-
Editor's Note: The use of drones is at the center of the Obama administration's counterterrorism policy – and, perhaps more importantly, at the center of many Lawfare discussions. One frequent concern is...
-
The Manhattan District Attorney's Office has released a new version of its white paper on "Smartphone Encryption and Public Safety." The report updates the Office's November 2015 white paper on encryptio...
-
In the world of kinetic military operations, collateral damage is typically straightforward to assess because of well-established definitions, well-understood weapon characteristics, and reasonably well-...
-
For almost exactly a year, Lawfare has been closely watching and commenting on the 2016 presidential campaign. As the campaign season finally draws to a close, below is a compendium of all the site’s ele...
-
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is th...
-
My colleague Ben Buchanan and I have written a paper on cybersecurity threats to American elections. While we examine operations that try to influence American voters—like the much-publicized hack of var...
-
On October 25, 2016 the Department of Justice released its “intake and charging policy for computer crime matters (blog post and formal memorandum). This policy has been operative since September 2014,...
-
Bonnie and Clyde are a thing of the past. Bank robberies have declined in the past several years, a function in part of improved security measures.
-
This is a plug for a new cyber policy book out this month: Cyber Insecurity: Navigating the Perils of the Next Information Age, edited by Richard Harrison, Director of Operations and Defense Technology P...
-
As Thomas Rid explains in this terrific piece in Esquire, the Russian government has developed a remarkable capacity for blending the fruits of espionage with information operations designed to manipulat...
-
An observation made in the briefing report War-Algorithm Accountability (featured in a Readings post last week) is that weapons are not the only military systems increasingly defined by algorithms, autom...
-
In my first post on this subject, I quoted a news story in fedscoop saying that
The development of “loud” offensive cyber tools, [that could be definitively traced to the United States and thus] able t...