Read the complete article: We Need Better Cybercrime Data We Need Better Cybercrime Data Advertise on IT Security News. Read the complete article: We Need Better Cybercrime Data
Tag: http://www.lawfareblog.com/rss.xml
The State Department Should Designate the Russian Imperial Movement as a Foreign Terrorist Organization
The State Department Should Designate the Russian Imperial Movement as a Foreign Terrorist Organization Advertise on IT Security News. Read the complete article: The State Department Should Designate the Russian Imperial Movement as a Foreign Terrorist Organization
Now the State Department Should Designate the Russian Imperial Movement a Foreign Terrorist Organization
Now the State Department Should Designate the Russian Imperial Movement a Foreign Terrorist Organization Advertise on IT Security News. Read the complete article: Now the State Department Should Designate the Russian Imperial Movement a Foreign Terrorist Organization
COVID-19 Contact Tracing We Can Live With: A Roadmap and Recommendations
COVID-19 Contact Tracing We Can Live With: A Roadmap and Recommendations Advertise on IT Security News. Read the complete article: COVID-19 Contact Tracing We Can Live With: A Roadmap and Recommendations
The Problem with Google and Apple’s COVID-Tracking Plan
The Problem with Google and Apple’s COVID-Tracking Plan Advertise on IT Security News. Read the complete article: The Problem with Google and Apple’s COVID-Tracking Plan
COVID-19 Contact Tracing We Can Live With: A Road Map and Recommendations
COVID-19 Contact Tracing We Can Live With: A Road Map and Recommendations Advertise on IT Security News. Read the complete article: COVID-19 Contact Tracing We Can Live With: A Road Map and Recommendations
Understanding Hungary’s Authoritarian Response to the Pandemic
Understanding Hungary’s Authoritarian Response to the Pandemic Advertise on IT Security News. Read the complete article: Understanding Hungary’s Authoritarian Response to the Pandemic
The Long History of Coercive Health Responses in American Law
The Long History of Coercive Health Responses in American Law Advertise on IT Security News. Read the complete article: The Long History of Coercive Health Responses in American Law
Maximum Pressure Still Won’t Sway Iran
Maximum Pressure Still Won’t Sway Iran Advertise on IT Security News. Read the complete article: Maximum Pressure Still Won’t Sway Iran
The Coronavirus Will Not Stop Globalization
The Coronavirus Will Not Stop Globalization Advertise on IT Security News. Read the complete article: The Coronavirus Will Not Stop Globalization
Trump Fired the Intelligence Community Inspector General. Congress Must Respond.
Trump Fired the Intelligence Community Inspector General. Congress Must Respond. Advertise on IT Security News. Read the complete article: Trump Fired the Intelligence Community Inspector General. Congress Must Respond.
Fifty-Seven Years Later: America’s Worst Nuclear Submarine Disaster
Fifty-Seven Years Later: America’s Worst Nuclear Submarine Disaster Advertise on IT Security News. Read the complete article: Fifty-Seven Years Later: America’s Worst Nuclear Submarine Disaster
As the Coronavirus Ravages the United States, a Fragile Truce Between Beijing and Washington Takes Hold
As the Coronavirus Ravages the United States, a Fragile Truce Between Beijing and Washington Takes Hold Advertise on IT Security News. Read the complete article: As the Coronavirus Ravages the United States, a Fragile Truce Between Beijing and Washington…
Looking Beyond Contact Tracing to Stop the Spread
Looking Beyond Contact Tracing to Stop the Spread Advertise on IT Security News. Read the complete article: Looking Beyond Contact Tracing to Stop the Spread
Time to Get a Handle on America’s Conduct of Proxy Warfare
Time to Get a Handle on America’s Conduct of Proxy Warfare Advertise on IT Security News. Read the complete article: Time to Get a Handle on America’s Conduct of Proxy Warfare
Could COVID-19 Upend International Asylum Norms?
Could COVID-19 Upend International Asylum Norms? Advertise on IT Security News. Read the complete article: Could COVID-19 Upend International Asylum Norms?
Three Cheers for Paper Hearings
Three Cheers for Paper Hearings Advertise on IT Security News. Read the complete article: Three Cheers for Paper Hearings
What Happens If the Trump Administration Designates Drug Cartels as Terrorist Organizations?
What Happens If the Trump Administration Designates Drug Cartels as Terrorist Organizations? Advertise on IT Security News. Read the complete article: What Happens If the Trump Administration Designates Drug Cartels as Terrorist Organizations?
What Happens if the Trump Administration Designates Drug Cartels as Terrorist Organizations?
What Happens if the Trump Administration Designates Drug Cartels as Terrorist Organizations? Advertise on IT Security News. Read the complete article: What Happens if the Trump Administration Designates Drug Cartels as Terrorist Organizations?
German Military Cyber Operations are in a Legal Gray Zone
German Military Cyber Operations are in a Legal Gray Zone Advertise on IT Security News. Read the complete article: German Military Cyber Operations are in a Legal Gray Zone
Why is Trump’s Inspector General Purge Not a National Scandal?
Why is Trump’s Inspector General Purge Not a National Scandal? Advertise on IT Security News. Read the complete article: Why is Trump’s Inspector General Purge Not a National Scandal?
Water Wars: Coronavirus Spreads Risk of Conflict around the South China Sea
Water Wars: Coronavirus Spreads Risk of Conflict around the South China Sea Advertise on IT Security News. Read the complete article: Water Wars: Coronavirus Spreads Risk of Conflict around the South China Sea
The Bomb Still Ticks
The Bomb Still Ticks Advertise on IT Security News. Read the complete article: The Bomb Still Ticks
Disease Surveillance and the Fourth Amendment
Disease Surveillance and the Fourth Amendment Advertise on IT Security News. Read the complete article: Disease Surveillance and the Fourth Amendment
Leveraging Africa’s Technology Boom to Protect U.S. Interests
Leveraging Africa’s Technology Boom to Protect U.S. Interests Advertise on IT Security News. Read the complete article: Leveraging Africa’s Technology Boom to Protect U.S. Interests
The Challenge of Software Liability
The Challenge of Software Liability Advertise on IT Security News. Read the complete article: The Challenge of Software Liability
The Afghanistan Investigation and the International Legal Order
The Afghanistan Investigation and the International Legal Order Advertise on IT Security News. Read the complete article: The Afghanistan Investigation and the International Legal Order
Keeping to the Conditions of the U.S.-Taliban Agreement
Keeping to the Conditions of the U.S.-Taliban Agreement Advertise on IT Security News. Read the complete article: Keeping to the Conditions of the U.S.-Taliban Agreement
What Coronavirus Means for Online Fraud, Forced Sex, Drug Smuggling and Wildlife Trafficking
What Coronavirus Means for Online Fraud, Forced Sex, Drug Smuggling and Wildlife Trafficking Advertise on IT Security News. Read the complete article: What Coronavirus Means for Online Fraud, Forced Sex, Drug Smuggling and Wildlife Trafficking
Why The Internet Didn’t Break—But It Still Failed Millions
Why The Internet Didn’t Break—But It Still Failed Millions Advertise on IT Security News. Read the complete article: Why The Internet Didn’t Break—But It Still Failed Millions
Evolutions in the U.S. Chinese-Hacking Indictment Strategy
Evolutions in the U.S. Chinese-Hacking Indictment Strategy Advertise on IT Security News. Read the complete article: Evolutions in the U.S. Chinese-Hacking Indictment Strategy
Federal Executive Emergency Authorities to Address COVID-19
Federal Executive Emergency Authorities to Address COVID-19 Advertise on IT Security News. Read the complete article: Federal Executive Emergency Authorities to Address COVID-19
Coronavirus Disinformation and the Need for States to Shore Up International Law
Coronavirus Disinformation and the Need for States to Shore Up International Law Advertise on IT Security News. Read the complete article: Coronavirus Disinformation and the Need for States to Shore Up International Law
Unpacking TikTok, Mobile Apps and National Security Risks
Unpacking TikTok, Mobile Apps and National Security Risks Advertise on IT Security News. Read the complete article: Unpacking TikTok, Mobile Apps and National Security Risks
Data Security and U.S.-China Tech Entanglement
Data Security and U.S.-China Tech Entanglement Advertise on IT Security News. Read the complete article: Data Security and U.S.-China Tech Entanglement
The U.S. Needs to Get in the Standards Game—With Like-Minded Democracies
The U.S. Needs to Get in the Standards Game—With Like-Minded Democracies Advertise on IT Security News. Read the complete article: The U.S. Needs to Get in the Standards Game—With Like-Minded Democracies
Managing Escalation Under Layered Cyber Deterrence
Managing Escalation Under Layered Cyber Deterrence Advertise on IT Security News. Read the complete article: Managing Escalation Under Layered Cyber Deterrence
The Cyberspace Solarium Commission: From Competing to Complementary Strategies
The Cyberspace Solarium Commission: From Competing to Complementary Strategies Advertise on IT Security News. Read the complete article: The Cyberspace Solarium Commission: From Competing to Complementary Strategies
How Foreign Policy Factors for American Muslims in 2020
How Foreign Policy Factors for American Muslims in 2020 Advertise on IT Security News. Read the complete article: How Foreign Policy Factors for American Muslims in 2020
The Inspector General’s Disturbing FISA Memo
The Inspector General’s Disturbing FISA Memo Advertise on IT Security News. Read the complete article: The Inspector General’s Disturbing FISA Memo
Summary: Justice Department Inspector General Memorandum on FBI Compliance With FISA Procedures
Summary: Justice Department Inspector General Memorandum on FBI Compliance With FISA Procedures Advertise on IT Security News. Read the complete article: Summary: Justice Department Inspector General Memorandum on FBI Compliance With FISA Procedures
Brexit Is Not Immune to Coronavirus
Brexit Is Not Immune to Coronavirus Advertise on IT Security News. Read the complete article: Brexit Is Not Immune to Coronavirus
Britain’s Coronavirus Response
Britain’s Coronavirus Response Advertise on IT Security News. Read the complete article: Britain’s Coronavirus Response
Counterterrorism and Humanitarian Action: Will 2020 Be a Turning Point for International Humanitarian Law at the United Nations?
Counterterrorism and Humanitarian Action: Will 2020 Be a Turning Point for International Humanitarian Law at the United Nations? Advertise on IT Security News. Read the complete article: Counterterrorism and Humanitarian Action: Will 2020 Be a Turning Point for International…
Prosecuting Purposeful Coronavirus Exposure as Terrorism
Prosecuting Purposeful Coronavirus Exposure as Terrorism Advertise on IT Security News. Read the complete article: Prosecuting Purposeful Coronavirus Exposure as Terrorism
The Supreme Court’s Coronavirus Postponement: Pandemics, Precedent and National Risks
The Supreme Court’s Coronavirus Postponement: Pandemics, Precedent and National Risks Advertise on IT Security News. Read the complete article: The Supreme Court’s Coronavirus Postponement: Pandemics, Precedent and National Risks
Singapore’s Location App Could Save American Lives
Singapore’s Location App Could Save American Lives Advertise on IT Security News. Read the complete article: Singapore’s Location App Could Save American Lives
The Week That Will Be
The Week That Will Be Advertise on IT Security News. Read the complete article: The Week That Will Be
A Foreign Policy Toward Warlords
A Foreign Policy Toward Warlords Advertise on IT Security News. Read the complete article: A Foreign Policy Toward Warlords
Why Does Russia Use Disinformation?
Why Does Russia Use Disinformation? Advertise on IT Security News. Read the complete article: Why Does Russia Use Disinformation?
Trump Can’t Reopen the Country Over State Objections
Trump Can’t Reopen the Country Over State Objections Advertise on IT Security News. Read the complete article: Trump Can’t Reopen the Country Over State Objections
Cost Imposition Is the Point: Understanding U.S. Cyber Operations and the Strategy Behind Achieving Effects
Cost Imposition Is the Point: Understanding U.S. Cyber Operations and the Strategy Behind Achieving Effects Advertise on IT Security News. Read the complete article: Cost Imposition Is the Point: Understanding U.S. Cyber Operations and the Strategy Behind Achieving Effects
Beijing Turns to Public Diplomacy and Messaging Campaigns, as the Coronavirus Spreads Worldwide
Beijing Turns to Public Diplomacy and Messaging Campaigns, as the Coronavirus Spreads Worldwide Advertise on IT Security News. Read the complete article: Beijing Turns to Public Diplomacy and Messaging Campaigns, as the Coronavirus Spreads Worldwide
The National Commission on Public Service Is Right to Endorse Women’s Draft Registration
The National Commission on Public Service Is Right to Endorse Women’s Draft Registration Advertise on IT Security News. Read the complete article: The National Commission on Public Service Is Right to Endorse Women’s Draft Registration
Cryptocurrency Laundering Is a National Security Risk
Cryptocurrency Laundering Is a National Security Risk Advertise on IT Security News. Read the complete article: Cryptocurrency Laundering Is a National Security Risk
Doctrinal Confusion and Cultural Dysfunction in the Pentagon Over Information and Cyber Operations
Doctrinal Confusion and Cultural Dysfunction in the Pentagon Over Information and Cyber Operations Advertise on IT Security News. Read the complete article: Doctrinal Confusion and Cultural Dysfunction in the Pentagon Over Information and Cyber Operations
Measuring Strategic Success in Cyber Operations
Editor’s note: This article is part of a series of short articles by analysts involved in the Cyberspace Solarium Commission, among others, highlighting and commenting upon aspects of the commission’s findings and conclusion. The international community lacks a firm grasp…
Trump’s Misplaced Reliance on Justice Department Memoranda to Protect His Financial Records
Trump’s Misplaced Reliance on Justice Department Memoranda to Protect His Financial Records Advertise on IT Security News. Read the complete article: Trump’s Misplaced Reliance on Justice Department Memoranda to Protect His Financial Records
How Recovered COVID-19 Patients Might Help Fight the Pandemic
How Recovered COVID-19 Patients Might Help Fight the Pandemic Advertise on IT Security News. Read the complete article: How Recovered COVID-19 Patients Might Help Fight the Pandemic
What’s in the Department of Justice’s Proposals to Congress for Addressing Issues Created by the COVID-19 Pandemic?
What’s in the Department of Justice’s Proposals to Congress for Addressing Issues Created by the COVID-19 Pandemic? Advertise on IT Security News. Read the complete article: What’s in the Department of Justice’s Proposals to Congress for Addressing Issues Created…
How are American Views of the Coronavirus Crisis Evolving as It Intensifies?
How are American Views of the Coronavirus Crisis Evolving as It Intensifies? Advertise on IT Security News. Read the complete article: How are American Views of the Coronavirus Crisis Evolving as It Intensifies?
A Presidential Succession Nightmare
A Presidential Succession Nightmare Advertise on IT Security News. Read the complete article: A Presidential Succession Nightmare
COVID-19 and Social Media Content Moderation
COVID-19 and Social Media Content Moderation Advertise on IT Security News. Read the complete article: COVID-19 and Social Media Content Moderation
‘Just Say No’ Is Not a Strategy for Supply Chain Security
‘Just Say No’ Is Not a Strategy for Supply Chain Security Advertise on IT Security News. Read the complete article: ‘Just Say No’ Is Not a Strategy for Supply Chain Security
Location Surveillance to Counter COVID-19: Efficacy Is What Matters
Location Surveillance to Counter COVID-19: Efficacy Is What Matters Advertise on IT Security News. Read the complete article: Location Surveillance to Counter COVID-19: Efficacy Is What Matters
Israel’s Supreme Court Loses Its Patience With Netanyahu
Israel’s Supreme Court Loses Its Patience With Netanyahu Advertise on IT Security News. Read the complete article: Israel’s Supreme Court Loses Its Patience With Netanyahu
Can the Federal Government Override State Government Rules on Social Distancing to Promote the Economy?
Can the Federal Government Override State Government Rules on Social Distancing to Promote the Economy? Advertise on IT Security News. Read the complete article: Can the Federal Government Override State Government Rules on Social Distancing to Promote the Economy?
Developments in Israeli Politics: A Conversation with Benjamin Wittes and Aluf Benn
With the busy news cycle, many have overlooked a cascade of important developments in Israeli politics. What are the coalitions that have emerged in the weeks after the Mar. 2 elections? And the political shuffle has had the backdrop of…
Security, Privacy and the Coronavirus: Lessons From 9/11
Security, Privacy and the Coronavirus: Lessons From 9/11 Advertise on IT Security News. Read the complete article: Security, Privacy and the Coronavirus: Lessons From 9/11
What Is Happening With the Foreign Women and Children in SDF Custody in Syria?
What Is Happening With the Foreign Women and Children in SDF Custody in Syria? Advertise on IT Security News. Read the complete article: What Is Happening With the Foreign Women and Children in SDF Custody in Syria?
The Next Gray Zone Conflict: State-Based Disinformation Attacks on the Private Sector
The Next Gray Zone Conflict: State-Based Disinformation Attacks on the Private Sector Advertise on IT Security News. Read the complete article: The Next Gray Zone Conflict: State-Based Disinformation Attacks on the Private Sector
Government Surveillance in an Age of Pandemics
Government Surveillance in an Age of Pandemics Advertise on IT Security News. Read the complete article: Government Surveillance in an Age of Pandemics
Government Surveillance in an Age of Pandemics
Government Surveillance in an Age of Pandemics Advertise on IT Security News. Read the complete article: Government Surveillance in an Age of Pandemics
Government Surveillance in an Age of Pandemics
Government Surveillance in an Age of Pandemics Advertise on IT Security News. Read the complete article: Government Surveillance in an Age of Pandemics
Progress Is the Promise in National Cybersecurity Strategy
Progress Is the Promise in National Cybersecurity Strategy Advertise on IT Security News. Read the complete article: Progress Is the Promise in National Cybersecurity Strategy
Congress Needs a Coronavirus Failsafe—Before It’s Too Late
Congress Needs a Coronavirus Failsafe—Before It’s Too Late Advertise on IT Security News. Read the complete article: Congress Needs a Coronavirus Failsafe—Before It’s Too Late
The Cyberspace Solarium Commission Report and Persistent Engagement
The Cyberspace Solarium Commission Report and Persistent Engagement Advertise on IT Security News. Read the complete article: The Cyberspace Solarium Commission Report and Persistent Engagement
The Executive Unbound, Pandemic Edition
The Executive Unbound, Pandemic Edition Advertise on IT Security News. Read the complete article: The Executive Unbound, Pandemic Edition
The Near Disqualification of Heba Yazbak: Defensive Democracy in a Divided Society?
The Near Disqualification of Heba Yazbak: Defensive Democracy in a Divided Society? Advertise on IT Security News. Read the complete article: The Near Disqualification of Heba Yazbak: Defensive Democracy in a Divided Society?
The Near Disqualification of Heba Yazbak: Defensive Democracy in a Divided Society?
The Near Disqualification of Heba Yazbak: Defensive Democracy in a Divided Society? Advertise on IT Security News. Read the complete article: The Near Disqualification of Heba Yazbak: Defensive Democracy in a Divided Society?
Khalid Batarfi and the Future of AQAP
Khalid Batarfi and the Future of AQAP Advertise on IT Security News. Read the complete article: Khalid Batarfi and the Future of AQAP
How Do You Spy When the World Is Shut Down?
How Do You Spy When the World Is Shut Down? Advertise on IT Security News. Read the complete article: How Do You Spy When the World Is Shut Down?
The Israeli Emergency Regulations for Location Tracking of Coronavirus Carriers
The Israeli Emergency Regulations for Location Tracking of Coronavirus Carriers Advertise on IT Security News. Read the complete article: The Israeli Emergency Regulations for Location Tracking of Coronavirus Carriers
How Do You Spy When the World is Shut Down?
How Do You Spy When the World is Shut Down? Advertise on IT Security News. Read the complete article: How Do You Spy When the World is Shut Down?
The Federal Government’s Legal Authorities in a Public Health Crisis: A Q&A with Benjamin Wittes and Steve Vladeck
As the COVID-19 crisis continues, the federal government has begun resorting to a series of emergency powers—including the Stafford Act, the Defense Production Act and the Public Health Service Act—in response. How far could these authorities be stretched? What would…
European Elections In a Time of Coronavirus
European Elections In a Time of Coronavirus Advertise on IT Security News. Read the complete article: European Elections In a Time of Coronavirus
What’s in Trump’s Executive Order on the Defense Production Act?
What’s in Trump’s Executive Order on the Defense Production Act? Advertise on IT Security News. Read the complete article: What’s in Trump’s Executive Order on the Defense Production Act?
Reducing One Source of a Potential Election Meltdown
Reducing One Source of a Potential Election Meltdown Advertise on IT Security News. Read the complete article: Reducing One Source of a Potential Election Meltdown
The President’s Legal Shell Game to Avoid Accountability
The President’s Legal Shell Game to Avoid Accountability Advertise on IT Security News. Read the complete article: The President’s Legal Shell Game to Avoid Accountability
Ten Recommendations to Ensure a Healthy and Trustworthy 2020 Election
Ten Recommendations to Ensure a Healthy and Trustworthy 2020 Election Advertise on IT Security News. Read the complete article: Ten Recommendations to Ensure a Healthy and Trustworthy 2020 Election
The Refugee Act of 1980: A Forlorn Anniversary
The Refugee Act of 1980: A Forlorn Anniversary Advertise on IT Security News. Read the complete article: The Refugee Act of 1980: A Forlorn Anniversary
Judge Enjoins Trump Administration’s Easing of Restrictions on 3-D Gun Blueprints
Judge Enjoins Trump Administration’s Easing of Restrictions on 3-D Gun Blueprints Advertise on IT Security News. Read the complete article: Judge Enjoins Trump Administration’s Easing of Restrictions on 3-D Gun Blueprints
Is ICE’s Use of a Maryland Facial Recognition Database Lawful?
Is ICE’s Use of a Maryland Facial Recognition Database Lawful? Advertise on IT Security News. Read the complete article: Is ICE’s Use of a Maryland Facial Recognition Database Lawful?
The Federal Courts Begin to Adapt to COVID-19
The Federal Courts Begin to Adapt to COVID-19 Advertise on IT Security News. Read the complete article: The Federal Courts Begin to Adapt to COVID-19
The Cyberspace Solarium Commission’s Mandate to Fix Congressional Oversight
The Cyberspace Solarium Commission’s Mandate to Fix Congressional Oversight Advertise on IT Security News. Read the complete article: The Cyberspace Solarium Commission’s Mandate to Fix Congressional Oversight
Better to Be Realistic About the Security Opportunities of Cloud Computing
Better to Be Realistic About the Security Opportunities of Cloud Computing Advertise on IT Security News. Read the complete article: Better to Be Realistic About the Security Opportunities of Cloud Computing
What Happened to FISA Reform?
What Happened to FISA Reform? Advertise on IT Security News. Read the complete article: What Happened to FISA Reform?
Time for Regulators to Take Cyber Insurance Seriously
Time for Regulators to Take Cyber Insurance Seriously Advertise on IT Security News. Read the complete article: Time for Regulators to Take Cyber Insurance Seriously
U.S. Diplomacy Is a Necessary Part of Countering China’s Digital Authoritarianism
U.S. Diplomacy Is a Necessary Part of Countering China’s Digital Authoritarianism Advertise on IT Security News. Read the complete article: U.S. Diplomacy Is a Necessary Part of Countering China’s Digital Authoritarianism
China Responds to the Coronavirus With an Iron Grip on Information Flow
China Responds to the Coronavirus With an Iron Grip on Information Flow Advertise on IT Security News. Read the complete article: China Responds to the Coronavirus With an Iron Grip on Information Flow