Intelligence & Surveillance

Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.

× Clear Filters
1,805 Articles
Just Security

“Tweet Roll”: Reactions to Glenn Greenwald’s article on “How Covert Agents Infiltrate the Internet”

As reported in this morning’s Daily News Roundup, Glenn Greenwald’s latest piece for The Intercept takes a look at how western intelligence agencies “are attempting…
Just Security

Italian Court of Cassation Reverses Convictions of Italian Intelligence Agents Involved in Bush-Era Extraordinary Rendition

Reuters and AP have reported that Italy’s highest court in criminal matters, the Court of Cassation, reversed the convictions on Monday of five Italian military intelligence…
Just Security

Lithuanian Prosecutors Open Probe into CIA Black Site

The Lithuanian Prosecutor General’s Office has opened a pre-trial investigation into allegations that a Saudi Guantánamo detainee, Mustafa al-Hawsawi was held at a secret CIA…
Just Security

The NSA’s Culture of “Legal Compliance” Still Breaks the Law

Lately the NSA has been on a public relations offensive that has two principal aims. First, the agency is trying to convince the public that a lot of the NSA’s bad press is based…
Just Security

Miranda: Blame Parliament Before Blaming the Courts

In August 2013, David Miranda, partner of journalist Glenn Greenwald, was transiting through Heathrow, on his way from Germany to Brazil when he was detained and searched under…
Just Security

Espionage Porn and Democratic Platitudes: A Response to Rahul Sagar

I don’t have much to say in reply to Rahul Sagar’s thoughtful response to my January 23 post, “Does Espionage Porn Make Us Stronger?” Much of that is because,…
Just Security

Democratic Platitudes

[Editor’s Note: Stay tuned later today for a post from Steve Vladeck responding to this guest post by Rahul Sagar.] In a recent post “Does Espionage Porn Make Us Stronger?”…
Just Security

Information Cascades and Intelligence Oversight

Sen. Blumenthal opened a recent surveillance oversight hearing by hammering an important point from the Privacy and Civil Liberties Oversight Board’s thorough report on the…
Just Security

Why Does Microsoft Want a Global Convention on Government Access to Data?

Last month, Brad Smith, the General Counsel of Microsoft, called for an international convention on government access to consumer data (he was at Davos, so presumably he uploaded…
Just Security

David Miranda detention and questioning was lawful, rules UK High Court

The UK High Court has dismissed a challenge brought by David Miranda, partner of Glenn Greenwald, that he was unlawfully detained and questioned for nine hours at Heathrow airport…
Just Security

A Rejoinder from Jenks and Corn re U.S. SIGINT Based Targeting

There is probably no area of greater consensus between us and Professors Goodman and Jinks (their post) than the recognition that the law of armed conflict should and must be responsive…
Just Security

Military Targeting Based on Cellphone Location

A recent news story by Glenn Greenwald and Jeremy Scahill details the use of NSA signals intelligence (SIGINT) – including cellphone and SIM card data – to locate and kill…
1-12 of 1,805 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: