Guest Author

× Clear Filters
681 Articles
Just Security

MLAT Reform and the 80 Percent Solution

Last week, The Washington Post reported that the US and the UK were in negotiations to permit UK law enforcement agencies to request stored communications like email and chats…
Just Security

Is Money a Legitimate Target?

Last month, the United States targeted a “cash distribution site” where millions of dollars belonging to ISIS had reportedly been stored. The target was considered so valuable…
Just Security

Surveillance Is Still About Power

Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…
Just Security

The Poisoning of Alexander Litvinenko and the Geographical Scope of Human Rights Law

On January 21, a British investigation concluded that Russian President Vladimir Putin “probably” approved the poisoning of former Russian spy Alexander Litvinenko, who died…
Just Security

When the NSA Merges Its Offense and Defense, Encryption Loses

How do you create strong encryption standards when the organization tasked to build them finds itself absorbed into an organization that dedicates huge quantities of resources…
Just Security

The High Standard of Proof in the Encryption Debate

Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there…
Just Security

Questions Congress Should Ask About Section 702

After passing a surveillance reform bill last year, Congress appears poised to turn to examine another controversial surveillance authority — Section 702 of FISA. Using Section…
Just Security

Why We Need to Reevaluate How We Share Intelligence Data With Allies

Last week, Canadians learned that their foreign signals intelligence agency, the Communications Security Establishment (CSE), had improperly shared information with their American,…
Just Security

IBM’s Terrorist-Hunting Software Raises Troubling Questions

Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
Just Security

America’s Muddled Approach to Fighting ISIS

Last month, the Los Angeles Times ran a story that helped highlight one facet of the muddled thinking afflicting the US government’s campaign against ISIS: While the military…
Just Security

It’s All About the Associated Forces

Senate Majority Leader Mitch McConnell quietly joined the battle over authorizing the war against the Islamic State of Iraq and the Levant last week. To the surprise of many given…
Just Security

Is the US Allowed to Control a Syrian Airfield?

Reports have recently emerged that the US is in control of an airfield in Syria. The details are a bit sketchy and it’s hard to determine their veracity. For their part, US officials…
1-12 of 681 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: