Democracy & Rule of Law

Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.

× Clear Filters
3,152 Articles
Just Security

A Problematic Pseudo-Category of Surveillance Information and Promising Post-Collection Policy

This week, the Office of the Director of National Intelligence declassified a Foreign Intelligence Surveillance Court of Review (FISCR) opinion that has important broad implications…
Just Security

Trump’s CEO’s Smear Campaign Against Gold Star Father Khizr Khan – Headlines and Excerpts

Stephen Bannon, the new chief executive of Donald Trump’s campaign, ran the online outlet Breitbart News until joining the campaign. Below is a collection of headlines and excerpts…
Just Security

The PPG Visualized, What the US Kill and Capture Bureaucracy Looks Like

This is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead…
Just Security

We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking

With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But…
Just Security

Today’s Important Deadline in the ACLU’s Targeted-Killing Transparency Case

Today, more than three years after President Obama announced that he had issued a classified “Presidential Policy Guidance,” commonly known as the PPG, meant to govern the…
Just Security

Cybersecurity, Elections, and Critical Infrastructure at Home and Abroad

In the last few days, Secretary of Homeland Security Jeh Johnson and Homeland Security Advisor Lisa Monaco have both suggested that in the wake of the DNC hack, the United States…
Just Security

Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill

In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…
Just Security

It’s Time to Come to Terms With Secret Law: Part II

On Wednesday, I summarized the findings of my recent study of alleged secret law in the three branches of the US government and my conclusion that secret law is a limited but important…
Just Security

It’s Time to Come to Terms With Secret Law: Part I

Secret law. The words are chilling. They evoke Kafka, unaccountable government, liberty subordinated to state security – and to some ears, perhaps simply the paranoid rantings…
Just Security

International Justice Day Round-Up III: Salvadoran Amnesty Law, Germany Apologizes to Namibia over Genocide, Corporate Criminality, and Colombia Ceasefire

This is Part III of an international criminal justice round-up covering ten of the top developments in the field this spring and summer. Part I is here and covers the Habré case,…
Just Security

The Microsoft Ireland Case and the Future of Digital Privacy

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

John Brennan on “enhanced interrogation techniques”

At this event today at Brookings, CIA Director John Brennan reiterated what he has said before: — “you cannot establish cause and effect between the [CIA’s]…
1-12 of 3,152 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: