-
An unprecedented level of security is in place today for the 118th Boston Marathon: 4,000 deployed police officers, over 100 surveillance cameras, and an underground coordination center filled with secur...
-
For quite some time, it has been apparent that the announcement of the NIST Cybersecurity Framework would be a seminal event. Though couched as a voluntary program, many expected that the Framework woul...
-
Event Announcements (More details on the Events Calendar)
-
Published by Scribner (2013)
Reviewed by Benjamin Wittes
-
Editor’s Note: The recent events in Ukraine have dredged up memories of an era of great-power competition and territorial conquest driven by imperialistic ambitions that many observers believed had been ...
-
Below is the text of a Report/public comment on the 702 program submitted by the NSA Civil Liberties and Privacy Office to the Privacy and Civil Liberties Oversight Board (PCLOB), dated April 16, 2014. I...
-
This is a very impressive hour of radio based on this excellent story by Gregory Johnsen. John Bellinger and I both show up at various points in the discussion. It's neat what you can do on national secu...
-
James Lewis of CSIS has an excellent post on the reality of the Russian surveillance system, a reality that is quite different from the impression created by Vladimir Putin during his recent televised ex...
-
In a surprising decision issued on the first anniversary of the Supreme Court’s decision in Kiobel, Judge Scheindlin held, in the long-running Apartheid litigation, that corporations may be sued under th...
-
I had meant to have a book review of former CIA lawyer John Rizzo's new book, Company Man: Thirty Years of Controversy and Crisis in the CIA, ready to run along with this episode of the podcast.
-
India suggests renaming the Internet. Not, apparently, a joke: "In a major diplomatic initiative, India is all set to challenge the U.S.’ hegemony of the World Wide Web at a global meet on Internet gove...
-
Coming off of the heartbleed scare, attention this week still focused on internet vulnerabilities.