Wars of None: AI, Big Data, and the Future of Insurgency

Two new books offer a glimpse of how advances in technology will change how small wars are fought. | Continue reading


@lawfareblog.com | 5 years ago

Who’s Really Crossing the U.S. Border, and Why They’re Coming

Despite what the president says, there’s not a flood of people racing across the border, and the majority of migrants aren’t dangerous criminals. | Continue reading


@lawfareblog.com | 5 years ago

The Cyberspace Solarium Commission: A Timely Proposal

A provision in the Senate’s proposed 2019 National Defense Authorization Act offers a timely proposal for improving the U.S.’s cybersecurity strategy. | Continue reading


@lawfareblog.com | 5 years ago

The De-Americanization of Internet Freedom

As Jack Goldsmith explains in a riveting new essay, the United States’s “internet freedom” agenda has been a boon for the commercial development of the internet. Yet in virtually every other respect, it has been an abject failure. | Continue reading


@lawfareblog.com | 5 years ago

Terrible Arguments Against the Constitutionality of the Mueller Investigation

There is no serious argument that Robert Mueller’s appointment violates the Constitution. | Continue reading


@lawfareblog.com | 5 years ago

Drone Blowback: Much Ado about Nothing?

Do drone strikes really drive terrorist recruitment? Interviews with militants, tribal leaders, and Pakistani intelligence suggest it might not. | Continue reading


@lawfareblog.com | 5 years ago

Censorship in the Age of Large Cloud Providers

What’s worrisome about the fight between the Russian government and the Telegram messaging app. | Continue reading


@lawfareblog.com | 5 years ago

UN Report on Online Content Regulation Calls for “Human Rights by Default”

Last week, a U.N. Special Rapporteur released the body’s first-ever report on the regulation of user-generated online content. | Continue reading


@lawfareblog.com | 5 years ago

NSA General Counsel Glenn Gerstell Remarks Georgetown Cybersecurity Law Institut

On Wednesday, NSA General Counsel Glenn Gerstell delivered the following remarks at the Georgetown Cybersecurity Law Institute in a speech entitled “Failing to Keep Pace: The Cyber Threat and Its Implications for Our Privacy Laws.” | Continue reading


@lawfareblog.com | 5 years ago

GDPR Derogations, EPrivacy, and the Evolving European Privacy Landscape

GDPR derogations will be applied throughout the EU. A few potential state-to-state variations will have implications for privacy and security. | Continue reading


@lawfareblog.com | 5 years ago

The FBI's Mistake on Encryption

The Washington Post reports that the FBI has repeatedly overstated the number of devices it can’t unlock. | Continue reading


@lawfareblog.com | 5 years ago

Can China Stop Wars Once They Start?

It would be far too easy to get into a war with China. How would it end? | Continue reading


@lawfareblog.com | 5 years ago

What “Efail” Tells Us About Email Vulnerabilities and Disclosure

Last week, researchers disclosed vulnerabilities in a large number of encrypted email clients. The case teaches us some important lessons about security vulnerabilities in general and email security in particular. | Continue reading


@lawfareblog.com | 5 years ago

Rational Security: The 'SpyGate' Edition

President Trump orders the Justice Department to investigate the Russia investigation. Secretary of State Mike Pompeo details the administration’s strategy for dealing with Iran. And Trump appears to say that North Korea might not need to get rid of its nuclear weapons after all. … | Continue reading


@lawfareblog.com | 5 years ago

U.K. Outlines Position on Cyberattacks and International Law

British Attorney General Jeremy Wright delivered public remarks describing the U.K. position on cyber and international law. This is an important step in developing and defending interpretations of existing international frameworks as applied to cyber. | Continue reading


@lawfareblog.com | 5 years ago

Why Engage in Proxy War? A State’s Perspective

Governments that believe proxy wars will let them have their cake and eat it too should think again. | Continue reading


@lawfareblog.com | 5 years ago

Guantanamo, Certification, and the Fear of Blame

A new Comment in the Yale Law Journal argues that, by harnessing the fear of blame, a seemingly-procedural requirement played a substantive role in thwarting the Obama Administration’s efforts to close Guantanamo. | Continue reading


@lawfareblog.com | 6 years ago

Are Facebook’s Ads Controlling Us? A New Version of an Old Question

We should view the innovations of online advertising less as a threat than as an opportunity to think more rigorously about the bargains we strike with companies like Facebook as individuals, and the bargains we collectively strike with such companies as a society. | Continue reading


@lawfareblog.com | 6 years ago

How Misinformation Spreads on Social Media–And What to Do About It

Opportunities to glimpse misinformation in action are fairly rare. But after the recent attack in Toronto, a journalist on Twitter unwittingly carried out a natural experiment that shows how quickly “fake news” can spread. | Continue reading


@lawfareblog.com | 6 years ago

Is It Time to Regulate Cyber Conflicts?

Recommendations for a long-term strategy on controlling nation-state cyber conflicts. | Continue reading


@lawfareblog.com | 6 years ago

What Is Absent from the U.S. Cyber Command 'Vision'

Many issues need to be addressed as Cyber Command implements “command vision” is implemented. | Continue reading


@lawfareblog.com | 6 years ago

WHOIS Going to Keep the Internet Safe?

Is an essential tool for law enforcement and cybersecurity researchers coming apart at the seams? | Continue reading


@lawfareblog.com | 6 years ago

Did Donald Trump Jr. Admit to Violating the Computer Fraud and Abuse Act?

A law-nerd analysis of whether Donald J. Trump Jr. violated the CFAA based on his recently-disclosed e-mail. | Continue reading


@lawfareblog.com | 6 years ago

War Machines: Artificial Intelligence in Conflict

A review of Paul Scharre’s “Army of None: Autonomous Weapons and the Future of War” (W.W. Norton, 2018). | Continue reading


@lawfareblog.com | 6 years ago