-
ChinaTalk: Export Controls for AI: Will They Work?
The latest episode of ChinaTalk. -
The Cyberlaw Podcast: AI-splaining
The latest episode of the Cyberlaw Podcast. -
Supreme Court Grants Certiorari in Gonzalez v. Google and Twitter v. Taamneh: An Overview
Last month, the Supreme Court granted certiorari in two related cases exploring the interaction between anti-terrorism laws and Section 230. It remains to be seen whether the legislature or the Supreme C... -
The Week That Will Be
Lawfare's weekly roundup of event announcements and employment opportunities. -
The Lawfare Podcast: The Government Rests; Roger Parloff Does Not
-
Quantifying Cyber Conflict: Introducing the European Repository on Cyber Incidents
Statistical data on cyber conflict is lacking. A new dataset by a European research initiative called EuRepoC tries to solve this problem by launching a dashboard to visualize more than 1,400 cyber incid... -
The Justice Department’s Agreement With a Data Broker That Facilitated Elder Fraud
The consent decree with Macromark enabled greater oversight over data brokers collecting sensitive personal information on defrauded elders. -
Great Power Competition and Internal Politics in Asia, Then and Now
International rivalries can draw powerful states into local political disputes—sometimes with disastrous consequences—but the United States and China can avoid the mistakes of the Cold War. -
The Week That Was: All of Lawfare in One Post
Your weekly summary of everything on the site. -
The Lawfare Podcast: Tchau, Bolsonaro? What to Make of Brazil's Election Results with Brian Winter
-
Cyber Insurance and Cybersecurity Policy: An Interconnected History
A review of Josephine Wolff, “Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks” (MIT Press, 2022). -
A Tale of Two Strategies: Comparing the Biden and Trump National Security Strategies
Reading the National Security Strategy on its own provides insights into an administration’s values and priorities, but comparing it to a previous strategy yields even more. How does Biden’s strategy com... -
Chatter: Cryptography in History and in the Movies with Vince Houghton
-
The Lawfare Podcast: Israeli Election Results with Natan Sachs
-
Water Wars: U.S. Unveils First Pacific Islands Partnership Strategy
Xi secures third presidential term following 20th National Congress of the Chinese Communist Party; Chinese military rehearses large-scale amphibious landings and headhunts Western pilots; U.S. releases ... -
Canada’s New Sanctions Against Iran: To List or Not to List
In our assessment, targeted sanctions on Iran are more likely to have an impact than is designating the IRGC as a terrorist entity. -
The Lawfare Podcast: Should the Donetsk and Luhansk People’s Militias Be Designated as Foreign Terrorist Organizations?
-
Rational Security 2.0: The 'Happy Hallowmas' Edition
-
A Lurking Threat: State Emergency Powers in Elections
The authority to both define state emergencies and exercise state statutory emergency powers rests almost entirely with America’s governors. When emergencies—real or supposed—and elections intersect, sta... -
Incentivizing High-Performing Cybersecurity Programs in the Banking Sector
Recent cyberattacks targeting financial institutions highlight the need for a high-performing cybersecurity program across the banking sector; voluntary programs modeled after anti-terrorism public-priva...
More Articles
-
The Situation: Jack Smith Throws in the Towel
In January, a man whom the Justice Department argued only today has committed grave crimes for which the evidence is strong will become president of the United States. -
The ICC’s Unsurprising Decision on Arrest Warrants for Netanyahu, Gallant, and Deif
A three-judge panel of the ICC found “reasonable grounds to believe” Israeli and Hamas leaders are responsible for international crimes and should face trial. -
Tackling Data Brokerage Threats to American National Security
A news story used brokered location data to track military personnel—illuminating a considerable threat to national security.