International Law
Just Security offers expert analysis of international law and its role in addressing global challenges. Our coverage includes litigation in international and regional tribunals, the process of international law-making, analysis of compliance and accountability for international law violations–including international criminal justice, and challenges to the international legal order.
3,503 Articles
61
That’s how many individuals the Department of Defense continues to detain at the Guantánamo Bay Naval Base after the recent transfer of 15 detainees to the United Arab Emirates.…
The PPG Visualized, What the US Kill and Capture Bureaucracy Looks Like
This is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead…
British Forces Hit the Islamic State With ‘the Punisher’ – the Legality of Airburst Munitions
A few days ago, it was reported that British special forces had used a deadly new weapon, nicknamed the Punisher, in a confrontation with ISIL in the Libyan city of Sirte (see…
Chemical Weapons Use Returns to Syria
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Today’s Important Deadline in the ACLU’s Targeted-Killing Transparency Case
Today, more than three years after President Obama announced that he had issued a classified “Presidential Policy Guidance,” commonly known as the PPG, meant to govern the…
Cybersecurity, Elections, and Critical Infrastructure at Home and Abroad
In the last few days, Secretary of Homeland Security Jeh Johnson and Homeland Security Advisor Lisa Monaco have both suggested that in the wake of the DNC hack, the United States…
Towards a Cyber-Security Treaty
The Democratic National Convention (DNC) leaks revealed last week have presumably reminded many Americans to the severe cyber-threats this country is facing. Particularly alarming…
The Democratic National Committee Hack: Information as Interference
Earlier this month, WikiLeaks released nearly 20,000 e-mails belonging to Democratic National Committee’s top officials, where Senator Bernie Sanders was humiliated and criticized.…
The Updated First Geneva Convention Commentary, DOD’s Law of War Manual, and a More Perfect Law of War: Part II
Earlier this month, I commented on the similarities and differences between the Updated Commentary on the Geneva Conventions of 1949 and the US Defense Department’s new Law…
Guest Post: US Dollars and Kenya’s ‘Disappeared’
Just over a year ago, in May , 2015, Kenyan Border Patrol police arrested Hussein Ali Abdullahi from his shop in Wajir, northeastern Kenya, and took him to Wajir military camp.…
Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill
In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…
It’s Time to Come to Terms With Secret Law: Part I
Secret law. The words are chilling. They evoke Kafka, unaccountable government, liberty subordinated to state security – and to some ears, perhaps simply the paranoid rantings…