-
Over at the Center for a New American Security, researcher Amy Chang is out with a detailed report entitled, "Warring State: China's Cybersecurity Strategy."
As the report points out:
Devising an optima...
-
Yesterday I took part in a panel discussion entitled “Device Encryption: Too Much Privacy for Consumers?” hosted by the Future of Privacy Forum (FPF) and the International Association of Privacy Professi...
-
As Professors Ryan Goodman and David Bosco have both noted in excellent posts at Just Security and Foreign Policy, respectively, over the past seven years, the International Criminal Court’s (ICC) Prosec...
-
Our guest for the week is Troels Oerting, the head of EC3, Europe’s new cybercrime coordination center. He talks about EC3’s role in the recent take down of over 400 darknet sites, arrests of travelers ...
-
Senator Diane Feinstein (D-CA) has announced that she plans to introduce new legislation aimed to "significantly strengthen drone safety laws to protect U.S. airline passengers and U.S.
-
In the final days of the 113th Congress, the Senate and House of Representatives will likely pass a new defense authorization bill. According to the National Journal, the NDAA will reach the House floor ...
-
As reported in an article in the New York Times back on November 21, President Obama recently decided to expand the set of circumstances in which the U.S. military might use force in Afghanistan during 2...
-
A little over a week after Secretary of Defense Chuck Hagel announced he was leaving his post, CNN reports that President Obama has decided on Ashton Carter, who served as Deputy Defense Secretary under ...
-
The Washington Post reports:
President Obama will nominate Ashton B.
-
There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of software liability, which would, drive safer code.
-
Senators Patrick Leahy and John Cornyn yesterday joined other Senators in expressing concern over a CIA proposal regarding the destruction of agency E-mail.
Their letter to the National Archives and Re...
-
I might react to the Elonis case a bit less stridently than I did last night had I not recently been involved in a horrid case of online threats directed at someone I know over material she wrote for a w...
-
You wouldn't think that labor relations were related to chemical security, but they are (or at least they may be). The security of our chemical facilities is governed by the CFATS -- the Chemical Facili...
-
The privacy- and oversight-relevant news comes to us via this Associated Press story.
-
The U.S.-led coalition to fight back the Islamic State in Syria and Iraq struck Raqqa, an IS stronghold in Syria, hard last night. CNN reports at least thirty airstrikes were launched against the city, ...
-
I confess that I don't have a lot of patience for all of the very serious discussion people seem to be having about the case of Elonis v. U.S., which was argued today in the Supreme Court. The question b...
-
Event Announcements (More details on the Events Calendar)
-
That counterterrorism instruments often fail is no surprise—terrorists are tough targets, after all. At times, however, these instruments can actually backfire. Such “blowback” can take many forms and is...
-
The United Kingdom’s Counter-Terrorism and Security Bill, HC Bill 127, had its first reading in the House of Commons on Wednesday, November 26.
-
My favorite ever Washington Post editorial was this one, entitled "A Deep-Fried Thanksgiving Tradition," which was a sort of comic meditation on the dangers and attractions of the deep-fried turkey.