Law Enforcement
720 Articles
White House Cybersecurity Bill: Botnets and “Creative Lawyering”
The White House has released its new legislative proposals on cybersecurity information sharing, federal data breach notification, and amendments to cyber-related law enforcement…
US Government Seeks to Deny Twitter’s “Warrant Canary” Challenge
On Friday, the Justice Department asked a federal district court to brush away a lawsuit filed in October by Twitter seeking greater freedom to publicly report on the numbers and…
14 National Security Law “Heroes” in 2014
We spend a lot of time on this blog being critical–of people; of institutions; of judicial decisions; and of policy developments But as 2014 draws to a close, I thought it…
The Sony Hack: Norms and North Korea
In statements on the Sony hack on Friday, both Secretary of State John Kerry and President Obama highlighted the need to develop norms for state behavior in cyberspace. Tying the…
Not to be Forgotten: The Case of Maher Arar
In the midst of our ongoing coverage of the content of, and fall out from, the Senate Select Intelligence Committee Report, and debates about the obligation to devise some form…
It Will Take More Than Body Cameras to Restore Trust in Law Enforcement
Editors’ Note: The following post is the latest installment of our “Monday Reflections,” in which a different Just Security editor examines the big stories from the previous…
The Private Frontline in Cybersecurity Offense and Defense
Two reports released Tuesday highlight the important role private actors are playing in cybersecurity defense. Cybersecurity company FireEye released a report on espionage activities…
Apple, Boyd, and Going Dark
Apple’s recent announcement that it will encrypt its newest iPhones is again pushing to the fore the question of whether the law should be updated to require companies to have…
East Africa Embassy Bombing Defendant Contests Miranda Waiver
In the last scheduled pre-trial hearing for alleged al-Qaeda operative known as Anas al-Libi, the defendant took the witness stand on Wednesday to contest the United States government’s…
Smartphone “Backdoors” and Open Computing
Recently I wrote a longish post over at the Cato Institute’s blog trying to deflate some of the increasing hysteria over the announcement that Apple and Google will be turning…
The Need for Both Legal and Technical Privacy Protections
Last week, Apple and Google came under intense criticism from the law enforcement and national security communities for their decisions to encrypt user data when devices are locked.…
NYPD Uses Discovery Tactics to Deter Civil Rights Claims
The discovery stage of national security litigation rarely attracts much interest, at least where it does not involve an invocation of “state secrets” by the federal government.…