-
This article originally appeared on Markaz.
-
Anyone following the Guantánamo military commissions would do well to read Bob Loeb and Helen Klein's trenchant take on last Friday's D.C. Circuit decision in In re Khadr, in which the Court of Appeals d...
-
Here it is. Judge Brett Kavanaugh's opinion for himself, Judge Thomas Griffith, and Senior Judge A. Raymond Randolph opens as follows:
Omar Ahmed Khadr was a member of al Qaeda. On July 27, 2002, at th...
-
It’s Tuesday morning at Guantanamo, and the military judge calls the military commission session to order. No, this is not the 9/11 case. It’s not even the Al Nashiri case. And no, the military judge isn...
-
Last week, the Fourth Circuit heard an appeal in Al Shimari v. CACI Premier Technology, Inc. Steve Vladeck earlier flagged the case at Just Security, but for those who haven't read his post: Al Shimari a...
-
In his recent post on sextortion as cybersecurity, Benjamin Wittes rightly points out that every webcam should have a physical cover or off-switch. I want to add an additional technical point: Even barri...
-
Most citizens assume that all of the law Congress writes is public. That is not, in fact, true. Our general norm of publishing law has a significant and largely overlooked legislative exception: classifi...
-
Military Commissions Chief Prosecutor Mark Martins issued the following statement yesterday prior to this week's military commission pre-trial hearings in the case of Abd al Hadi al Iraqi. Keep an eye on...
-
In the week since the release of our sextortion reports, there have been a number of encouraging signs of legislative interest in the problem. The day Brookings released the reports, Rep.
-
Like many of us on the internet, sextortionists rely on pseudonyms to carry out their work, whether in order to hide their identity online or to affirmatively present a false one.
-
One interesting feature of the sextortion research we released this week—a feature we did not discuss in the papers themselves—is the interaction between this issue and the “going dark” debate. We left t...
-
When we think of cybersecurity, we don't think of sexual violence. Sexual assault, rape, and child molestation are problems of intimate contact between individuals in close proximity to one another. By c...