-
The most recent purportedly serious proposal by a Western government to force technology companies to provide access to the content of encrypted communications comes from Ian Levy and Crispin Robinson of...
-
The so-called Crypto Wars have been going on for 25 years now.
-
Today the Brookings Institution is publishing our edited volume, "Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations." And here is the first intro
-
Across the globe, the rapid pace of technology development has made it difficult to govern emerging tech effectively. Policymakers struggle with several primary issues, including knowledge of the subject...
-
A Congress that begins with a government shutdown carrying over and a raft of subpoenas to the executive branch issued by incoming House committee chairs promises to be at least as polarized and partisan...
-
On the U.S.-China trade war front, the first week of 2019 has brought cause for cautious optimism. Midlevel trade talks between American and Chinese officials were extended for an additional day and conc...
-
The Committee on Foreign Investment in the United States (CFIUS) protects U.S. national security by regulating against attempts by foreign commercial efforts to obtain control in a U.S. trade or business.
-
The financial sector has long been at the forefront of cybersecurity protection, information sharing, and collaboration. Even so, cyberattacks on banks and other institutions of the global financial syst...
-
Just before Christmas, the U.S. Department of Justice unsealed an indictment against two Chinese nationals who allegedly conducted a twelve-year “global campaign[] of computer intrusions” to steal sensit...
-
Over the past year, lawmakers from Brussels to Washington have discussed whether and how to regulate social media platforms. In Germany, a central question has been whether such platforms—which Germans c...
-
Lawfare has run a series of posts concerning exceptional access.
-
In the cybersecurity field, the term “active defense” is often used in a variety of ways, referring to any activity undertaken outside the legitimate span of control of an organization being attacked; an...