-
France, Cyber Operations and Sovereignty: The ‘Purist’ Approach to Sovereignty and Contradictory State Practice
The rule of sovereignty that France asserts applies to cyberspace is incompatible with several of its own operations. The “purist” approach to a rule of sovereignty for cyber operations is at odds with t... -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: Content Moderation and the First Amendment for Dummies
-
Commission Criticizes Lack of Preparedness; U.S. Likely to Implement Sweeping Rule on Tech-Related Transactions
-
The Biden Administration’s Opportunity to Secure International Mail
Closing vulnerabilities in the postal system is a necessary first step to address the opioid epidemic. -
Rational Security: The 'Happy Birthday, Remote Jungle Studio' Edition
-
Fault Lines: Supply Chains and Relationship Strains
The latest episode of Fault Lines -
Today’s Headlines and Commentary
Lawfare’s daily roundup of national security news and opinion -
The Lawfare Podcast: America's War in Afghanistan's Pech Valley
-
EU Privacy Law and U.S. Surveillance: Solving the Problem of Transatlantic Data Transfers
Most current approaches to resolving the EU-U.S. conflict fall short. It’s time for a hybrid approach. -
How Biden’s Cyber Strategy Echoes Trump’s
Comparing the Biden administration’s Interim National Security Strategic Guidance with Trump’s National Cyber Strategy. -
The Microsoft Exchange Hack and the Great Email Robbery
The world is probably days away from a mass-exploitation of Microsoft Exchange servers—a hack that could have a far greater impact than the SolarWinds breach.