Skip to content

Tag Archives: Jack Goldsmith

Testimony from May 16 Senate Armed Services Committee Hearing on the AUMF

By
Thursday, May 16, 2013 at 2:54 PM

There’s been a flurry of Lawfare posts on today’s hearing, before the Senate Armed Services Committee, on the 2001 Authorization for the Use of Military Force. The video of the hearing can be viewed here, and we’ve got links to the witnesses’ testimony below.

Why the USG Complaints Against Chinese Economic Cyber-Snooping Are So Weak

By
Monday, March 25, 2013 at 9:01 AM

James Lewis had an op-ed yesterday in the WP about “Five Myths About Chinese Hackers.”  The fifth myth: 5. America spies on China, too, so what can we complain about? Chinese officials portray their country as a victim of hacking. Meanwhile, some American scholars question whether the United States is in a position to criticize, since it also engages . . .
Read more »

Will The Supreme Court Issue a Decision in Kiobel This Week?

By
Sunday, March 24, 2013 at 10:47 PM

Although most Supreme Court watchers are focused on the two gay marriage cases to be argued before the Court on Tuesday and Wednesday of this week (NB: I signed the brief submitted by former Republican officials supporting same-sex marriage in the Hollingsworth case), for Lawfare readers this may be the week that the Supreme Court finally issues a . . .
Read more »

Readings: Jens Ohlin, ‘The Duty to Capture’

By
Tuesday, February 26, 2013 at 9:29 AM

Jack Goldsmith has flagged NYU professor Ryan Goodman’s European Journal of International Law article, “The Power to Kill or Capture Enemy Combatants,” as well as a Slate article by Goodman drawn from that academic journal piece, “The Lesser Evil: What the Obama administration isn’t telling you about drones: the standard rule is capture, not kill.”  Goodman’s . . .
Read more »

Mark R. Jacobson on 5 Myths About Drone Warfare in the Washington Post

By
Sunday, February 10, 2013 at 10:41 PM

John Bellinger makes note in his post below that that Obama administration faces increasing organized NGO, activist-advocacy, and European pushback on drone warfare, and he cites today’s front page NYT story by Peter Baker that this essentially reprises the campaign against detention and interrogation of the Bush years.  Regular readers of Lawfare will be well . . .
Read more »

Readings: Sen. Ron Wyden (D-OR) Letter to John Brennan, CIA Director Nominee, on Targeted Killing of US Citizens Abroad

By
Monday, January 14, 2013 at 5:29 PM

John Brennan, nominated by President Obama to become the next CIA director, will apparently face some tough questioning from Senator Ron Wyden (D-OR) at his Senate confirmation hearings (reportedly set for Thursday, February 7, 2:30 pm).  Sen. Wyden has sent Brennan a letter (obtained by Wired’s DangerRoom) on the refusal of the Administration to release . . .
Read more »

Judicial Review for Enemy Fighters? Andrew Kent on the Quirin Case

By
Friday, January 4, 2013 at 11:00 AM

Andrew Kent writes in with the following guest post on his fascinating new article on Ex Parte Quirin. I asked Andrew to write up this piece, after reading an earlier draft of the underlying paper for a workshop last summer that Matt and Trevor organized at Columbia Law School. I found both the history Andrew . . .
Read more »

WCIT Treaty Breakdown — A Summary and Some Analysis

By
Friday, December 14, 2012 at 10:36 AM

As you may have read by now (reports from the New York Times and Washington Post are pretty good),  that the WCIT conference has ended in disarray.  The United States and a number of other Western countries have refused to sign the final instrument updating the international telecommunications regulations because of a dispute over what . . .
Read more »

Readings: David Cole on Civil Society and Individual Rights After 9/11

By
Saturday, November 17, 2012 at 7:22 PM

Georgetown law professor David Cole has a new article up on SSRN, “Where Liberty Lies: Civil Society and Individual Rights after 9/11.”  It offers something of a retrospective on the role of civil society organizations in defending a vision of individual rights under the Constitution in the years following 9/11 – these organizations include, Cole . . .
Read more »

A Presidential Cyber LOAC Directive

By
Thursday, November 15, 2012 at 10:06 AM

While the Senate was making a feint at legislation yesterday, far more significant cyber news was disclosed.  According to the Washington Post President Obama has signed a new Presidential Policy Directive that assigns roles and responsibilities for military and civilian activity in cyber operations outside the Federal network.  As the Post reports: President Obama has . . .
Read more »

Conspiracy and Military Commissions After Hamdan II

By
Wednesday, October 17, 2012 at 8:42 PM

In his post on yesterday’s decision in (what I think we should all call) Hamdan II, Jack writes “The historical arguments for a conspiracy charge in military commissions under the laws of war, while not slam dunks, are . . . more powerful than similar arguments for material support.” Thus,  he “think[s] the strong suggestions . . .
Read more »

More on the Defense Science Board — And the Proliferation of Data

By
Thursday, September 13, 2012 at 12:19 PM

Like Jack, I was struck by the Defense Science Board’s report on the autonomy of military systems, but it was a different aspect of the report that caught my eye – enough so that I thought it was worth noting here. Buried in the report is an acknowledgement of an increasingly concerning phenomenon:  the rate . . .
Read more »

Thoughts About the Revised Lieberman-Collins Cybersecurity Bill

By
Saturday, July 21, 2012 at 11:20 AM

As I noted on Friday, Senators Lieberman and Collins have released a Manager’s Amendment in the form of a substitute which reflects some significant changes to their original bill.  You can access the full text of the amendment here.  Talk in the Senate is that Senator Reid plans to call the bill up for consideration . . .
Read more »

Cybersecurity Regulation — How Significant is the Threat?

By
Friday, July 6, 2012 at 12:01 PM

Some time ago I began an answer to Jack Goldsmith on why I thought cybersecurity regulation was the wrong answer to our current cyber problems.  Other commitments, including paying clients!, got in the way of further developing the argument, but I have some time now to return to the discussion. In my introductory post on . . .
Read more »

Thoughts on Leak Investigations in the Modern Era

By
Saturday, June 9, 2012 at 11:23 AM

One item in Jack’s post on the upcoming leak investigations caught my eye — he noted that “It is hard to discover leakers without access to journalists’ testimony or notes (which are hard to obtain).” My sense is that this is increasingly becoming less true.  Indeed, I had one rather high-level IC member tell me, . . .
Read more »

The Stuxnet Story and Some Interesting Questions

By
Saturday, June 2, 2012 at 4:52 PM

By now almost everyone has read David Sanger’s fascinating New York Times story relating the behind-the-scenes story of the development and deployment of the Stuxnet virus as part of a larger classified program known as “Olympic Game.”   Others, including my colleagues Jack Goldsmith and Matt Waxman have already remarked on the seeming breach of classification.   . . .
Read more »

Unintended Irony Department

By
Friday, June 1, 2012 at 9:20 AM

Jack has already noted today’s New York Times story attributing the Stuxnet virus to American and Israeli activity through the disclosure of a code word classified program known as Olympic Game.  I’ll have more to say about the details of the Stuxnet disclosures when I’ve had a chance to digest the article.  For now, I . . .
Read more »

How to Destroy the Internet

By
Thursday, May 24, 2012 at 5:08 PM

I’ve lately been thinking of the scope and nature of cyber threats — mostly in writing a still-in-draft response to Jack Goldsmith’s recent defense of cybersecurity regulation.  In the interest of furthering the debate, this article on How to Destroy the Internet is about as dark a vision as I’ve ever seen.  From the introduction: . . .
Read more »

The Unpersuasiveness of the Case for Cybersecurity Regulation – An Introduction

By
Thursday, May 17, 2012 at 12:35 PM

My friend, Jack Goldsmith, wonders whether my earlier post about the pending Congressional proposal to regulate cybersecurity was a reference to General Alexander’s failure to persuade Senator McCain of the merits of a regulatory program, or an expression of my own view.  He rightly concludes that it was a little bit of both – mostly . . .
Read more »

Jack Goldsmith’s Op-Ed, Counterterrorism, & Campaign Politics

By
Friday, April 27, 2012 at 10:06 AM

I’m very excited to join the Lawfare team. As a first post, I’d draw readers’ attention to Jack’s Washington Post op-ed, in which he discusses how candidate Romney might to try to differentiate himself from President Obama on counterterrorism policy. Although I differ with Jack on some things in here, especially important is his point . . .
Read more »