-
DOD has issued the press release. Here is the opening:
-
Nearly half a year after the DNC hack, the United States finally took action. Citing the role of the Russian government in cyber operations apparently intended to affect the U.S. presidential election, a...
-
The Tallinn Manual on the International Law Applicable to Cyber Warfare is the most comprehensive and thoughtful work to date on the applicability of existing international law to cyber warfare.
-
As 2016 (finally) comes to an end, we’re looking back on an eventful year. This week, Lawfare will be rounding up coverage of some of our favorite national security topics of the past twelve months. Toda...
-
Last week, co-authors Michèle Flournoy, Richard Fontaine, and I released a Center for a New American Security report on the future of surveillance policy. The full report is available here; video of the...
-
The federal government isn’t often held up as a model for IT innovation and efficiency, but there are areas where they should be. An example of a policy directive that has paid dividends is the Continuou...
-
“Whatever the source of the material was,” Donald Trump’s deputy campaign manager David Bossie began, “if it was on the front page of the paper—it’s in the public domain. We would look at it.” Pas...
-
Lawfare readers by now should be very familiar with the concept of the FBI's Network Investigatory Technique or NIT, a small piece of malicious code that exploits the target’s computer to generate a mess...
-
As of midnight last night changes to Rule 41 of the Federal Rules of Criminal Procedure took effect. Opponents of the rule change failed in a last ditch effort in the Senate to block the change.
-
It didn’t take long after Trump’s unexpected election as the 45th president of the United States for the encryption debate to reemerge.
-
The internet has been buzzing with news and speculation regarding state election recounts and a movement to audit voting results. Last week, accounts emerged that well-respected researchers had found ind...
-
For some time I have argued that encryption is a security versus security issue. Given our reliance on cyber, that is, our increasing intertwining of the physical world with network controls, I continue ...