Intelligence & Surveillance
Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.
1,805 Articles
Power Wars Symposium: Further on the law of the bin Laden operation, Part II
Editor’s Note: This is the third entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Power Wars Symposium: Further on the law of the bin Laden operation, Part I
Editor’s Note: This is the second entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Power Wars Symposium: The Savage Effect
Editor’s Note: This is the first entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Reminder: Tech Firms Aren’t Always the Privacy Advocates We’d Like to Think They Are
Last weekend, news broke that Facebook had been informally lobbying lawmakers to let them know the company didn’t oppose the Cybersecurity Information Sharing Act (CISA). The…
A Quick Update: Apple, Privacy, and the All Writs Act of 1789
Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal…
Orin Kerr’s Unconvincing Defense of Yesterday’s Second Circuit (Non-)Ruling
Over at the Volokh Conspiracy, my friend Orin Kerr has a thoughtful post up about yesterday’s Second Circuit decision in ACLU v. Clapper, which refused to enjoin the…
Section 215 and “Fruitless” (?!?) Constitutional Adjudication
This morning, the Second Circuit issued a follow-on ruling to its May decision in ACLU v. Clapper (which had held that the NSA’s bulk telephone records program was unlawful…
The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Safe Harbor and Reforming Section 702
Having only belatedly caught up on the European Court of Justice’s Safe Harbor decision, I wanted to weigh in on the excellent discussion between Tim Edgar and Peter Margulies…
The World Doesn’t Need a “Snowden Treaty”
How to best protect privacy in cyberspace is a very difficult question. So is what role the law (domestic and international) should play in ensuring a proper balance between privacy…
Update on Apple’s Compelled-Decryption Case
Last week, we wrote about an order from a federal magistrate judge in New York that questioned the government’s ability, under an ancient federal law called the All Writs Act,…
The Latest Stumbling Block in the 9/11 Case: Self-Representation and Classified Evidence
Can a military commission defendant represent himself if he can’t see the classified evidence against him? That’s the outstanding issue in the 9/11 case taking place at the…