-
The developing story of the FBI’s impersonation of journalists is, in a way, really the story of Timberline high school in Washington State. In June of 2007 Timberline had received a series of bomb threa...
-
The Russians are Coming. A trojan horse malware program has deeply penetrated US critical infrastructure and the Russians are probably behind it.
The Crypto-Libertarians are Not Coming. More than 400 ...
-
This week, President Obama will ask Congress to approve $3.2 billion in additional funding for U.S. operations against the Islamic State. This figure comes as an amendment to the pending $58.6 billion wa...
-
By the end of the year, the United States and Japan are expected to release revised Guidelines for Defense Cooperation. For the first time in seventeen years, the two nations will modernize the framework...
-
Published by Basic Books (2014)
Reviewed by Benjamin Bissell
-
One of the most engaging contemporary debates is about the efficacy and utility of encryption as a means of protecting privacy. I’ve written, in the past, about how encryption works and about the growing...
-
In August I described a politically palatable AUMF against the Islamic State (IS). What was politically palatable in August is not necessarily politically palatable after three months of air strikes, ho...
-
Earlier on Lawfare, I wrote about the outcome of the Chinese government’s Fourth Plenum---a key meeting of the Central Committee of the Chinese Communist Party which wrapped up about two weeks ago.
-
Yesterday, President Obama announced that he plans to seek new Congressional authorization for the ongoing military campaign against the Islamic State in Iraq and Syria.
-
Attorneys for Ammar al-Baluchi, one of the five men accused of plotting the 9/11 attacks, said the following today in a statement:
WASHINGTON, DC-Today, the legal team representing Ammar al Baluchi submi...
-
Hey GTMO fans: the estimable Matt Danzer's digests of yesterday's hearing in this capital Guantanamo military commissions case can be found below, and in our "Events Coverage" section.
Keep an eye on th...
-
The commission returns from recess and prepares to consider AE 284 and 284L, a defense motion and supplement seeking to allow Al-Nashiri to hold supervised Skype calls with his elderly parents.
Before t...
-
Military judge Vance Spath opens Wednesday’s motions proceedings with AE 181G, a defense request to reargue the underlying defense motion to remove the possibility of the death penalty for Al-Nashiri if ...
-
It...is...on. At a press briefing today, President Obama declared three legislative priorities for the lame-duck Congress in the weeks ahead. One is to get an AUMF for ISIS:
Second, I'm going to begin en...
-
Those of you interested in the organization of the Intelligence Community may recall a major initiative launched by the Defense Intelligence Agency, in 2012, to expand the size and focus of its HUMINT co...
-
The only holiday devoted to celebrating the failure of non-state actors to destroy the symbols and institutions of state power.
-
The result is no surprise: Republicans now control both houses of Congress---or, at least, they will come January. I'll leave it to others to dissect how we should understand last night's electoral resul...
-
Our guest is one of the most highly regarded cybercrime prosecutors in the country - John Lynch, the Chief of the Computer Crime and Intellectual Property Section (CCIPS) in DOJ's Criminal Division. Amo...
-
First of all: Happy Guy Fawkes Day from all of us at Lawfare.
4 years after the 2010 Republican wave, Democrats across the country got shellacked again yesterday.
-
Below you’ll find a recap of yesterday morning’s argument in Klayman v. Obama.
A three-judge panel of the D.C. Circuit yesterday considered a key challenge to the NSA’s bulk collection from telephone c...