Terrorism & Violent Extremism

Just Security provides expert legal and policy analysis of terrorism, counterterrorism, and domestic and international violent extremism.

× Clear Filters
2,228 Articles
Just Security

Reflecting on 25 Years of US Policy Towards Iraq

January marks the 25th anniversary of the first Gulf War. Many in the military look back on Operation Desert Storm with nostalgia. Objectives were limited, clear and achievable.…
Just Security

Instability and Terrorism in Africa’s Sahel: A Primer

Africa’s Sahel region has been in the international news a lot since 2012, largely because of its increasing political instability and insecurity. More recently, the region has…
Just Security

“Ideating” on ISIS and Silicon Valley

In a lot of Silicon Valley meetings, participants “iterate,” “ideate,” and “sync,” and do other buzzwordy things. Every once in a while something innovative and impactful…
Just Security

James Comey’s Default-Encryption Bogeyman

FBI Director James Comey recently told the Senate Judiciary Committee that encryption routinely poses a problem for law enforcement. He stated that encryption has “moved from…
Just Security

Latest Guantánamo Transfers May Signal Change in Approach

Politicians and pundits are still fighting over whether President Obama should, can, or will close the Guantánamo Bay detention center before he leaves office. For his part,…
Just Security

Social Media Companies Should Decline the Government’s Invitation to Join the National Security State

The pressure on social media companies to limit or take down content in the name of national security has never been greater. Resolving any ambiguity about the how much the Obama…
Just Security

ISIS in the United States: Which Legal Regime Applies?

Consider the following hypothetical: It is 10:00pm in Times Square, New York City. The “city that never sleeps” is bustling with tourists, Broadway shows, street performers,…
Just Security

Was the Cyber Attack on a Dam in New York an Armed Attack?

Concerns about the vulnerability of infrastructure to cyber attacks were highlighted in two recent news articles. Last month, the Wall Street Journal reported that in 2013, Iranian…
Just Security

Let’s Start Calling Combat Combat

On Tuesday, a Special Forces soldier died and two others were injured in a skirmish with Taliban fighters near Marjah in the Helmand province of southern Afghanistan. Al Asad air…
Just Security

The Irresponsible Institutional Politics of an “Election Year”

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

Closing GTMO: “Why wasn’t there a clearly delineated strategy?”

It’s not even the most glaring error in Dina Temple-Raston’s review of Charlie Savage’s Power Wars, but this passage sure does stand out: While the issue of closing…
Just Security

Ten National Security Oversight Issues to Watch in 2016

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
1-12 of 2,228 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: