-
Again, we learn of a key commissions ruling in the 9/11 case, without having the ruling itself. And again, we learn of it from 9/11 defense lawyer James Connell III. Here is his second statement (whic...
-
So we learn from James Connell III, an attorney for 9/11 accused Ammar al-Baluchi.
-
On October 25, the Hoover Institution held a day-long media colloquium out at Stanford University for a first-rate group of journalists focused on national security legal issues and the work of Hoover’s ...
-
Despite talks in the White House, in Congress and abroad about reining in the NSA data collection program, the Times reports that the Obama administration, for now, has “concluded that there is no workab...
-
Okay, guys, I know that Guy Fawkes tried to blow up King James I, but launching fireworks at Buckingham Palace to celebrate Guy Fawkes Day? Very uncool.
-
It’s no accident that ousted President Mohamed Morsi’s trial happened in a place called the Fifth Settlement, which was, until ten years ago, in the middle of the desert. Parts of it fit that description...
-
Today the D.C. Circuit handed down its opinion in a Guantanamo detainee's habeas-related appeal. The detainee filed his notice of appeal too late, concluded the three-judge panel, thus divesting the appe...
-
So, what are we to make of claims that the NSA scandal will lead other countries to set up their own non-USA cloud? I really can't speak to the political imperative, but this is pretty notable: Google ...
-
Over at The National Interest, I just published a short piece about the military balance in East Asia.
-
At yesterday's hearing of the Privacy and Civil Liberties Oversight Board, I argued that a "rule of lenity" for foreign intelligence surveillance law could be a helpful way to regulate national security ...
-
Kenyan authorities have charged four in connection with the siege of the Westgate Mall in September. Read the Daily Nation story.
Today the Supreme Court hears oral arguments in Bond v. United States, a...
-
Over the past month, Jane Chong has written a series of posts published over at Security States that go under the title “Bad Code.” Her thesis (amply documented) is that those who write software code ge...