-
In Part I of this series, we listed the many designated foreign terrorist organizations (DFTOs) that seem to have overt Twitter accounts.
-
In the first part of this series, we noted the rather large number of designated foreign terrorist organizations that seem to have open Twitter presences, and we posed the following questions: Is Twitter...
-
Guess how many designated foreign terrorist organizations have apparently official Twitter feeds. Hint: More than you probably think.
-
On Tuesday, Director of National Intelligence James Clapper provided the annual Worldwide Threat Assessment of the U.S. Intelligence Community to Congress.
-
When the Senate Intelligence Committee initially released its Study on the CIA’s Enhanced Interrogation Program in December 2014, the CIA quietly released a Note to the Reader along with its Fact Sheet, ...
-
Last summer, U.S. forces conducted a raid in Syria that resulted in the capture of Umm Sayyaf, an ISIL member involved in the imprisonment and rape of women including American citizen Kayla Mueller. She...
-
There's a headline I never expected to write. Among my many criticisms of the New York Times editorial page, after all, I would never until today have accused it of being soft on sexual violence.
-
In a 20-page opinion, D.C. District Judge Christopher R. Cooper yesterday denied a request by Ahmed Abu Khattala to return to Libya and be spared the death penalty. Khatalla, who stands accused of orches...
-
Can we learn from our mistakes at Camp Bucca?
-
How many people are illegally present in the United States today? Nobody knows the exact answer of course, but the best estimates from the Pew Center (through 2014) puts the number at roughly 11.3 milli...
-
The Guantanamo Bay diaspora, on a per capita basis, may be the most widespread in the world. Indeed, as the Obama administration makes a final push towards emptying the detention facility, the number of ...
-
Back in July, we wrote a lengthy piece about whether Apple could conceivably face civil liability for providing end-to-end encryption to criminals and terrorists.