International Law

Just Security offers expert analysis of international law and its role in addressing global challenges. Our coverage includes litigation in international and regional tribunals, the process of international law-making, analysis of compliance and accountability for international law violations–including international criminal justice, and challenges to the international legal order.

× Clear Filters
3,494 Articles
Just Security

Court Denies FOIA Request for Panetta Review on CIA Torture

U.S. District Court Judge James Boasberg today said that the CIA is not obligated to release the Panetta Review, an internal review of the CIA’s torture program that was heavily…
Just Security

The Provision of Means: Dual Use Goods & Corporate Liability

This is Part III of a series on the Doe v. Cisco case pending in the Northern District of California and involving claims that Cisco should be liable for aiding and abetting the…
Just Security

Associated Forces: Why the Differences between ISIL and al-Qaeda Matter

Members of Ansar Dine in Timbuktu, Mali. Image credit: Magharebia via Wikimedia Commons. This post is the latest installment of our “Monday Reflections” feature, in which a…
Just Security

“Proportionate” Collateral Damage and Why We Should Care About What Civilians Think

In their recent blog post “Surveying Proportionality: Whither the Reasonable Military Commander?” Laurie Blank, Geoffrey S. Corn, and Eric Jensen level three criticisms against…
Just Security

International Law on the Saudi-Led Military Operations in Yemen

On Wednesday night, Saudi Arabia launched a military intervention in Yemen to stop Houthi advances through the country. Calling it “Operation Decisive Storm,” Saudi Arabia…
Just Security

Surveying Proportionality: Whither the Reasonable Commander?

At least two surveys gathering information about “public perceptions” of proportionality and collateral damage are making their way around the international arena by way of…
Just Security

Doe v. Cisco: The Legal Issues

Part 1 of this post introduced a set of cases against Cisco Systems, which has been sued for being complicit in the design and implementation of China’s Golden Shield surveillance…
Just Security

Perfidy, ambush, snipers, and the COLE bombing (al Nashiri) case

Thanks to Rogier Bartels and Kevin Heller for their fascinating debate here and at Opinio Juris on whether the alleged Israeli/U.S. car-bomb operation operation that killed Hezbollah’s…
Just Security

No, Disguising Military Equipment As Civilian Objects to Help Kill Isn’t Perfidy

I read with great interest my friend Rogier Bartels’ long post arguing that it is perfidious to use a bomb planted in a civilian car to kill an enemy soldier. As Rogier notes,…
Just Security

Killing With Military Equipment Disguised as Civilian Objects is Perfidy, Part II

On Friday, I concluded that modifying a civilian-looking vehicle into a military object to attack an adversary could indeed amount to perfidy during an international armed conflict.…
Just Security

Preparing for Cyber War: A Clarion Call

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Killing With Military Equipment Disguised as Civilian Objects is Perfidy

The Washington Post earlier this year revealed US involvement in a 2008 Israeli operation that killed Hezbollah’s Imad Mughniyah in a Damascus parking lot. In discussing various…
1-12 of 3,494 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: