizes Lack of Preparedness; U.S. Likely to Implement Sweeping Rule on Tech-Related Transactions
-
The Biden Administration’s Opportunity to Secure International Mail
Closing vulnerabilities in the postal system is a necessary first step to address the opioid epidemic. -
Rational Security: The 'Happy Birthday, Remote Jungle Studio' Edition
-
Fault Lines: Supply Chains and Relationship Strains
The latest episode of Fault Lines -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: America's War in Afghanistan's Pech Valley
-
EU Privacy Law and U.S. Surveillance: Solving the Problem of Transatlantic Data Transfers
Most current approaches to resolving the EU-U.S. conflict fall short. It’s time for a hybrid approach. -
How Biden’s Cyber Strategy Echoes Trump’s
Comparing the Biden administration’s Interim National Security Strategic Guidance with Trump’s National Cyber Strategy. -
The Microsoft Exchange Hack and the Great Email Robbery
The world is probably days away from a mass-exploitation of Microsoft Exchange servers—a hack that could have a far greater impact than the SolarWinds breach.
More Articles
-
How Trump Is Disappearing Migrants
From CECOT to domestic jails, the Trump administration is engaging in incommunicado detention to cut migrants off from legal protections. -
The Trump Admin’s Attempt to Redefine a ‘Foreign Affairs Function’
Courts will likely reject this effort to shield all of the executive’s cross-border actions from Administrative Procedure Act review. -
What’s Going on at the IRS?
Breaking down the reduction in tax workforce, DOGE’s attempts to access sensitive data, and the politicization and erosion of agency independence at the IRS