| | What “Efail” Tells Us About Email Vulnerabilities and Disclosure (lawfareblog.com) |
| 1 point by DmenshunlAnlsis on May 24, 2018 | past |
|
| | Rational Security: The 'SpyGate' Edition (lawfareblog.com) |
| 1 point by raleighm on May 24, 2018 | past |
|
| | U.K. Outlines Position on Cyberattacks and International Law (lawfareblog.com) |
| 1 point by raleighm on May 23, 2018 | past |
|
| | Why Engage in Proxy War? A State’s Perspective (lawfareblog.com) |
| 1 point by raleighm on May 21, 2018 | past |
|
| | Guantanamo, Certification, and the Fear of Blame (lawfareblog.com) |
| 1 point by DmenshunlAnlsis on May 18, 2018 | past |
|
| | Are Facebook’s Ads Controlling Us? A New Version of an Old Question (lawfareblog.com) |
| 1 point by raleighm on May 16, 2018 | past |
|
| | How Misinformation Spreads on Social Media–And What to Do About It (lawfareblog.com) |
| 1 point by raleighm on May 9, 2018 | past |
|
| | The Role of Norms in Internet Security: Reputation and Its Limits (lawfareblog.com) |
| 1 point by raleighm on May 8, 2018 | past |
|
| | Is It Time to Regulate Cyber Conflicts? (lawfareblog.com) |
| 1 point by raleighm on May 4, 2018 | past |
|
| | Law and Public Intuition on the Use of Force, Part 1: An Introduction (lawfareblog.com) |
| 2 points by raleighm on May 4, 2018 | past |
|
| | What Is Absent from the U.S. Cyber Command 'Vision' (lawfareblog.com) |
| 1 point by raleighm on May 3, 2018 | past | 1 comment |
|
| | WHOIS Going to Keep the Internet Safe? (lawfareblog.com) |
| 2 points by thread_id on May 3, 2018 | past |
|
| | Under the Foreign Sovereign Immunities Act, Where Do Hacking Torts Happen? (lawfareblog.com) |
| 1 point by raleighm on May 1, 2018 | past |
|
| | Did Donald Trump Jr. Admit to Violating the Computer Fraud and Abuse Act? (lawfareblog.com) |
| 2 points by raleighm on April 29, 2018 | past |
|
| | Document: Foreign Intelligence Surveillance Court 2017 Annual Report (lawfareblog.com) |
| 1 point by raleighm on April 28, 2018 | past |
|
| | War Machines: Artificial Intelligence in Conflict (lawfareblog.com) |
| 3 points by raleighm on April 28, 2018 | past |
|
| | Why Were Members of Congress Asking Mark Zuckerberg About Myanmar? A Primer (lawfareblog.com) |
| 3 points by cfadvan on April 27, 2018 | past |
|
| | Why Were Members of Congress Asking Mark Zuckerberg About Myanmar? A Primer (lawfareblog.com) |
| 1 point by highdesertmuse on April 27, 2018 | past |
|
| | The Russians Are Coming (lawfareblog.com) |
| 1 point by GW150914 on April 18, 2018 | past |
|
| | Michael Cohen, Attorney-Client Privilege and the Crime-Fraud Exception (lawfareblog.com) |
| 13 points by chatmasta on April 18, 2018 | past | 4 comments |
|
| | Procedural Hurdles for the Mueller Protection Bills (lawfareblog.com) |
| 1 point by raleighm on April 17, 2018 | past |
|
| | [flagged] What to Make of Trump’s Pardon of Scooter Libby? (lawfareblog.com) |
| 4 points by thread_id on April 14, 2018 | past |
|
| | Predicting Enemies: Military Use of Predictive Algorithms (lawfareblog.com) |
| 1 point by dbasedweeb on April 11, 2018 | past |
|
| | Predicting Enemies: Military Use of Predictive Algorithms (lawfareblog.com) |
| 1 point by raleighm on April 10, 2018 | past |
|
| | The Encryption Debate Isn't About Stopping Terrorists, It's About Solving Crime (lawfareblog.com) |
| 68 points by scottie_m on April 9, 2018 | past | 75 comments |
|
| | Is Cybersecurity Improving? (lawfareblog.com) |
| 3 points by dbasedweeb on April 8, 2018 | past | 1 comment |
|
| | A Hard Transparency Choice: What Is WikiLeaks? (lawfareblog.com) |
| 6 points by scottie_m on April 7, 2018 | past | 1 comment |
|
| | The Supreme Court of Facebook: Proposed Governance for Online Speech (lawfareblog.com) |
| 2 points by raleighm on April 5, 2018 | past |
|
| | The Al-Kibar Strike: What a Difference 26 Years Make (lawfareblog.com) |
| 1 point by eaguyhn on April 2, 2018 | past |
|
| | Breaking the Encryption Stalemate: New Research on Secure Third-Party Access (lawfareblog.com) |
| 1 point by SubiculumCode on April 1, 2018 | past |
|
|
| More |