-
Election Security After Iowa
The disaster of the Iowa caucuses is a vivid illustration of how public reaction to a mishap can be worse than the mishap itself. -
The Quarantine Power: A Primer in Light of the Coronavirus Situation
The U.S. government has begun invoking quarantine authority, so now is probably a good time for a review of the legal architectures that both authorize and constrain the quarantine power. -
Persistent Engagement and Cost Imposition: Distinguishing Between Cause and Effect
Cost imposition should be reconceptualized to align with the realities of cyber strategic competition. -
Coronavirus Death Toll Rises Above 200; Experts Expect It to Spread
Lawfare's biweekly roundup of U.S.-China technology policy news. -
Members of the House Are on Notice: No Tweeting Deepfakes
The House Ethics Committee has announced that members who share deepfakes or “other audio-visual distortions intended to mislead the public” could face sanctions. It’s a small but noteworthy step. -
Facebook's Oversight Board Bylaws: For Once, Moving Slowly
The new bylaws include a number of promising signs about Facebook’s commitment to the Oversight Board experiment. But the board’s original ambit of operations will be fairly limited. -
Is There a Targeted Troll Campaign Against Lisa Page? A Bot Sentinel Investigation
I am the founder and CEO of Bot Sentinel, a platform that uses machine learning and artificial intelligence to classify inauthentic and problematic Twitter accounts. Even I was shocked by what we discove... -
U.S. and China Sign "Phase One" Trade Deal but Leave Key Issues Unresolved
Lawfare's biweekly roundup of U.S.-China technology policy news. -
Internet Freedom 10 Years In
Hillary Clinton gave her first speech on internet freedom 10 years ago today. How does it read after a decade of increasing skepticism about whether the internet is good for the world? -
NSA General Counsel Remarks to the American Bar Association
-
Apple vs FBI: Pensacola Isn’t San Bernardino
Once again, the FBI is seeking Apple’s help in unlocking phones in a counterterrorism case. But this time, Apple is technically incapable of providing assistance. -
Tor Hidden Services Are a Failed Technology, Harming Children, Dissidents and Journalists
Tor hidden services are intended to help dissidents and whistleblowers. Instead, they have provided a false sense of security to users and created a platform for child sexual exploitation.



