Intelligence

Unpacking and Updating the CLOUD Act

(Jennifer Daskal - Lawfare) The CLOUD Act, enacted in 2018, is the most significant amendment to ECPA in over a decade. It clarified that...

Limiting Reverse Searches in the Stored Communications Act

(Paul Ohm - Lawfare) Law enforcement increasingly conducts “reverse searches”—requests that ask online providers to search their massive databases not for information about a...

The War on Anthropic: Pretextual Designation and Unlawful Punishment

(Harold Hongju Koh, Bruce Swartz, Avi Gupta and Brady Worthington - Just Security) On Feb. 27, U.S. Secretary of Defense Pete Hegseth announced—via tweet—that...

Artificial Urgency: Reflecting on AI Hype at the 2026 REAIM Summit

(Zena Assaad - Just Security) The third Summit on Responsible AI in the Military Domain (REAIM) took place from February 4 to 5 in...

Cyber (In)Security and Surveillance

Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor (Kevin Poireault - Infosecurity Magazine) Several US companies have been targeted by Iranian hacking group...

Fog, Proxies and Uncertainty: Cyber in US-Israeli Operations in Iran

(Louise Marie Hurel - RUSI) These are days of considerable uncertainty in Iran and across many countries in the Middle East and, as with...

Cyber (In)Security and Surveillance (5 March 2026)

Human Rights at Risk in the Sprint Toward AI Sovereignty (Kian Vesteinsson and Grant Baker - Just Security) As AI tools are increasingly embedded in...

Cyber (In)Security and Surveillance (4 March 2026)

Global Takedown Neutralizes Tycoon2FA Phishing Service (Phil Muncaster - Infosecurity Magazine) Investigators claimed today to have taken out another key player in the global cybercrime...

AI Integration in Operation Epic Fury and Cascading Effects

(The Soufan Center) CENTCOM employed Anthropic’s large language model, Claude, for planning, targeting support, and battlefield simulations just hours after the Trump administration ordered...

Latest articles