The incoming Biden administration should seek to build a U.S.-EU alliance that will hardwire democratic governance into everything digital.
Latest in Cybersecurity
This is my favorite story of the episode. David Kris covers a report from the Privacy and Civil Liberties Oversight Board on the enormous value that European governments get in fighting terrorism from the same American surveillance programs that European institutions have been fighting for twenty years to shut down. It’s a delightful takedown of European virtue-signaling, and I hope the Biden Administration gives the PCLOB a new name and mission in honor of the report.
The United States has one of the world’s strongest and most sophisticated capabilities to launch cyberattacks against adversaries. How does the US Constitution allocate power to use that capability? And what does that allocation tell us about appropriate executive-legislative branch arrangements for setting and implementing cyber strategy?
Cyber Command plays a part of the U.S.’s election defense, but other entities are better positioned to defend against certain election interference threats.
As its name implies, the 2018 US Department of Defense Defend Forward strategy is principally reactive. The strategy assumes that the United States will continue to suffer harm from competitors and malign actors through cyberspace. Accordingly, it outlines US reactions in order to preempt threats, defeat ongoing harm, and deter future harm.
The Cyberspace Solarium Commission recommended that Congress establish a Bureau of Cyber Statistics. How should this body be organized?
The Department of Justice has charged five Chinese nationals with a variety of crimes for allegedly hacking into over 100 organizations worldwide, including targeted attacks on U.S. companies.
The latest episode of the Cyberlaw Podcast.
Lawfare’s Bobby Chesney and Matt Waxman have launched “The National Security Law Lectures”: a free series of lectures on an array of national security law topics.
The idea—which aims to develop systems to scan photographs and messages before they are sent or received by users—is attractive, but it has far too many technical, legal and policy uncertainties to be ripe for adoption at this time.