The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of Smith v. Maryland, the privacy invasions resulting from the universal use of pen regist...
Imagine the government is constantly monitoring you — keeping track of every person you call or emai...
In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, t...
The Supreme Court\u27s Fourth Amendment jurisprudence is often critiqued, particularly the Court\u27...
The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s int...
Due to the unauthorized leaks of classified information, we have come to learn that the National Sec...
In June 2013, a National Security Agency (NSA) contractor, Edward Snowden, leaked classified documen...
Each day as we add cell phone apps, adopt trending tweets, or ask Siri for assistance, our informati...
October 21, 2015 Case Western Reserve University School of Law Arthur W. Fiske Lecture Series Instit...
Edward Snowden became a household name on June 5, 2013, when he leaked highly classified documents r...
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the el...
This Article outlines a dynamic conception of national security surveillance that justifies programs...
This report focuses on two main National Security Agency (NSA) collection activities approved by the...
Protecting associational freedom is a core, independent yet unappreciated part of the Fourth Amendme...
In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, t...
This report focuses on two main National Security Agency (NSA) collection activities approved by the...
Imagine the government is constantly monitoring you — keeping track of every person you call or emai...
In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, t...
The Supreme Court\u27s Fourth Amendment jurisprudence is often critiqued, particularly the Court\u27...
The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s int...
Due to the unauthorized leaks of classified information, we have come to learn that the National Sec...
In June 2013, a National Security Agency (NSA) contractor, Edward Snowden, leaked classified documen...
Each day as we add cell phone apps, adopt trending tweets, or ask Siri for assistance, our informati...
October 21, 2015 Case Western Reserve University School of Law Arthur W. Fiske Lecture Series Instit...
Edward Snowden became a household name on June 5, 2013, when he leaked highly classified documents r...
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the el...
This Article outlines a dynamic conception of national security surveillance that justifies programs...
This report focuses on two main National Security Agency (NSA) collection activities approved by the...
Protecting associational freedom is a core, independent yet unappreciated part of the Fourth Amendme...
In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, t...
This report focuses on two main National Security Agency (NSA) collection activities approved by the...
Imagine the government is constantly monitoring you — keeping track of every person you call or emai...
In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, t...
The Supreme Court\u27s Fourth Amendment jurisprudence is often critiqued, particularly the Court\u27...