Recent Articles

Just Security

Missing Transparency: Is the US Response to Reported Drone Attack on Wedding Party Self-Defeating?

On Thursday, Human Rights Watch (HRW) released a fact-intensive report based on the group’s investigations into a US drone strike that allegedly hit a wedding party in Yemen…
Just Security

News Roundup and Notes: February 20, 2014

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. Surveillance The Wall Street…
Just Security

Information Cascades and Intelligence Oversight

Sen. Blumenthal opened a recent surveillance oversight hearing by hammering an important point from the Privacy and Civil Liberties Oversight Board’s thorough report on the…
Just Security

Update: Changes to Export Control Arrangement Intended to Apply to Surveillance Technology, not Exploits, but Confusion and Ambiguity Remain

Last month, we wrote a post raising the potential that recent changes to the Wassenaar Arrangement could apply to “zero-days” and other computer exploits. As we noted in our…
Just Security

Why Does Microsoft Want a Global Convention on Government Access to Data?

Last month, Brad Smith, the General Counsel of Microsoft, called for an international convention on government access to consumer data (he was at Davos, so presumably he uploaded…
Just Security

Letter to the Editor from former US Air Force Airman and drone sensor operator, Brandon Bryant

[Editor’s note: Brandon Bryant is a former U.S. Air Force Airman, who served as a sensor operator for the Air Force drone program (2005-2011). Following his active duty in the…
Just Security

David Miranda detention and questioning was lawful, rules UK High Court

The UK High Court has dismissed a challenge brought by David Miranda, partner of Glenn Greenwald, that he was unlawfully detained and questioned for nine hours at Heathrow airport…
Just Security

News Roundup and Notes: February 19, 2014

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. Surveillance AT&T has…
Just Security

A Rejoinder from Jenks and Corn re U.S. SIGINT Based Targeting

There is probably no area of greater consensus between us and Professors Goodman and Jinks (their post) than the recognition that the law of armed conflict should and must be responsive…
Just Security

Military Targeting Based on Cellphone Location

A recent news story by Glenn Greenwald and Jeremy Scahill details the use of NSA signals intelligence (SIGINT) – including cellphone and SIM card data – to locate and kill…
Just Security

Eyes Wide Shut: Scahill and Greenwald’s Flawed Critique of U.S. SIGINT Based Targeting

[Editor’s Note: Stay tuned later today for a post by Ryan Goodman and Derek Jinks responding to the guest post by Chris Jenks and Geoffrey Corn.] In The NSA’s Secret Role in…
Just Security

News Roundup and Notes: February 18, 2014

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. Surveillance In an interview…
1-12 of 12,796 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: