-
The Lawfare Podcast: Rebecca Herman on ‘Cooperating with the Colossus’
-
The Lawfare Podcast, Emergency Edition: Another Special Counsel Investigation of Donald Trump
-
ChinaTalk: Can the U.S. and China Work Together on Anything?
The latest episode of ChinaTalk. -
Summarizing the 2022 National Defense Strategy
In October, the Department of Defense released an unclassified version of the National Defense Strategy, the Nuclear Posture Review, and the Missile Defense Review, outlining four main defense priorities... -
Keeping Up With Ransomware
The recent meeting of the International Counter Ransomware Initiative brought together representatives from over 30 countries and the private sector. It’s a good step in responding to different aspects o... -
Chatter: Satellites, Space Debris, and Hollywood with Aaron Bateman
David Priess sat down with Aaron Bateman to discuss early satellite technology, foreign satellite and anti-satellite activities, the Space Force, and more. -
The Lawfare Podcast: Jed Purdy on Democratic Renewal
-
Disrupting Violent Extremists’ ‘Free Spaces,’ Online and Off
Extremist groups like the New Mexico Civil Guard are benefitting from iterative recruitment in online and offline spaces that bridge ideologies. -
Can Oblique Intent Trigger an Armed Attack and Activate Article 5 of NATO?
The recent incident in Poland offers an opportunity to clarify gray areas of the international legal stance related to the conditions surrounding an attack that can ultimately trigger Article 5. -
What If the Przewodów Tragedy Had Been Caused by a Russian Missile?
How international law would shape the response to a potential armed attack on a NATO member state. -
Democracy After the Midterms
The midterms represent an unexpected step back from the brink—and an opportunity to reflect on the health of American democracy going forward. -
The Lawfare Podcast: Matt Tait on Cybersecurity in Ukraine
-
Rational Security 2.0: The 'Raising a Wordcel' Edition
-
Cyber Norms in the Context of Armed Conflict
United Nations norms related to nation-state cyberspace operations clearly apply during peacetime, but recent events in Ukraine and Russia raise challenges regarding those norms’ applicability in armed c... -
9/11 Commission's 2004 Interview of Bush and Cheney Declassified
The notes, which give details on the administration’s response to the 9/11 attacks, were declassified by the Interagency Security Classification Appeals Panel close to a decade after the appeal was initi... -
The Cyberlaw Podcast: Election Aftershocks for Cyberlaw
The latest episode of the Cyberlaw Podcast. -
How the 2002 Iraq AUMF Got to Be So Dangerous, Part 1: History and Practice
Congress originally enacted the 2002 AUMF to remove Saddam Hussein. But in the subsequent 20 years, it’s been used for so much more. -
The Lawfare Podcast: Sophia Yan Explains How to Become a Dictator
-
Can China Escape the Innovation Trap?
China faces a crucial choice: become a more creative, dynamic economy, or prioritize security and stability. Unfortunately for Beijing, it can’t have both—and unfortunately for the world, Xi Jinping appe... -
Mar-a-Lago “Global Issues” Briefs and Responses Posted
The Justice Department and former President Donald Trump briefed Special Master Judge Raymond J. Dearie on five global issues surrounding contested Mar-a-Lago documents, meant to lessen document review b...
More Articles
-
The Situation: Jack Smith Throws in the Towel
In January, a man whom the Justice Department argued only today has committed grave crimes for which the evidence is strong will become president of the United States. -
The ICC’s Unsurprising Decision on Arrest Warrants for Netanyahu, Gallant, and Deif
A three-judge panel of the ICC found “reasonable grounds to believe” Israeli and Hamas leaders are responsible for international crimes and should face trial. -
Tackling Data Brokerage Threats to American National Security
A news story used brokered location data to track military personnel—illuminating a considerable threat to national security.