Technology

New Bill That Would Give Foreign Governments a Fast Track to Access Data

by and

Mar 13th, 2018

DHS’ Constant Vetting Initiative: a Muslim-Ban by Algorithm

by and

Mar 12th, 2018

Cyber Operations and the U.S. Definition of “Armed Attack”

by

Mar 8th, 2018

Why An Encryption Backdoor for Just the “Good Guys” Won’t Work

by and

Mar 2nd, 2018

Symposium Recap: We Need the Cloud Act To Save Us & What Bill Dodge Got Right

by

Feb 22nd, 2018

Can “Fake News” be stopped?

by

Feb 22nd, 2018

Microsoft, Ireland, and the Rest of the World

by

Feb 21st, 2018

The Microsoft Design Decisions That Caused this Mess

by

Feb 21st, 2018

Microsoft (Ireland) and the Federal Rules of Criminal Procedure

by

Feb 20th, 2018

“Extraterritorial” Is Not a Bad Word, Even on the Internet

by

Feb 20th, 2018

A Way Forward on Section 702 Queries

by and

Feb 20th, 2018

United States v. Microsoft: Why the Government Should Win the Statutory Interpretation Argument

by

Feb 19th, 2018

Microsoft Ireland: Extraterritoriality Step Zero

by

Feb 16th, 2018

The Parties in U.S. v. Microsoft Are Misinterpreting the Stored Communications Act’s Warrant Authority

by

Feb 15th, 2018

Introducing Just Security’s Symposium on United States v. Microsoft

by and

Feb 15th, 2018

The Age of Unregulated Social Media Is Over

by

Feb 15th, 2018

Left Out of the Party on Cloud Nine: A Response to Jennifer Daskal

by

Feb 13th, 2018

New Bill Would Moot Microsoft Ireland Case — And Much More!

by

Feb 6th, 2018

Episode 55 of the National Security Law Podcast: #ReleaseThePodcast

by

Jan 24th, 2018

Stop Calling It “Incidental” Collection of Americans’ Emails: The Gov’t’s Renewed Surveillance Powers

by

Jan 22nd, 2018

The UN Security Council, Global Watch Lists, Biometrics, and the Threat to the Rule of Law

by

Jan 17th, 2018

Episode 54 of the National Security Law Podcast: Family Ties or Family Matters?

by

Jan 17th, 2018

Facts on FISA: Correcting the Record on the Section 702 House Floor Debate

by

Jan 17th, 2018

Exclusive: New Evidence of Loopholes in Facebook’s Regulation of Terrorism Content

by

Jan 16th, 2018

A Checklist for Protecting Our Elections from Foreign Meddling

by

Jan 12th, 2018

Deep State Dissonance

by

Jan 11th, 2018

Customs and Border Protection’s New Policy for Searching Devices Offers Thin Protection

by

Jan 9th, 2018

Episode 51 of the National Security Podcast: Temporary, Immediate, and Unmonitored Access to this Podcast

by

Dec 27th, 2017

Warrantless Border Searches: The officer ‘searched through every email and intimate photos of my wife’

by

Dec 22nd, 2017

Episode 50 of the National Security Law Podcast: The Big Chill

by

Dec 20th, 2017

By Weakening Arms Export Controls, Trump’s National Security Strategy Will Create National and Global Insecurity

by

Dec 20th, 2017

Three Questions on the WannaCry Attribution to North Korea

by

Dec 20th, 2017

1 9 10 11 12