-
In the social media era, there have been a number of terrorist attacks in America that, at least in part, could be attributed to “self-radicalization.” Self-radicalization refers to the phenomenon wherei...
-
Apple has asserted that a one-time use of any software that would enable the FBI to bypass security features in the iPhone is impossible—that it would inevitably be used multiple times. In a previous po...
-
As the battle between Apple and the FBI continues, today, Apple filed a motion to vacate the order from the federal government to assist the FBI in accessing the locked and encrypted iPhone belonging to ...
-
In three recent developments, Apple appears to want
(1) to develop a security improvement that would require a PIN code to update firmware
-
The House Judiciary Committee heard testimony today on "International Conflicts of Law Concerning Cross Border Data Flow and Law Enforcement Requests." The two-panel hearing included remarks from Princip...
-
You know you want one.
Motion to Vacate Brief and Supporting Declarations
-
What is the most surprising discovery a law firm partner makes when he jumps to the National Security Agency? I direct that and other questions at Glenn Gerstell, who has just finished six months in the ...
-
GAZIANTEP, Turkey—”This looks so much like the countryside around Aleppo,” says Dr. Diaa Abdullah as we drive past green and rust-colored hills and olive groves between the Southeastern Turkish towns of ...
-
FBI Director Jim Comey bites into Apple. The Obama administration unveils its plan for closing Guantanamo. And the Homeland Security Department will start scouring social media for warning signs of viole...
-
Let’s not pretend that that the outcome the Justice Department seeks in the Apple case is limited to only a single case and just this particular phone.
This unquestionably involves a special case. Becau...
-
It is a strange time for national security.
-
We are delighted to announce the launch of Lawfare's new subsidiary page, called Aegis: Security Policy in Depth.