-
Office of the Director of National Intelligence General Counsel Robert Litt has published a new essay in The Yale Law Journal that will likely be of interest to Lawfare readers. Entitled "The Fourth Amen...
-
ZAATARI REFUGEE CAMP, Jordan—Child marriage among Syrian girls in the Zaatari refugee camp is on the rise. The practice of child marriage is not new among Syrians refugees in Jordan; in fact, it has rece...
-
A few weeks ago, as anyone who is not living under a rock will remember, the FBI withdrew its effort to force Apple to unlock an iPhone because, as it told the court, it gained access to the phone throug...
-
Recently, the government unsealed a November ruling by the Foreign Intelligence Surveillance Court (FISC).
-
The U.S. is ramping up cyber operations against ISIS. Another standoff over the FBI’s access to a locked iPhone ends, but are more fights around the corner? And the mystery of the curious zombie habeas c...
-
As I've previously written, the Congress has been considering updating the Electronic Communications Privacy Act. The Act, first adopted in 1986, does not have a warrant requirement for government acces...
-
The BBC reports that up to $800 million dollars of the Islamic State’s cash have been destroyed by U.S. strikes after U.S. forces stepped up their efforts to target the group’s funding. According to Gene...
-
The U.S. government has sent a letter to all 50 states asking them to align state and local laws with the Joint Comprehensive Plan of Action (JCPOA) that the United States and other nations negotiated wi...
-
As the tensions over the South China Sea continue to heat up, the Wall Street Journal editorial board has recently opined that the U.S. should state publicly that the U.S.
-
Security developers tussle between security and usability every day, but security and not weakness has to be the starting point.
-
Don't look now, but something's happening in the Guantanamo litigation.
-
In 2014, at the very beginning of the “Going Dark debate,” FBI Director James Comey gave a challenge to the technical community. Is it possible to create a “front-door” that law enforcement can use to ac...