-
Tuesday, Ben bemoaned the state of drone-themed humor in the New York Times, and followed it up yesterday morning with a tale of national security parody gone awry.
-
So we learn from this petition, filed with the Court of Military Commission Review ("CMCR") last Thursday.
Here's a taste, from the document's "Preliminary Statement:"
This petition for a writ of mandam...
-
For those who can't get in to the Supreme Court oral argument in Shelby County v. Holder, and who aren't otherwise enticed by the Journal of National Security Law & Policy's inaugural symposium, "Swimmin...
-
I want to highlight these upcoming events at Brookings of potential interest to our readers in the D.C. area:
Is there a Widening Sunni-Shia Schism?
February 22, 2013, 2:00 PM - 3:30 PM EST, Saul/Zilkh...
-
Yesterday, as I noted in today’s news roundup, the United Nations Assistance Mission in Afghanistan released its annual report on civilian casualties (defined as both direct and indirect deaths and injur...
-
Gary Shiffman and Ravi Gupta have written an interesting new article: "Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons." From the abstract:
Individu...
-
The U.N. Assistance Mission in Afghanistan has released its annual report on the protection of civilians in the conflict in Afghanistan.
-
Ryan Goodman follows up his EJIL draft with a briefer and more pointed version of the argument in Slate.
-
From Stars and Stripes:
If “Guantanamo Prisoners to Receive GI Bill Benefits” sounds like a joke… that’s because it is.
-
Paul and Ritika have already linked to the Mandiant report yesterday on the Chinese People's Liberation Army cyber espionage group known as Unit 61398. It's a very impressive document. Here is the execu...
-
As the co-creator of the Lawfare Drone Smackdown and the publisher (though not the baker) of this drone strike cake, I should perhaps check myself before cringing at other people's drone humor. But I can...
-
Lots going on after the long weekend.
Let’s begin with the big, bad Chinese.
-
Apropos of our discussion last week about "Taming the Cyber Dragon" today's New York Times has an extensive report on how China's army is directly linked to hacking inside the United States. For those w...
-
Back on December 11, 2012, I posted a special Readings page of links to articles, reports and other materials on autonomous weapon systems and their regulation. It is updated periodically; I've just add...
-
One of the most notable challenges in dealing with cybersecurity is the difficulty of adequately conveying the scope and size of cyberspace. It's easy to say that there are nearly 2.5 billion internet u...
-
Over at the emptywheel blog, Ms. Wheel (aka Marcy Wheeler) has done a handy side-by-side of Attorney General Holder's Northwestern speech and the leaked White Paper.
-
Carrie Cordero, Georgetown’s Director of National Security Studies and a former Justice Department national security official, writes in with the following thoughts on the FISA Court and its lessons for ...
-
The recent controversy about the Justice Department White Paper and the closely related Senate confirmation hearings for CIA director-nominee John Brennan have raised the profile of congressional intelli...
-
Here's an update on the status of Section 11 of the STOCK Act, the law enacted last year that would have required 28,000 senior executive officials (and senior military officers) to post their financial ...
-
Further to Jack's post yesterday on the politics of drones versus enhanced interrogation, and my post earlier in the week about Peter Baker's article about the mounting criticism of the Obama Administrat...