National Security Highlights from the Eleventh Democratic Debate Advertise on IT Security News. Read the complete article: National Security Highlights from the Eleventh Democratic Debate
Tag: http://www.lawfareblog.com/rss.xml
Lessons for America: How South Korean Authorities Used Law to Fight the Coronavirus
Lessons for America: How South Korean Authorities Used Law to Fight the Coronavirus Advertise on IT Security News. Read the complete article: Lessons for America: How South Korean Authorities Used Law to Fight the Coronavirus
The Challenge of Software Liability
The Challenge of Software Liability Advertise on IT Security News. Read the complete article: The Challenge of Software Liability
What’s Ahead in the Cyber Norms Debate?
What’s Ahead in the Cyber Norms Debate? Advertise on IT Security News. Read the complete article: What’s Ahead in the Cyber Norms Debate?
The Ides of March are Come: A Trump Tweet Causes FISA Authorities to Expire
The Ides of March are Come: A Trump Tweet Causes FISA Authorities to Expire Advertise on IT Security News. Read the complete article: The Ides of March are Come: A Trump Tweet Causes FISA Authorities to Expire
Right-Wing Extremists’ New Weapon
Right-Wing Extremists’ New Weapon Advertise on IT Security News. Read the complete article: Right-Wing Extremists’ New Weapon
What’s In Trump’s National Emergency Announcement on COVID-19?
What’s In Trump’s National Emergency Announcement on COVID-19? Advertise on IT Security News. Read the complete article: What’s In Trump’s National Emergency Announcement on COVID-19?
The U.S. Government Can Deepen Its Operational Partnership With the Private Sector to Better Defend the U.S. in Cyberspace
The U.S. Government Can Deepen Its Operational Partnership With the Private Sector to Better Defend the U.S. in Cyberspace Advertise on IT Security News. Read the complete article: The U.S. Government Can Deepen Its Operational Partnership With the Private…
Is Trump Right That Britain Is Handling the Coronavirus Well?
Is Trump Right That Britain Is Handling the Coronavirus Well? Advertise on IT Security News. Read the complete article: Is Trump Right That Britain Is Handling the Coronavirus Well?
ICC Appeals Chamber Authorizes Investigation Into Crimes in Afghanistan
ICC Appeals Chamber Authorizes Investigation Into Crimes in Afghanistan Advertise on IT Security News. Read the complete article: ICC Appeals Chamber Authorizes Investigation Into Crimes in Afghanistan
Justice Department Must Share Mueller Grand Jury Information With House, D.C. Circuit Rules
Justice Department Must Share Mueller Grand Jury Information With House, D.C. Circuit Rules Advertise on IT Security News. Read the complete article: Justice Department Must Share Mueller Grand Jury Information With House, D.C. Circuit Rules
Critical Gaps Remain in Defense Department Weapons System Cybersecurity
Critical Gaps Remain in Defense Department Weapons System Cybersecurity Advertise on IT Security News. Read the complete article: Critical Gaps Remain in Defense Department Weapons System Cybersecurity
Cyber Strategy and Talent
Cyber Strategy and Talent Advertise on IT Security News. Read the complete article: Cyber Strategy and Talent
To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force
To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force Advertise on IT Security News. Read the complete article: To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force
Digital Strangelove: The Cyber Dangers of Nuclear Weapons
Digital Strangelove: The Cyber Dangers of Nuclear Weapons Advertise on IT Security News. Read the complete article: Digital Strangelove: The Cyber Dangers of Nuclear Weapons
Confronting the Ubiquity of Norms in Cyberspace and Cyber Governance
Confronting the Ubiquity of Norms in Cyberspace and Cyber Governance Advertise on IT Security News. Read the complete article: Confronting the Ubiquity of Norms in Cyberspace and Cyber Governance
Ensuring the Cybersecurity and Resilience of the Defense Industrial Base
Ensuring the Cybersecurity and Resilience of the Defense Industrial Base Advertise on IT Security News. Read the complete article: Ensuring the Cybersecurity and Resilience of the Defense Industrial Base
Operationalizing Defend Forward: How the Concept Works to Change Adversary Behavior
Operationalizing Defend Forward: How the Concept Works to Change Adversary Behavior Advertise on IT Security News. Read the complete article: Operationalizing Defend Forward: How the Concept Works to Change Adversary Behavior
Coronavirus Infection Rates Rise in U.S., as China Curbs the Virus’s Spread; Justice Department Charges Two Chinese Nationals
Coronavirus Infection Rates Rise in U.S., as China Curbs the Virus’s Spread; Justice Department Charges Two Chinese Nationals Advertise on IT Security News. Read the complete article: Coronavirus Infection Rates Rise in U.S., as China Curbs the Virus’s Spread;…
Cyber Attackers Are Exploiting Coronavirus Fears
Cyber Attackers Are Exploiting Coronavirus Fears Advertise on IT Security News. Read the complete article: Cyber Attackers Are Exploiting Coronavirus Fears
Canadian Supreme Court Allows Corporate Liability for International Law Violations
Canadian Supreme Court Allows Corporate Liability for International Law Violations Advertise on IT Security News. Read the complete article: Canadian Supreme Court Allows Corporate Liability for International Law Violations
House Oversight Committee Questions Government Response to Coronavirus
House Oversight Committee Questions Government Response to Coronavirus Advertise on IT Security News. Read the complete article: House Oversight Committee Questions Government Response to Coronavirus
What’s in H.R. 6172, the House’s Compromise FISA Reform Bill?
What’s in H.R. 6172, the House’s Compromise FISA Reform Bill? Advertise on IT Security News. Read the complete article: What’s in H.R. 6172, the House’s Compromise FISA Reform Bill?
Defending Forward by Defending Norms
Defending Forward by Defending Norms Advertise on IT Security News. Read the complete article: Defending Forward by Defending Norms
Defend Forward as a Whole-of-Nation Effort
Defend Forward as a Whole-of-Nation Effort Advertise on IT Security News. Read the complete article: Defend Forward as a Whole-of-Nation Effort
Water Wars: Duterte Disdains Detente, Departs Defense Deal
Water Wars: Duterte Disdains Detente, Departs Defense Deal Advertise on IT Security News. Read the complete article: Water Wars: Duterte Disdains Detente, Departs Defense Deal
The Pentagon’s General Counsel Defends the Legality of the Soleimani Strike
The Pentagon’s General Counsel Defends the Legality of the Soleimani Strike Advertise on IT Security News. Read the complete article: The Pentagon’s General Counsel Defends the Legality of the Soleimani Strike
Deterrence by Denial: The Missing Element of U.S. Cyber Strategy
Deterrence by Denial: The Missing Element of U.S. Cyber Strategy Advertise on IT Security News. Read the complete article: Deterrence by Denial: The Missing Element of U.S. Cyber Strategy
Layered Cyber Deterrence: A Strategy for Securing Connectivity in the 21st Century
Layered Cyber Deterrence: A Strategy for Securing Connectivity in the 21st Century Advertise on IT Security News. Read the complete article: Layered Cyber Deterrence: A Strategy for Securing Connectivity in the 21st Century
The Cyberspace Solarium Commission Report: A Lawfare Series
Today marks the launch of the official report of the Cyberspace Solarium Commission. It will be posted here later today, and we urge you to read it in full. Meanwhile, here at Lawfare we will be posting a series of…
The Revised EARN IT Act Proposes a Better Process for Encryption Policy
The Revised EARN IT Act Proposes a Better Process for Encryption Policy Advertise on IT Security News. Read the complete article: The Revised EARN IT Act Proposes a Better Process for Encryption Policy
The U.S. Gets U.N. Support for the Taliban Deal
The U.S. Gets U.N. Support for the Taliban Deal Advertise on IT Security News. Read the complete article: The U.S. Gets U.N. Support for the Taliban Deal
Why is Congress Conducting Business as Usual in the Face of Coronavirus?
Why is Congress Conducting Business as Usual in the Face of Coronavirus? Advertise on IT Security News. Read the complete article: Why is Congress Conducting Business as Usual in the Face of Coronavirus?
Another Blow to the Presumption of Regularity
Another Blow to the Presumption of Regularity Advertise on IT Security News. Read the complete article: Another Blow to the Presumption of Regularity
Is It Time to Reform the Federal Vacancies Reform Act?
Is It Time to Reform the Federal Vacancies Reform Act? Advertise on IT Security News. Read the complete article: Is It Time to Reform the Federal Vacancies Reform Act?
In Saudi Arabia, the Virus Crisis Meets Inept Leadership
In Saudi Arabia, the Virus Crisis Meets Inept Leadership Advertise on IT Security News. Read the complete article: In Saudi Arabia, the Virus Crisis Meets Inept Leadership
Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to the Coronavirus
Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to the Coronavirus Advertise on IT Security News. Read the complete article: Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to the Coronavirus
Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to COVID-19
Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to COVID-19 Advertise on IT Security News. Read the complete article: Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to COVID-19
Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to Coronavirus
Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to Coronavirus Advertise on IT Security News. Read the complete article: Congressional Homeland Security Committees Seek Ways to Support State, Federal Responses to Coronavirus
A Bad Deal for Afghanistan
A Bad Deal for Afghanistan Advertise on IT Security News. Read the complete article: A Bad Deal for Afghanistan
The Pentagon’s General Counsel on the Law of Military Operations in Cyberspace
The Pentagon’s General Counsel on the Law of Military Operations in Cyberspace Advertise on IT Security News. Read the complete article: The Pentagon’s General Counsel on the Law of Military Operations in Cyberspace
Could the U.S. Sanction the International Criminal Court?
Could the U.S. Sanction the International Criminal Court? Advertise on IT Security News. Read the complete article: Could the U.S. Sanction the International Criminal Court?
Reading Between the Lines of Afghan Agreements
Reading Between the Lines of Afghan Agreements Advertise on IT Security News. Read the complete article: Reading Between the Lines of Afghan Agreements
Reading between the Lines of Afghan Agreements
Reading between the Lines of Afghan Agreements Advertise on IT Security News. Read the complete article: Reading between the Lines of Afghan Agreements
How Italy Is Handling the Coronavirus
How Italy Is Handling the Coronavirus Advertise on IT Security News. Read the complete article: How Italy Is Handling the Coronavirus
What We Learned From Bloomberg’s Online Campaign
What We Learned From Bloomberg’s Online Campaign Advertise on IT Security News. Read the complete article: What We Learned From Bloomberg’s Online Campaign
Quarantine and Isolation Authorities in States Affected by COVID-19
Quarantine and Isolation Authorities in States Affected by COVID-19 Advertise on IT Security News. Read the complete article: Quarantine and Isolation Authorities in States Affected by COVID-19
Summary: House Has No Standing to Compel McGahn’s Testimony, D.C. Circuit Rules
Summary: House Has No Standing to Compel McGahn’s Testimony, D.C. Circuit Rules Advertise on IT Security News. Read the complete article: Summary: House Has No Standing to Compel McGahn’s Testimony, D.C. Circuit Rules
Idlib’s Internally Displaced Persons Crisis
Idlib’s Internally Displaced Persons Crisis Advertise on IT Security News. Read the complete article: Idlib’s Internally Displaced Persons Crisis
Treasury Department Implements New Foreign Investment Rules
Treasury Department Implements New Foreign Investment Rules Advertise on IT Security News. Read the complete article: Treasury Department Implements New Foreign Investment Rules
The EU’s White Paper on AI: A Thoughtful and Balanced Way Forward
The EU’s White Paper on AI: A Thoughtful and Balanced Way Forward Advertise on IT Security News. Read the complete article: The EU’s White Paper on AI: A Thoughtful and Balanced Way Forward
House Subcommittee Voices Concerns Over U.S. Management of the Coronavirus
House Subcommittee Voices Concerns Over U.S. Management of the Coronavirus Advertise on IT Security News. Read the complete article: House Subcommittee Voices Concerns Over U.S. Management of the Coronavirus
Persistent Engagement Neglects Secrecy at Its Peril
Persistent Engagement Neglects Secrecy at Its Peril Advertise on IT Security News. Read the complete article: Persistent Engagement Neglects Secrecy at Its Peril
Summary: Appointment of USCIS Director Cuccinelli Violates Federal Vacancies Reform Act, Court Rules
Summary: Appointment of USCIS Director Cuccinelli Violates Federal Vacancies Reform Act, Court Rules Advertise on IT Security News. Read the complete article: Summary: Appointment of USCIS Director Cuccinelli Violates Federal Vacancies Reform Act, Court Rules
Asylum Update: Ninth Circuit Deals Two Defeats to the Trump Administration
Asylum Update: Ninth Circuit Deals Two Defeats to the Trump Administration Advertise on IT Security News. Read the complete article: Asylum Update: Ninth Circuit Deals Two Defeats to the Trump Administration
Turkey’s Troubles in Idlib: Does Article 5 of the North Atlantic Treaty Hold the Answer?
Turkey’s Troubles in Idlib: Does Article 5 of the North Atlantic Treaty Hold the Answer? Advertise on IT Security News. Read the complete article: Turkey’s Troubles in Idlib: Does Article 5 of the North Atlantic Treaty Hold the Answer?
Understanding China’s ‘Preventive Repression’ in Xinjiang
Understanding China’s ‘Preventive Repression’ in Xinjiang Advertise on IT Security News. Read the complete article: Understanding China’s ‘Preventive Repression’ in Xinjiang
Huawei Faces Setbacks in U.S. Courts; Coronavirus Epidemic Expands Beyond Chinese Borders
Huawei Faces Setbacks in U.S. Courts; Coronavirus Epidemic Expands Beyond Chinese Borders Advertise on IT Security News. Read the complete article: Huawei Faces Setbacks in U.S. Courts; Coronavirus Epidemic Expands Beyond Chinese Borders
Random Toxicity? What’s Going on in @benjaminwittes’s Mentions
Random Toxicity? What’s Going on in @benjaminwittes’s Mentions Advertise on IT Security News. Read the complete article: Random Toxicity? What’s Going on in @benjaminwittes’s Mentions
Planning for Coronavirus
Planning for Coronavirus Advertise on IT Security News. Read the complete article: Planning for Coronavirus
Why the Trump Administration May End Up in Court Over War Powers Reporting
Why the Trump Administration May End Up in Court Over War Powers Reporting Advertise on IT Security News. Read the complete article: Why the Trump Administration May End Up in Court Over War Powers Reporting
States and Cities Could Use Billions of Unspent DHS Grants to #Protect2020
States and Cities Could Use Billions of Unspent DHS Grants to #Protect2020 Advertise on IT Security News. Read the complete article: States and Cities Could Use Billions of Unspent DHS Grants to #Protect2020
What a New Resource Says About the Value of War Powers Reporting
What a New Resource Says About the Value of War Powers Reporting Advertise on IT Security News. Read the complete article: What a New Resource Says About the Value of War Powers Reporting
Summary: The House Judiciary Committee’s Proposed Changes to FISA
Summary: The House Judiciary Committee’s Proposed Changes to FISA Advertise on IT Security News. Read the complete article: Summary: The House Judiciary Committee’s Proposed Changes to FISA
One Year From Expiration, ‘New START’ Remains in Limbo
One Year From Expiration, ‘New START’ Remains in Limbo Advertise on IT Security News. Read the complete article: One Year From Expiration, ‘New START’ Remains in Limbo
One Year From Expiration, “New START” Remains in Limbo
One Year From Expiration, “New START” Remains in Limbo Advertise on IT Security News. Read the complete article: One Year From Expiration, “New START” Remains in Limbo
The Iron March Data Dump Provides a Window Into How White Supremacists Communicate and Recruit
The Iron March Data Dump Provides a Window Into How White Supremacists Communicate and Recruit Advertise on IT Security News. Read the complete article: The Iron March Data Dump Provides a Window Into How White Supremacists Communicate and Recruit
Cyber Norms Processes at a Crossroads
Cyber Norms Processes at a Crossroads Advertise on IT Security News. Read the complete article: Cyber Norms Processes at a Crossroads
Hackers Are Everywhere. Here’s How Scholars Can Find Them.
Hackers Are Everywhere. Here’s How Scholars Can Find Them. Advertise on IT Security News. Read the complete article: Hackers Are Everywhere. Here’s How Scholars Can Find Them.
How to Reform the Pardon Power
How to Reform the Pardon Power Advertise on IT Security News. Read the complete article: How to Reform the Pardon Power
The Political Landscape of FISA Reauthorization
The Political Landscape of FISA Reauthorization Advertise on IT Security News. Read the complete article: The Political Landscape of FISA Reauthorization
Warren Has a Plan for Disinformation—What About Everyone Else?
Warren Has a Plan for Disinformation—What About Everyone Else? Advertise on IT Security News. Read the complete article: Warren Has a Plan for Disinformation—What About Everyone Else?
Do Geofence Warrants Violate the Fourth Amendment?
Do Geofence Warrants Violate the Fourth Amendment? Advertise on IT Security News. Read the complete article: Do Geofence Warrants Violate the Fourth Amendment?
Does Trump Care About the Director of National Intelligence?
Does Trump Care About the Director of National Intelligence? Advertise on IT Security News. Read the complete article: Does Trump Care About the Director of National Intelligence?
What Really Happened at the Roger Stone Sentencing
What Really Happened at the Roger Stone Sentencing Advertise on IT Security News. Read the complete article: What Really Happened at the Roger Stone Sentencing
Will SDF-Affiliated Courts Try European Foreign Fighters?
Will SDF-Affiliated Courts Try European Foreign Fighters? Advertise on IT Security News. Read the complete article: Will SDF-Affiliated Courts Try European Foreign Fighters?
Far-Right Terror Rocks Germany
Far-Right Terror Rocks Germany Advertise on IT Security News. Read the complete article: Far-Right Terror Rocks Germany
Prosecutions of International Terrorist Supporters Continue: Winter 2019 Update
Prosecutions of International Terrorist Supporters Continue: Winter 2019 Update Advertise on IT Security News. Read the complete article: Prosecutions of International Terrorist Supporters Continue: Winter 2019 Update
Take Greenland Seriously and Literally as a Vital National Security Issue
Take Greenland Seriously and Literally as a Vital National Security Issue Advertise on IT Security News. Read the complete article: Take Greenland Seriously and Literally as a Vital National Security Issue
Dispatch from Munich: Seeking a Savior in a Time of Westlessness
Dispatch from Munich: Seeking a Savior in a Time of Westlessness Advertise on IT Security News. Read the complete article: Dispatch from Munich: Seeking a Savior in a Time of Westlessness
The 2020 Presidential Candidates Stay (Mostly) Quiet on Law Enforcement Independence
The 2020 Presidential Candidates Stay (Mostly) Quiet on Law Enforcement Independence Advertise on IT Security News. Read the complete article: The 2020 Presidential Candidates Stay (Mostly) Quiet on Law Enforcement Independence
What Should We Do About Section 230?
What Should We Do About Section 230? Advertise on IT Security News. Read the complete article: What Should We Do About Section 230?
New Evidence of Secret International Agreements
New Evidence of Secret International Agreements Advertise on IT Security News. Read the complete article: New Evidence of Secret International Agreements
Our Robophobia
Our Robophobia Advertise on IT Security News. Read the complete article: Our Robophobia
Bill Barr’s Secret: He’s Pro-Defendant
Bill Barr’s Secret: He’s Pro-Defendant Advertise on IT Security News. Read the complete article: Bill Barr’s Secret: He’s Pro-Defendant
The Senate Urges a More Assertive Approach Toward Libya Policy
The Senate Urges a More Assertive Approach Toward Libya Policy Advertise on IT Security News. Read the complete article: The Senate Urges a More Assertive Approach Toward Libya Policy
Facebook’s White Paper on the Future of Online Content Regulation: Hard Questions for Lawmakers
Facebook’s White Paper on the Future of Online Content Regulation: Hard Questions for Lawmakers Advertise on IT Security News. Read the complete article: Facebook’s White Paper on the Future of Online Content Regulation: Hard Questions for Lawmakers
Redefining Victory in Democracy’s War on Terror
Redefining Victory in Democracy’s War on Terror Advertise on IT Security News. Read the complete article: Redefining Victory in Democracy’s War on Terror
The Disruption of Development Finance
The Disruption of Development Finance Advertise on IT Security News. Read the complete article: The Disruption of Development Finance
Department of Justice Announces Indictments Against PLA Officials
Department of Justice Announces Indictments Against PLA Officials Advertise on IT Security News. Read the complete article: Department of Justice Announces Indictments Against PLA Officials
Charles Lenton O’Brien, RIP
Charles Lenton O’Brien, RIP Advertise on IT Security News. Read the complete article: Charles Lenton O’Brien, RIP
Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks
Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks Advertise on IT Security News. Read the complete article: Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks
How U.S. Sanctions Affect Europe’s Leverage in the Iran Deal Dispute Resolution Mechanism
How U.S. Sanctions Affect Europe’s Leverage in the Iran Deal Dispute Resolution Mechanism Advertise on IT Security News. Read the complete article: How U.S. Sanctions Affect Europe’s Leverage in the Iran Deal Dispute Resolution Mechanism
No Nation Can Fight Coronavirus on Its Own
No Nation Can Fight Coronavirus on Its Own Advertise on IT Security News. Read the complete article: No Nation Can Fight Coronavirus on Its Own
Congress, Not the Attorney General, Should Decide the Future of Encryption
Congress, Not the Attorney General, Should Decide the Future of Encryption Advertise on IT Security News. Read the complete article: Congress, Not the Attorney General, Should Decide the Future of Encryption
Prime Minister Trudeau Campaigns for a U.N. Security Council Seat
Prime Minister Trudeau Campaigns for a U.N. Security Council Seat Advertise on IT Security News. Read the complete article: Prime Minister Trudeau Campaigns for a U.N. Security Council Seat
The President Tweets and the Justice Department Complies
The President Tweets and the Justice Department Complies Advertise on IT Security News. Read the complete article: The President Tweets and the Justice Department Complies
The EARN IT Act Raises Good Questions About End-to-End Encryption
The EARN IT Act Raises Good Questions About End-to-End Encryption Advertise on IT Security News. Read the complete article: The EARN IT Act Raises Good Questions About End-to-End Encryption
What Exactly Do the New PLA Indictments Accomplish?
What Exactly Do the New PLA Indictments Accomplish? Advertise on IT Security News. Read the complete article: What Exactly Do the New PLA Indictments Accomplish?
The Legal Limits on Trump’s Reprisals Against Impeachment Witnesses
The Legal Limits on Trump’s Reprisals Against Impeachment Witnesses Advertise on IT Security News. Read the complete article: The Legal Limits on Trump’s Reprisals Against Impeachment Witnesses