-
Is the internet really worth it? Our guest for episode 91, Jason Healey of the Atlantic Council and Columbia University, recaps a study finding that, even with a worst-case Clockwork Orange Internet, th...
-
Earlier I wrote a short primer on refugee law for those who follow this blog. It seems worthwhile to follow up with the news that yesterday several former national security officials sent a letter to Se...
-
As proof of the dramatic impact the Paris attacks have had in Europe, the German cabinet has approved plans to contribute forces to the fight against the Islamic State in Syria. With the parliament expec...
-
A few weeks ago, I took note of the comments of China-cybersecurity expert James Lewis to the effect that those much-derided US indictments of PLA hackers had actually had a big impact of Chinese cyber-s...
-
The Foreign Intelligence Surveillance Court has released the names of the first five Amici Curiae that will serve the Court as part of reforms enacted under the USA Freedom Act. The list, effective Novem...
-
Dalia Ghanem-Yazbeck comes on the show to talk about jihadism in Algeria. Some of the topics covered include:
-
Here is the December 2015 supplement for my casebook with Curtis Bradley, Foreign Relations Law: Cases and Materials, (5th ed. 2014).
-
I have an op-ed in tomorrow’s New York Times explaining why I think we’re at a critical moment in the regulation of the global Internet. States are increasingly asserting territorial control over the In...
-
On Wednesday, November 25th, President Barack Obama signed the 2016 National Defense Authorization Act into law.
In addition to the added and renewed restrictions (sections 1031 and 1032) on the presid...
-
Fallout from Turkey’s shooting down of a Russian fighter jet last Tuesday continues.
-
Here are ten good reasons you should not forget to include Lawfare in your end-of-year giving plans:
Lawfare is far less irritating about asking you for money than your local NPR affiliate.
The...
-
On midnight of November 29th, the NSA stopped its bulk collection of telephony metadata once authorized under Section 215 of the USA Patriot Act. Under the USA Freedom Act, which Congress passed in June,...
-
Today's fascinating piece by Matthew Waxman and Doron Hindin, "How Does Israel Regulate Encryption?," raises a number of questions in my mind, two of which I put out to readers by way of soliciting infor...
-
Event Announcements (More details on the Events Calendar)
-
Recent terrorist attacks and resulting questions about the limits of surveillance have rekindled debate about how governments should deal with the challenges of powerful, commercially available encryptio...
-
The third in our series of our book soirees at the Hoover Institution's Washington Office will take place on December 2, when Ben interviews Edward Lucas of the Economist about his new book, Cyberphobia:...
-
The third in our series of our book soirees at the Hoover Institution's Washington Office will take place on December 2, when Ben interviews Edward Lucas of the Economist about his new book, Cyberphobia:...
-
Meet Diesel. He lives next door to me and as his owner tells it, Diesel is always a "nice" dog, but sometimes not a very "good" one. This photo is one of his latest adventures -- he managed to figure o...
-
American and allied forces efforts in the fight against ISIL have recently focused on disrupting the terrorist group’s primary source of revenue: oil production and transportation. The New York Times re...
-
Editor’s Note: Counterterrorism officials often express considerable concern about lone wolf terrorists -- individuals who act without direct ties to an existing group -- because they are difficult to de...