Recent Articles
Recap of Recent Posts at Just Security (January 30–February 5)
I. Encryption & the “Going Dark” Debate John Reed, Moving Beyond the “Going Dark” Frame (Monday, February 1) Julian Sanchez, Cryptopanic and James Comey’s Xanatos…
When the NSA Merges Its Offense and Defense, Encryption Loses
How do you create strong encryption standards when the organization tasked to build them finds itself absorbed into an organization that dedicates huge quantities of resources…
The High Standard of Proof in the Encryption Debate
Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there…
News Roundup and Notes: February 5, 2016
Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA The Syrian…
The Complexities of the FARC Deal
As I noted at the end of the year, the Government of Colombia and the FARC-EP are continuing peace talks in Havana, Cuba aimed at ending the longest running conflict in the Western…
Questions Congress Should Ask About Section 702
After passing a surveillance reform bill last year, Congress appears poised to turn to examine another controversial surveillance authority — Section 702 of FISA. Using Section…

Siege Warfare and the Starvation of Civilians as a Weapon of War and War Crime
“Let me be clear: The use of starvation as a weapon of war is a war crime.” These are the words of UN Secretary General Ban Ki-Moon, uttered in connection with the starvation…
News Roundup and Notes: February 4, 2016
Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA Syria peace…
Why We Need to Reevaluate How We Share Intelligence Data With Allies
Last week, Canadians learned that their foreign signals intelligence agency, the Communications Security Establishment (CSE), had improperly shared information with their American,…
IBM’s Terrorist-Hunting Software Raises Troubling Questions
Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
News Roundup and Notes: February 3, 2016
Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news. IRAQ and SYRIA Syria peace…
Cryptopanic and James Comey’s Xanatos Gambit
For the past year or so I’ve been part of a cybersecurity working group at Harvard’s Berkman Center that on Monday released its first public report, Don’t Panic: Making Progress…