Show sidebar

Tag Archive: Metadata

Just Security Event: Surveillance and the Trump Administration

Join Just Security for a fireside chat on U.S. surveillance and a celebration of Jennifer Granick‘s new book, American Spies: Modern Surveillance, Why You Should Care, And What to Do About It. Opening remarks by Senator Ron Wyden, followed by a discussion between Granick and Pulitzer Prize-winning New York Times Washington Correspondent Charlie Savage on U.S.…   continue »

Just Security’s Questions for Clinton and Trump

Given the importance of tonight’s prime-time debate between US presidential candidates Hillary Clinton and Donald Trump, we’re again running our list of vital national security questions we want to see both candidates answer. The list below was originally compiled by a group of Just Security’s editors and contributors ahead the Commander-in-Chief Forum that took place earlier this month.…   continue »

A Problematic Pseudo-Category of Surveillance Information and Promising Post-Collection Policy

This week, the Office of the Director of National Intelligence declassified a Foreign Intelligence Surveillance Court of Review (FISCR) opinion that has important broad implications for privacy and warrantless surveillance.

The opinion, issued on April 14 and released pursuant to the USA FREEDOM Act’s disclosure requirements, deals with government collection of the numbers one dials into a phone during a call, such as a credit card number or passcode (called post-cut-through digits), that’s done under the auspices of authorized Pen Register/Trap and Trace (Pen/Trap) surveillance.…   continue »

The PPG Visualized, What the US Kill and Capture Bureaucracy Looks Like

This is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead to key developments on the horizon.

On August 5, under legal pressure from the ACLU, the US government released its guidelines for overseas kill and capture operations against terrorist targets located outside of active American war zones.…   continue »

It’s Time to Come to Terms With Secret Law: Part I

Secret law. The words are chilling. They evoke Kafka, unaccountable government, liberty subordinated to state security – and to some ears, perhaps simply the paranoid rantings of tinfoil hat wearers. But the claim that the US government is creating secret law has become increasingly common and credible, levied by scholars, secrecy critics, courts, and by lawmakers and government officials of both parties.…   continue »

The Microsoft Ireland Case and the Future of Digital Privacy

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead to key developments on the horizon.

Two big legal developments last week—a court opinion and a legislative proposal—mean the pressure is on to address the question of when law enforcement can seize personal information stored in other countries, known as cross-border data acquisition.…   continue »