Recent Articles

Just Security

Recap of Recent Posts at Just Security (January 30–February 5)

I. Encryption & the “Going Dark” Debate John Reed, Moving Beyond the “Going Dark” Frame (Monday, February 1) Julian Sanchez, Cryptopanic and James Comey’s Xanatos…
Just Security

When the NSA Merges Its Offense and Defense, Encryption Loses

How do you create strong encryption standards when the organization tasked to build them finds itself absorbed into an organization that dedicates huge quantities of resources…
Just Security

The High Standard of Proof in the Encryption Debate

Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there…
Just Security

News Roundup and Notes: February 5, 2016

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA The Syrian…
Just Security

The Complexities of the FARC Deal

As I noted at the end of the year, the Government of Colombia and the FARC-EP are continuing peace talks in Havana, Cuba aimed at ending the longest running conflict in the Western…
Just Security

Questions Congress Should Ask About Section 702

After passing a surveillance reform bill last year, Congress appears poised to turn to examine another controversial surveillance authority — Section 702 of FISA. Using Section…

Siege Warfare and the Starvation of Civilians as a Weapon of War and War Crime

“Let me be clear: The use of starvation as a weapon of war is a war crime.” These are the words of UN Secretary General Ban Ki-Moon, uttered in connection with the starvation…
Just Security

News Roundup and Notes: February 4, 2016

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA Syria peace…
Just Security

Why We Need to Reevaluate How We Share Intelligence Data With Allies

Last week, Canadians learned that their foreign signals intelligence agency, the Communications Security Establishment (CSE), had improperly shared information with their American,…
Just Security

IBM’s Terrorist-Hunting Software Raises Troubling Questions

Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
Just Security

News Roundup and Notes: February 3, 2016

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA Syria peace…
Just Security

Cryptopanic and James Comey’s Xanatos Gambit

For the past year or so I’ve been part of a cybersecurity working group at Harvard’s Berkman Center that on Monday released its first public report, Don’t Panic: Making Progress…
1-12 of 12,808 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: