Other
1,687 Articles

Is Flawed Terrorism Research Driving Flawed Counterterrorism Policies?
More than thirteen years after the U.S. intelligence community named the prevention of terrorism its number one goal, it seems to have little understanding of what drives terrorism,…

Recap of Recent Posts at Just Security (Mar 28–Apr 3)
I. Surveillance & Cybersecurity Geoff Brigham & Michelle Paulson, Guest Post: Wikimedia v. NSA: Standing and the Fight for Free Speech and Privacy (Monday, March 30)…

Security Council Passes Self-Reflective Resolution
Apparently the diplomatic process in New York has produced some soul searching. Today, the UN Security Council has issued a resolution on the current state of the world and its…

Recap of Recent Posts at Just Security (Mar 21–27)
I. Perfidy Under International Humanitarian Law Rogier Bartels, Guest Post: Killing With Military Equipment Disguised as Civilian Objects is Perfidy, Part II (Monday,…

Doe v. Cisco: The Legal Issues
Part 1 of this post introduced a set of cases against Cisco Systems, which has been sued for being complicit in the design and implementation of China’s Golden Shield surveillance…

China’s Golden Shield—Is Cisco Systems Complicit?
This is Part I of a series on a case pending in the Northern District of California against Cisco Systems involving the company’s provision of technology to help construct,…

Recap of Recent Posts at Just Security (Mar 14–20)
I. Drones & Autonomous Weapons Rachel Levinson-Waldman, Guest Post: Deep Dive: The White House’s New Memo on Drones and Privacy (Monday, March 16) Robert Keohane & Allen…

Killing With Military Equipment Disguised as Civilian Objects is Perfidy
The Washington Post earlier this year revealed US involvement in a 2008 Israeli operation that killed Hezbollah’s Imad Mughniyah in a Damascus parking lot. In discussing various…

Recap of Recent Posts at Just Security (Mar 7–13)
I. Republican Letter to Iran Robert Howse & Ruti Teitel, Guest Post: Legal Flaws in the 47 Senators’ Letter to Iran (Tuesday, March 10) Marty Lederman, The Cotton Letter…

Peace and Security Means Addressing Social and Economic Rights for Women
As the 59th session of the Commission on the Status of Women takes places this week, much of the institutional, state, and non-governmental attention will be focused on the enforcement…

Recap of Recent Posts at Just Security (Feb 28-Mar 6)
I. Authorization for the Use of Military Force (AUMF) Against the Islamic State Harold Koh, Sunset and Supersede: Striking the Right Balance in the AUMF Against ISIL (Monday,…

Case To Watch: Microsoft v. US on the Extraterritorial Reach of the Electronic Communications Privacy Act
On Monday, the government will be filing its brief in its case against Microsoft regarding the reach of the government’s warrant authority under the Electronic Communications…