-
Event Announcements (More details on the Events Calendar)
-
Editor’s Note: Under President Xi Jinping, China appears more aggressive and dictatorial: a worrisome combination as China’s wealth makes it more influential and helps it build a stronger military.
-
Last month, Jack gave a talk at the Hoover Institution on President Obama's war powers legacy. It's a remarkable address: hard-hitting, clear, and sure to discomfort Obama's defenders on war powers issue...
-
Orin Kerr provided audio of this week’s oral arguments in Klayman v. Obama. Wells later contributed a recap of the arguments in the case.
Paul noted how curious it was that according to current law enfo...
-
Yesterday I posted a short blog on an interesting VA decision regarding the application the Fifth Amendment privilege to the question of unlocking cell phones and other devices. The short summary is tha...
-
The parties return for the afternoon session and Judge Spath begins by laying out his thinking on the previous motion seeking supervised telephone and Skype calls between Al-Nashiri and his family. In th...
-
The developing story of the FBI’s impersonation of journalists is, in a way, really the story of Timberline high school in Washington State. In June of 2007 Timberline had received a series of bomb threa...
-
The Russians are Coming. A trojan horse malware program has deeply penetrated US critical infrastructure and the Russians are probably behind it.
The Crypto-Libertarians are Not Coming. More than 400 ...
-
This week, President Obama will ask Congress to approve $3.2 billion in additional funding for U.S. operations against the Islamic State. This figure comes as an amendment to the pending $58.6 billion wa...
-
By the end of the year, the United States and Japan are expected to release revised Guidelines for Defense Cooperation. For the first time in seventeen years, the two nations will modernize the framework...
-
Published by Basic Books (2014)
Reviewed by Benjamin Bissell
-
One of the most engaging contemporary debates is about the efficacy and utility of encryption as a means of protecting privacy. I’ve written, in the past, about how encryption works and about the growing...