Recent Articles

The Political Support and Divisions Behind the European Parliament Resolution on Drones

by

Feb 28th, 2014

Optic Nerve – A Digital Mugbook & the Questions It Raises

by

Feb 28th, 2014

The United States Cannot be at War With an Ideology

by

Feb 27th, 2014

Chris Sprigman and Barry Friedman on ReplyAll Discussing Chris’ Just Security Post

by

Feb 27th, 2014

European Parliament Passes Resolution on Drones, Targeted Killings, and Fully Autonomous Weapons

by

Feb 27th, 2014

RightsCon, March 3-5, San Francisco

by

Feb 26th, 2014

Bart Gellman’s NSL

by

Feb 26th, 2014

State Practice and the Use of Force: Iran Invokes the “Unwilling or Unable” Test against its Neighbors

by

Feb 26th, 2014

Secrecy, Nonacknowledgement, and Yemen

by

Feb 26th, 2014

“Tweet Roll”: Reactions to Glenn Greenwald’s article on “How Covert Agents Infiltrate the Internet”

by and

Feb 25th, 2014

Italian Court of Cassation Reverses Convictions of Italian Intelligence Agents Involved in Bush-Era Extraordinary Rendition

by

Feb 25th, 2014

Accountability & North Korea in Light of the Commission of Inquiry’s Report

by

Feb 24th, 2014

What to Listen for in Key Defense Hearings this Week

by

Feb 24th, 2014

Lithuanian Prosecutors Open Probe into CIA Black Site

by

Feb 24th, 2014

The NSA’s Culture of “Legal Compliance” Still Breaks the Law

by

Feb 24th, 2014

Miranda: Blame Parliament Before Blaming the Courts

by

Feb 24th, 2014

Recap: A Guide to the Past Week’s Posts on Just Security (February 15-21)

by

Feb 22nd, 2014

Disturbing Findings of the North Korea Commission of Inquiry

by

Feb 21st, 2014

Espionage Porn and Democratic Platitudes: A Response to Rahul Sagar

by

Feb 21st, 2014

Democratic Platitudes

by

Feb 21st, 2014

More Executive-Minded than the Executive

by

Feb 21st, 2014

Al Darbi Pleads Guilty but Questions Remain [UPDATED re AE168]

by

Feb 20th, 2014

Missing Transparency: Is the US Response to Reported Drone Attack on Wedding Party Self-Defeating?

by

Feb 20th, 2014

Information Cascades and Intelligence Oversight

by

Feb 19th, 2014

Update: Changes to Export Control Arrangement Intended to Apply to Surveillance Technology, not Exploits, but Confusion and Ambiguity Remain

by and

Feb 19th, 2014

Why Does Microsoft Want a Global Convention on Government Access to Data?

by

Feb 19th, 2014

Letter to the Editor from former US Air Force Airman and drone sensor operator, Brandon Bryant

by

Feb 19th, 2014

David Miranda detention and questioning was lawful, rules UK High Court

by

Feb 19th, 2014

A Rejoinder from Jenks and Corn re U.S. SIGINT Based Targeting

by and

Feb 18th, 2014

Military Targeting Based on Cellphone Location

by and

Feb 18th, 2014

Eyes Wide Shut: Scahill and Greenwald’s Flawed Critique of U.S. SIGINT Based Targeting

by and

Feb 18th, 2014

Happy Presidents’ Day, Just Security Readers

by

Feb 17th, 2014

1 263 264 265 266 267 279