Intelligence activities

Cyber Attribution Problems—Not Just Who, but What

by

Dec 11th, 2014

Five Torturous Steps to Hell

by

Dec 11th, 2014

The Torture Report and the “Glomar Fig Leaf”

by

Dec 10th, 2014

Torture: Unreliable and Inestimably Costly

by

Dec 9th, 2014

The Torture Convention & Appendix M of the Army Field Manual on Interrogations

by

Dec 5th, 2014

An Intelligence Committee Agenda

by

Dec 4th, 2014

The Senate Torture Report Should Name Victims

by

Dec 3rd, 2014

Drone Courts: The Wrong Solution to the Wrong Problem

by

Dec 2nd, 2014

Takeaways from the House Intelligence Committee Cybersecurity Hearing

by

Nov 21st, 2014

The End of the Snowden Affair

by

Nov 19th, 2014

The FBI Doesn’t Need More Access: We’re Already in the Golden Age of Surveillance

by

Nov 17th, 2014

The Surveillance State’s Legalism Isn’t About Morals, It’s About Manipulating the Rules

by

Nov 13th, 2014

The Problem With Legalism in the Surveillance State

by

Nov 7th, 2014

A Cult of Rules: The Origins of Legalism in the Surveillance State

by

Nov 5th, 2014

National Security Politics in the 114th Congress

by

Nov 5th, 2014

A Republican Senate Takeover Won’t Doom Surveillance Reform

by

Nov 4th, 2014

The Private Frontline in Cybersecurity Offense and Defense

by

Oct 30th, 2014

EU-Funded Study: Electronic Mass Surveillance Fails – Drastically

by

Oct 14th, 2014

Shhh! Last Week Was All About Secrets

by

Oct 13th, 2014

Twitter is Suing the US Government in an Effort to Reveal Surveillance Information

by

Oct 8th, 2014

Bugs, Bounties, and Blowback

by

Oct 3rd, 2014

It’s Time to Pass the USA Freedom Act—Warts and All

by

Oct 2nd, 2014

The Need for Both Legal and Technical Privacy Protections

by

Sep 30th, 2014

A Briefing on European Developments in Accounting for and Advancing Counterterrorism Actions

by

Sep 26th, 2014

1 19 20 21