Recent Articles

Just Security

Information Cascades and Intelligence Oversight

Sen. Blumenthal opened a recent surveillance oversight hearing by hammering an important point from the Privacy and Civil Liberties Oversight Board’s thorough report on the…
Just Security

Update: Changes to Export Control Arrangement Intended to Apply to Surveillance Technology, not Exploits, but Confusion and Ambiguity Remain

Last month, we wrote a post raising the potential that recent changes to the Wassenaar Arrangement could apply to “zero-days” and other computer exploits. As we noted in our…
Just Security

Why Does Microsoft Want a Global Convention on Government Access to Data?

Last month, Brad Smith, the General Counsel of Microsoft, called for an international convention on government access to consumer data (he was at Davos, so presumably he uploaded…
Just Security

Letter to the Editor from former US Air Force Airman and drone sensor operator, Brandon Bryant

[Editor’s note: Brandon Bryant is a former U.S. Air Force Airman, who served as a sensor operator for the Air Force drone program (2005-2011). Following his active duty in the…
Just Security

David Miranda detention and questioning was lawful, rules UK High Court

The UK High Court has dismissed a challenge brought by David Miranda, partner of Glenn Greenwald, that he was unlawfully detained and questioned for nine hours at Heathrow airport…
Just Security

News Roundup and Notes: February 19, 2014

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. Surveillance AT&T has…
Just Security

A Rejoinder from Jenks and Corn re U.S. SIGINT Based Targeting

There is probably no area of greater consensus between us and Professors Goodman and Jinks (their post) than the recognition that the law of armed conflict should and must be responsive…
Just Security

Military Targeting Based on Cellphone Location

A recent news story by Glenn Greenwald and Jeremy Scahill details the use of NSA signals intelligence (SIGINT) – including cellphone and SIM card data – to locate and kill…
Just Security

Eyes Wide Shut: Scahill and Greenwald’s Flawed Critique of U.S. SIGINT Based Targeting

[Editor’s Note: Stay tuned later today for a post by Ryan Goodman and Derek Jinks responding to the guest post by Chris Jenks and Geoffrey Corn.] In The NSA’s Secret Role in…
Just Security

News Roundup and Notes: February 18, 2014

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. Surveillance In an interview…
Just Security

Happy Presidents’ Day, Just Security Readers

Happy Presidents’ Day! We will likely have reduced coverage today. In addition to our usual coverage in the coming week, stay tuned on Tuesday for a debate on the use of signals…
Just Security

The al Iraqi Case and the Future of Military Commissions

This morning’s New York Times features a story by Charlie Savage about yesterday’s addition of a conspiracy charge to the pending military commission proceeding at…
1-12 of 12,650 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: