Intelligence & Surveillance

Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.

× Clear Filters
1,805 Articles
Just Security

Power Wars Symposium: Further on the law of the bin Laden operation, Part II

Editor’s Note: This is the third entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Power Wars Symposium: Further on the law of the bin Laden operation, Part I

Editor’s Note: This is the second entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Power Wars Symposium: The Savage Effect

Editor’s Note: This is the first entry in a symposium Just Security is hosting in conjunction with this week’s release of Power Wars: Inside Obama’s Post-9/11 Presidency by…
Just Security

Reminder: Tech Firms Aren’t Always the Privacy Advocates We’d Like to Think They Are

Last weekend, news broke that Facebook had been informally lobbying lawmakers to let them know the company didn’t oppose the Cybersecurity Information Sharing Act (CISA). The…
Just Security

A Quick Update: Apple, Privacy, and the All Writs Act of 1789

Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal…
Just Security

Orin Kerr’s Unconvincing Defense of Yesterday’s Second Circuit (Non-)Ruling

Over at the Volokh Conspiracy, my friend Orin Kerr has a thoughtful post up about yesterday’s Second Circuit decision in ACLU v. Clapper, which refused to enjoin the…
Just Security

Section 215 and “Fruitless” (?!?) Constitutional Adjudication

This morning, the Second Circuit issued a follow-on ruling to its May decision in ACLU v. Clapper (which had held that the NSA’s bulk telephone records program was unlawful…
Just Security

The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Safe Harbor and Reforming Section 702

Having only belatedly caught up on the European Court of Justice’s Safe Harbor decision, I wanted to weigh in on the excellent discussion between Tim Edgar and Peter Margulies…
Just Security

The World Doesn’t Need a “Snowden Treaty”

How to best protect privacy in cyberspace is a very difficult question. So is what role the law (domestic and international) should play in ensuring a proper balance between privacy…
Just Security

Update on Apple’s Compelled-Decryption Case

Last week, we wrote about an order from a federal magistrate judge in New York that questioned the government’s ability, under an ancient federal law called the All Writs Act,…
Just Security

The Latest Stumbling Block in the 9/11 Case: Self-Representation and Classified Evidence

Can a military commission defendant represent himself if he can’t see the classified evidence against him? That’s the outstanding issue in the 9/11 case taking place at the…
1-12 of 1,805 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: