-
A couple of weeks ago, I thought it worth calling to reader's attention the threat assessment done by the Norwegian Police Security Service (more or less Norway's MI-5). Today, we have news from the Nor...
-
This week, the battle between the FBI and Apple in a California court spilled into the broader public debate on encryption and lawful access.
-
Ahead of Super Tuesday, the 10th GOP presidential debate took place Thursday in Houston, TX. The debate featured the five remaining Republican presidetial candidates Ben Carson, Ted Cruz, John Kasich, Ma...
-
Well, we’ve had a busy week here at Lawfare. Let's start with Apple.
On Sunday, FBI Director James Comey asserted that the FBI could not look the survivors of the San Bernardino terrorist attack in the ...
-
Yesterday, Apple filed a motion to vacate a court order compelling the tech company to assist the U.S. government in unlocking an iPhone belonging to one of the San Bernardino terrorists.
-
-
Do you need to get up to speed on the latest developments in the Apple vs FBI iPhone dispute, but either lack the time to read the brief Apple filed yesterday or the context to decode it? I’m here to he...
-
Following months of speculation, Saudi Arabia, Russia, Qatar, and Venezuela last week announced their intention to freeze oil production at existing (high) levels in an attempt to stabilize the oil market.
-
Director James Comey claims that the FBI is simply carrying out a diligent investigation in San Bernardino. Put bluntly, I doubt this for two reasons. First, the FBI and public already has enough knowled...
-
In the social media era, there have been a number of terrorist attacks in America that, at least in part, could be attributed to “self-radicalization.” Self-radicalization refers to the phenomenon wherei...
-
Apple has asserted that a one-time use of any software that would enable the FBI to bypass security features in the iPhone is impossible—that it would inevitably be used multiple times. In a previous po...
-
As the battle between Apple and the FBI continues, today, Apple filed a motion to vacate the order from the federal government to assist the FBI in accessing the locked and encrypted iPhone belonging to ...
-
In three recent developments, Apple appears to want
(1) to develop a security improvement that would require a PIN code to update firmware
-
The House Judiciary Committee heard testimony today on "International Conflicts of Law Concerning Cross Border Data Flow and Law Enforcement Requests." The two-panel hearing included remarks from Princip...
-
You know you want one.
Motion to Vacate Brief and Supporting Declarations
-
What is the most surprising discovery a law firm partner makes when he jumps to the National Security Agency? I direct that and other questions at Glenn Gerstell, who has just finished six months in the ...
-
GAZIANTEP, Turkey—”This looks so much like the countryside around Aleppo,” says Dr. Diaa Abdullah as we drive past green and rust-colored hills and olive groves between the Southeastern Turkish towns of ...
-
FBI Director Jim Comey bites into Apple. The Obama administration unveils its plan for closing Guantanamo. And the Homeland Security Department will start scouring social media for warning signs of viole...
-
Let’s not pretend that that the outcome the Justice Department seeks in the Apple case is limited to only a single case and just this particular phone.
This unquestionably involves a special case. Becau...
-
We are delighted to announce the launch of Lawfare's new subsidiary page, called Aegis: Security Policy in Depth.