Law Enforcement

× Clear Filters
717 Articles
Just Security

A New UK-US Data Sharing Agreement: A Tremendous Opportunity, If Done Right

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

The High Standard of Proof in the Encryption Debate

Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there…
Just Security

Moving Beyond the “Going Dark” Frame

For more than a year now, this site has posted dozens of articles critiquing the US government’s claims that it needs a method of accessing encrypted digital communications…
Just Security

National Security Letters and Leak Investigations

Journalists were reminded again last week of how little legal protection actually exists when the federal government decides to investigate national security leaks. In an ongoing…
Just Security

James Comey’s Default-Encryption Bogeyman

FBI Director James Comey recently told the Senate Judiciary Committee that encryption routinely poses a problem for law enforcement. He stated that encryption has “moved from…
Just Security

Settlement of NYPD Muslim Surveillance Lawsuits: A Platform for Better Oversight

Last week, the City of New York agreed to settle two federal lawsuits challenging the NYPD’s surveillance of American Muslims, promising to reform the rules that govern how the…
Just Security

Content Is Content, No Matter How Small

Recently, Orin Kerr and I had a brief conversation on Twitter regarding the Fourth Amendment and the content/non-content distinction. Specifically, Orin asked those of us who subscribe…
Just Security

A Few Keystrokes Could Solve the Crime. Would You Press Enter?

Image credit: Wikimedia Commons Suppose a laptop were found at the apartment of one of the perpetrators of last year’s Paris attacks. It’s searched by the authorities pursuant…
Just Security

ISIS in the United States: Which Legal Regime Applies?

Consider the following hypothetical: It is 10:00pm in Times Square, New York City. The “city that never sleeps” is bustling with tourists, Broadway shows, street performers,…
Just Security

The FBI Should Stop Undermining Norms Before They Take Root

Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet…
Just Security

Cy Vance’s Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities

Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s…
Just Security

Cross-Border Data Requests: A Response to Greg Nojeim

Editor’s note: This post also appears on Lawfare. Last week on Lawfare, Greg Nojeim responded to — and raised a set of questions about — our proposed framework for dealing…
1-12 of 717 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: