Law Enforcement
720 Articles
Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance
The FISA Amendments Act of 2008 (FAA) — the statute the government uses to engage in warrantless surveillance of Americans’ international communications — is scheduled to…
A Response to “The Tech”: Continuing the Vulnerability Equities Process Debate
In my recent Just Security piece, I argued that Aitel and Tait’s suggestions in Lawfare to focus the Vulnerability Equities Process (VEP) more narrowly on strategic intelligence…
Supreme Court Grants Temporary Stay in Backpage Senate Subpoena Litigation
I recently wrote about the Senate civil enforcement action seeking to enforce a subpoena of Backpage.com records issued by the Permanent Subcommittee on Investigations (PSI). Backpage…
The Vulnerability Equities Process Should Consider More than Intelligence Community Needs
Dave Aitel and Matt Tait’s recent post in Lawfare argued that the U.S. government’s procedure for deciding whether to withhold unknown or little-known vulnerabilities in…
Foreign Governments, Tech Companies, and Your Data: A Response to Jennifer Daskal and Andrew Woods
In a thoughtful August 1 piece in Just Security and Lawfare, law professors Andrew Woods and Jennifer Daskal urged Congress to embrace a legislative proposal by the US Justice…
A 9/11 Commission Approach to the Russian Hack of the DNC
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
A Problematic Pseudo-Category of Surveillance Information and Promising Post-Collection Policy
This week, the Office of the Director of National Intelligence declassified a Foreign Intelligence Surveillance Court of Review (FISCR) opinion that has important broad implications…
Judicial Enforcement of a Senate Subpoena of Backpage.com
Last week, the DC Circuit temporarily stayed an order enforcing a US Senate subpoena for records from the classified advertising site, Backpage.com, which has come under scrutiny…
We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking
With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But…
Cybersecurity, Elections, and Critical Infrastructure at Home and Abroad
In the last few days, Secretary of Homeland Security Jeh Johnson and Homeland Security Advisor Lisa Monaco have both suggested that in the wake of the DNC hack, the United States…
Guest Post: US Dollars and Kenya’s ‘Disappeared’
Just over a year ago, in May , 2015, Kenyan Border Patrol police arrested Hussein Ali Abdullahi from his shop in Wajir, northeastern Kenya, and took him to Wajir military camp.…
Donald Trump’s Wall, David Rieff’s Long War, and the Dangers of Fear-Mongering
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…