International Law
Just Security offers expert analysis of international law and its role in addressing global challenges. Our coverage includes litigation in international and regional tribunals, the process of international law-making, analysis of compliance and accountability for international law violations–including international criminal justice, and challenges to the international legal order.
3,494 Articles

Court Denies FOIA Request for Panetta Review on CIA Torture
U.S. District Court Judge James Boasberg today said that the CIA is not obligated to release the Panetta Review, an internal review of the CIA’s torture program that was heavily…

The Provision of Means: Dual Use Goods & Corporate Liability
This is Part III of a series on the Doe v. Cisco case pending in the Northern District of California and involving claims that Cisco should be liable for aiding and abetting the…

Associated Forces: Why the Differences between ISIL and al-Qaeda Matter
Members of Ansar Dine in Timbuktu, Mali. Image credit: Magharebia via Wikimedia Commons. This post is the latest installment of our “Monday Reflections” feature, in which a…

“Proportionate” Collateral Damage and Why We Should Care About What Civilians Think
In their recent blog post “Surveying Proportionality: Whither the Reasonable Military Commander?” Laurie Blank, Geoffrey S. Corn, and Eric Jensen level three criticisms against…

International Law on the Saudi-Led Military Operations in Yemen
On Wednesday night, Saudi Arabia launched a military intervention in Yemen to stop Houthi advances through the country. Calling it “Operation Decisive Storm,” Saudi Arabia…

Surveying Proportionality: Whither the Reasonable Commander?
At least two surveys gathering information about “public perceptions” of proportionality and collateral damage are making their way around the international arena by way of…

Doe v. Cisco: The Legal Issues
Part 1 of this post introduced a set of cases against Cisco Systems, which has been sued for being complicit in the design and implementation of China’s Golden Shield surveillance…

Perfidy, ambush, snipers, and the COLE bombing (al Nashiri) case
Thanks to Rogier Bartels and Kevin Heller for their fascinating debate here and at Opinio Juris on whether the alleged Israeli/U.S. car-bomb operation operation that killed Hezbollah’s…

No, Disguising Military Equipment As Civilian Objects to Help Kill Isn’t Perfidy
I read with great interest my friend Rogier Bartels’ long post arguing that it is perfidious to use a bomb planted in a civilian car to kill an enemy soldier. As Rogier notes,…

Killing With Military Equipment Disguised as Civilian Objects is Perfidy, Part II
On Friday, I concluded that modifying a civilian-looking vehicle into a military object to attack an adversary could indeed amount to perfidy during an international armed conflict.…

Preparing for Cyber War: A Clarion Call
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…

Killing With Military Equipment Disguised as Civilian Objects is Perfidy
The Washington Post earlier this year revealed US involvement in a 2008 Israeli operation that killed Hezbollah’s Imad Mughniyah in a Damascus parking lot. In discussing various…