-
Details are still emerging on the two terror raids conducted by American commandos this weekend, giving the media plenty to compare and contrast. Peter Baker and David Sanger of the New York Times charac...
-
Last Wednesday, accused Boston Marathon bomber Dzhokhar Tsarnaev filed a motion to vacate special administrative measures (SAMs) imposed on him and his attorneys. In his motion, Tsarnaev argues that the ...
-
Hilary Mantel is justly famous for Wolf Hall and Bring Up the Bodies (Wolf Hall, Book 2
-
Imagine if the Democrats in 2007, having just regained control of the Congress, had decided to go to the mat against the Bush tax cuts. Imagine that they voted repeatedly to repeal them. They tried to de...
-
A little-noticed district court opinion has expanded---at least at the margins---the universe of national security materials subject to FOIA requests.
We missed this opinion when it came out back in Aug...
-
Yesterday's Special Operations Forces raid on an al-Shabaab facility in Baraawe, Somalia, and the near-simultaneous capture-and-rendition of an al Qaeda figure in Tripoli, raise a number of interesting l...
-
At the Senate Intelligence Committee hearing the other day on NSA programs, I talked a lot about the importance and centrality of compliance procedures. And I quoted a quip by NSA's compliance chief, Joh...
-
From The New York Times comes the second of the day's two breaking stories regarding recent and quite significant counterterrorism operations by the United States.
-
That's the news from the New York Times.
-
It is one of Cairo's rare windy fall days, and I am sitting with a group of friends, who are drinking juice and smoking shisha on multi-colored plastic chairs in an alley downtown. A poster of Nasser flu...
-
I have noted how openly the United States has been leaking information about its covert action to support moderate Syrian rebels – from its inception through the supposed recent ramp-up. I notice via a
-
TOR (a/k/a The Onion Router) is an anonymous, encrypted web browser bundle that, in theory, is intended to allow for untraceable activity in cyberspace. Like most tools, it is neutral in value, and thus...