Whistleblowing

× Clear Filters
122 Articles
Just Security

Reforming 702: Does NSA Minimize Cloud Files?

Yesterday, I wrote generally about the problems with section 702 of the FISA Amendments Act (FAA). Today I want to focus on categories of information—including content—that…
Just Security

Does “Espionage Porn” Make Us Stronger?

Although they have somewhat different focuses, one can find much in common in recent posts about the continuing byproducts of the Snowden disclosures (including last Friday’s…
Just Security

Balancing the Public Interest in Disclosures

On Monday, Marc Theissen had an opinion piece in the Washington Post taking The New York Times to task for publishing the details of the NSA’s capabilities of using radio…
Just Security

Which Congressional NSA Reform Proposals Will the Obama Administration Now Support?

A lot of my reactions to yesterday’s surveillance reform speech by President Obama have already been captured by others, including David Cole in his thoughtful take over…
Just Security

Reactions to the New York Times and The Guardian Editorial Boards’ Call for Clemency for Snowden

As Ruchi covered this morning in the news roundup, today the editorial boards of the New York Times and The Guardian called on the Obama Administration to offer Edward Snowden…
Just Security

Data-Mining, Section 215, and Regulating the Government’s Use of Stored Data: The Overlooked, but More Important, Question About NSA Surveillance

[Editor’s Note: Just Security is holding a “mini forum” on the Report by the President’s Review Group on Intelligence and Communications Technologies. Others in the series…
Just Security

Highlights of the Report of the President’s Review Group on Intelligence and Communications Technologies

[Editor’s Note: Just Security is holding a “mini forum” on the Report by the President’s Review Group on Intelligence and Communications Technologies. Others in the series…
Just Security

Latest Snowden Documents Show NSA Tracks Americans’ Cell Location Data

Today’s Washington Post report that the National Security Agency (NSA) is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world should light…
Just Security

NSA SEXINT is the Abuse You’ve All Been Waiting For

In the latest news report based on documents revealed by Edward Snowden, we’ve learned that the NSA creates profiles of porn viewing, online sexual activity and more from its…
Just Security

My New Paper on Standing and Secret Surveillance

Our good friend (and separation-of-powers maven) Peter Shane from (the) Ohio State University’s Moritz College of Law is hosting a “virtual” symposium on NSA…
Just Security

Newsweek’s Wayward Cover Story on Snowden and Chinese Cyber Hacking

Newsweek’s current cover story, “How Edward Snowden Escalated Cyber War with China” by Kurt Eichenwald, is an important read. Eichenwald makes two claims: Snowden’s impact:…
Just Security

Hands Off Encryption! Say New Amici Briefs in Lavabit Case

The Fourth Circuit Court of Appeals is in the process of deciding the first legal challenge to government seizure of the master encryption keys that secure our communications with…
1-12 of 122 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: