-
This afternoon, the American Bar Association's Standing Committee on Law and National Security will present a panel discussion entitled "NSA Surveillance Leaks: Facts and Fiction."
The event will be hos...
-
Philip Bobbitt (Columbia Law School, and the author of, among many other things, Terror and Consent) writes in:
Three thoughts on the Snowden matter.
First, Snowden's strongest point: how can the govern...
-
Earlier, I posted my read on the leaked NSA targeting and minimization procedures. Unsurprisingly, the ACLU has a rather different take.
-
Edward Snowden is on the move, in Moscow and reportedly heading towards Ecuador, but I will leave coverage of that to the daily press.
-
Th Washington Post and New York Times report.The three-count criminal complaint---alleging theft of government property, unauthorized communication of national defense information, and willful communicat...
-
As the Supreme Court's October 2012 Term enters its climactic closing week, I've been thinking a lot about the most important national security decision of the Term--the 5-4 February 26 decision in <
-
The following is a guest post by Susan Landau, author of Surveillance or Security? The Risks Posed by New Wiretapping Technologies.
-
There is a subtle connection between the unfolding NSA metadata controversy and the controversy that has long plagued the administration's position on drone strikes, involving the impact of transparency ...
-
The administration issued this statement yesterday on NSA collection under Sections 702 and 215. The entire statement---which describes controls on the programs, their broad parameters, and their value i...
-
The Washington Post this morning has another big NSA story, this one historical in nature. I'm still digesting it, so for now, I'll just flag key aspects of it.
-
Senator Rand Paul has said he is "reserving judgment" about Edward Snowden, but nevertheless characterized Snowden's conduct as "civil disobedience." Is that right?
From Socrates through Thoreau, Gandh...
-
Last week (which seems almost an age ago) when the NSA telephone call meta-data portion of the NSA disclosures first broke, Ben wondered about how an application could be written that would satisfy Secti...