Democracy & Rule of Law
Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.
3,168 Articles
Chris Soghoian on Collaboration Between Lawyers, Technologists, and Policymakers
As faithful readers of our site are hopefully aware, Just Security will be celebrating its second anniversary on Monday with an event dedicated to exploring one of the most important…
Lifting the Gag Order on One NSL is Good, But It’s Just a Start
Earlier this week, the public got a look at that rare occurrence in a national security case: a court lifting a gag on the recipient of a surveillance request. On August 28, Judge…
Counter-Terrorism Committee: Addressing the Role of Women in Countering Terrorism and Violent Extremism
The UN Security Council’s Women, Peace and Security Agenda (WPS) has become the dominant discourse framing women’s engagement in international affairs over the past fifteen…
DOJ’s New Stingray Policy is a Good Start, But It’s Got Problems
Last Thursday afternoon, just as we were all heading out for the Labor Day weekend, the Justice Department released new policy guidance on the use of cell-site simulator technology.…
Two More British Citizens are Dead From a Targeted Killing in Syria
UK Prime Minister David Cameron speaking before Parliament on Sept. 7 revealed that in addition to alleged ISIL hacker, recruiter, and propagandist Junaid Hussain, two other Britons…
The Microsoft Warrant Case: A Response to Orin Kerr
With less than a week before the Second Circuit considers the dispute between Microsoft and the government over emails stored in Ireland (an issue I have blogged about here, here,…
The Difficulty With Metaphors and the Fourth Amendment
The Fourth Amendment to the US Constitution seems straightforward on its face: At its core, it tells us that our “persons, houses, papers, and effects” are to be protected…
Armed Drones and the Influence of Big Business on Police Surveillance Technology
On Wednesday, the Daily Beast reported that the North Dakota state legislature recently passed a bill allowing law enforcement drones to carry less-than-lethal weapons. In theory,…
Beyond the APA: The Role of Psychology Boards and State Courts in Propping up Torture
The image of torture in US popular culture is an intimate one: a government agent and a suspect in a dark cell, usually alone. But the reality of our state-sanctioned torture program…
A Legislative Fix to Inspectors’ General Difficulties Accessing Information?
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
The Dream of Internet Freedom Doesn’t Have to Die
This post is a version of the introduction to the author’s keynote speech, “The Lifecycle of a Revolution” at this year’s Black Hat information security conference. Twenty…
Drones and Contractor Mission Creep
I have written previously about the transparency, oversight, and accountability issues that outsourcing aspects of the U.S. drone program can pose – issues that often get lost…