4th Amendment

× Clear Filters
176 Articles
Just Security

The Vulnerability Equities Process Should Consider More than Intelligence Community Needs

Dave Aitel and Matt Tait’s recent post in Lawfare argued that the U.S. government’s procedure for deciding whether to withhold unknown or little-known vulnerabilities in…
Just Security

A Problematic Pseudo-Category of Surveillance Information and Promising Post-Collection Policy

This week, the Office of the Director of National Intelligence declassified a Foreign Intelligence Surveillance Court of Review (FISCR) opinion that has important broad implications…
Just Security

We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking

With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But…
Just Security

Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill

In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…
Just Security

It’s Time to Come to Terms With Secret Law: Part II

On Wednesday, I summarized the findings of my recent study of alleged secret law in the three branches of the US government and my conclusion that secret law is a limited but important…
Just Security

It’s Time to Come to Terms With Secret Law: Part I

Secret law. The words are chilling. They evoke Kafka, unaccountable government, liberty subordinated to state security – and to some ears, perhaps simply the paranoid rantings…
Just Security

The Microsoft Ireland Case and the Future of Digital Privacy

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Letter to the Editor: Chairman Medine’s Dedicated Service to the PCLOB Was a Testament to Bipartisanship

David Medine left the Privacy and Civil Liberties Oversight Board on July 1, 2016, after three years of dedicated service and leadership as the board’s Chairman. As the board’s…
Just Security

With Remote Hacking, the Government’s Particularity Problem Isn’t Going Away

Electronic surveillance succeeds because it is secret. When the government seeks to record “what is whispered in the closet,” in the words of Justice Brandeis, it must use…
Just Security

The 702 Reform Debate Is Just Heating Up

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

The FBI’s Warrantless Surveillance Back Door Just Opened a Little Wider

On Tuesday, the Office of the Director of National Intelligence (ODNI) released a redacted version of an opinion by Judge Thomas F. Hogan of the Foreign Intelligence Surveillance…
Just Security

A New Lawsuit from Microsoft: No More Gag Orders!

Microsoft is once again making headlines via litigation over government’s use of the Stored Communications Act. For the past two years, it was Microsoft’s lawsuit challenging…
1-12 of 176 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: