Intelligence activities

Post-Flynn’s Resignation: New and Important Questions Raised

by and

Feb 14th, 2017

The CIA’s New Guidelines for Handling Americans’ Information

by

Jan 18th, 2017

Cross-Border Cyber Ops to Erode Legitimacy: An Act of Coercion

by

Jan 12th, 2017

Trump’s Responses to Allegations of Russian Connections

by

Jan 11th, 2017

Trump’s Dangerous Attribution Message on Russian Hacking—and How to Counter It

by

Jan 10th, 2017

A Tweet Recap of the Senate Armed Services Committee Hearing on Foreign Cyber Threats to the US

by

Jan 5th, 2017

The DHS/FBI Report on Russian Hacking was a Predictable Failure

by

Jan 4th, 2017

U.S.-Russian Relations After the Russian Hacking Affair

by

Dec 30th, 2016

At Least One Copy of the Senate Torture Report Will Be Preserved. What About the Others?

by

Dec 13th, 2016

President-elect Trump’s Picks Redefine “Two-Tiered System of Justice”

by

Dec 12th, 2016

The Economic Incentives for International Cybersecurity Coordination

by

Dec 6th, 2016

Foreign Gov’t Assistance to Trump Administration Policies: What Int’l Law Prohibits

by

Nov 23rd, 2016

The Server Will Bewitch You Shortly

by

Oct 31st, 2016

The Drone Memos—The Book

by

Oct 31st, 2016

New UN Report Highlights Freedom of Expression Violations Across the Globe

by

Oct 21st, 2016

Mass Hacks of Private Email Aren’t Whistleblowing, They are at Odds With It

by

Oct 19th, 2016

International Law and Proposed U.S. Responses to the D.N.C. Hack

by

Oct 14th, 2016

“A First Amendment in the Digital Age”—Peter Zenger Lecture

by

Oct 11th, 2016

Are Companies Bulk-Scanning E-mails for Spy Agencies?

by

Oct 5th, 2016

The UK Snooper’s Charter and the Anderson Report on Bulk Powers

by

Oct 4th, 2016

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part III

by and

Sep 29th, 2016

A Broken Playbook: The NYPD Targeted Muslims in Over 95-Percent of Investigations That Broke Surveillance Rules

by

Sep 23rd, 2016

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part II

by and

Sep 22nd, 2016

No More Snowdens? Start by Reforming the House Intelligence Committee

by

Sep 21st, 2016

Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance

by and

Sep 19th, 2016

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform

by and

Sep 15th, 2016

A Response to “The Tech”: Continuing the Vulnerability Equities Process Debate

by

Sep 13th, 2016

The DC Circuit’s Latest Ruling in Al-Nashiri: Why the Military Commissions Cannot Escape the Taint of CIA Torture

by

Sep 9th, 2016

The Vulnerability Equities Process Should Consider More than Intelligence Community Needs

by

Sep 2nd, 2016

Foreign Governments, Tech Companies, and Your Data: A Response to Jennifer Daskal and Andrew Woods

by and

Aug 30th, 2016

A 9/11 Commission Approach to the Russian Hack of the DNC

by

Aug 29th, 2016

A Problematic Pseudo-Category of Surveillance Information and Promising Post-Collection Policy

by

Aug 25th, 2016

1 13 14 15 16 17 21