Domestic Surveillance

× Clear Filters
291 Articles
Just Security

US Government Makes Slight Concession in Twitter’s Warrant-Canary Suit

The US government last week conceded for the first time that some companies have the right to publish so called “warrant canaries” in a new filing supporting its partial motion…
Just Security

A Terrorist Conspiracy Via Email

On April 3, 2009, Abid Naseer, a 22-year-old Pakistani student, sat in front of his computer in his Manchester, England, apartment and drafted an email to his al-Qaeda handler…
Just Security

Transcript: NSA Director Mike Rogers vs. Yahoo! on Encryption Back Doors

NSA Director Adm. Mike Rogers squared off against top security experts from the tech industry today in a series of exchanges that illustrated the chasm between some leading technology…
Just Security

Washington’s New Drone Sales Policy Could Export US-Style Drone War

This week, the United States released a new policy for the export of US-made drones. The policy conditions any drone sale on a pledge by the foreign buyer government that it will…
Just Security

Guest Post: CVE Efforts Should be Based on Facts, Not Flawed Theories

Ed. note: This guest post was produced as part of the Brennan Center for Justice’s interview series, Rethinking Intelligence. Yesterday, the White House kicked-off a three-day summit…
Just Security

Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans

Last week, the Obama Administration released a report and documents cataloging progress toward signals intelligence (SIGINT) reform goals set a year ago by the President in a document…
Just Security

Surveillance and the Vanishing Right to Know

Editor’s Note: This post offers a preview of the authors’ upcoming article in the Santa Clara Law Review: The Notice Paradox: Secret Surveillance, Criminal Defendants…
Just Security

The Newest Reforms on SIGINT Collection Still Leave Loopholes

Director of National Intelligence James Clapper this morning released a report detailing new rules aimed at reforming the way signals intelligence is collected and stored by certain…
Just Security

Five Important Questions About DEA’s Vehicle Surveillance Program

With each week, we seem to learn about a new government location tracking program. This time, it’s the expanded use of license plate readers. According to the Wall Street Journal, relying…
Just Security

OHCHR Call for Comments on Encryption and Anonymity Online

David Kaye, the UN Special Rapporteur on protection and promotion of the right to freedom of opinion and expression, has issued a call for submission of information related to…
Just Security

The Latest Rules on How Long NSA Can Keep Americans’ Encrypted Data Look Too Familiar

Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question…
Just Security

Decrypting John Boehner on the Capitol Bomb Plotter

An Ohio man was recently charged with plotting to blow up the U.S. Captiol, and House Speaker John Boehner appears to be claiming that the NSA’s controversial bulk telephony…
1-12 of 291 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: