Surveillance

The Ninth Circuit’s Constitutional Detour in Mohamud

by

Dec 8th, 2016

New Counterterrorism Program in Los Angeles: Suspicious Thought Reporting?

by

Dec 1st, 2016

The Investigatory Powers Act: The Official Entrenchment of Far-Reaching Surveillance Powers

by

Nov 30th, 2016

Investigating Surveillance Around Standing Rock

by and

Nov 16th, 2016

New UN Report Highlights Freedom of Expression Violations Across the Globe

by

Oct 21st, 2016

Hot off the Presses: DOJ Rehearing Petition in the Microsoft Ireland Case (Full Text)

by

Oct 13th, 2016

“A First Amendment in the Digital Age”—Peter Zenger Lecture

by

Oct 11th, 2016

Are Companies Bulk-Scanning E-mails for Spy Agencies?

by

Oct 5th, 2016

The UK Snooper’s Charter and the Anderson Report on Bulk Powers

by

Oct 4th, 2016

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part III

by and

Sep 29th, 2016

Just Security’s Questions for Clinton and Trump

by

Sep 26th, 2016

A Broken Playbook: The NYPD Targeted Muslims in Over 95-Percent of Investigations That Broke Surveillance Rules

by

Sep 23rd, 2016

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part II

by and

Sep 22nd, 2016

No More Snowdens? Start by Reforming the House Intelligence Committee

by

Sep 21st, 2016

Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance

by and

Sep 19th, 2016

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform

by and

Sep 15th, 2016

A Response to “The Tech”: Continuing the Vulnerability Equities Process Debate

by

Sep 13th, 2016

The Vulnerability Equities Process Should Consider More than Intelligence Community Needs

by

Sep 2nd, 2016

Foreign Governments, Tech Companies, and Your Data: A Response to Jennifer Daskal and Andrew Woods

by and

Aug 30th, 2016

A Problematic Pseudo-Category of Surveillance Information and Promising Post-Collection Policy

by

Aug 25th, 2016

We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking

by and

Aug 12th, 2016

France’s Emergency Powers: The New Normal

by

Aug 2nd, 2016

Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill

by

Jul 26th, 2016

Donald Trump’s Wall, David Rieff’s Long War, and the Dangers of Fear-Mongering

by

Jul 25th, 2016

It’s Time to Come to Terms With Secret Law: Part II

by

Jul 22nd, 2016

Theresa May’s Record on Surveillance, Human Rights, and Counterterrorism

by

Jul 21st, 2016

It’s Time to Come to Terms With Secret Law: Part I

by

Jul 20th, 2016

The Microsoft Ireland Case and the Future of Digital Privacy

by

Jul 18th, 2016

Letter to the Editor: Chairman Medine’s Dedicated Service to the PCLOB Was a Testament to Bipartisanship

by

Jul 12th, 2016

Visions and Revisions: Karen Greenberg on the Making of the Modern Security State

by

Jul 12th, 2016

Whose World Is This?: US and UK Government Hacking

by

Jul 7th, 2016

The Encryption Debate: All Quiet on the Western Front?

by

Jul 6th, 2016

1 7 8 9 10 11 15