Constitution

× Clear Filters
688 Articles
Just Security

Transcript: NSA Director Mike Rogers vs. Yahoo! on Encryption Back Doors

NSA Director Adm. Mike Rogers squared off against top security experts from the tech industry today in a series of exchanges that illustrated the chasm between some leading technology…
Just Security

Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans

Last week, the Obama Administration released a report and documents cataloging progress toward signals intelligence (SIGINT) reform goals set a year ago by the President in a document…
Just Security

Surveillance and the Vanishing Right to Know

Editor’s Note: This post offers a preview of the authors’ upcoming article in the Santa Clara Law Review: The Notice Paradox: Secret Surveillance, Criminal Defendants…
Just Security

Homeland Insecurity: Checkpoints, Warrantless Searches and Security Theater

Since June 2013, the American public, press, and policy-makers have been debating the implications of Edward Snowden’s disclosures of mass U.S. government surveillance programs,…
Just Security

Guest Post: Drone Courts–A Response to Professor Vladeck

Editors’ note: In this post, Professors Brand, Guiora, and Barela reply to Steve Vladeck’s December 2 post, “Drone Courts: The Wrong Solution to the Wrong Problem,”…
Just Security

My Agenda as New UN Special Rapporteur for Freedom of Expression

This past June, the UN Human Rights Council appointed me special rapporteur on the protection and promotion of the right to freedom of opinion and expression, effective August…
Just Security

Apple, Boyd, and Going Dark

Apple’s recent announcement that it will encrypt its newest iPhones is again pushing to the fore the question of whether the law should be updated to require companies to have…
Just Security

Rejecting the Bush Comparison: A Response to Goldsmith & Waxman

Jack Goldsmith and Matthew Waxman have written an interesting essay on President Obama’s war powers legacy, boldly titled “Obama, not Bush, is the Master of Unilateral War.”…
Just Security

Constitutional “Cross-Ruffing”: My New Article

About a year ago, I wrote about the Second Circuit’s decision in the Ghailani case, in which, among other things, the Court of Appeals rejected a former Guantánamo detainee’s…
Just Security

FBI is Hurting Apple and Google’s Competitiveness with Crypto Backdoor Demands

Last week, FBI Director James B. Comey dispatched his minions to yell at Apple and Google for architecting their smartphones such that government officials cannot decrypt information…
Just Security

The Posse Comitatus Act, Unlawful Surveillance, and the Exclusionary Rule

Most students of U.S. national security law are familiar with the Posse Comitatus Act (PCA) — an 1878 statute that subjects to criminal punishment anyone who, “except…
Just Security

The Coming Congressional “Authorization” to Use Force Against ISIL?

Many commentators and news outlets are focused on whether the White House will seek, or Congress will pass, authorization for the President to use military force against ISIL.…
1-12 of 688 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: