Intelligence & Surveillance

Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.

× Clear Filters
1,807 Articles
Just Security

Power Wars Symposium: The Ascendancy of the Lawyer

Editor’s Note: This is the latest entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Power Wars Symposium: Surveillance, Individual Rights, and the Obama Administration

Editor’s Note: This is the latest entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Power Wars Symposium: Further on the law of the bin Laden operation, Part II

Editor’s Note: This is the third entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Power Wars Symposium: Further on the law of the bin Laden operation, Part I

Editor’s Note: This is the second entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Power Wars Symposium: The Savage Effect

Editor’s Note: This is the first entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Reminder: Tech Firms Aren’t Always the Privacy Advocates We’d Like to Think They Are

Last weekend, news broke that Facebook had been informally lobbying lawmakers to let them know the company didn’t oppose the Cybersecurity Information Sharing Act (CISA). The…
Just Security

A Quick Update: Apple, Privacy, and the All Writs Act of 1789

Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal…
Just Security

Orin Kerr’s Unconvincing Defense of Yesterday’s Second Circuit (Non-)Ruling

Over at the Volokh Conspiracy, my friend Orin Kerr has a thoughtful post up about yesterday’s Second Circuit decision in ACLU v. Clapper, which refused to enjoin the…
Just Security

Section 215 and “Fruitless” (?!?) Constitutional Adjudication

This morning, the Second Circuit issued a follow-on ruling to its May decision in ACLU v. Clapper (which had held that the NSA’s bulk telephone records program was unlawful…
Just Security

The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Safe Harbor and Reforming Section 702

Having only belatedly caught up on the European Court of Justice’s Safe Harbor decision, I wanted to weigh in on the excellent discussion between Tim Edgar and Peter Margulies…
Just Security

The World Doesn’t Need a “Snowden Treaty”

How to best protect privacy in cyberspace is a very difficult question. So is what role the law (domestic and international) should play in ensuring a proper balance between privacy…
1-12 of 1,807 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: