Democracy & Rule of Law
Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.
3,152 Articles

“A First Amendment in the Digital Age”—Peter Zenger Lecture
I had the honor of delivering the inaugural Peter Zenger lecture at Columbia Journalism School last week. The lecture is named for a newspaper publisher who was tried for libel…

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part III
In our previous posts, we’ve argued that the NSA is collecting massive amounts of data about US citizens under conditions that have nothing to do with terrorism or national…

Letter to the Editor: Suggestions for Just Security’s Questions to the Presidential Candidates
I like the idea of Just Security‘s listing questions for the presidential nominees. As you ran them again before last night’s debate, and presumably may run them at…

Just Security’s Questions for Clinton and Trump
Given the importance of tonight’s prime-time debate between US presidential candidates Hillary Clinton and Donald Trump, we’re again running our list of vital national…

A Broken Playbook: The NYPD Targeted Muslims in Over 95-Percent of Investigations That Broke Surveillance Rules
The NYPD’s Intelligence Bureau consistently broke court-imposed rules governing investigations involving political activity, according to a recent report by the NYPD Inspector…

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform, Part II
Last week, we argued that the public discussion surrounding two of the government’s most controversial mass surveillance programs – PRISM and Upstream – has not sufficiently…

Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance
The FISA Amendments Act of 2008 (FAA) — the statute the government uses to engage in warrantless surveillance of Americans’ international communications — is scheduled to…

Guide to the Presidential Candidates’ National Security Positions
As we have periodically done since its February launch, we’re updating our guide to the 2016 presidential candidates’ positions on national security matters. Today, we have…

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform
The legal authority behind the controversial PRISM and Upstream surveillance programs used by the NSA to collect large swaths of private communications from leading Internet companies…

Supreme Court Grants Temporary Stay in Backpage Senate Subpoena Litigation
I recently wrote about the Senate civil enforcement action seeking to enforce a subpoena of Backpage.com records issued by the Permanent Subcommittee on Investigations (PSI). Backpage…

The Vulnerability Equities Process Should Consider More than Intelligence Community Needs
Dave Aitel and Matt Tait’s recent post in Lawfare argued that the U.S. government’s procedure for deciding whether to withhold unknown or little-known vulnerabilities in…

A 9/11 Commission Approach to the Russian Hack of the DNC
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…