Democracy & Rule of Law

Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.

× Clear Filters
3,168 Articles
Just Security

French Surveillance Law Compared to US Surveillance Law

Last Thursday, France’s constitutional court—le Conseil constitutionnel—issued a ruling upholding most of that country’s controversial new surveillance law, enacted in…
Just Security

Jen Daskal’s The Un-Territoriality of Data is Honored

Yesterday, I had the pleasure of attending a luncheon honoring winners for best of the 2014-2015 Call for Papers by the Southeastern Association of Law Schools (SEALS) at its annual…
Just Security

Legislative Cyber Threats: CISA’s Not The Only One

If anyone in the United States Senate had any doubts that the proposed Cyber Information Sharing Act (CISA) was universally hated by a range of civil society groups, a literal…
Just Security

Skeptical of Guantánamo Diary? Question the US Government Instead

It is sort of a cardinal rule for writers not to respond to negative reviews, and I can easily imagine that Mohamedou Ould Slahi would let the new review of his Guantánamo Diary…
Just Security

The Declining Half-Life of Secrets

Image credit: US Government via Wikimedia Commons The following post is a preview of a new paper from New America’s Cybersecurity Initiative, where the author is a fellow.…
Just Security

CIA and OLC Must Release More “Secret” Documents on Aulaqi Drone Strike

On Thursday, a federal district court in New York issued its latest ruling in the ACLU’s long-running Freedom of Information Act (FOIA) litigation seeking the legal and factual…
Just Security

Cross-Border Shootings as a Test Case for the Extraterritorial Fourth Amendment

Ever since the Supreme Court’s 2008 decision in Boumediene v. Bush, courts and commentators alike have wondered about the relationship between the functional approach…
Just Security

It’s Time to End the “Debate” on Encryption Backdoors

Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct…
Just Security

10 Questions about the UK Spying on Amnesty International

Yesterday, the UK’s Investigatory Powers Tribunal informed Amnesty International that British intelligence agency GCHQ had spied on the human rights organization by intercepting…
Just Security

Video and Highlights From a Conversation on Countering Violent Extremism

Just Security and the Project for the Study of the 21st Century (PS21) recently hosted an extremely interesting discussion between ex senior UN counter terrorism official Richard…
Just Security

There’s No Reason to Hide the Amount of Secret Law

Last week, President Obama announced a new policy that would allow private parties to pay ransoms to hostage takers. The policy was established through an executive order and an…
Just Security

Sloppy Cyber Threat Sharing Is Surveillance by Another Name

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
1-12 of 3,168 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: