-
A number of sources are reporting the discovery of a complex malware toolkit, mostly described as "Flame," which appears to have been distributed in a targeted fashion to infect computers in Iran in part...
-
The Supreme Court issued orders this morning - but, as before, took no action on several Guantanamo-related petitions for certiorari.
-
The New York Times this morning has a lengthy, rich, and detailed feature story on President Obama's counterterrorism record. Reporters Jo Becker and Scott Shane have done a really terrific job of bringi...
-
...albeit in ancient Rome.
-
Over at Opinio Juris, Kevin Jon Heller has a post complaining about Leon Panetta's recent lament that “[i]t is so difficult to understand and it’s so disturbing that [Pakistan] would sentence this doctor...
-
George Washington University Law School's Laura A. Dickinson's book from Yale University Press (2012), Outsourcing War & Peace: Preserving Public Values in a World of Privatized Foreign Affairs, is quite...
-
The Federal government acknowledged, on Friday, that a contractor operating aspects of the Thrift Savings Plan (the government's in-house pension plan) suffered a significant cyber breach. As a result o...
-
The government has moved for reconsideration in the Hedges case.
-
The New York Times published an editorial yesterday criticizing Monday's decision by the Second Circuit in ACLU v.
-
As I’ve argued previously here (at length) and here (briefly), if you are interested in government counterterrorism intelligence activities and privacy, don’t just pay attention at the federal level – th...
-
Samuel Moyn’s review of Mary Dudziak’s book War Time, like the book it reviews, makes interesting points about “endless war.” Along the way Moyn says that my book Power and Constraint claims “that Barac...
-
I've lately been thinking of the scope and nature of cyber threats -- mostly in writing a still-in-draft response to Jack Goldsmith's recent defense of cybersecurity regulation. In the interest of furth...