Intelligence & Surveillance
Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.
1,805 Articles

Nuremberg Prosecutor says Guantanamo Military Commissions Don’t Measure Up
In an upcoming filing, the last living Nuremberg prosecutor, Benjamin B. Ferencz, says there is "very limited comparison" between the Guantanamo military commissions and the Nuremberg…

Former Chair of U.S. National Intelligence Council: Learning the Right Lessons from Afghanistan
"The example of the Iraqi army — which quickly collapsed in the Islamic State’s 2014 blitz across northern Iraq — ought to have sharpened the concerns about the Afghan…

CIA’s Former Counterterrorism Chief for the Region: Afghanistan, Not An Intelligence Failure — Something Much Worse
"While it’s certainly convenient to depict the shock and miscalculation U.S. officials claim over Afghanistan’s tragic, rapid fall to the Taliban as an intelligence failure,…

Artificial Intelligence in the Intelligence Community: Culture is Critical
The US intelligence community must prioritize addressing its own internal culture in order to engage effectively in the global AI race.

A Flaw in the Attorney General’s Policy Against Seizing Reporters’ Records
The new Guidelines hamstring prosecutors’ ability to counter the worst espionage, writes George Croner.

GAO Faults DHS for Failing to Designate Jan. 6 as a Protected Event in Advance of Attack
DHS erroneously considered activities at the Capitol “routine congressional business” and failed to properly consider threat environment, GAO report says.

Mark Meadows Timeline: The Chief of Staff and Schemes to Overturn 2020 Election
Meadows was directly involved at major intersections of President Donald Trump’s efforts to overturn the 2020 presidential election. A detailed timeline of all the publicly available…

Balancing Reality and Fear: Why An Alarmist Take on Chinese Influence Operations Is Counterproductive
Five specific reasons not to exaggerate the threat of Chinese cyber influence operations.

Encryption Originalism
Encryption originalism views strong encryption as the modern reemergence of Founding Era practice of employing—often unbreakable—ciphers.

Long-Withheld Office of Legal Counsel Records Reveal Agency’s Postwar Influence
The Knight Institute is publishing 14 indexes cataloging the titles of more than a thousand unclassified opinions authored by the OLC between 1945 and 1958.

Artificial Intelligence in the Intelligence Community: Money is Not Enough
Congress wants to spend hundreds of billions of dollars on competitiveness in emerging technology, and AI in particular. But spending it effectively requires reforms to the Intelligence…

The Tucker Carlson Disinformation Show
Tucker Carlson's latest claims provide a textbook example of the disinformation techniques that fuel conspiracy theories – and illustrate what makes them so dangerous.