National Security, Technology & Law Working Group

Explore Research

Filter By:

Topic

Type

Author

Enter comma-separated ID numbers for authors

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Blank Section (Placeholder)EssaysAnalysis and Commentary

Appropriate Norms Of State Behavior In Cyberspace: Governance In China And Opportunities For US Businesses

by Mei Gechlikvia Aegis Paper Series
Thursday, July 27, 2017

Finding cybernorms that are acceptable to the United States and China, which have different ideologies and practices as well as enormous interests at stake, is challenging. This article identifies these developments in China - the new Guiding Cases System as well as foreign and domestic developments regarding facilitating everyone’s access to cyberspace - and discusses how they, together with the Shanghai Cooperation Organization’s growing significance in the international arena, call for more strategic thinking among US policymakers so that the United States can seize the new opportunities to engage meaningfully with China in establishing international norms for cyberspace.

How To Deal With A Kamikaze President

by Jack Goldsmith
Tuesday, July 25, 2017

Donald Trump’s angry morning tweet storm reached another new low with attacks on his Attorney General for not investigating his former presidential opponent, and on his acting FBI Director’s integrity. This and other attacks on key law enforcement figures in his own Executive branch goes far beyond breaking norms of investigatory independence.

Featured

Jack Goldsmith's Interview With Dean Baquet, Executive Editor Of The New York Times, On Publication Decisions About Intelligence Secrets

by Jack Goldsmithvia Lawfare
Monday, July 24, 2017

On April 25, two days after President Obama announced that a U.S. drone strike accidentally killed two innocent hostages, Mark Mazzetti and Matt Apuzzo published a story in the New York Times about congressional and White House support for the CIA’s “targeted killing program.” A major point in the story was that some of the CIA officers who built the CIA’s drone program also led the CIA’s detention and interrogation program. 

Featured

Loyalty And Principle In The Trump White House

by Jack Goldsmithvia Lawfare
Friday, July 21, 2017

We don’t yet know why Mark Corallo, the spokesman for President Trump’s personal legal team, resigned yesterday.

Analysis and Commentary

The Trump Interview And DOJ Independence

by Jack Goldsmithvia Lawfare
Thursday, July 20, 2017

I see the implications of the Trump interview a little differently than Ben does. First, Ben says that the only honorable thing for Attorney General Sessions and Deputy Attorney General Rosenstein to do in light of Trump’s intemperate attacks is to resign.

Blank Section (Placeholder)Essays

Encryption Substitutes

by Andrew Keane Woodsvia Aegis Paper Series
Tuesday, July 18, 2017

This paper argues that the “going dark” debate ought to be considered in context of the larger debate over government access to data. Encryption is not the only game in town: just as law enforcement can pursue a number of different alternatives to mandating encryption backdoors, so too can privacy advocates take steps beyond encrypting their data to ensure their privacy.  Acknowledging these substitutes—both for law enforcement and for privacy seekers—generates a number of insights. For example, comprehensive reform may make more sense than serial reforms, since it would allow for issue linkage and deal-making.

Blank Section (Placeholder)Essays

China and the US Strategic Construction of Cybernorms: The Process Is the Product

by Duncan B. Hollisvia Aegis Paper Series
Thursday, July 6, 2017

This paper explores the role norms play in advancing U.S. interests in changing Chinese behavior in cyberspace.  It compares and contrasts U.S. efforts to achieve two norms:  (1) the U.N. Group of Governmental Experts’ consensus that international law applies in cyberspace; and (2) the U.S.-China understanding that neither State would pursue cyber-espionage for commercial advantages.  In contrast to prior studies that focus only on the behavior a norm requires, this paper employs a broader, process-based analysis.  That analysis offers a new framework for strategizing about the potential risks and rewards of pursuing different normative processes, whether in U.S. efforts to impact China’s behavior in cyberspace or vice-versa. 

In the News

Announcing A New Partnership With Foreign Policy

by Benjamin Wittes, Susan Hennesseyvia Lawfare
Thursday, July 6, 2017

We are excited to announce a new partnership between Lawfare and Foreign Policy magazine. 

Russian Presidential Press Office
Analysis and Commentary

Rational Security: The "Guns And Smoke" Edition

by Benjamin Wittesvia Lawfare
Thursday, July 6, 2017

The first signs of potential collusion between the Trump campaign and Russia emerge. State Department employees say they’re uncertain about the future of their work under the Trump administration. And the president is facing a crisis in North Korea as he prepares to meet with world leaders, including Vladimir Putin. 

Analysis and Commentary

Foreign Relations Law Supplement

by Jack Goldsmithvia Lawfare
Tuesday, June 27, 2017

Curtis Bradley and I have completed a 23-page Supplement to the new edition of our casebook, Foreign Relations Law: Cases and Materials (6th Ed. 2017). The Supplement addresses, among other things, litigation over the Trump administration’s executive orders relating to immigration, the administration’s announcement that the United States would withdraw from the Paris climate change agreement, the administration’s missile strikes against Syria in April 2017, and the debates and litigation concerning “sanctuary jurisdictions.”

Pages

Aegis on Lawfare

 
Aegis explores legal and policy issues at the intersection of technology and national security.  Published in partnership with Lawfare, it features long-form essays of the working group, examines major new books in the field, and carries podcasts and videos or the working group’s events in Washington and Stanford.

Security by the Book Podcasts

The Security by the Book podcast series features monthly interviews with authors of important, new national security-oriented books and publications.

The Jean Perkins Foundation Working Group on National Security, Technology, and Law brings together national and international specialists with broad interdisciplinary expertise to analyze how technology affects national security and national security law and how governments can use that technology to defend themselves, consistent with constitutional values and the rule of law.

The group will focus on a broad range of interests, from surveillance to counterterrorism to the dramatic impact that rapid technological change—digitalization, computerization, miniaturization, and automaticity—are having on national security and national security law. Topics include cybersecurity, the rise of drones and autonomous weapons systems, and the need for and dangers of state surveillance. The group’s output will also be published on the Lawfare blog, which covers the merits of the underlying legal and policy debates of actions taken or contemplated to protect the nation and the nation’s laws and legal institutions.

Jack Goldsmith is the chair of the Jean Perkins Foundation Working Group on National Security, Technology, and Law.