National Security, Technology & Law Working Group

Explore Research

Filter By:

Topic

Type

Author

Enter comma-separated ID numbers for authors

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Analysis and Commentary

Michael Ratner, RIP

by Jack Goldsmithvia Lawfare
Thursday, May 12, 2016

I am a perhaps-improbable admirer of Michael Ratner, whom I was sad to learn passed away yesterday. I interviewed Ratner six years ago for my book Power and Constraint and thought him such a significant figure in the story of post-9/11 accountability that I built a chapter around him (called “The GTMO Bar”).

Analysis and Commentary

Sextortion: The Problem And Solutions

by Benjamin Wittes, Cody Poplin , Quinta Jurecic, Clara Speravia Lawfare
Wednesday, May 11, 2016

Prosecutors colloquially call it “sextortion.” Legally speaking, there’s no such thing. The word is a kind a prosecutorial slang for a class of cases that do not correspond neatly with any known criminal offense.

Analysis and Commentary

Event Announcement: "Sextortion: Remote Sexual Assault"

by Benjamin Wittesvia Lawfare
Friday, May 6, 2016

Next Wednesday, May 11, Brookings is holding an online event to release a pair of papers on which I and a team of Lawfare folks have spent a great deal of time over the last several months. 

Analysis and Commentary

Twitter, ISIS, Civil Liability, And Immunity: An Update

by Benjamin Wittesvia Lawfare
Thursday, May 5, 2016

A few months ago, Zoe Bedell and I wrote a series of posts about Twitter and potential liability—both criminal and civil—for material support for terrorist groups arising out of its provision of service to ISIS members and supporters. The series was prompted by litigation against Twitter filed by the families of people killed in ISIS attacks. 

Analysis and Commentary

Rational Security: The "Never Say Never Trump Again" Edition

by Benjamin Wittesvia Lawfare
Thursday, May 5, 2016

Donald Trump becomes the presumptive Republican nominee for president after an overwhelming primary victory in Indiana. Iraq and Syria are in meltdown; why is this time any worse? And the Supreme Court gives the thumbs up to new hacking powers for law enforcement. Plus, Susan is installing a camera in her shower!

Analysis and Commentary

Analysis Of Lawsuit Challenging War Against ISIL

by Jack Goldsmithvia Lawfare
Wednesday, May 4, 2016

Charlie Savage reports that Captain Nathan Michael Smith, an army intelligence officer deployed in Kuwait, has brought a lawsuit challenging President Obama’s interpretive extension of the 2001 AUMF in response to 9/11 the Islamic State.

Analysis and Commentary

Hindsight: Reflections On Fifteen Years Of The War On Terror

by Benjamin Wittesvia Lawfare
Tuesday, May 3, 2016

Rachel Brand earlier linked to the video of one session of the April 26 conference at the Fordham Law School Center on National Security on "Hindsight: Reflections On 15 Years of the War on Terror."

Analysis and Commentary

Drones And The “Internet Of Things-Style Surveillance Network”

by Jack Goldsmithvia Lawfare
Monday, May 2, 2016

Nextgov reports that the State Department has put out a request for information for a wireless intrustion detection system that the story describes as an “Internet of Things-style surveillance network.”

Analysis and Commentary

Using Data To Secure Networks: Optimizing Individual Privacy While Achieving Strong Security

by Benjamin Wittesvia Lawfare
Monday, May 2, 2016

On April 14, in partnership with the Center For Democracy and Technology, Intel Security, and the Hoover Institution, we held a lunch event entitled, “Using Data To Secure Networks: Optimizing Individual Privacy While Achieving Strong Security."

Analysis and Commentary

The Lawfare Podcast: Intel Security's Chris Young On Cybersecurity And A Debate On Using Data To Protect Data

by Benjamin Wittesvia Lawfare
Saturday, April 30, 2016

Earlier this month, Lawfare held a lunch event in partnership with Intel Security, the Hoover Institution, and the Center for Democracy and Technology on whether Big Data analytics are merely a privacy threat or whether data can also be used to protect data.

Pages

Aegis on Lawfare

 
Aegis explores legal and policy issues at the intersection of technology and national security.  Published in partnership with Lawfare, it features long-form essays of the working group, examines major new books in the field, and carries podcasts and videos or the working group’s events in Washington and Stanford.

Security by the Book Podcasts

The Security by the Book podcast series features monthly interviews with authors of important, new national security-oriented books and publications.

The Working Group on National Security, Technology, and Law brings together national and international specialists with broad interdisciplinary expertise to analyze how technology affects national security and national security law and how governments can use that technology to defend themselves, consistent with constitutional values and the rule of law.

The group will focus on a broad range of interests, from surveillance to counterterrorism to the dramatic impact that rapid technological change—digitalization, computerization, miniaturization, and automaticity—are having on national security and national security law. Topics include cybersecurity, the rise of drones and autonomous weapons systems, and the need for and dangers of state surveillance. The group’s output will also be published on the Lawfare blog, which covers the merits of the underlying legal and policy debates of actions taken or contemplated to protect the nation and the nation’s laws and legal institutions.

Jack Goldsmith and Benjamin Wittes are the cochairs of the National Security, Technology, and Law Working Group.