Recent Articles

Information Cascades and Intelligence Oversight
Sen. Blumenthal opened a recent surveillance oversight hearing by hammering an important point from the Privacy and Civil Liberties Oversight Board’s thorough report on the…

Update: Changes to Export Control Arrangement Intended to Apply to Surveillance Technology, not Exploits, but Confusion and Ambiguity Remain
Last month, we wrote a post raising the potential that recent changes to the Wassenaar Arrangement could apply to “zero-days” and other computer exploits. As we noted in our…

Why Does Microsoft Want a Global Convention on Government Access to Data?
Last month, Brad Smith, the General Counsel of Microsoft, called for an international convention on government access to consumer data (he was at Davos, so presumably he uploaded…

Letter to the Editor from former US Air Force Airman and drone sensor operator, Brandon Bryant
[Editor’s note: Brandon Bryant is a former U.S. Air Force Airman, who served as a sensor operator for the Air Force drone program (2005-2011). Following his active duty in the…

David Miranda detention and questioning was lawful, rules UK High Court
The UK High Court has dismissed a challenge brought by David Miranda, partner of Glenn Greenwald, that he was unlawfully detained and questioned for nine hours at Heathrow airport…

News Roundup and Notes: February 19, 2014
Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. Surveillance AT&T has…

A Rejoinder from Jenks and Corn re U.S. SIGINT Based Targeting
There is probably no area of greater consensus between us and Professors Goodman and Jinks (their post) than the recognition that the law of armed conflict should and must be responsive…

Military Targeting Based on Cellphone Location
A recent news story by Glenn Greenwald and Jeremy Scahill details the use of NSA signals intelligence (SIGINT) – including cellphone and SIM card data – to locate and kill…

Eyes Wide Shut: Scahill and Greenwald’s Flawed Critique of U.S. SIGINT Based Targeting
[Editor’s Note: Stay tuned later today for a post by Ryan Goodman and Derek Jinks responding to the guest post by Chris Jenks and Geoffrey Corn.] In The NSA’s Secret Role in…

News Roundup and Notes: February 18, 2014
Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. Surveillance In an interview…

Happy Presidents’ Day, Just Security Readers
Happy Presidents’ Day! We will likely have reduced coverage today. In addition to our usual coverage in the coming week, stay tuned on Tuesday for a debate on the use of signals…

The al Iraqi Case and the Future of Military Commissions
This morning’s New York Times features a story by Charlie Savage about yesterday’s addition of a conspiracy charge to the pending military commission proceeding at…