National Security, Technology & Law Working Group

Explore Research

Filter By:

Topic

Type

Author

Enter comma-separated ID numbers for authors

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Analysis and Commentary

A New Front In The Second Crypto War

by Benjamin Wittesvia Lawfare
Tuesday, March 15, 2016

Don’t look now but a new front is about to open up in the Second Crypto War. The Hill reports that the encryption legislation being drafted by Senate Intelligence Committee leaders Richard Burr and Dianne Feinstein could come as soon as this week.

Analysis and Commentary

Rational Security: The "117 Experts Can't Be Wrong" Edition

by Benjamin Wittesvia Lawfare
Friday, March 11, 2016

Republican national security experts declare Donald Trump unfit to be president. Who actually actually advises candidate Trump and who would advise President Trump? 

Analysis and Commentary

ACLU Takes First Step Towards Prepublication Review Reform

by Jack Goldsmithvia Lawfare
Friday, March 11, 2016

In December, Oona Hathaway and I wrote an op-ed and series of posts on the broken pre-publication review process. 

Analysis and Commentary

Lisa Monaco Speaks At CFR

by Benjamin Wittesvia Lawfare
Wednesday, March 9, 2016

White House counterterrorism czar Lisa Monaco spoke the other day at the Council on Foreign Relations.

Analysis and Commentary

A Trans-Atlantic Town Hall Dialogue With Germans On Data Privacy

by Benjamin Wittesvia Lawfare
Monday, March 7, 2016

Last month, I was asked to participate in a genuinely unusual radio experiment: a trans-Atlantic town hall meeting hosted by PRI's America Abroad simultaenously in Austin Texas and Berlin. The subject was data privacy.

Analysis and Commentary

The Lawfare Podcast: Apple V. FBI At The Wilson Center

by Benjamin Wittesvia Lawfare
Saturday, March 5, 2016

This week on the Lawfare Podcast, the Wilson Center takes on the Apple v. FBI controversy in a panel entitled “Will They or Won’t They? Understanding the Encryption Debate.”

Analysis and Commentary

Why Does Apple Think Telegram Is "Pernicious"?

by Benjamin Wittesvia Lawfare
Friday, March 4, 2016

I have a lot to say about this week's House Judiciary Committee, at which both FBI Director James Comey and Apple general counsel Bruce Sewell testified. I'll write up some general thoughts over the next few days.

Analysis and Commentary

Rational Security: The "It's A Feature Not A Bug" Edition

by Benjamin Wittesvia Lawfare
Friday, March 4, 2016

A New York magistrate judge says the government can’t force Apple to help the FBI extract information from an iPhone. Forty percent of analysts at the U.S. military’s Central Command say the “integrity” of their reports is flawed. 

Analysis and Commentary

e-Residency In Estonia, Part III: Wherein I Use My New Digital Identity Card To Swap Letters With The President

by Benjamin Wittesvia Lawfare
Friday, March 4, 2016

The other day, I received a letter from Estonian President Toomas Hendrik Ilves. It came in the form of an unadorned Microsoft Word file called "wittes.docx." It did not bear President Ilves's John Hancock. Nor was it on the letterhead of the office of the Estonian Presidency.

Analysis and Commentary

Estonian Digital Residency Update IV: The President Weighs In On "Going Dark"

by Benjamin Wittesvia Lawfare
Tuesday, March 1, 2016

The FBI v. Apple flap exploded on the public scene just as I was learning my way around my new Estonian e-Residency card, which promises—among other things—secure communications between card holders. I am currently working on the next piece in my series about Estonian e-Residency, so more on the...

Pages

Aegis on Lawfare

 
Aegis explores legal and policy issues at the intersection of technology and national security.  Published in partnership with Lawfare, it features long-form essays of the working group, examines major new books in the field, and carries podcasts and videos or the working group’s events in Washington and Stanford.

Security by the Book Podcasts

The Security by the Book podcast series features monthly interviews with authors of important, new national security-oriented books and publications.

The Working Group on National Security, Technology, and Law brings together national and international specialists with broad interdisciplinary expertise to analyze how technology affects national security and national security law and how governments can use that technology to defend themselves, consistent with constitutional values and the rule of law.

The group will focus on a broad range of interests, from surveillance to counterterrorism to the dramatic impact that rapid technological change—digitalization, computerization, miniaturization, and automaticity—are having on national security and national security law. Topics include cybersecurity, the rise of drones and autonomous weapons systems, and the need for and dangers of state surveillance. The group’s output will also be published on the Lawfare blog, which covers the merits of the underlying legal and policy debates of actions taken or contemplated to protect the nation and the nation’s laws and legal institutions.

Jack Goldsmith and Benjamin Wittes are the cochairs of the National Security, Technology, and Law Working Group.