National Security, Technology & Law Working Group

Explore Research

Filter By:

Topic

Type

Author

Enter comma-separated ID numbers for authors

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Invitation To The Hoover Book Soiree: Fred Kaplan On "Dark Territory: The Secret History Of Cyber War"

by Jack Goldsmith, Benjamin Wittes
Monday, June 6, 2016

The next in our series of book soirees at the Hoover Institution's Washington Office will take place on June 15, when Ben interviews Fred Kaplan about his new book, Dark Territory: The Secret History of Cyber War.

Analysis and Commentary

How To Limit Jasta's Adverse Impact

by Curtis A. Bradley, Jack Goldsmithvia Lawfare
Friday, June 3, 2016

We have previously written about why we think JASTA—the bill approved by the Senate last month that would strip foreign sovereign immunity for certain terrorism-related torts inside the United States—is a bad idea.  We argued that the law would be widely perceived around the world as a violation of international law and that it would undermine the U.S. ability to claim immunity in other nation’s courts, and that these costs to the nation would likely outweigh any benefits to the potential plaintiffs.

Featured

Important First Step By HPSCI On Pre-Publication Review Reform

by Jack Goldsmith, Oona A. Hathawayvia Lawfare
Thursday, May 26, 2016

We are happy to learn, via Secrecy News, that the House Permanent Select Committee on Intelligence (HPSCI) has weighed in constructively on the pre-publication review issue that we first wrote about.

Analysis and Commentary

Trump And The Powers Of The American Presidency (Part I)

by Benjamin Wittesvia Lawfare
Wednesday, May 25, 2016

John Adams's famous aspiration is not our reality: We live in a government of men, as well as laws. One of those men, the most powerful of them all, may soon be Donald Trump.

Analysis and Commentary

Donald Trump And A Tale Of Two Washingtons

by Benjamin Wittesvia Lawfare
Monday, May 23, 2016

CNN reported yesterday that Sen. Lindsey Graham of South Carolina—after many months of principled opposition to Donald Trump—has decided to become a Trump enabler after all: Sen. Lindsey Graham, one of Donald Trump's fiercest critics, is now calling on Republicans to support their presumptive nominee.

Analysis and Commentary

The D.C. Circuit Hands Down Opinion In Khadr

by Benjamin Wittesvia Lawfare
Friday, May 20, 2016

Here it is. Judge Brett Kavanaugh's opinion for himself, Judge Thomas Griffith, and Senior Judge A. Raymond Randolph opens as follows: Omar Ahmed Khadr was a member of al Qaeda. On July 27, 2002, at the age of 15, 2 Khadr took part in a firefight in Afghanistan against U.S. forces. During the battle, Khadr killed a U.S. Army soldier, Sergeant First Class Christopher Speer.

Featured

The New JASTA Is Still Harmful Congressional Shirking

by Jack Goldsmithvia Lawfare
Thursday, May 19, 2016

Steve Vladeck followed up his excellent analysis of an earlier version of the Justice Against Sponsors of Terrorism Act (JASTA) with an excellent analysis of the different version of JASTA that passed the Senate earlier this week. The Bill that passed the Senate was indeed different than the one being considered a few weeks ago.

Analysis and Commentary

Legislative Response On Sextortion

by Benjamin Wittesvia Lawfare
Tuesday, May 17, 2016

In the week since the release of our sextortion reports, there have been a number of encouraging signs of legislative interest in the problem. The day Brookings released the reports, Rep. Katherine Clark of Massachusetts announced that "I find the prevalence of this heinous practice alarming. 

Analysis and Commentary

Sextortion And The Going Dark Debate

by Benjamin Wittesvia Lawfare
Friday, May 13, 2016

One interesting feature of the sextortion research we released this week—a feature we did not discuss in the papers themselves—is the interaction between this issue and the “going dark” debate.

Analysis and Commentary

Sextortion As Cybersecurity: Defining Cyber Risk Too Narrowly

by Benjamin Wittesvia Lawfare
Thursday, May 12, 2016

When we think of cybersecurity, we don't think of sexual violence. Sexual assault, rape, and child molestation are problems of intimate contact between individuals in close proximity to one another. By contrast, we tend think of cybersecurity as a problem of remote attacks that affect governments, major corporations, and—at an individual level—people with credit card numbers or identities to steal.

Pages

Aegis on Lawfare

 
Aegis explores legal and policy issues at the intersection of technology and national security.  Published in partnership with Lawfare, it features long-form essays of the working group, examines major new books in the field, and carries podcasts and videos or the working group’s events in Washington and Stanford.

Security by the Book Podcasts

The Security by the Book podcast series features monthly interviews with authors of important, new national security-oriented books and publications.

The Working Group on National Security, Technology, and Law brings together national and international specialists with broad interdisciplinary expertise to analyze how technology affects national security and national security law and how governments can use that technology to defend themselves, consistent with constitutional values and the rule of law.

The group will focus on a broad range of interests, from surveillance to counterterrorism to the dramatic impact that rapid technological change—digitalization, computerization, miniaturization, and automaticity—are having on national security and national security law. Topics include cybersecurity, the rise of drones and autonomous weapons systems, and the need for and dangers of state surveillance. The group’s output will also be published on the Lawfare blog, which covers the merits of the underlying legal and policy debates of actions taken or contemplated to protect the nation and the nation’s laws and legal institutions.

Jack Goldsmith and Benjamin Wittes are the cochairs of the National Security, Technology, and Law Working Group.