National Security, Technology & Law Working Group

Explore Research

Filter By:

Topic

Type

Author

Enter comma-separated ID numbers for authors

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Analysis and Commentary

Seven National Security And Executive Power Questions For Donald Trump

by Benjamin Wittesvia Lawfare
Sunday, September 25, 2016

The first of the presidential debates takes place tomorrow evening. Last week, I found myself in Las Vegas, giving a pair of addresses on the election, national security, and the challenge of Donald Trump.

Analysis and Commentary

Rational Security: The "What Candy Are You?" Edition

by Benjamin Wittesvia Lawfare
Thursday, September 22, 2016

I'm off in Las Vegas this week, but it turns out that Rational Security does need me. The gang discusses how the bombings in New York and New Jersey have fixed us again on the threat of lone wolf terrorists.

Analysis and Commentary

In Defense Of The Washington Post's Much Maligned Snowden Editorial

by Benjamin Wittesvia Lawfare
Wednesday, September 21, 2016

To see the Snowdenistas and many media elites clutching for their smelling salts, you’d think my former colleagues at the Washington Post editorial page had stabbed Edward Snowden in the back after swearing a blood oath to protect him to Bart Gellman and the Post’s news team.

Blank Section (Placeholder)Analysis and Commentary

Attribution Of Malicious Cyber Incidents: From Soup To Nuts

by Herbert Linvia Lawfare
Tuesday, September 20, 2016

Attribution of malicious cyber activities is a deep issue, about which confusion and disquiet can be found in abundance. Attribution has many aspects, and a variety of well-researched and well-executed papers cover one or more of these aspects; these papers are referenced in the body of the paper and are called out again in the Acknowledgments section.

Blank Section (Placeholder)Essays

Attribution of Malicious Cyber Incidents: From Soup to Nuts

by Herbert Linvia Aegis Paper Series
Monday, September 19, 2016

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity.

Featured

Why President Obama Won't, and Shouldn't, Pardon Snowden

by Jack Goldsmithvia Lawfare
Friday, September 16, 2016

A “pardon Snowden” campaign was launched Wednesday, in conjunction with the Snowden film. Snowden himself made the “moral case” case for why he should be pardoned, and Tim Edgar made a much more powerful case. I remain unconvinced. I don’t think the President will, or should, pardon Snowden.

Analysis and Commentary

In Defense Of Jim Comey: Politico's Bizarrely Shoddy Attack On The FBI Director

by Benjamin Wittesvia Lawfare
Wednesday, September 14, 2016

An astonishingly bad piece appeared in Politico this week under an admittedly arresting headline: “The Case Against James Comey: Not Since Hoover Has an FBI Director Shown Such a Lack of Accountability.”

Analysis and Commentary

Livestream Of "The National Security Division At 10: Past, Present, And Future"

by Benjamin Wittesvia Lawfare
Wednesday, September 14, 2016

A major event on ten years of the Justice Department's National Security Division is taking place at the Center for Strategic and International Studies.

Analysis and Commentary

My Electoral Forecast Model

by Benjamin Wittesvia Lawfare
Sunday, September 4, 2016

Okay, this has nothing to do with national security law or policy. What's more, this is way, way outside my area of expertise. But I have this feeling that this may be of interest to some Lawfare readers, so I'm going to post it to this site once and then never mention it here again: I've developed a super-crude electoral forecast model.

Analysis and Commentary

Rational Security: The "Hackers, Heart Patients, And Hellfire" Edition

by Benjamin Wittesvia Lawfare
Thursday, September 1, 2016

New details emerge about Americans held hostage by Islamic militants and behavior of Doctors Without Borders in the Kayla Mueller case. Security researchers use an unorthodox approach to protect medical devices. And the U.S. kills ISIS’s number two. Does it matter?

Pages

Aegis on Lawfare

 
Aegis explores legal and policy issues at the intersection of technology and national security.  Published in partnership with Lawfare, it features long-form essays of the working group, examines major new books in the field, and carries podcasts and videos or the working group’s events in Washington and Stanford.

Security by the Book Podcasts

The Security by the Book podcast series features monthly interviews with authors of important, new national security-oriented books and publications.

The Jean Perkins Foundation Working Group on National Security, Technology, and Law brings together national and international specialists with broad interdisciplinary expertise to analyze how technology affects national security and national security law and how governments can use that technology to defend themselves, consistent with constitutional values and the rule of law.

The group will focus on a broad range of interests, from surveillance to counterterrorism to the dramatic impact that rapid technological change—digitalization, computerization, miniaturization, and automaticity—are having on national security and national security law. Topics include cybersecurity, the rise of drones and autonomous weapons systems, and the need for and dangers of state surveillance. The group’s output will also be published on the Lawfare blog, which covers the merits of the underlying legal and policy debates of actions taken or contemplated to protect the nation and the nation’s laws and legal institutions.

Jack Goldsmith is the chair of the Jean Perkins Foundation Working Group on National Security, Technology, and Law.