Congress

House Judiciary Committee Hearing Tomorrow: Law Enforcement Access to Data Across Borders

by

Feb 24th, 2016

The President’s Plan for Closing the Guantánamo Bay Detention Facility

by

Feb 23rd, 2016

A New UK-US Data Sharing Agreement: A Tremendous Opportunity, If Done Right

by

Feb 8th, 2016

When the NSA Merges Its Offense and Defense, Encryption Loses

by

Feb 5th, 2016

Questions Congress Should Ask About Section 702

by

Feb 4th, 2016

It’s All About the Associated Forces

by

Jan 28th, 2016

What the Senate Preserved in Blocking the SAFE Act

by

Jan 21st, 2016

Just Security Editors’ Annotated State of the Union

by

Jan 13th, 2016

Ten National Security Oversight Issues to Watch in 2016

by

Dec 28th, 2015

War: What Is It Good For? — Revisiting Strategic Questions Congress Should Ask in Debating an ISIL AUMF

by

Dec 21st, 2015

Rep. Schiff’s Newly-Proposed AUMF: Praise And A Caveat

by and

Dec 10th, 2015

The President’s NDAA signing statement re: GTMO and anti-torture provisions

by

Nov 25th, 2015

History, Hysteria, and Syrian Refugees

by

Nov 21st, 2015

A False Choice on Guantánamo Closure

by

Nov 2nd, 2015

Reminder: Tech Firms Aren’t Always the Privacy Advocates We’d Like to Think They Are

by

Nov 1st, 2015

After the NDAA Veto: Now What?

by

Oct 23rd, 2015

The Obama Administration’s Misguided Opposition to Tariq Ba Odah’s Request for Judicial Relief

by

Oct 13th, 2015

Too Much Posturing and Not Enough Substance on Encryption

by

Oct 12th, 2015

Amid Calls for UN Investigation Into Kunduz Strike, US Senator Suggests that the UN Does Not Investigate Taliban Abuses. He’s Wrong.

by

Oct 6th, 2015

Congressional Due Process Failure: A Benghazi Example

by

Oct 5th, 2015

The US-China Cyber Agreement: What’s In and What’s Out

by

Sep 28th, 2015

There’s Still Room for Mischief After Iran Deal Vote

by

Sep 4th, 2015

Is al-Qaeda v Islamic State the Right Question?

by

Aug 6th, 2015

Judge Lamberth decides Warafi

by

Jul 30th, 2015

Legislative Cyber Threats: CISA’s Not The Only One

by

Jul 29th, 2015

OPM, CISA, and the Cybersecurity Oxymoron

by

Jul 2nd, 2015

Sloppy Cyber Threat Sharing Is Surveillance by Another Name

by

Jun 29th, 2015

The FISC’s Newest Opinion: Proof of the Need for an Amicus

by

Jun 23rd, 2015

The OPM Hack and the New DOD Law of War Manual

by

Jun 17th, 2015

A Sweeping Victory for the McCain-Feinstein Anti-Torture Measure

by

Jun 16th, 2015

Thoughts on Zivotofsky, Part Six: Why the majority’s surprising decision on executive exclusivity is unpersuasive

by

Jun 13th, 2015

Thoughts on Zivotofsky, Part Five: Why did the majority choose to decide whether the President’s “recognition” power is exclusive?

by

Jun 13th, 2015

1 14 15 16 17 18 20