Congressional Oversight

× Clear Filters
435 Articles
Just Security

Schiff Introduces Updated Proposal for AUMF to Fight the Islamic State

Earlier today, Rep. Adam Schiff (D-Calif.) introduced a new proposal for a limited authorization for the use of military force (AUMF) against the Islamic State. Though largely…
Just Security

AUMF Proposals and Congressionally Mandated Reporting Requirements: Some Guideposts

In his State of the Union speech on Tuesday, President Obama called on Congress to authorize force against the Islamic State. This was consistent with the line he has been walking…
Just Security

The Latest Rules on How Long NSA Can Keep Americans’ Encrypted Data Look Too Familiar

Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question…
Just Security

No Impunity for Torturers [Updated]

[Editor’s Note: This post was originally published on December 15, 2014. Check out a substantial Update published on January 5, 2015 and appended below.] In a post called…
Just Security

Did USAID engage in “covert action” in Cuba without proper domestic legal authority?

Lost in last week’s wave of news coverage on Cuba was an important Associated Press story on reportedly clandestine practices conducted by the U.S. Agency for International Development…
Just Security

The Unintended Consequences of the 2001 AUMF Sunset

I join Ryan Goodman in applauding the Senate Foreign Relations Committee under the strong leadership of its Chairman Bob Menendez (D-N.J.), Sen. Tim Kaine (D-Va.), and many others…
Just Security

Why Do We Talk About Torture The Way We Do?

Editors’ Note: The following post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from…
Just Security

The Torture Report is Only the First Step

Ed Note. This piece also appears in Foreign Policy. Great nations admit and learn from their mistakes. The United States took a major step forward this week with the long-delayed…
Just Security

Five Torturous Steps to Hell

In a short and early section of the SSCI’s redacted summary of its torture report, we can read about the step-by-step descent from humanity to inhumanity, from the 20th century…
Just Security

The Torture Report and the “Glomar Fig Leaf”

The Glomar Explorer, the CIA ship after which the much-abused legal doctrine is named Buried in the SSCI’s report is an arresting passage that suggests that the CIA was quietly…
Just Security

Torture: Unreliable and Inestimably Costly

A few years ago, I served as a member of the Constitution Project’s Task Force on Detainee Treatment – an 11-member, bi-partisan group of former, high-ranking officials in…
Just Security

An Intelligence Committee Agenda

There are big changes coming to the congressional intelligence committees in the 114th Congress, with new leadership in both the Senate Select Committee on Intelligence (SSCI)…
1-12 of 435 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: