Terrorism & Violent Extremism

Just Security provides expert legal and policy analysis of terrorism, counterterrorism, and domestic and international violent extremism.

× Clear Filters
2,231 Articles
Abstract image of human eye with retinal circuit on a black background.

The Dangerous Foreign Intelligence Exception Loophole in the Hasbajrami Decision

The Hasbajrami decision’s expansive view of the FISA foreign intelligence exception threatens to swallow the rule that the Fourth Amendment's warrant requirement applies to U.S.…
The photo shows four very long, shallow docked boats arrayed next to each other diagonally across the image, seemingly made of iron or metal, carrying belongings and one with a number of adults and children in it. Other people are on land at the back of the image, next to a dirt road beside fields stretching into the distance.

Visa Revocations Disregard South Sudan War Risks, Overlook U.S. Communities’ Embrace of Refugees

The breadth and depth of support for South Sudanese across red and blue states has origins in evangelical backing for the young country.
People participate in a candlelight vigil in front of the main offices of the Centers for Disease Control

Dropping U.S. Biodefenses: Why Cuts to Federal Health Agencies Make Americans Less Safe

Top experts write that the Trump administration's sweeping changes to HHS will make the United States highly insecure, not healthy.
A man with tattoos on his arms is handcuffed behind his back.

The Missing Due Process for Gang Allegations

There is a long history of immigration agencies using tattoos and a set of notoriously flawed gang databases to bring false or weak claims of gang involvement.
Two women and a young girl walk past an archway.

No Way Home: How an ISIS-era Law Prevents Yazidi Women and Their Children Born of Conflict from Returning to Sinjar, Iraq

Yazidi women, who survived acts of sexual violence and bore children from ISIS militants, face an Iraqi law that designates their children Muslim.
A police officer shows a gun

What A Corrupt Police Network in the Dominican Republic Reveals About Arms Trafficking

How do arms trafficking and state corruption networks in Latin America operate, and how they can be disrupted?
Palestinian kid adds fuel to a fire amidst rubble.

Gaza and Israel’s Renewed Policy of Deprivation

Israel’s decision to cut Gaza off from essential goods violates IHL and reactivates crimes charged in the ICC’s arrest warrant for Netanyahu, writes Dannenbaum.
Activists hold a rally and march through downtown

U.S. AI-Driven “Catch and Revoke” Initiative Threatens First Amendment Rights

The State Department's AI-enabled "Catch and Revoke" initiative will dissuade individuals from exercising First Amendment-protected activities.
The US Constitution with a gavel laid on it.

5 Big Questions in the Alien Enemies Act Litigation

Major legal issues following Chief Judge Boasberg's ordering a temporary block to the presidential proclamation.
Pro-Palestinian protestors rally in support of Mahmoud Khalil outside of the Thurgood Marshall Courthouse

Explainer on First Amendment and Due Process Issues in Deportation of Pro-Palestinian Student Activist(s)

Legal experts explain First Amendment and Due Process rights in case of Mahmoud Khalil and potential deportations of other pro-Palestinian protestors.
US representative Zalmay Khalilzad (left) and Taliban representative Abdul Ghani Baradar (right) sign the agreement in Doha, Qatar on February 29, 2020. [State Department photo by Ron Przysucha/ Public Domain]

Legal Implications of the Doha Agreement: Prospects Under a Second Trump Presidency

The fifth anniversary of the Doha Agreement highlights its profound impact on Afghanistan's trajectory.
People and first responders gather outside storefronts in Saida, Lebanon.

Israel’s Pager Operation: Not an Indiscriminate Attack But a Strategic Success

Israel's pager operation was not an indiscriminate attack. It was a strategic operation that achieved its objective.
1-12 of 2,231 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: