-
Does a Civil Rights Law Prohibit Lies About Voting?
The U.S. Court of Appeals for the Second Circuit weighed the question during oral arguments in United States v. Mackey. -
Lawfare Live: Trump's Trials and Tribulations, April 11
Join the Lawfare team for a discussion of the trials of Donald Trump -
Correcting Presidential Immunity's Original Sin
In both civil and criminal cases, presidents should generally receive qualified, not absolute, immunity for official acts. -
The Lawfare Podcast: Information Ecology and 19th-Century Naturalism at Verify 2024
What does Prussian naturalist Alexander Von Humboldt have to do with cybersecurity? -
Livestream: Day 2 of the 2024 U.S. CYBERCOM Legal Conference
Watch day 2 of the 2024 U.S. Cyber Command Legal Conference starting at 7:45 a.m. ET. -
Backdoor in XZ Utils That Almost Happened
The recent cybersecurity catastrophe that wasn’t reveals an untenable situation, one being exploited by malicious actors. -
Kyber Sprotyv: Ukraine’s Spec Ops in Cyberspace?
A group with ties to the Ukrainian government is breaching the email accounts of Russian military officers, politicians, and civilians. -
The Lawfare Podcast: Juliette Kayyem on the Baltimore Bridge Collapse and Crisis Management
How should the government react to the Francis Scott Key Bridge collapse? -
Livestream: Day 1 of the 2024 U.S. CYBERCOM Legal Conference
Watch day 1 of the 2024 U.S. Cyber Command Legal Conference, starting at 8 a.m. ET. -
Texas, Military Federalism, and the Southern Border
Interstate support for Texas’s border operations underscore states’ meaningful, but limited, independent authority to deploy military personnel for domestic operations. -
Verification Is Possible: Checking Compliance With an Autonomous Weapon Ban
Secure records can help prove that attacks by armed uncrewed vehicles were conducted under human control. -
The Lawfare Podcast: Jim Dempsey and John Carlin on U.S. Cybersecurity Law and Policy: There’s a Lot Going On
What is new in the realm of cybersecurity? -
Peak Economic Security? The Securitization of U.S.-China Economic Relations and Rethinking Resilience
The U.S. must better balance its coercive economic security measures with constructive policies that underscore the benefits of new and sustainable forms of interdependence. -
The Lawfare Podcast, Trump's Trials and Tribulations: Trump Gagged Once Again
Listen to this week's episode of Trump's Trials and Tribulations -
The Week That Was: All of Lawfare in One Post
Your weekly summary of everything on the site. -
What Does the Public Think About Government Use of Facial Recognition?
New data suggests that the public is broadly accepting of targeted facial recognition use even as it is concerned about casual facial surveillance becoming an everyday event. -
CSRB Lashes Microsoft’s ‘Cascade of Security Failures’ + Supply Chain Compromises
The latest edition of the Seriously Risky Business cybersecurity newsletter, now on Lawfare. -
Threading the Needle in United States v. Mackey
Section 241 can be applied in a manner that resolves the First Amendment concerns raised by Mackey and the government while allowing the law to achieve its intended purposes. -
The Lawfare Podcast: How Congressional Staffers Helped Our Afghan Allies
Discussing the congressional effort by staffers to help Afghan allies flee the country during the U.S. withdrawal from Afghanistan -
Rational Security: The “Going Once, Going Twice” Edition
This week, Alan Rozenshtein and Quinta Jurecic were joined by Natalie Orpett to talk through the week's big national security news
More Articles
-
The Week That Was
Your weekly summary of everything on the site. -
Call for Papers: The University of Texas at Austin Announces the 2025 "Bobby R. Inman Award" for Student Scholarship on Intelligence
-
Tracing the Origins of a ‘New American Surveillance State’
A review of Byron Tau, "Means of Control: How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State" (Crown, 2024).