-
U.S. Trade Representative Robert Lighthizer and Treasury Secretary Steven Mnuchin concluded the 10th round of U.S.-China trade talks with Vice Premier Liu He on May 1. President Trump initially cast the ...
-
Amid a massive exchange of rocket fire and airstrikes between Israel and both Hamas and Islamic Jihad this weekend, Hamas attempted a cyber operation against an unspecified civilian target in Israel. The...
-
Michael P. Fischerkeller and Richard J. Harknett have recently produced excellent writing on persistent engagement, a central element of U.S. Cyber Command’s (USCYBERCOM’s)—and the nation’s—strategy for ...
-
In March, Facebook took down more than 2,600 pages, groups and accounts engaged in sweeping coordinated information operations on its platforms—an important step in the platform’s effort to prevent malig...
-
While there is widespread agreement that Huawei devices in 5G infrastructure pose some risk to the U.S. and allied nations, the policy community—in particular the U.K.’s National Cyber Security Centre—ha...
-
In Commonwealth v. Jones, the Massachusetts Supreme Judicial Court held, for the second time in five years, that the government may compel a defendant to unlock an electronic device under certain circums...
-
After last year’s passage of the Clarifying Lawful Overseas Use of Data Act (Cloud Act), officials and journalists in the European Union have ramped up criticism of the American desire for extraterritori...
-
Background
-
Treasury Secretary Steven Mnuchin revealed last week on CNBC that U.S. and Chinese negotiators have reached agreement on an “enforcement mechanism” as part of negotiations over a bilateral trade deal. Mn...
-
Telecommunications networks are special—they are designed to enable wiretapping. Mandates such as the Communications Assistance for Law Enforcement Act (CALEA) in the U.S. and similar requirements elsewh...
-
On April 1, AT&T announced that the Navy and the Marine Corps had signed up to the FirstNet public safety broadband network, which prioritizes public safety communications over other types of traffic. A ...
-
In a recent Lawfare post, Max Smeets examines the implications of the shift in U.S. strategic thinking on cyberspace. He correctly notes that U.S.