-
Editor's Note: below you'll find the third in a series of posts by David Kris on surveillance reform.
-
Editor's Note: this is the second in a series of four posts by David Kris, on large-scale surveillance reform.
-
Editor's Note: This is the first in a series of four posts, in which David S. Kris discusses the possibility of wide-ranging reform to U.S. surveillance law.
-
Carrie Cordero, Georgetown’s Director of National Security Studies and a former Justice Department official, writes in with these thoughts on the AP subpoenas controversy and background law:
In light ...
-
It's been a rough week for the Obama Administration. In addition to outrage over IRS targeting of conservative groups and continued conspiratorial rumblings about the Administration's response to the Ben...
-
So we learn from this Associated Press story. It hints that the records' acquisition may stem from a DOJ inquiry into the disclosure, last year, of classified material to the AP---regarding the CIA's di...
-
The New America Foundation has released a fact sheet listing the identities of Guantanamo Bay detainees who are "confirmed to be or suspected of engaging in militant activities against either U.S. or non...
-
From Harold Koh’s speech to the Oxford Union the other day:
Suppose we are back at Sept 18, 2001, and Congress has just passed the AUMF against Al Qaeda. Suppose the President –let’s assume it for the sa...
-
Big news out of the House Armed Services Committee: Representative Mac Thornberry (a graduate of the University of Texas School of Law, I proudly note) is going to introduce a bill enhancing oversight of...
-
Curtis Bradley and I have a casebook on foreign relations law that includes a heavy dose of national security law (including chapters on covert action and targeted killing) that might be of interest to L...
-
Earlier today, former State Department Legal Adviser Harold Koh gave a talk at the Oxford Union, entitled "How to End the Forever War?" His remarks begin as follows:
Thank you, Mr. President and Members...
-
As Paul noted, a new Pentagon Report to Congress states:
In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some o...