-
In May 2014, the Court of Justice of the European Union (CJEU) ruled that search engine operators in the EU are responsible for handling individuals’ requests to remove links to personal information that...
-
Editor’s note: This post also appears on Just Security.
-
As experts debate the policy implications of the DNC hack and need for attribution, there appears to be consensus that campaigns need better cybersecurity. The unanswered question is how exactly to ensur...
-
Politicians and analysts in Europe and the United States understandably focus on the threat the Islamic State poses to the West, and the debate is fierce over whether the group’s recent attacks are a des...
-
Shadi Hamid is a senior fellow at the Brookings Institution’s Project on US Relations with the Islamic World and the author of the new book Islamic Exceptionalism: How the Struggle Over Islam Is Reshapin...
-
This week’s news was dominated by the Demoncratic Convention and allegations that the Russian government hacked the DNC, perhaps to aid Republican nominee Donald Trump.
-
Secretary of State Hillary Clinton has officially accepted the Democratic Party’s nomination for the presidency, becoming the first woman to become a major party nominee in the United States. Clinton por...
-
Military Commissions Chief Prosecutor Mark Martins released the following remarks yesterday at Guantanamo Bay preceding pre-trial hearings in Khalid Sheikh Mohammad et al. The hearings today and yesterda...
-
I know we promised to take August off, but I was inspired by the flap over the DNC hack and the fact that I’m at the Aspen Homeland Security Working Group meeting in Colorado. I waylaid two former intell...
-
President Obama’s speech last night at the Democratic National Convention has been widely understood as pointed thematic rebuke of Donald Trump.
-
Critics of state investigations of alleged violations of the law of armed conflict (LOAC) often accuse those inquiries of being insufficiently independent from the chain of command. Medicins Sans (MSF, a...
-
All are, by now, no doubt familiar with two factor authentication. It is the idea that when I try and log-in somewhere besides my user name and password I have to give additional authentication that ver...