Constitution

× Clear Filters
690 Articles
Just Security

Chris Soghoian on Collaboration Between Lawyers, Technologists, and Policymakers

As faithful readers of our site are hopefully aware, Just Security will be celebrating its second anniversary on Monday with an event dedicated to exploring one of the most important…
Just Security

Self-Censorship in Action: The British Library Rejects Taliban Archive

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

The Microsoft Warrant Case: A Response to Orin Kerr

With less than a week before the Second Circuit considers the dispute between Microsoft and the government over emails stored in Ireland (an issue I have blogged about here, here,…
Just Security

The Difficulty With Metaphors and the Fourth Amendment

The Fourth Amendment to the US Constitution seems straightforward on its face: At its core, it tells us that our “persons, houses, papers, and effects” are to be protected…
Just Security

Jen Daskal’s The Un-Territoriality of Data is Honored

Yesterday, I had the pleasure of attending a luncheon honoring winners for best of the 2014-2015 Call for Papers by the Southeastern Association of Law Schools (SEALS) at its annual…
Just Security

Cross-Border Shootings as a Test Case for the Extraterritorial Fourth Amendment

Ever since the Supreme Court’s 2008 decision in Boumediene v. Bush, courts and commentators alike have wondered about the relationship between the functional approach…
Just Security

Sloppy Cyber Threat Sharing Is Surveillance by Another Name

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Abu Ghraib and the Perversion of the Political Question Doctrine

I’ve written extensively about the important and complex legal questions raised by state-law tort suits against private military contractors, many of which have arisen in…
Just Security

UN’s David Kaye on Encryption, Anonymity, and Human Rights

In his first report as UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye fired a shot across the bow of governments…
Just Security

Why the Latest Ridiculous Guantánamo Amendment is Almost Certainly Unconstitutional

Later today, the House of Representatives appears set to vote on the following amendment to the Department of Defense appropriations bill, sponsored by Missouri Congressman Jason…
Just Security

United States v. Davis – Wrestling With the Third Party Doctrine

In the excitement over the Second Circuit’s ruling on the NSA’s bulk collection program, another very significant appellate decision that was issued last week has been largely…
Just Security

How the Second Circuit’s Decision in Clapper Informs the Section 215 Discussion

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
1-12 of 690 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: