International Law

Just Security offers expert analysis of international law and its role in addressing global challenges. Our coverage includes litigation in international and regional tribunals, the process of international law-making, analysis of compliance and accountability for international law violations–including international criminal justice, and challenges to the international legal order.

× Clear Filters
3,503 Articles
Just Security

61

That’s how many individuals the Department of Defense continues to detain at the Guantánamo Bay Naval Base after the recent transfer of 15 detainees to the United Arab Emirates.…
Just Security

The PPG Visualized, What the US Kill and Capture Bureaucracy Looks Like

This is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead…
Just Security

British Forces Hit the Islamic State With ‘the Punisher’ – the Legality of Airburst Munitions

A few days ago, it was reported that British special forces had used a deadly new weapon, nicknamed the Punisher, in a confrontation with ISIL in the Libyan city of Sirte (see…
Just Security

Chemical Weapons Use Returns to Syria

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Today’s Important Deadline in the ACLU’s Targeted-Killing Transparency Case

Today, more than three years after President Obama announced that he had issued a classified “Presidential Policy Guidance,” commonly known as the PPG, meant to govern the…
Just Security

Cybersecurity, Elections, and Critical Infrastructure at Home and Abroad

In the last few days, Secretary of Homeland Security Jeh Johnson and Homeland Security Advisor Lisa Monaco have both suggested that in the wake of the DNC hack, the United States…
Just Security

Towards a Cyber-Security Treaty

The Democratic National Convention (DNC) leaks revealed last week have presumably reminded many Americans to the severe cyber-threats this country is facing. Particularly alarming…
Just Security

The Democratic National Committee Hack: Information as Interference

Earlier this month, WikiLeaks released nearly 20,000 e-mails belonging to Democratic National Committee’s top officials, where Senator Bernie Sanders was humiliated and criticized.…
Just Security

The Updated First Geneva Convention Commentary, DOD’s Law of War Manual, and a More Perfect Law of War: Part II

Earlier this month, I commented on the similarities and differences between the Updated Commentary on the Geneva Conventions of 1949 and the US Defense Department’s new Law…
Just Security

Guest Post: US Dollars and Kenya’s ‘Disappeared’

Just over a year ago, in May , 2015, Kenyan Border Patrol police arrested Hussein Ali Abdullahi from his shop in Wajir, northeastern Kenya, and took him to Wajir military camp.…
Just Security

Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill

In his recent posts and an article, Dakota Rudesill tackles the phenomenon of secret law. Dakota persuasively describes a growing body secret law, which he defines as “legal…
Just Security

It’s Time to Come to Terms With Secret Law: Part I

Secret law. The words are chilling. They evoke Kafka, unaccountable government, liberty subordinated to state security – and to some ears, perhaps simply the paranoid rantings…
1-12 of 3,503 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: