Democracy & Rule of Law

Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.

× Clear Filters
3,168 Articles
Just Security

HPSCI Rejects Drone Reporting Requirements in Intel Authorization Act

As Sarah Knuckey covered earlier this month in a post here on Just Security, the Senate Intelligence Committee included in the 2014 intelligence authorization bill requirements…
Just Security

New FISC Pen Register Opinion: It’s Just a Matter of Time Before Somebody Gets Hurt

Once again, the NSA has conducted illegal spying. New documents reveal the National Security Agency’s (NSA) systemic violation of Foreign Intelligence Surveillance Court (FISC)…
Just Security

State Department Concludes Review of NGO Drone Strike Reports, Offers Public Response (Sort of)

The U.S. Department of State told reporters late last week that it had concluded its review of the Amnesty International and HRW targeted killing and drone strike reports.  The…
Just Security

Anonymous US Officials Admit CIA Accidentally Killed a Yemeni Child in a Drone Strike

Buried in a Los Angeles Times article yesterday was this remarkable government admission: In June, a drone-launched missile hit an SUV carrying an Al Qaeda commander in Yemen.…
Just Security

Drone Reporting Requirement in the Intelligence Authorization Act and Congress’ Ability to Compel Public Disclosure

Last week, the Senate Intelligence Committee voted 13-2 to approve the 2014 Intelligence Authorization Act.  Included in this appropriations bill is a new measure that would require…
Just Security

Should ICRC Reports on Detainee Visits be Turned Over to Military Commission Defense Counsel?

On November 6, Military Commission Judge James Pohl ordered the prosecution to hand over to him all ICRC confidential reports on its visits to Guantanamo that are in the possession…
Just Security

Making Sense of the NSA Metadata Collection Program (Part II)

In a previous post here on Just Security, I discussed the constitutionality of the National Security Agency (NSA) program that sweeps up detailed “metadata” pertaining to essentially…
Just Security

My New Paper on Standing and Secret Surveillance

Our good friend (and separation-of-powers maven) Peter Shane from (the) Ohio State University’s Moritz College of Law is hosting a “virtual” symposium on NSA…
Just Security

The Basis for the NSA’s Call-Tracking Program Has Disappeared, If It Ever Existed [Updated]

There’s a significant discrepancy, one that deserves more attention, between what the NSA told the Foreign Intelligence Surveillance Court five years ago about the call-tracking…
Just Security

Newsweek’s Wayward Cover Story on Snowden and Chinese Cyber Hacking

Newsweek’s current cover story, “How Edward Snowden Escalated Cyber War with China” by Kurt Eichenwald, is an important read. Eichenwald makes two claims: Snowden’s impact:…
Just Security

La Plus Ça Change: A Look Back at Intelligence Gathering Reform

“To understand the past in order to better propose guidance for the future” -Church Commission (1976) Today’s report that the NSA has been tapping into Google and Yahoo data…
Just Security

Live Feed of HPSCI Hearing on Potential Changes to FISA [Update: hearing now complete]

[Update (5:15 pm): The HPSCI Hearing on Potential Changes to FISA is now complete.  Recorded video of the hearing testimony is provided below in two parts, due to the length of…
1-12 of 3,168 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: