Democracy & Rule of Law

Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.

× Clear Filters
3,150 Articles
Just Security

Apple, Boyd, and Going Dark

Apple’s recent announcement that it will encrypt its newest iPhones is again pushing to the fore the question of whether the law should be updated to require companies to have…
Just Security

Rejecting the Bush Comparison: A Response to Goldsmith & Waxman

Jack Goldsmith and Matthew Waxman have written an interesting essay on President Obama’s war powers legacy, boldly titled “Obama, not Bush, is the Master of Unilateral War.”…
Just Security

State Secrets Might Get a Little More Secret

The state secrets privilege has been the topic of significant academic and judicial focus, particularly in the post-9/11 era in which invocations of the privilege were seen by…
Just Security

Shhh! Last Week Was All About Secrets

Editors’ Note: The following post is the sixth installment of a new feature, “Monday Reflections,” in which a different Just Security editor will take an in-depth look…
Just Security

Twitter’s First Amendment Suit & the Warrant-Canary Question

This week, Twitter lobbed the latest volley in what has been both a fascinating and encouraging repositioning of technology companies vis-à-vis the U.S. government—a pivot that…
Just Security

Constitutional “Cross-Ruffing”: My New Article

About a year ago, I wrote about the Second Circuit’s decision in the Ghailani case, in which, among other things, the Court of Appeals rejected a former Guantánamo detainee’s…
Just Security

FBI is Hurting Apple and Google’s Competitiveness with Crypto Backdoor Demands

Last week, FBI Director James B. Comey dispatched his minions to yell at Apple and Google for architecting their smartphones such that government officials cannot decrypt information…
Just Security

Towards a Global Debate? UN Human Rights Council Takes on Drones

On Monday, the UN Human Rights Council’s (HRC) expert panel on the use of armed drones and international law, expressed clear consensus around the need for greater transparency…
Just Security

The Posse Comitatus Act, Unlawful Surveillance, and the Exclusionary Rule

Most students of U.S. national security law are familiar with the Posse Comitatus Act (PCA) — an 1878 statute that subjects to criminal punishment anyone who, “except…
Just Security

The Erosion of a Secret

Drone Timeline (Click to Enlarge) In connection with an ACLU Freedom of Information Act lawsuit pending before the U.S. District Court for the District of Columbia, the CIA has…
Just Security

NYPD Uses Discovery Tactics to Deter Civil Rights Claims

The discovery stage of national security litigation rarely attracts much interest, at least where it does not involve an invocation of “state secrets” by the federal government.…
Just Security

The Coming Congressional “Authorization” to Use Force Against ISIL?

Many commentators and news outlets are focused on whether the White House will seek, or Congress will pass, authorization for the President to use military force against ISIL.…
1-12 of 3,150 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: