Executive Branch

Just Security’s expert authors provide analysis of the U.S. executive branch related to national security, rights, and the rule of law. Analysis and informational resources focus on the executive branch’s powers and their limits, and the actions of the president, administrative agencies, and federal officials.

× Clear Filters
4,623 Articles
Just Security

Version 4.0 – Do We Need A New Privacy and Civil Liberties Board?

One aspect of the President’s Review Group report on NSA surveillance that has gone relatively unnoticed is the recommendation that the current Privacy and Civil Liberties Oversight…
Just Security

Could the NSA’s Telephony Metadata Program Have Prevented 9/11? Judge William Pauley v. Lawrence Wright

In an earlier post, I proposed some analytic tools for evaluating the effectiveness of the NSA’s telephony metadata program – in light of recommendations by the President’s…
Just Security

Helpful Resource from the Dept of Defense: Periodic Review Board Website

We wanted to flag for interested readers a helpful resource, the Department of Defense’s website for the Periodic Review Secretariat (PRS), the body responsible for the administrative…
Just Security

FISC Approves Application to Renew Telephony Metadata Program [UPDATED]

Today, the Office of the Director of National Intelligence declassified and announced that the FISC has approved the government’s application to renew the telephony metadata…
Just Security

Reactions to the New York Times and The Guardian Editorial Boards’ Call for Clemency for Snowden

As Ruchi covered this morning in the news roundup, today the editorial boards of the New York Times and The Guardian called on the Obama Administration to offer Edward Snowden…
Just Security

The “Front-Page Rule”

In my earlier post on the Report of the President’s Review Group on Intelligence and Communications Technologies (PRGICT), I highlighted a recurrent theme of the Report–the…
Just Security

How to Evaluate Whether the NSA’s Telephony Metadata Program Makes Us Safer (and What Proponents and Opponents Get Wrong)

[Editor’s Note: Just Security is holding a “mini forum” on the Report by the President’s Review Group on Intelligence and Communications Technologies. Others in the…
Just Security

How Limited is 702?

[Editor’s Note: Just Security is holding a “mini forum” on the Report by the President’s Review Group on Intelligence and Communications Technologies. Others in the series…
Just Security

Data-Mining, Section 215, and Regulating the Government’s Use of Stored Data: The Overlooked, but More Important, Question About NSA Surveillance

[Editor’s Note: Just Security is holding a “mini forum” on the Report by the President’s Review Group on Intelligence and Communications Technologies. Others in the series…
Just Security

The Report of the UK Detainee Inquiry (December 2013)

On Thursday December 19, 2013, the long awaited Report of the Detainee Inquiry (“the Report”) was published. The subject of the Report was Britain’s involvement in US torture…
Just Security

Highlights of the Report of the President’s Review Group on Intelligence and Communications Technologies

[Editor’s Note: Just Security is holding a “mini forum” on the Report by the President’s Review Group on Intelligence and Communications Technologies. Others in the series…
Just Security

So Much for a New Drone Policy – Why Can’t the US Explain Why It Targeted a Wedding Party?

The New York Times has an important front-page story today by Mark Mazzetti and Robert Worth on last week’s drone strike in Yemen, which reportedly targeted a convoy of trucks…
1-12 of 4,623 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: