Other

× Clear Filters
1,687 Articles
Just Security

Is Flawed Terrorism Research Driving Flawed Counterterrorism Policies?

More than thirteen years after the U.S. intelligence community named the prevention of terrorism its number one goal, it seems to have little understanding of what drives terrorism,…
Just Security

Recap of Recent Posts at Just Security (Mar 28–Apr 3)

I. Surveillance & Cybersecurity Geoff Brigham & Michelle Paulson, Guest Post: Wikimedia v. NSA: Standing and the Fight for Free Speech and Privacy (Monday, March 30)…
Just Security

Security Council Passes Self-Reflective Resolution

Apparently the diplomatic process in New York has produced some soul searching. Today, the UN Security Council has issued a resolution on the current state of the world and its…
Just Security

Recap of Recent Posts at Just Security (Mar 21–27)

I. Perfidy Under International Humanitarian Law Rogier Bartels, Guest Post: Killing With Military Equipment Disguised as Civilian Objects is Perfidy, Part II (Monday,…
Just Security

Doe v. Cisco: The Legal Issues

Part 1 of this post introduced a set of cases against Cisco Systems, which has been sued for being complicit in the design and implementation of China’s Golden Shield surveillance…
Just Security

China’s Golden Shield—Is Cisco Systems Complicit?

This is Part I of a series on a case pending in the Northern District of California against Cisco Systems involving the company’s provision of technology to help construct,…
Just Security

Recap of Recent Posts at Just Security (Mar 14–20)

I. Drones & Autonomous Weapons Rachel Levinson-Waldman, Guest Post: Deep Dive: The White House’s New Memo on Drones and Privacy (Monday, March 16) Robert Keohane & Allen…
Just Security

Killing With Military Equipment Disguised as Civilian Objects is Perfidy

The Washington Post earlier this year revealed US involvement in a 2008 Israeli operation that killed Hezbollah’s Imad Mughniyah in a Damascus parking lot. In discussing various…
Just Security

Recap of Recent Posts at Just Security (Mar 7–13)

I. Republican Letter to Iran Robert Howse & Ruti Teitel, Guest Post: Legal Flaws in the 47 Senators’ Letter to Iran (Tuesday, March 10) Marty Lederman, The Cotton Letter…
Just Security

Peace and Security Means Addressing Social and Economic Rights for Women

As the 59th session of the Commission on the Status of Women takes places this week, much of the institutional, state, and non-governmental attention will be focused on the enforcement…
Just Security

Recap of Recent Posts at Just Security (Feb 28-Mar 6)

I. Authorization for the Use of Military Force (AUMF) Against the Islamic State Harold Koh, Sunset and Supersede: Striking the Right Balance in the AUMF Against ISIL (Monday,…
Just Security

Case To Watch: Microsoft v. US on the Extraterritorial Reach of the Electronic Communications Privacy Act

On Monday, the government will be filing its brief in its case against Microsoft regarding the reach of the government’s warrant authority under the Electronic Communications…
1-12 of 1,687 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: