Presently, we are in an interlude. The Mueller investigation is over, but Congress and the public have not yet seen the special counsel's report. Around 5:00pm on Friday, March 22nd, Attorney General William Barr sent a letter to the House and Senate Judiciary Committees, notifying them that Special Counsel Robert Mueller had concluded his investigation … Continue reading The Next Fight: DOJ and Congress after the Mueller Investigation
Late in 2017, Congress was trying to conclude a process that has, in recent years, become a fixture of national politics and a symbol of Washington gridlock: annual budget negotiations. More accurately, this process, which results in government funding for two-to-three-month increments, should be described as a dangerous brinkmanship which has the potential to seriously … Continue reading Section 702: The Debate is Not Going Away
North Korean ballistic missile tests over the past eight months have been a significant cause of concern in the United States and around the world. Recently, the U.S. has taken an increasingly aggressive posture, culminating in Donald Trump’s speech to the UN General Assembly, during which he threatened to "totally destroy North Korea” in defense … Continue reading A Renewed Case for Diplomacy with North Korea: Missile Defense Is Not Yet Reliable
The date was September 14th, 2001. Rep. Barbara Lee (D-CA) was delivering a one-and-a-half minute speech on the US House of Representatives floor in an attempt to persuade at least some of her colleagues to vote against authorizing the use of force in Afghanistan. Quoting a member of the clergy to whom she had listened … Continue reading Authorizing Military Force: The Mistakes of 2001 and Remedies for the Future
On June 17th, 2010, Sergey Ulasen was at a party when he received a call from one of his clients, an Iranian company. Ulasen worked at VirusBlocAda, a small computer security firm in Minsk, when he came across a curious report from an Iranian client. The clients’ computers were caught in a “reboot loop”, turning on and off repeatedly, and on-site technicians were unable to reassert control over them. In the following days, Sergey Ulasen remotely accessed the computer in order to examine the operating system. He located the worm, which was exploiting an unknown bug in the Windows operating system.