Category: On the Homefront – the HSDL Blog

social media icons

Legal Aspects of Social Media Extremism

The Program on Extremism at the George Washington University (GW) released additional papers on Online Violent Extremism as a part of the Legal Perspectives on Tech Series, commissioned in conjunction with the Congressional Counterterrorism Caucus. According to GW, the Program “provides analysis on issues related to violent and non-violent extremism.”...

United States Congress

Real Costs of Government Shutdowns

The United States Senate Homeland Security and Government Affairs Permanent Subcommittee on Investigations has released a report documenting the costs of the last three government shutdowns. Upon surveying 26 federal agencies, the investigation estimated the overall cost to American taxpayers at nearly $4 billion. The back pay to federal workers...

24 used bullet shells lined up in a rectangle of 3 by 8

Violent Crime on the Rise

The 2018 National Crime Victimization Survey (NCVS) reports that violent crime has been trending upward since 2015, a stark reversal from the consistent decline which started in the 1990s. Overall, the survey results present a slow, but steady, rise in violent crimes beginning in 2015. However, the report shows that...

Drawing of young man in a teal hoodie at a desk spray painting a surveillance camera as he works on his laptop while another man at a desk sweats as he looks at an eye on the computer screen with a man behind him starting over a wall at his screen

Three New Papers on Online Violent Extremism from the Program on Extremism

The George Washington University Program on Extremism released three new papers on Online Violent Extremism. All deal with the complicated issue of determining and assigning who bears the legal and moral onus of countering online terrorism. “Leveraging CDA 230 to Counter Online Extremism” by Annemarie Bridy argues “that the scope...

first responders on the site of 9/11

Remembering September 11, 2001

As Americans commemorate 9/11 attacks, the nation is continuing to grapple with the consequences of the largest terrorist attack on U.S. soil. Eighteen years have passed since the event brought an unprecedented breadth of research on terrorism, culminating in significant policy and legislative changes that continue to shape the U.S....

Social Media apps icons. Twitter

Chinese Disinformation Campaign Against the Hong Kong Protests

The Australian Strategic Policy Institute has released a new report analyzing the Chinese Government’s social media campaign against the recent Hong Kong protests.  Titled Tweeting Through the Great Firewall: Preliminary Analysis of PRC-linked Information Operations on the Hong Kong Protests, the study analyzes roughly 3.6 million tweets from over 900...

Light network at night

In Focus: 5G and National Security

New In Focus now available on 5G and National Security. From the Cybersecurity and Infrastructure Security Agency (CISA): Use of 5G components manufactured by untrusted companies could expose U.S. entities to risks introduced by malicious software and hardware, counterfeit components, and component flaws caused by poor manufacturing processes and maintenance...

Laptop with matrix code

In Focus: Insider Threats

New In Focus now available on Insider Threats. From the Department of Homeland Security: DHS/US-CERT defines the insider threat as a current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data and intentionally misused that access to negatively...