Democracy & Rule of Law
Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.
3,168 Articles
Letter to the Editor from Gabor Rona, Airstrikes in Yemen and Government Transparency
Thanks Ryan and Sarah for an excellent analysis of the NY Times article on the recent military activity in Yemen. In noting that the article is imprecise in its reference to “alleged…
Court Decision Supports Broader Disclosures on US Drone War
The Second Circuit Court of Appeals’ decision yesterday that the Obama administration had waived its right to refuse to turn over legal memos justifying the killing of a U.S.…
The Second Circuit and the Vices of Selective Disclosure
I’ve now had a full day to digest yesterday’s lengthy decision by the Second Circuit in New York Times v. Department of Justice, which, among other things, orders…
Searchable Database of NSA Documents
Some Just Security readers will be interested to know that the ACLU has just launched a text-searchable database of NSA documents released since June of 2013. The database is here.
Representatives Schiff and Jones Introduce Bill to Increase Transparency in U.S. Drone Program
Today, Representatives Adam Schiff (D-CA) and Walter Jones (R-NC) introduced new legislation aimed to bring greater transparency to the U.S. drone program. The Targeted Lethal…
Military Courts and Article III
For some time, I’ve been working on the larger implications of the jurisprudence arising from the Guantánamo military commissions and the Court of Appeals for the Armed…
DOJ Pushes to Expand Hacking Abilities Against Cyber-Criminals
The Wall Street Journal reports that the Department of Justice is seeking increased authority to remotely search not only computers but also cloud based services to which those…
An End to Dragnet Surveillance?
The New York Times report that President Obama will call for an end to the bulk collection of American’s telephone metadata is yet further vindication for Edward Snowden in particular,…
The So-Called Huawei Scandal and the Snowden Operation
We should spy on China. And Russia. And Iran. And plenty of other countries too. They are our political, diplomatic and economic competitors and enemies. And they spy on us. If…
Is the ODNI Approach to Secrecy and Transparency Evolving?
We flagged this yesterday afternoon on Just Security’s Twitter account, but nevertheless, it is helpful to include a reference here on the pages of the blog as well. Yesterday,…
DiFi vs CIA
More than a few folks have commented on the irony of Sen. Dianne Feinstein—perhaps the most vigorous defender of NSA’s controversial surveillance programs—flipping into…
Debating “The Snowden Operation”: A Victory for Privacy Rights or for Russia?
A Debate between Edward Lucas, Senior Editor of The Economist and author of “The Snowden Operation: Inside the West’s Greatest Intelligence Disaster“ and Stephen Holmes,…