<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Just Security</provider_name><provider_url>https://www.justsecurity.org</provider_url><title>Recap of the Week&#x2019;s Posts on Just Security (Nov 16-22) - Just Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="3f1xvOWT3d"&gt;&lt;a href="https://www.justsecurity.org/3670/recap-weeks-posts-security-nov-16-22/"&gt;Recap of the Week&#x2019;s Posts on Just Security (Nov 16-22)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.justsecurity.org/3670/recap-weeks-posts-security-nov-16-22/embed/#?secret=3f1xvOWT3d" width="600" height="338" title="&#x201C;Recap of the Week&#x2019;s Posts on Just Security (Nov 16-22)&#x201D; &#x2014; Just Security" data-secret="3f1xvOWT3d" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>I. Surveillance and Data Collection Marty Lederman, Hearing in Another Surveillance Challenge Today (Monday, Nov. 18) Marty Lederman, Supreme Court Denies EPIC Petition for Mandamus on the Telephony Metadata Program (Monday, Nov. 18) Marty Lederman, Additional documents on telephony records collection (and much more) declassified (Monday, Nov. 18) Steve Vladeck, Early Thoughts on the New [&hellip;]</description><thumbnail_url>https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2017/12/blue-logo.png?fit=178%2C60&amp;ssl=1</thumbnail_url><thumbnail_width>178</thumbnail_width><thumbnail_height>60</thumbnail_height></oembed>
