Congress

× Clear Filters
692 Articles
Just Security

Recap of Recent Pieces on Just Security (Oct. 28-Nov. 3)

Cybersecurity and Cyber Conflict Robert S. Taylor, Cyber, Sovereignty, and North Korea–And the Risk of Inaction Michelle Richardson and Mike Godwin, What the White House Needs…
Former campaign manager for U.S. President Donald Trump, Paul Manafort, smiles as he leaves U.S. District Court after pleading not guilty following his indictment on federal charges on October 30, 2017 in Washington, DC.

Norms Watch: Democracy, the Trump Administration, and Reactions to It (October 2017)

Sign up here to receive Norms Watch in your inbox once a month. INTRODUCTORY NOTE This edition of Norms Watch will examine the ten greatest violations of democratic norms in the…

Episode 43 of the National Security Law Podcast: Unseal this Podcast!

It’s been a busy week in national security law! In Episode 43, Professor Bobby Chesney and I take on: Mueller-Time: Indictments against Manafort and Gates, and an even-more important…

Episode 42 of the National Security Law Podcast: The Magic Bullet Travel Ban(d)

In this week’s episode, Bobby Chesney and I start with a close look at Smith v. Trump, a case that seeks a judicial ruling on whether the Islamic State really falls within…

Congressional Oversight and the Niger Attack

President Donald Trump’s handling of military condolences has dominated the coverage of the Oct. 4 deaths of four U.S. Special Operations forces soldiers in Niger. However, there…
Clouds pass over the U.S. Capitol on March 7, 2017 in Washington, DC.

Closing Section 702’s Front-Door Search Loophole: A Critical Protection for Americans

As the December 31st expiration date for Section 702 of the Foreign Intelligence Surveillance Act (FISA) approaches, the debate over reauthorization is in full swing. Most of the…
John B. Bellinger, III, Kathryn Ruemmler, Lisa Monaco, and Ryan Goodman sit on a panel at NYU Law.

NYU Law Forum: “National Security: The Role of Senior Advisers in the White House”

On October 18, the Latham & Watkins Forum at NYU Law presented discussion on “National Security: The Role of Senior Advisers in the White House.” Just Security…

The Rhetoric of “Responsible Encryption”

Last week, Deputy Attorney General Rod Rosenstein gave a speech about encryption that prompted a considerable amount of well-deserved blowback. His speech rehashed a number of…

Responsibility and the Encryption Debate: A Response to DAG Rosenstein

Deputy Attorney General Rod Rosenstein. Last week, Deputy Attorney General Rod Rosenstein gave a speech about encryption at the U.S. Naval Academy, solidifying the Trump administration’s…

Would the United States Be Responsible for Private Hacking?

Rep. Tom Graves (R-GA) and Rep. Kyrsten Sinema (D-AZ) introduced the Active Cyber Defense Certainty Act (H.R. 4036) in the House of Representatives on Oct. 13. The bill would amend…

Protecting a Free and Open Internet: My testimony before the House Commerce Committee

The free movement of data across borders is critical to economic growth, has benefits for data security, and promotes privacy, speech, and associational rights.  Yet, increasingly…

It’s Time to Pass Legislation Governing a Key Part of the Government’s Hacking Policy

An example of the splash screen from the Petya malware that was suspected of relying on an exploit developed by the U.S. National Security Agency. It’s well known that government…
1-12 of 692 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: