Surveillance

× Clear Filters
680 Articles
Just Security

A Broken Playbook: The NYPD Targeted Muslims in Over 95-Percent of Investigations That Broke Surveillance Rules

The NYPD’s Intelligence Bureau consistently broke court-imposed rules governing investigations involving political activity, according to a recent report by the NYPD Inspector…
Just Security

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part II

Last week, we argued that the public discussion surrounding two of the government’s most controversial mass surveillance programs – PRISM and Upstream – has not sufficiently…
Just Security

No More Snowdens? Start by Reforming the House Intelligence Committee

Last Thursday, the House Intelligence Committee (HPSCI) issued a report condemning Edward Snowden and its members unanimously urged President Obama to decline public calls to grant…
Just Security

Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance

The FISA Amendments Act of 2008 (FAA) — the statute the government uses to engage in warrantless surveillance of Americans’ international communications — is scheduled to…
Just Security

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform

The legal authority behind the controversial PRISM and Upstream surveillance programs used by the NSA to collect large swaths of private communications from leading Internet companies…
Just Security

A Response to “The Tech”: Continuing the Vulnerability Equities Process Debate

In my recent Just Security piece, I argued that Aitel and Tait’s suggestions in Lawfare to focus the Vulnerability Equities Process (VEP) more narrowly on strategic intelligence…
Just Security

Supreme Court Grants Temporary Stay in Backpage Senate Subpoena Litigation

I recently wrote about the Senate civil enforcement action seeking to enforce a subpoena of Backpage.com records issued by the Permanent Subcommittee on Investigations (PSI). Backpage…
Just Security

The Vulnerability Equities Process Should Consider More than Intelligence Community Needs

Dave Aitel and Matt Tait’s recent post in Lawfare argued that the U.S. government’s procedure for deciding whether to withhold unknown or little-known vulnerabilities in…
Just Security

Foreign Governments, Tech Companies, and Your Data: A Response to Jennifer Daskal and Andrew Woods

In a thoughtful August 1 piece in Just Security and Lawfare, law professors Andrew Woods and Jennifer Daskal urged Congress to embrace a legislative proposal by the US Justice…
Just Security

We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking

With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But…
Just Security

France’s Emergency Powers: The New Normal

France’s latest renewal of its emergency law has made few headlines abroad—except perhaps in Turkey, where President Recep Tayyip Erdogan, fresh from passing his own sweeping…
Just Security

Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill

In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…
1-12 of 680 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: