Intelligence

The Four Hour Cyber War on Iran

(Tom Uren - Lawfare)  The U.S.-Israel attack on Iran shows how cyber operations help achieve military goals when aggressors have cyber dominance. But it also...

Beyond Carpenter – A Legislative Framework for Mobile Location Privacy

(Jim Dempsey - Lawfare) In Carpenter v. United States, the Supreme Court held that the Fourth Amendment requires a warrant for compelled disclosure of...

Installing a Content Patch in the Stored Communications Act

(Stephanie Pell, Richard Salgado - Lawfare) The 1980s-era scheme in the Stored Communications Act that allows the government to compel service providers to disclose...

Data Proxies for the Stored Communications Act

(David Kris - Lawfare) When law enforcement obtains a customer’s cloud data from a cloud service provider (CSP) under the Stored Communications Act, a...

Harmonizing ECPA to Close Gaps and Increase Statutory Coherence

(Aaron R. Cooper - Lawfare) The Electronic Communications Privacy Act of 1986 (ECPA) was designed to protect the privacy of electronic communications while providing...

Unpacking and Updating the CLOUD Act

(Jennifer Daskal - Lawfare) The CLOUD Act, enacted in 2018, is the most significant amendment to ECPA in over a decade. It clarified that...

Limiting Reverse Searches in the Stored Communications Act

(Paul Ohm - Lawfare) Law enforcement increasingly conducts “reverse searches”—requests that ask online providers to search their massive databases not for information about a...

The War on Anthropic: Pretextual Designation and Unlawful Punishment

(Harold Hongju Koh, Bruce Swartz, Avi Gupta and Brady Worthington - Just Security) On Feb. 27, U.S. Secretary of Defense Pete Hegseth announced—via tweet—that...

Artificial Urgency: Reflecting on AI Hype at the 2026 REAIM Summit

(Zena Assaad - Just Security) The third Summit on Responsible AI in the Military Domain (REAIM) took place from February 4 to 5 in...

Latest articles