-
On Tuesday, the Department of Justice unsealed an indictment in the Southern District of California charging 10 defendants, including Chinese intelligence officers and their recruits, in two conspiracies...
-
In my first post in this series, I wrote that one definition of artificial intelligence (AI) is a machine that thinks. But is it? Several people with technical backgrounds in the AI field reached out to ...
-
The New York Times reported a mind-boggling story on Oct. 24. The president of the United States routinely ignores the advice of his aides and calls old friends on an unsecured iPhone “no different from ...
-
Introduction
-
In Lawfare on Oct. 19, Chinese cybersecurity analyst Lyu Jinghua (吕晶华) offered a thoughtful critique of the 2018 Department of Defense Cyber Strategy, an unclassified seven-page summary of which was rele...
-
Last week, Lawfare published an article from Lyu Jinghua, a former colonel in the People’s Liberation Army, titled “A Chinese Perspective on the Pentagon’s Cyber Strategy: From ‘Active Cyber Defense’ to ...
-
The 2018 Department of Defense Cyber Strategy is the third report of its kind: The document, a summary of which was issued on Sept.
-
Last June in a 5-4 ruling in Carpenter v. United States, the Supreme Court extended Fourth Amendment protections to an individual’s cell phone location data for the first time.
-
Pence Calls Out Chinese Intellectual Property Theft
-
This article proposes the creation of an international organization modeled after the International Committee of the Red Cross (ICRC) to provide assistance and relief to vulnerable citizens and enterpris...
-
In the wake of Russia’s interference in U.S. elections, questions persist as to whether Russia changed vote totals and changed the outcome of the election.
-
A recurring question in law-of-digital-evidence investigations is how the Fifth Amendment applies to acts of compelled decryption. In these cases, the government gets an order directing a person to enter...