Surveillance
680 Articles

A Broken Playbook: The NYPD Targeted Muslims in Over 95-Percent of Investigations That Broke Surveillance Rules
The NYPD’s Intelligence Bureau consistently broke court-imposed rules governing investigations involving political activity, according to a recent report by the NYPD Inspector…

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part II
Last week, we argued that the public discussion surrounding two of the government’s most controversial mass surveillance programs – PRISM and Upstream – has not sufficiently…

No More Snowdens? Start by Reforming the House Intelligence Committee
Last Thursday, the House Intelligence Committee (HPSCI) issued a report condemning Edward Snowden and its members unanimously urged President Obama to decline public calls to grant…

Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance
The FISA Amendments Act of 2008 (FAA) — the statute the government uses to engage in warrantless surveillance of Americans’ international communications — is scheduled to…

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform
The legal authority behind the controversial PRISM and Upstream surveillance programs used by the NSA to collect large swaths of private communications from leading Internet companies…

A Response to “The Tech”: Continuing the Vulnerability Equities Process Debate
In my recent Just Security piece, I argued that Aitel and Tait’s suggestions in Lawfare to focus the Vulnerability Equities Process (VEP) more narrowly on strategic intelligence…

Supreme Court Grants Temporary Stay in Backpage Senate Subpoena Litigation
I recently wrote about the Senate civil enforcement action seeking to enforce a subpoena of Backpage.com records issued by the Permanent Subcommittee on Investigations (PSI). Backpage…

The Vulnerability Equities Process Should Consider More than Intelligence Community Needs
Dave Aitel and Matt Tait’s recent post in Lawfare argued that the U.S. government’s procedure for deciding whether to withhold unknown or little-known vulnerabilities in…

Foreign Governments, Tech Companies, and Your Data: A Response to Jennifer Daskal and Andrew Woods
In a thoughtful August 1 piece in Just Security and Lawfare, law professors Andrew Woods and Jennifer Daskal urged Congress to embrace a legislative proposal by the US Justice…

We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking
With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But…

France’s Emergency Powers: The New Normal
France’s latest renewal of its emergency law has made few headlines abroad—except perhaps in Turkey, where President Recep Tayyip Erdogan, fresh from passing his own sweeping…

Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill
In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…