Works matching United States. National Security Agency/Central Security Service
Results: 54
Standing Up to Clapper: How to Increase Transparency and Oversight of FISA Surveillance.
- Published in:
- New England Law Review, 2013, v. 48, n. 1, p. 55
- By:
- Publication type:
- Article
Logical Warrants and the NSA.
- Published in:
- Radical Teacher, 2014, v. 99, p. 83, doi. 10.5195/rt.2014.85
- By:
- Publication type:
- Article
AFTER SNOWDEN: REGULATING TECHNOLOGY-AIDED SURVEILLANCE IN THE DIGITAL AGE.
- Published in:
- Capital University Law Review, 2016, v. 44, n. 4, p. 677
- By:
- Publication type:
- Article
ARMED WITH A KEYBOARD: PRESIDENTIAL DIRECTIVE 20, CYBER-WARFARE, AND THE INTERNATIONAL LAWS OF WAR.
- Published in:
- Capital University Law Review, 2015, v. 43, n. 3, p. 679
- By:
- Publication type:
- Article
Gimme Shelter: International Political Asylum in the Information Age.
- Published in:
- Vanderbilt Journal of Transnational Law, 2014, v. 47, n. 4, p. 1167
- By:
- Publication type:
- Article
An International Legal Framework for Surveillance.
- Published in:
- Virginia Journal of International Law, 2015, v. 55, n. 2, p. 291
- By:
- Publication type:
- Article
Harris Radio Simplifies Interoperable Tactical Communications.
- Published in:
- Microwave Journal, 2009, v. 52, n. 10, p. 43
- Publication type:
- Article
Network of concern.
- Published in:
- Nature, 2006, v. 439, n. 7077, p. 633, doi. 10.1038/439633b
- Publication type:
- Article
France and the NSA: The Tolerable Deception.
- Published in:
- International Policy Digest, 2015, v. 2, n. 6, p. 22
- By:
- Publication type:
- Article
The Right to Privacy in Light of Presidents' Programs: What Project MINARET's Admissions Reveal about Modern Surveillance of Americans.
- Published in:
- Texas Law Review, 2010, v. 88, n. 7, p. 1855
- By:
- Publication type:
- Article
Google, Libraries, and Knowledge Management: From the Navajo to the National Security Agency.
- Published in:
- Journal of Library Administration, 2007, v. 46, n. 1, p. 27, doi. 10.1300/J111v46n01_03
- By:
- Publication type:
- Article
An INS Special Forum: Implications of the Snowden Leaks.
- Published in:
- Intelligence & National Security, 2014, v. 29, n. 6, p. 793, doi. 10.1080/02684527.2014.946242
- By:
- Publication type:
- Article
'US Intelligence and Vietnam': The Official Version(s).
- Published in:
- Intelligence & National Security, 2010, v. 25, n. 5, p. 611, doi. 10.1080/02684527.2010.537119
- By:
- Publication type:
- Article
Operation 'Piet': The Joseph Sidney Petersen Jr. Spy Case, a Dutch 'Mole' Inside the National Security Agency.
- Published in:
- Intelligence & National Security, 2008, v. 23, n. 4, p. 488, doi. 10.1080/02684520802293098
- By:
- Publication type:
- Article
Prometheus embattled: A post-9/11 report card on the National Security Agency.
- Published in:
- Intelligence & National Security, 2006, v. 21, n. 6, p. 980, doi. 10.1080/02684520601046317
- By:
- Publication type:
- Article
All Glory is Fleeting: Sigint and the Fight Against International Terrorism.
- Published in:
- Intelligence & National Security, 2003, v. 18, n. 4, p. 72, doi. 10.1080/02684520310001688880
- By:
- Publication type:
- Article
The National Security Agency and the Cold War.
- Published in:
- Intelligence & National Security, 2001, v. 16, n. 1, p. 27, doi. 10.1080/02684520412331306200a
- By:
- Publication type:
- Article
The Time of Troubles: The US National Security Agency in the Twenty-First Century.
- Published in:
- Intelligence & National Security, 2000, v. 15, n. 3, p. 1, doi. 10.1080/02684520008432615
- By:
- Publication type:
- Article
American Signals Intelligence and the Cuban Missile Crisis.
- Published in:
- Intelligence & National Security, 2000, v. 15, n. 1, p. 169, doi. 10.1080/02684520008432591
- By:
- Publication type:
- Article
SECRECY, STANDING, AND EXECUTIVE ORDER 12,333.
- Published in:
- Southern California Law Review, 2016, v. 89, n. 5, p. 1203
- By:
- Publication type:
- Article
Multi-Institutional Retrospective Analysis Of Carbon Ion Radiotherapy For Prostate Cancer; The Japan Carbon Ion Radiation Oncology Study Group (J-Cros) 1501.
- Published in:
- Journal of Cancer Research & Therapeutics, 2017, v. 13, p. S48
- By:
- Publication type:
- Article
INTERVIEW.
- Published in:
- 1999
- By:
- Publication type:
- Interview
The Role of the European Parliament and the US Congress in Shaping Transatlantic Relations: TTIP, NSA Surveillance, and CIA Renditions.
- Published in:
- Journal of Common Market Studies, 2016, v. 54, n. 4, p. 896, doi. 10.1111/jcms.12345
- By:
- Publication type:
- Article
DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY OF THE NATIONAL SECURITY AGENCY'S WARRANTLESS WIRETAPPING PROGRAM: EXIT THE RULE OF LAW.
- Published in:
- University of Florida Journal of Law & Public Policy, 2006, v. 17, n. 3, p. 429
- By:
- Publication type:
- Article
Square Legal Pegs in Round Cyber Holes: The NSA, Lawfulness, and the Protection of Privacy Rights and Civil Liberties in Cyberspace.
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 139
- By:
- Publication type:
- Article
Snowden and Latin America.
- Published in:
- CounterPunch, 2013, v. 20, n. 8, p. 14
- By:
- Publication type:
- Article
Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age.
- Published in:
- Harvard International Law Journal, 2015, v. 56, n. 1, p. 81
- By:
- Publication type:
- Article
Exposure to interpersonal violence and risk for PTSD, depression, delinquency, and binge drinking among adolescents: Data from the NSA-R.
- Published in:
- Journal of Traumatic Stress, 2012, v. 25, n. 1, p. 33, doi. 10.1002/jts.21672
- By:
- Publication type:
- Article
Safe snooping.
- Published in:
- Bulletin of the Atomic Scientists, 1990, v. 46, n. 8, p. 5
- Publication type:
- Article
Admiral Inman's tidal wave.
- Published in:
- Bulletin of the Atomic Scientists, 1982, v. 38, n. 3, p. 3, doi. 10.1080/00963402.1982.11455705
- By:
- Publication type:
- Article
NSA AND DEA INTELLIGENCE SHARING: WHY IT IS LEGAL AND WHY REUTERS AND THE GOOD WIFE GOT IT WRONG.
- Published in:
- SMU Law Review, 2015, v. 68, n. 2, p. 427
- By:
- Publication type:
- Article
Warrantless Wiretapping, FISA Reform, and the Lessons of Public Liberty: A Comment on Holmes's Jorde Lecture.
- Published in:
- 2009
- By:
- Publication type:
- Essay
TORT LAW VS. PRIVACY.
- Published in:
- Columbia Law Review, 2014, v. 114, n. 4, p. 879
- By:
- Publication type:
- Article
In brief.
- Published in:
- Bulletin of the Atomic Scientists, 2000, v. 56, n. 6, p. 10
- Publication type:
- Article
Desperately Seeking Signals.
- Published in:
- Bulletin of the Atomic Scientists, 2000, v. 56, n. 2, p. 47, doi. 10.1080/00963402.2000.11456943
- By:
- Publication type:
- Article
Spies R Us.
- Published in:
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 3, p. 8
- By:
- Publication type:
- Article
London calling, the NSA listening.
- Published in:
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 2, p. 9
- By:
- Publication type:
- Article
In brief.
- Published in:
- Bulletin of the Atomic Scientists, 1998, v. 54, n. 6, p. 7
- Publication type:
- Article
A little help.
- Published in:
- Bulletin of the Atomic Scientists, 1995, v. 51, n. 6, p. 7
- Publication type:
- Article
The Right to Quantitative Privacy.
- Published in:
- Minnesota Law Review, 2013, v. 98, n. 1, p. 62
- By:
- Publication type:
- Article
THE SURPRISINGLY STRONGER CASE FOR THE LEGALITY OF THE NSA SURVEILLANCE PROGRAM: THE FDR PRECEDENT.
- Published in:
- Stanford Law Review, 2008, v. 60, n. 4, p. 1023
- By:
- Publication type:
- Article
Can the U.S. government legally monitor private communications? If so, given the U.S.'s significant protection of privacy rights, what government cannot?
- Published in:
- Journal of Public Affairs (14723891), 2017, v. 17, n. 3, p. n/a, doi. 10.1002/pa.1659
- By:
- Publication type:
- Article
Shining a Light on Cyber An Interview with John C. "Chris" Inglis Former Deputy Director, National Security Agency Member, Cyberspace Solarium Commission.
- Published in:
- 2020
- Publication type:
- Interview
Safety in Numbers.
- Published in:
- Sciences, 1981, v. 21, n. 6, p. 8
- By:
- Publication type:
- Article
The Contemporary Presidency Constraining Executive Power: George W. Bush and the Constitution.
- Published in:
- Presidential Studies Quarterly, 2008, v. 38, n. 1, p. 123, doi. 10.1111/j.1741-5705.2007.02632.x
- By:
- Publication type:
- Article
An Evolutionary Clustering-Based Optimization to Minimize Total Weighted Completion Time Variance in a Multiple Machine Manufacturing System.
- Published in:
- International Journal of Information Technology & Decision Making, 2015, v. 14, n. 5, p. 971, doi. 10.1142/S0219622015500200
- By:
- Publication type:
- Article
Stopping science: The case of cryptography.
- Published in:
- Health Matrix: Journal of Law-Medicine, 1999, v. 9, n. 2, p. 253
- By:
- Publication type:
- Article
RUBBER-STAMPING: LEGISLATIVE, EXECUTIVE, AND JUDICIAL RESPONSES TO CRITIQUES OF THE FOREIGN INTELLIGENCE SURVEILLANCE COURT ONE YEAR AFTER THE 2013 NSA LEAKS.
- Published in:
- 2014
- By:
- Publication type:
- Opinion
Legal Responses and Countermeasures to National Security Letters.
- Published in:
- Washington University Journal of Law & Policy, 2015, v. 47, p. 217
- By:
- Publication type:
- Article
Searching for Federal Judicial Power: Article III and the Foreign Intelligence Surveillance Court.
- Published in:
- George Washington Law Review, 2017, v. 85, n. 3, p. 800
- By:
- Publication type:
- Article