Constitution
688 Articles
Transcript: NSA Director Mike Rogers vs. Yahoo! on Encryption Back Doors
NSA Director Adm. Mike Rogers squared off against top security experts from the tech industry today in a series of exchanges that illustrated the chasm between some leading technology…
Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans
Last week, the Obama Administration released a report and documents cataloging progress toward signals intelligence (SIGINT) reform goals set a year ago by the President in a document…
Surveillance and the Vanishing Right to Know
Editor’s Note: This post offers a preview of the authors’ upcoming article in the Santa Clara Law Review: The Notice Paradox: Secret Surveillance, Criminal Defendants…
Homeland Insecurity: Checkpoints, Warrantless Searches and Security Theater
Since June 2013, the American public, press, and policy-makers have been debating the implications of Edward Snowden’s disclosures of mass U.S. government surveillance programs,…
Guest Post: Drone Courts–A Response to Professor Vladeck
Editors’ note: In this post, Professors Brand, Guiora, and Barela reply to Steve Vladeck’s December 2 post, “Drone Courts: The Wrong Solution to the Wrong Problem,”…
My Agenda as New UN Special Rapporteur for Freedom of Expression
This past June, the UN Human Rights Council appointed me special rapporteur on the protection and promotion of the right to freedom of opinion and expression, effective August…
Apple, Boyd, and Going Dark
Apple’s recent announcement that it will encrypt its newest iPhones is again pushing to the fore the question of whether the law should be updated to require companies to have…
Rejecting the Bush Comparison: A Response to Goldsmith & Waxman
Jack Goldsmith and Matthew Waxman have written an interesting essay on President Obama’s war powers legacy, boldly titled “Obama, not Bush, is the Master of Unilateral War.”…
Constitutional “Cross-Ruffing”: My New Article
About a year ago, I wrote about the Second Circuit’s decision in the Ghailani case, in which, among other things, the Court of Appeals rejected a former Guantánamo detainee’s…
FBI is Hurting Apple and Google’s Competitiveness with Crypto Backdoor Demands
Last week, FBI Director James B. Comey dispatched his minions to yell at Apple and Google for architecting their smartphones such that government officials cannot decrypt information…
The Posse Comitatus Act, Unlawful Surveillance, and the Exclusionary Rule
Most students of U.S. national security law are familiar with the Posse Comitatus Act (PCA) — an 1878 statute that subjects to criminal punishment anyone who, “except…
The Coming Congressional “Authorization” to Use Force Against ISIL?
Many commentators and news outlets are focused on whether the White House will seek, or Congress will pass, authorization for the President to use military force against ISIL.…