A Gig Surveillance Economy

What are the legal and policy questions raised by gig surveillance work? | Continue reading


@lawfareblog.com | 2 years ago

Facial Recognition as a Less-Bad Option

The perils that flow from facial recognition can be mitigated through sensible limits without banning the technology and the risks of facial recognition are less bad than the options police have without its use. | Continue reading


@lawfareblog.com | 2 years ago

Carpenter vs. United States: cell phone users retained Fourth Amendment rights

An analysis of the federal and state judgments applying Carpenter illuminates both the present state of the law and the paths along which it will likely continue to develop. | Continue reading


@lawfareblog.com | 2 years ago

The Pros and Cons of Mandating Reporting from Ransomware Victims

The proposed reporting mandates are an insufficient solution to the right problem. | Continue reading


@lawfareblog.com | 2 years ago

Alternative Channels for Police Transparency

Fourth Amendment doctrine and new policing technologies have made law enforcement less transparent, less accountable and less trustworthy. Transparency law is beginning to fill the gap. | Continue reading


@lawfareblog.com | 2 years ago

Manufactured Whistleblowing: Data Leaks as Subversion

Manufactured whistleblowing has become an element of disinformation campaigns to disrupt Taiwan’s sovereignty and stability. | Continue reading


@lawfareblog.com | 2 years ago

A Brief History of Online Influence Operations

What does the history of online influence operations reveal about how to tackle disinformation? | Continue reading


@lawfareblog.com | 2 years ago

The New Climate Security Reports

The reports offer a clear-eyed analysis of the climate threats facing the nation and world. | Continue reading


@lawfareblog.com | 2 years ago

Prosecuting Project Raven: A New Frontier for Export Control Enforcement

The deferred prosecution agreements for three members of Project Raven charged with hacking on behalf of a foreign government seem to set a precedent for lenient treatment for this type of conduct. In reality, the case signals that the U.S. Department of Justice intends to crack … | Continue reading


@lawfareblog.com | 2 years ago

What Are the Limits on Congressional Surveillance?

The limits on congressional surveillance vary from those on other, more common forms of government surveillance. As a whole, they raise difficult questions around the convergence of individual privacy and the separation of powers. | Continue reading


@lawfareblog.com | 2 years ago

When Is a State Secret Not a Secret?

In oral argument in United States v. Zubaydah, the court seemed to take seriously the government’s invocation of the state secrets privilege to protect information that seems very much in the public domain. | Continue reading


@lawfareblog.com | 2 years ago

Private Data/Public Regulation

Policing increasingly relies on the collection of digital data, often of people for whom there is no basis for suspicion. Police seek fewer search warrants and more requests to harvest metadata, they buy data from brokers, they track location and other aspects of our lives. Somet … | Continue reading


@lawfareblog.com | 2 years ago

China’s Successful Foray into Asymmetric Lawfare

The Chinese government’s use of its own weak legal system to carry out “hostage diplomacy" may herald a new “asymmetric lawfare” strategy to counter the U.S. | Continue reading


@lawfareblog.com | 2 years ago

The FBI’s FISA Mess

The inspector general’s latest report on FISA implementation at the FBI is not as bad as it looks, but it’s not good either. | Continue reading


@lawfareblog.com | 2 years ago

The Cyber Monoculture Risk

Monoculture risk is manageable for most systems, but that isn’t the case for government systems. For these systems, monoculture vulnerability is a national security risk. | Continue reading


@lawfareblog.com | 2 years ago

Cfius, Team Telecom and China

What have CFIUS and Team Telecom been up to? | Continue reading


@lawfareblog.com | 2 years ago

Legal Mechanisms of Aukus Explained

AUKUS has already sparked a hullabaloo, both with allies such as France and with adversaries such as China. This post explains the naval nuclear propulsion portion of AUKUS, its operation and legal basis, and the controversy surrounding it. | Continue reading


@lawfareblog.com | 2 years ago

China Is Making Smart Money

China’s fintech activity is evolving swiftly and the U.S. government needs to thwart this long-term threat by ensuring that the companies exploring new technical capabilities in the financial sector have an alternative to Chinese innovation. | Continue reading


@lawfareblog.com | 2 years ago

SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom

Interested in a detailed-but-accessible case study of the Russian cyberespionage campaign that targeted SolarWinds (among others)? I’ve got you covered. | Continue reading


@lawfareblog.com | 2 years ago

The Apple Client-Side Scanning System

Apple’s efforts, though commendable, raise as many questions as they answer. | Continue reading


@lawfareblog.com | 2 years ago

Warnings That Work: Combating Misinformation Without Deplatforming

Both President Biden and Facebook have taken steps to dial down the temperature since last week’s dustup, but the fundamental problem remains: How can platforms effectively combat misinformation with steps short of takedowns? | Continue reading


@lawfareblog.com | 2 years ago

After Didi Fiasco, China Imposes Cybersecurity Reviews on Foreign IPOs

Lawfare’s biweekly roundup of U.S.-China technology policy and national security news. | Continue reading


@lawfareblog.com | 2 years ago

What Happened in the Kaseya VSA Incident?

Right before the start of the holiday weekend, news broke of yet another massive ransomware attack. What's the deal? | Continue reading


@lawfareblog.com | 2 years ago

Dangers Posed by Evidentiary Software–and What to Do About It

It's well known the code is buggy; that's why software updates for anything from apps to operating systems are now the norm. But if the public understands this, the courts have not followed suit. | Continue reading


@lawfareblog.com | 2 years ago

How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission

Making cryptocurrency mining illegal won’t stop all mining, but it will seriously disrupt it. | Continue reading


@lawfareblog.com | 2 years ago

Finally! A Cybersecurity Safety Review Board

The creation of the Cyber Safety Review Board is a good first step, but additional action can magnify the value the board offers. | Continue reading


@lawfareblog.com | 2 years ago

Tense Relations Between China and Philippines; Europe, Japan Seek Larger Roles

Relations between China and the Philippines continue to smolder; U.S. freedom of navigation operations continue; Japan and Europe move to address broader Indo-Pacific stability. | Continue reading


@lawfareblog.com | 2 years ago

Facebook’s Responses in Trump Case Better Than a Kick in the Teeth, but Not Much

Today was the 30-day deadline for Facebook’s responses to the policy recommendations in the FOB’s decision on the suspension of Trump’s account. The responses are underwhelming. | Continue reading


@lawfareblog.com | 2 years ago

The Ransomware Problem Is a Bitcoin Problem

The best way to deal with this new era of big-game ransomware will involve not just securing computer systems or prosecuting criminals, but disrupting the one payment channel capable of moving millions at a time outside of money laundering laws: Bitcoin and other cryptocurrencies … | Continue reading


@lawfareblog.com | 2 years ago

Digital Disease Surveillance

The government’s best defense of a warrantless system of digital surveillance would rely on the “special needs” exception to the Fourth Amendment. | Continue reading


@lawfareblog.com | 2 years ago

Disinformation Ops Affected Integrity of Democratic Elections in Latin America

The years 2021 and 2022 are set to be major periods for elections across Latin America and a roundup of how information operations have affected them can help to shed some light on the current state of the region's information ecosystem and where future information operations may … | Continue reading


@lawfareblog.com | 2 years ago

Chipping Away at Due Process Rights in HK NSL Cases

One case case may mark an ominous turning point for human rights and rule of law in Hong Kong. | Continue reading


@lawfareblog.com | 2 years ago

Apple Faces Criticism over Its Cooperation with China

Lawfare’s biweekly roundup of U.S.-China technology policy and national security news. | Continue reading


@lawfareblog.com | 2 years ago

Congratulations on the Ceasefire. Now the Hard Work Begins

Today’s shaky ceasefire between Israel and Hamas is a good thing in itself, but without further diplomacy it will prove just a brief respite from the violence. | Continue reading


@lawfareblog.com | 2 years ago

The Danger of the Moment

Donald Trump is promoting, and his party is using various means of achieving, a politicized electoral process in which politicians would have more power to direct the running of elections in their self-interest. | Continue reading


@lawfareblog.com | 2 years ago

Belarus and Hijacking of Flight FR4978: A Preliminary International Law Analysis

From the perspective of international law, it is difficult to overstate the seriousness of Belarus’ actions. | Continue reading


@lawfareblog.com | 2 years ago

Is It 85 Percent?

A commonly cited statistic about private ownership of U.S. infrastructure has popped up again after the Colonial Pipeline ransomware report. But where does it actually come from? | Continue reading


@lawfareblog.com | 3 years ago

The New Executive Order on Cybersecurity

The Biden administration has released its much-anticipated executive order aiming to improve federal cybersecurity standards and other aspects of cybersecurity. Here’s what you need to know. | Continue reading


@lawfareblog.com | 3 years ago

It's Not Over. The Oversight Board's Trump Decision Is Just the Start.

What do the details of today's decision reveal about Facebook’s rules, and the FOB’s role in reviewing them? | Continue reading


@lawfareblog.com | 3 years ago

Israel’s Version of Moving Fast and Breaking Things: The New Cybersecurity Bill

If a new law is passed by government committee and the Knesset, it will redefine cybersecurity governance in Israel. | Continue reading


@lawfareblog.com | 3 years ago

Justice Thomas's Misguided Concurrence on Platform Regulation

The justice’s speculations on the possibilities for regulating social media platforms are already changing the tone of the debate on the political right—but he makes a weak argument. | Continue reading


@lawfareblog.com | 3 years ago

Time for Answers About Those Intelligence Reports DHS Filed About Me

I’m not seeking damages or a judgment that what the Department of Homeland Security did was illegal, but I do want to understand who else the department reported on based on First Amendment-protected activity. | Continue reading


@lawfareblog.com | 3 years ago

Enterprise Cybersecurity Measurement

Enterprises can manage, mitigate and monitor their cyber risks by mapping threats and adversary tactics, techniques and procedures to known vulnerabilities. Ultimately, the goal is to have a scalable, reproducible metric for risk. | Continue reading


@lawfareblog.com | 3 years ago

Christchurch Report Points to Better Avenues for Internet Reform

What does the report reveal about online extremism and the efforts to counter it? | Continue reading


@lawfareblog.com | 3 years ago

Understanding and Responding to the SolarWinds Attack: The Federal Perspective

On Thursday, March 18, 2021, at 10:15 a.m., the Senate Homeland Security and Governmental Affairs Committee will hold a hearing on understanding and responding to the SolarWinds supply chain attack. | Continue reading


@lawfareblog.com | 3 years ago

Making Sense of Iran and Al-Qaeda’s Relationship

The arrangement can be tense and transactional, but has provided benefits for both sides. | Continue reading


@lawfareblog.com | 3 years ago

How Biden’s Cyber Strategy Echoes Trump’s

Comparing the Biden administration’s Interim National Security Strategic Guidance with Trump’s National Cyber Strategy. | Continue reading


@lawfareblog.com | 3 years ago

Facebook, It’s Time to Put the Rules in One Place

Facebook’s policies on health misinformation stretch across blog posts, different sections within the Community Standards, and now in its Help Center. This must change. | Continue reading


@lawfareblog.com | 3 years ago