Transparency

× Clear Filters
387 Articles

UK Government’s Disappointing Dodge on Drones

A Royal Air Force Reaper RPAS (Remotely Piloted Air System) at Kandahar Airfield in Afghanistan- Wikimedia Commons [This post was first published 2:50EDT] The UK Government recently…

Who is Responsible for the Yemen Funeral Bombing, and How?

The aftermath of a bombing by the Saudi-led coalition in Yemen. Photo: Almigdad Mojalli/IRIN The Saudi-led coalition has acknowledged, after initially denying, that it carried…
The Exxon Valdez after leaking more than 10 million gallons of oil into Alaska's Prince William Sound in March, 1989.

Mass Hacks of Private Email Aren’t Whistleblowing, They are at Odds With It

The Exxon Valdez after leaking more than 10 million gallons of oil into Alaska’s Prince William Sound in March, 1989. Image via NOAA/Wikimedia The world of 2016 is one where…
Just Security

“A First Amendment in the Digital Age”—Peter Zenger Lecture

I had the honor of delivering the inaugural Peter Zenger lecture at Columbia Journalism School last week.  The lecture is named for a newspaper publisher who was tried for libel…
Just Security

Just Security’s Questions for Clinton and Trump

Given the importance of tonight’s prime-time debate between US presidential candidates Hillary Clinton and Donald Trump, we’re again running our list of vital national…
Just Security

A 9/11 Commission Approach to the Russian Hack of the DNC

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

The PPG Visualized, What the US Kill and Capture Bureaucracy Looks Like

This is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead…
Just Security

We Shouldn’t Wait Another Fifteen Years for a Conversation About Government Hacking

With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But…
Just Security

Today’s Important Deadline in the ACLU’s Targeted-Killing Transparency Case

Today, more than three years after President Obama announced that he had issued a classified “Presidential Policy Guidance,” commonly known as the PPG, meant to govern the…
Just Security

Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill

In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…
Just Security

It’s Time to Come to Terms With Secret Law: Part II

On Wednesday, I summarized the findings of my recent study of alleged secret law in the three branches of the US government and my conclusion that secret law is a limited but important…
Just Security

It’s Time to Come to Terms With Secret Law: Part I

Secret law. The words are chilling. They evoke Kafka, unaccountable government, liberty subordinated to state security – and to some ears, perhaps simply the paranoid rantings…
1-12 of 387 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: