Steve Slick reviews General Michael Hayden's Playing to the Edge.
Latest in Espionage
Is it lawful to conduct submarine espionage in a territorial sea, and if not, what recourse does a coastal state have to stop the activity?
The rapid succession of agreements against commercial cyber espionage raises an interesting possibility: we may be moving towards the formation of international law norms against economically motivated cyber espionage.
Yesterday, the 2015 G20 Summit in Turkey released the G20 Leaders' Communiqué packed full of cyberespionage goodies.
Fergus Hanson examines the emerging norm of the use of aggressive cyber attacks during peacetime and offers suggestions for how states can respond to this growing threat.
The other day, I was privileged to participate in the CIA and George Washington University's conference on "The Ethos and Profession of Intelligence."
Steven Spielberg's "Bridge of Spies" opens today. Here's the facinating law behind the arrest, detention, trial, and two trips to the U.S. Supreme Court of one its main characters.
When Chancellor Angela Merkel recently cited the “challenges” concerning the National Security Agency as an area that the German government has “tackled excellently” this term, many observers were surprised – not least because, two years into the “NSA affair,” the German government continues to vocally criticize American surveillance efforts while failing to address the shortcomings of its own intelligence agencies.
Today at the Lyndon B. Johnson Presidential Library at the University of Texas, the CIA released a trove of presidential briefs that were delivered to both Presidents John F. Kennedy and LBJ from 1961 to 1969. The collection includes over 2,500 documents exclusively prepared for the president each day.
"U.S. developing sanctions against China over cyberthefts” says the headline in Ellen Nakashima's story in the Post. We have heard this story before--for many years. The persistent failure to follow through is much worse than embarassing.