Guest Author

FBI’s Push to “Fix a Typo” Would Really Expand Its Surveillance Authority

by

Feb 17th, 2016

Law Enforcement Online: Innovative Doesn’t Mean Illegal

by

Feb 16th, 2016

The New US Anti-Torture Law: A Genuine Step Forward

by

Feb 12th, 2016

MLAT Reform and the 80 Percent Solution

by

Feb 11th, 2016

Is Money a Legitimate Target?

by

Feb 10th, 2016

Surveillance Is Still About Power

by

Feb 9th, 2016

The Poisoning of Alexander Litvinenko and the Geographical Scope of Human Rights Law

by

Feb 9th, 2016

When the NSA Merges Its Offense and Defense, Encryption Loses

by

Feb 5th, 2016

The High Standard of Proof in the Encryption Debate

by

Feb 5th, 2016

Questions Congress Should Ask About Section 702

by

Feb 4th, 2016

Why We Need to Reevaluate How We Share Intelligence Data With Allies

by and

Feb 3rd, 2016

IBM’s Terrorist-Hunting Software Raises Troubling Questions

by

Feb 3rd, 2016

America’s Muddled Approach to Fighting ISIS

by

Jan 28th, 2016

It’s All About the Associated Forces

by

Jan 28th, 2016

Is the US Allowed to Control a Syrian Airfield?

by

Jan 27th, 2016

Reflecting on 25 Years of US Policy Towards Iraq

by

Jan 26th, 2016

Instability and Terrorism in Africa’s Sahel: A Primer

by

Jan 26th, 2016

The European Court of Human Rights Constrains Mass Surveillance (Again)

by

Jan 22nd, 2016

What the Senate Preserved in Blocking the SAFE Act

by

Jan 21st, 2016

A Wider Talent Pool Means a Stronger Marine Corps: A Response to Rep. Hunter

by , and

Jan 21st, 2016

National Security Letters and Leak Investigations

by

Jan 20th, 2016

“Ideating” on ISIS and Silicon Valley

by

Jan 20th, 2016

James Comey’s Default-Encryption Bogeyman

by

Jan 15th, 2016

Fixing Pre-Publication Review: What Should Be Done?

by

Jan 15th, 2016

Content Is Content, No Matter How Small

by

Jan 13th, 2016

Social Media Companies Should Decline the Government’s Invitation to Join the National Security State

by

Jan 12th, 2016

ISIS in the United States: Which Legal Regime Applies?

by

Jan 11th, 2016

Was the Cyber Attack on a Dam in New York an Armed Attack?

by

Jan 8th, 2016

Congress Squawks as Surveillance Chickens Come Home to Roost

by

Dec 30th, 2015

Why the US Should Cooperate With Investigations Into the Hospital Bombing

by

Dec 23rd, 2015

War: What Is It Good For? — Revisiting Strategic Questions Congress Should Ask in Debating an ISIL AUMF

by

Dec 21st, 2015

House Demolitions 2.0

by

Dec 18th, 2015

1 6 7 8 9 10 22