National Security Agency (NSA)

× Clear Filters
295 Articles
Just Security

RightsCon, March 3-5, San Francisco

Further to all our coverage of the use and abuse of digital technologies, I commend RightsCon to our readers—a gathering of the Silicon Valley (and beyond) tech community, digital…
Just Security

“Tweet Roll”: Reactions to Glenn Greenwald’s article on “How Covert Agents Infiltrate the Internet”

As reported in this morning’s Daily News Roundup, Glenn Greenwald’s latest piece for The Intercept takes a look at how western intelligence agencies “are attempting…
Just Security

The NSA’s Culture of “Legal Compliance” Still Breaks the Law

Lately the NSA has been on a public relations offensive that has two principal aims. First, the agency is trying to convince the public that a lot of the NSA’s bad press is based…
Just Security

Information Cascades and Intelligence Oversight

Sen. Blumenthal opened a recent surveillance oversight hearing by hammering an important point from the Privacy and Civil Liberties Oversight Board’s thorough report on the…
Just Security

David Miranda detention and questioning was lawful, rules UK High Court

The UK High Court has dismissed a challenge brought by David Miranda, partner of Glenn Greenwald, that he was unlawfully detained and questioned for nine hours at Heathrow airport…
Just Security

A Rejoinder from Jenks and Corn re U.S. SIGINT Based Targeting

There is probably no area of greater consensus between us and Professors Goodman and Jinks (their post) than the recognition that the law of armed conflict should and must be responsive…
Just Security

Military Targeting Based on Cellphone Location

A recent news story by Glenn Greenwald and Jeremy Scahill details the use of NSA signals intelligence (SIGINT) – including cellphone and SIM card data – to locate and kill…
Just Security

Eyes Wide Shut: Scahill and Greenwald’s Flawed Critique of U.S. SIGINT Based Targeting

[Editor’s Note: Stay tuned later today for a post by Ryan Goodman and Derek Jinks responding to the guest post by Chris Jenks and Geoffrey Corn.] In The NSA’s Secret Role in…
Just Security

Eight Questions PCLOB Should Ask About Section 702

Tomorrow, all five members of the Privacy and Civil Liberties Oversight Board (PCLOB) will testify before the Senate Judiciary Committee about their recent report concluding that…
Just Security

Office of the DNI Releases List of Permissible Uses of Data Collected in Bulk

If you’ll recall last month, in conjunction with his January 17th speech on U.S. signals intelligence reform, President Obama issued Presidential Policy Directive/PPD-28…
Just Security

Where’s the “Metadata”?: What Greenwald and Scahill (Don’t) Say about NSA Metadata Collection and Lethal Targeting

There are many, many important revelations about NSA’s involvement in the US drone program in Glenn Greenwald and Jeremy Scahill’s historic debut story for First Look…
Just Security

Two Developments re Section 215: (i) Changes to the Section 215 Program and (ii) Program’s Scope is Currently More Limited than Originally Thought

In his speech last month on the U.S. signals intelligence programs, President Obama “directed the Attorney General to work with the Foreign Intelligence Surveillance Court…
1-12 of 295 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: