-
FBI Warns That Deepfakes Will Be Used Increasingly in Foreign Influence Operations
On Mar. 10, the FBI’s Cyber Division released a Private Industry Notification (PIN) warning that “Malicious actors almost certainly will leverage synthetic content for cyber and foreign influence operati... -
The Lawfare Podcast: War Powers and the Biden Administration
-
No, Florida Can’t Regulate Online Speech
Republican Governor Ron DeSantis has promised that Florida will soon enact “the most ambitious reforms yet proposed” for “holding ‘Big Tech’ accountable.” There’s just one problem: It’s unconstitutional. -
How Should the U.S. Respond to the SolarWinds and Microsoft Exchange Hacks?
If the SolarWinds/Holiday Bear campaign was a minimally invasive arthroscopic incision into vulnerable networks, the Microsoft Exchange hack was a full-limb amputation: untargeted, reckless and extremely... -
France, Cyber Operations and Sovereignty: The ‘Purist’ Approach to Sovereignty and Contradictory State Practice
The rule of sovereignty that France asserts applies to cyberspace is incompatible with several of its own operations. The “purist” approach to a rule of sovereignty for cyber operations is at odds with t... -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: Content Moderation and the First Amendment for Dummies
-
Commission Criticizes Lack of Preparedness; U.S. Likely to Implement Sweeping Rule on Tech-Related Transactions
-
The Biden Administration’s Opportunity to Secure International Mail
Closing vulnerabilities in the postal system is a necessary first step to address the opioid epidemic. -
Rational Security: The 'Happy Birthday, Remote Jungle Studio' Edition
-
Fault Lines: Supply Chains and Relationship Strains
The latest episode of Fault Lines -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: America's War in Afghanistan's Pech Valley
-
EU Privacy Law and U.S. Surveillance: Solving the Problem of Transatlantic Data Transfers
Most current approaches to resolving the EU-U.S. conflict fall short. It’s time for a hybrid approach. -
How Biden’s Cyber Strategy Echoes Trump’s
Comparing the Biden administration’s Interim National Security Strategic Guidance with Trump’s National Cyber Strategy. -
The Microsoft Exchange Hack and the Great Email Robbery
The world is probably days away from a mass-exploitation of Microsoft Exchange servers—a hack that could have a far greater impact than the SolarWinds breach. -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Cyberlaw Podcast: A Lot of Cybersecurity Measures That Don't Work, And A Few That Might
-
The Lawfare Podcast: Gayle Tzemach Lemmon on 'The Daughters of Kobani'
-
Was SolarWinds a Different Type of Cyber Espionage?
There is a gap between how administration officials are framing the nature of the SolarWinds incident and what the available evidence indicates about it.
More Articles
-
Procedure as Substance in the UN Cybercrime Convention
The convention, which just opened for signature, is substantively similar to the Budapest Convention, but it is procedurally different, and that may make all the difference. -
Worried About AI Monopoly? Embrace Copyright’s Limits
Copyright’s limits play essential antimonopoly functions. Undermining them in the context of AI is likely to strengthen Big Tech. -
Lawfare Daily: Trials of the Trump Administration, Oct. 24
Listen to the Oct. 24 livestream as a podcast.
