- 
                      Drivers of Disharmony in U.S. Cyber RegulationsTo harmonize cyber regulations, researchers and the government must first understand disharmonies and their causes.
- 
                      Lawfare Daily: Susan Landau and Alan Rozenshtein Debate End-to-End Encryption (Again!)What are the benefits and drawbacks of E2E?
- 
                      The Constitution of KakistocracyBy nominating unqualified loyalists, Trump undermines the Constitution's vision of merit-based governance.
- 
                      An Air Force Colonel Just Overruled the Secretary of DefenseA judge at Guantanamo rejected Secretary Austin’s attempt to cancel the 9/11 guilty pleas because law still matters—at least to some.
- 
                      Chatter: The Legacy of “The Hunt for Red October” with Katherine VoylesWhat has been "The Hunt for Red October's" cultural influence?
- 
                      Lawfare Daily: Elle Reeve on "Black Pill" and Alt-Right Internet CultureDiscussing the world of alt-right internet culture, now at the center of the Republican Party.
- 
                      Military Innovation on the Global StageA review of Andrew F. Krepinevich, “The Origins of Victory: How Disruptive Military Innovation Determines the Fates of Great Powers” (Yale University Press, 2023).
- 
                      AI and Constitutional Interpretation: The Law of Conservation of JudgmentLarge language models cannot eliminate the need for human judgment in constitutional law.
- 
                      Lawfare Daily: Sam Manning on Benefits Sharing in the Context of AIDiscussing the different options to share AI's benefits at the international level.
- 
                      Taking Stock of the Islamic StateHow has the “over-the-horizon” counterterrorism strategy worked?
- 
                      The Week That WasYour weekly summary of everything on the site.
- 
                      Our Man in Damascus? Sanctions and Governance in Post-Assad SyriaAn overview of sanctions challenges, questions regarding HTS’s terrorist organization status, and a few recommendations for U.S. policy toward Syria.
- 
                      Hayat Tahrir al-Sham’s Drone ForceThe Al-Shaheen Brigade’s drones helped carry HTS to Damascus.
- 
                      Lawfare Daily: Understanding the DC Circuit Court's Decision on TikTokWhy did the D.C. Circuit Court uphold the TikTok ban?
- 
                      FCC to Demand Telcos Improve SecurityThe latest edition of the Seriously Risky Business cybersecurity newsletter, now on Lawfare.
- 
                      Inspector General Report Details FBI Shortcomings Surrounding Jan. 6The report finds that the FBI did not canvass field offices prior to Jan. 6, despite false claims made to Congress.
- 
                      How the Philippines Screens Foreign InvestmentsThe screening laws safeguard national security interests while removing outdated investment restrictions, but clearer limits are needed.
- 
                      Rational Security: The “Tornado Kash” EditionScott Anderson was joined by his Lawfare colleagues Benjamin Wittes, Eugenia Lostri, and Tyler McBrien.
- 
                      Open-Source Intelligence and the Challenges of OverclassificationOverclassifying OSINT poses security risks that can be countered by reforming policies, embracing transparency, and leveraging technology.
- 
                      Lawfare Daily: Pro-Democracy Protests in GeorgiaWhat is causing the mass protests in Georgia?
More Articles
- 
                      The Appellate Void: Trump Could Defy Judges Without Confronting the Supreme CourtBy refusing to appeal adverse rulings, a president could defy lower courts while denying higher courts any clear path to intervene.
- 
                      The Situation: James Comey Is Just Asking QuestionsSo many motions; so many options for dismissal.
- 
                      Peter Williams, Ex-ASD, Pleads Guilty to Selling Eight Exploits to RussiaThe latest edition of the Seriously Risky Business cybersecurity newsletter, now on Lawfare.

 
     
     
    .jpg?sfvrsn=564b5f50_5) 
     
     
     
     
     
     
     
    .png?sfvrsn=ee085106_5) 
     
    -(1).jpg?sfvrsn=c9f1cccc_5) 
     
    .jpg?sfvrsn=1e58655_5) 
     
     
    .jpg?sfvrsn=db3b12e5_5) 
    