Intelligence activities

The Right Way to Share Information and Improve Cybersecurity

by

Mar 26th, 2015

Doe v. Cisco: The Legal Issues

by

Mar 25th, 2015

Killing With Military Equipment Disguised as Civilian Objects is Perfidy, Part II

by

Mar 23rd, 2015

Reforming the FISA Court

by and

Mar 20th, 2015

Killing With Military Equipment Disguised as Civilian Objects is Perfidy

by

Mar 20th, 2015

Whither the Section 215 Reauthorization Debate?

by

Mar 19th, 2015

UK Parliament’s Intell and Security Committee: Intelligence agencies “do not seek to circumvent the law”

by

Mar 13th, 2015

Why Wikipedia is Suing the NSA

by

Mar 13th, 2015

Post-Snowden Inquiry by UK Parliamentary Committee Recommends New Laws

by

Mar 12th, 2015

Wikimedia Sues the NSA

by

Mar 10th, 2015

US Government Makes Slight Concession in Twitter’s Warrant-Canary Suit

by

Mar 9th, 2015

A Terrorist Conspiracy Via Email

by

Mar 7th, 2015

Case To Watch: Microsoft v. US on the Extraterritorial Reach of the Electronic Communications Privacy Act

by

Mar 6th, 2015

Cybersecurity in the Intelligence Community’s 2015 Worldwide Threat Assessment

by

Mar 6th, 2015

DOJ Inspector General Complains About FBI Foot-dragging

by

Feb 24th, 2015

Transcript: NSA Director Mike Rogers vs. Yahoo! on Encryption Back Doors

by

Feb 23rd, 2015

Guest Post: CVE Efforts Should be Based on Facts, Not Flawed Theories

by

Feb 19th, 2015

Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans

by

Feb 13th, 2015

Key Questions for Today’s Senate Intelligence Committee Hearing With Nicholas Rasmussen

by

Feb 12th, 2015

Surveillance and the Vanishing Right to Know

by and

Feb 10th, 2015

Torture and the CIA’s Unaccountability Boards

by

Feb 5th, 2015

The Newest Reforms on SIGINT Collection Still Leave Loopholes

by

Feb 3rd, 2015

Members Only: Al Qaeda’s Charter List Revealed After 13 Years in US Hands

by

Jan 29th, 2015

The Latest Rules on How Long NSA Can Keep Americans’ Encrypted Data Look Too Familiar

by

Jan 22nd, 2015

The Torture Report, the CIA’s “Work of Fiction,” and a Friday-afternoon Letter From DOJ

by

Jan 18th, 2015

Decrypting John Boehner on the Capitol Bomb Plotter

by

Jan 16th, 2015

Cybersecurity and a New Era of Asymmetric Economic Warfare

by

Jan 16th, 2015

US Government Seeks to Deny Twitter’s “Warrant Canary” Challenge

by

Jan 13th, 2015

No Impunity for Torturers [Updated]

by

Jan 5th, 2015

The Three Legal Questions Left Unresolved by al-Libi’s Death

by

Jan 3rd, 2015

14 National Security Law “Heroes” in 2014

by

Dec 31st, 2014

Drones, the FATA, the President’s remarks . . . and the prospect of greater transparency

by

Dec 22nd, 2014

1 17 18 19 20