-
Back in the Fall of 2014, a little noticed contactual battle surfaced some significant security concerns with the management of the American telephone system. It involved the local-number-portability ad...
-
The tension between a Nation-state’s need to detect and interdict threats to life, safety and property inevitably conflict with the privacy interests of its individual citizens and private sector entitie...
-
Internal Divisions Land ASEAN in Troubled Waters
Flag of ASEAN member states in Brunei's Prime Minister Office Building (Photo: The Straits Times)
Ch
-
At least 38 civilians were killed and dozens more were injured in a eruption of violence throughout Aleppo.
-
No holds are barred as a freewheeling panel of cryptographers and security pros duke it out with me and the Justice Department over going dark, exceptional access, and the Apple-FBI conflict.
-
Office of the Director of National Intelligence General Counsel Robert Litt has published a new essay in The Yale Law Journal that will likely be of interest to Lawfare readers. Entitled "The Fourth Amen...
-
ZAATARI REFUGEE CAMP, Jordan—Child marriage among Syrian girls in the Zaatari refugee camp is on the rise. The practice of child marriage is not new among Syrians refugees in Jordan; in fact, it has rece...
-
A few weeks ago, as anyone who is not living under a rock will remember, the FBI withdrew its effort to force Apple to unlock an iPhone because, as it told the court, it gained access to the phone throug...
-
Recently, the government unsealed a November ruling by the Foreign Intelligence Surveillance Court (FISC).
-
The U.S. is ramping up cyber operations against ISIS. Another standoff over the FBI’s access to a locked iPhone ends, but are more fights around the corner? And the mystery of the curious zombie habeas c...
-
As I've previously written, the Congress has been considering updating the Electronic Communications Privacy Act. The Act, first adopted in 1986, does not have a warrant requirement for government acces...
-
The BBC reports that up to $800 million dollars of the Islamic State’s cash have been destroyed by U.S. strikes after U.S. forces stepped up their efforts to target the group’s funding. According to Gene...
-
The U.S. government has sent a letter to all 50 states asking them to align state and local laws with the Joint Comprehensive Plan of Action (JCPOA) that the United States and other nations negotiated wi...
-
As the tensions over the South China Sea continue to heat up, the Wall Street Journal editorial board has recently opined that the U.S. should state publicly that the U.S.
-
Security developers tussle between security and usability every day, but security and not weakness has to be the starting point.
-
Don't look now, but something's happening in the Guantanamo litigation.
-
In 2014, at the very beginning of the “Going Dark debate,” FBI Director James Comey gave a challenge to the technical community. Is it possible to create a “front-door” that law enforcement can use to ac...
-
In the fight against the Islamic State, it appears that the United States and Iran are impeding one another. In recent months, Iraqi forces—backed by American airstrikes and advised by American officers—...
-
On February 16, US Magistrate Judge Sheri Pym, responding to an FBI request, ordered Apple to provide software to bypass the company's technical protections; this would unlock the work phone of Syed Faro...
-
Editor's Note: This piece originally appeared on Markaz.