Recent Articles

National Security-Related Congressional Hearings, February 22–26

by

Feb 22nd, 2016

Who Sets the Rules of the Privacy and Security Game?

by

Feb 22nd, 2016

How Should International Law Deal With Doubt in the Era of Drones and Big Data?

by

Feb 22nd, 2016

Iraq and Syria: Prospects for Accountability

by

Feb 22nd, 2016

Recap of Recent Posts at Just Security (February 13–19)

by

Feb 20th, 2016

Building Civil Liberties Protections Into the EU’s Latest Border Discussions

by

Feb 19th, 2016

Justice Scalia, Privacy, and Where We Go From Here

by

Feb 19th, 2016

“More Than a Domestic Mechanism”: Options for Hybrid Justice in Sri Lanka

by

Feb 18th, 2016

FBI’s Push to “Fix a Typo” Would Really Expand Its Surveillance Authority

by

Feb 17th, 2016

D.C. Circuit Quietly Set to Hear Major National Security Appeals

by

Feb 16th, 2016

Law Enforcement Online: Innovative Doesn’t Mean Illegal

by

Feb 16th, 2016

President’s Day at Just Security

by

Feb 15th, 2016

Recap of Recent Posts at Just Security (February 6–12)

by

Feb 13th, 2016

When Did the War With al-Qaeda Start?

by

Feb 12th, 2016

The New US Anti-Torture Law: A Genuine Step Forward

by

Feb 12th, 2016

Security and the Internet of Things

by

Feb 11th, 2016

MLAT Reform and the 80 Percent Solution

by

Feb 11th, 2016

Is Money a Legitimate Target?

by

Feb 10th, 2016

Surveillance Is Still About Power

by

Feb 9th, 2016

The Poisoning of Alexander Litvinenko and the Geographical Scope of Human Rights Law

by

Feb 9th, 2016

National Security-Related Congressional Hearings, February 8–12

by

Feb 8th, 2016

A New UK-US Data Sharing Agreement: A Tremendous Opportunity, If Done Right

by

Feb 8th, 2016

Recap of Recent Posts at Just Security (January 30–February 5)

by

Feb 6th, 2016

When the NSA Merges Its Offense and Defense, Encryption Loses

by

Feb 5th, 2016

The High Standard of Proof in the Encryption Debate

by

Feb 5th, 2016

The Complexities of the FARC Deal

by

Feb 4th, 2016

Questions Congress Should Ask About Section 702

by

Feb 4th, 2016

Siege Warfare and the Starvation of Civilians as a Weapon of War and War Crime

by

Feb 4th, 2016

Why We Need to Reevaluate How We Share Intelligence Data With Allies

by and

Feb 3rd, 2016

IBM’s Terrorist-Hunting Software Raises Troubling Questions

by

Feb 3rd, 2016

Cryptopanic and James Comey’s Xanatos Gambit

by

Feb 2nd, 2016

Moving Beyond the “Going Dark” Frame

by

Feb 1st, 2016

1 211 212 213 214 215 276