Intelligence & Surveillance

Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.

× Clear Filters
1,807 Articles
Just Security

MLAT Reform and the 80 Percent Solution

Last week, The Washington Post reported that the US and the UK were in negotiations to permit UK law enforcement agencies to request stored communications like email and chats…
Just Security

Surveillance Is Still About Power

Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…
Just Security

The Poisoning of Alexander Litvinenko and the Geographical Scope of Human Rights Law

On January 21, a British investigation concluded that Russian President Vladimir Putin “probably” approved the poisoning of former Russian spy Alexander Litvinenko, who died…
Just Security

A New UK-US Data Sharing Agreement: A Tremendous Opportunity, If Done Right

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

When the NSA Merges Its Offense and Defense, Encryption Loses

How do you create strong encryption standards when the organization tasked to build them finds itself absorbed into an organization that dedicates huge quantities of resources…
Just Security

The High Standard of Proof in the Encryption Debate

Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there…
Just Security

Questions Congress Should Ask About Section 702

After passing a surveillance reform bill last year, Congress appears poised to turn to examine another controversial surveillance authority — Section 702 of FISA. Using Section…
Just Security

Why We Need to Reevaluate How We Share Intelligence Data With Allies

Last week, Canadians learned that their foreign signals intelligence agency, the Communications Security Establishment (CSE), had improperly shared information with their American,…
Just Security

IBM’s Terrorist-Hunting Software Raises Troubling Questions

Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
Just Security

Cryptopanic and James Comey’s Xanatos Gambit

For the past year or so I’ve been part of a cybersecurity working group at Harvard’s Berkman Center that on Monday released its first public report, Don’t Panic: Making Progress…
Just Security

Moving Beyond the “Going Dark” Frame

For more than a year now, this site has posted dozens of articles critiquing the US government’s claims that it needs a method of accessing encrypted digital communications…
Just Security

America’s Muddled Approach to Fighting ISIS

Last month, the Los Angeles Times ran a story that helped highlight one facet of the muddled thinking afflicting the US government’s campaign against ISIS: While the military…
1-12 of 1,807 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: