Democracy & Rule of Law

Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.

× Clear Filters
3,168 Articles
Just Security

Letter to the Editor from Gabor Rona, Airstrikes in Yemen and Government Transparency

Thanks Ryan and Sarah for an excellent analysis of the NY Times article on the recent military activity in Yemen. In noting that the article is imprecise in its reference to “alleged…
Just Security

Court Decision Supports Broader Disclosures on US Drone War

The Second Circuit Court of Appeals’ decision yesterday that the Obama administration had waived its right to refuse to turn over legal memos justifying the killing of a U.S.…
Just Security

The Second Circuit and the Vices of Selective Disclosure

I’ve now had a full day to digest yesterday’s lengthy decision by the Second Circuit in New York Times v. Department of Justice, which, among other things, orders…
Just Security

Searchable Database of NSA Documents

Some Just Security readers will be interested to know that the ACLU has just launched a text-searchable database of NSA documents released since June of 2013. The database is here.
Just Security

Representatives Schiff and Jones Introduce Bill to Increase Transparency in U.S. Drone Program

Today, Representatives Adam Schiff (D-CA) and Walter Jones (R-NC) introduced new legislation aimed to bring greater transparency to the U.S. drone program. The Targeted Lethal…
Just Security

Military Courts and Article III

For some time, I’ve been working on the larger implications of the jurisprudence arising from the Guantánamo military commissions and the Court of Appeals for the Armed…
Just Security

DOJ Pushes to Expand Hacking Abilities Against Cyber-Criminals

The Wall Street Journal reports that the Department of Justice is seeking increased authority to remotely search not only computers but also cloud based services to which those…
Just Security

An End to Dragnet Surveillance?

The New York Times report that President Obama will call for an end to the bulk collection of American’s telephone metadata is yet further vindication for Edward Snowden in particular,…
Just Security

The So-Called Huawei Scandal and the Snowden Operation

We should spy on China. And Russia. And Iran. And plenty of other countries too. They are our political, diplomatic and economic competitors and enemies. And they spy on us. If…
Just Security

Is the ODNI Approach to Secrecy and Transparency Evolving?

We flagged this yesterday afternoon on Just Security’s Twitter account, but nevertheless, it is helpful to include a reference here on the pages of the blog as well.  Yesterday,…
Just Security

DiFi vs CIA

More than a few folks have commented on the irony of Sen. Dianne Feinstein—perhaps the most vigorous defender of NSA’s controversial surveillance programs—flipping into…
Just Security

Debating “The Snowden Operation”: A Victory for Privacy Rights or for Russia?

A Debate between Edward Lucas, Senior Editor of The Economist and author of “The Snowden Operation: Inside the West’s Greatest Intelligence Disaster“ and Stephen Holmes,…
1-12 of 3,168 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: