What are China's AI ambitions?| Default
By taking Taiwan, China could erase America’s best hope of keeping its AI edge.| Default
Hard National Security Choices| Default
Texas’s argument equating the two goes against the text and original meaning of the Constitution, and would set a dangerous precedent if courts accept it.| Default
In the lower courts, the presumption of regularity is in free fall—if it hasn’t crashed already.| Default
My resignation from the FBI.| Default
End-to-end encrypted email is generally cumbersome and unintuitive. It’s time to invest in alternatives.| Default
Though the subject line borrows a phrase from Musk’s Twitter email, the federal government is not a private company, and its HR policies are arcane and legally binding.| Default
SCOTUS cannot avoid a constitutional crisis by avoiding confrontation with the administration.| Default
More Articles | Default
Child sexual abuse and exploitation online is a serious issue. Targeting end-to-end encryption is not the solution.| Default
The law’s survival doesn’t hinge on the level of constitutional scrutiny. And the main issue isn’t really data privacy; it’s Chinese influence.| Default
China’s National Intelligence Law, enacted on June 27 with unusual speed and limited public discussion, is a uniquely troubling milestone in Beijing’s four-year-old| Default
The recent cybersecurity catastrophe that wasn’t reveals an untenable situation, one being exploited by malicious actors.| Default
An EU proposal on combating child sexual abuse material online relies on technology not yet invented and, even worse, would create significant national security risks.| Default
At what point does informal coercion raise Constitutional questions?| Default
Jenna Ellis is the fourth co-defendant to plead guilty in the Fulton County 2020 election subversion case.| Default