Executive Branch

Just Security’s expert authors provide analysis of the U.S. executive branch related to national security, rights, and the rule of law. Analysis and informational resources focus on the executive branch’s powers and their limits, and the actions of the president, administrative agencies, and federal officials.

× Clear Filters
4,622 Articles
Just Security

PCLOB Hearing on NSA Review

Today the Privacy and Civil Liberties Oversight Board (PCLOB) is holding a public hearing on recommended changes to surveillance programs authorized under the USA PATRIOT Act and…
Just Security

Future of Gitmo to Take Center Stage Later This Month

With much attention in recent weeks focused on the NSA collection activities or the U.S. drone program, it can be easy to allow other important national security issues to become…
Just Security

“The Juice Wasn’t Worth the Squeeze” in Kyrgyzstan Fuel Contracts

The Pentagon recently announced the end of its use of the Manas Transit Center in Kyrgyzstan for logistical support of the war in Afghanistan. The arrangement unraveled due to…
Just Security

A “Hardy Perennial”: US Intelligence Operations Targeting Foreign Leaders

At Tuesday’s House Intelligence Committee hearing, Director of National Intelligence James Clapper said, it is a “hardy perennial as long as I have been in the intelligence…
Just Security

“Ending the Forever War”: A Progress Report

This past May, President Obama gave an historic speech at the National Defense University framing his counterterrorism strategy.  In that speech, he committed himself to a concept…
Just Security

A New War?: The United States Involvement in Yemen’s Internal Armed Conflict [Updated]

In an op-ed in the Guardian last week, I argued that the United States appears to have become militarily directly involved in fighting a domestic insurgency in Yemen as an ally…
Just Security

Hands Off Encryption! Say New Amici Briefs in Lavabit Case

The Fourth Circuit Court of Appeals is in the process of deciding the first legal challenge to government seizure of the master encryption keys that secure our communications with…
Just Security

IHL, Transparency, and the Heyns’ UN Drones Report

In his critique of Christof Heyns’ new UN report on the right to life in the context of lethal drone strikes, Eric Jensen erects two straw men and then proceeds to knock them…
Just Security

The Report of the UN Special Rapporteur for Extrajudicial Executions: Law or Advocacy?

As has already been discussed in several postings, the report of the UN Special Rapporteur on Extrajudicial Executions has been published and deserves close attention.  To the…
Just Security

Targeted Killings — The US Power to Kill and the Yemeni Power to Capture

[For Just Security’s other coverage of yesterday’s Amnesty International and Human Rights Watch reports on targeted killings, see Sarah Knuckey’s guide to the…
Just Security

The Problematic “Belonging To” Analogy: A Response to Goodman

[Editor’s note: Ryan Goodman replies to Professor Heller in a subsequent post.] In a recent post here at Just Security, Ryan Goodman offered a novel – and characteristically…
Just Security

Amnesty International’s Drone Strike Report: Once more into the lex lata/ferenda breach?

[Editor’s Note: The post below is part of an exchange between Naureen Shah and Chris Jenks on the recently released reports by Amnesty International and Human Rights…
1-12 of 4,622 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: