Guest Author

× Clear Filters
681 Articles
Just Security

Was the Cyber Attack on a Dam in New York an Armed Attack?

Concerns about the vulnerability of infrastructure to cyber attacks were highlighted in two recent news articles. Last month, the Wall Street Journal reported that in 2013, Iranian…
Just Security

Congress Squawks as Surveillance Chickens Come Home to Roost

A year that has alternated between major surveillance reforms and calls for new spying laws in the wake of ISIS attacks is set to close with a pendulum swing back against NSA surveillance…
Just Security

Why the US Should Cooperate With Investigations Into the Hospital Bombing

On December 12, the United Nations released a “special report” on human rights abuses and international humanitarian law violations that recently occurred in Kunduz, Afghanistan.…
Just Security

War: What Is It Good For? — Revisiting Strategic Questions Congress Should Ask in Debating an ISIL AUMF

As I revisited the series of 20 questions I recommended Congress consider in September 2014 regarding US strategy to combat the threat posed by ISIL, I remembered the advice an…
Just Security

House Demolitions 2.0

As violence erupted in Israel and in the Occupied Palestinian Territories over the past several months, the Israeli government has returned to one of its most controversial practices…
Just Security

The New African Commission General Comment on the Right to Life Is an Important Step Forward

During its final session of 2015 last month, the African Commission on Human and Peoples’ Rights adopted a General Comment on the right to life under the African Charter. General…
Just Security

The Worst of the Worst? What al-Shamiri’s Case Tells Us About Gitmo Detainees

Earlier this month, the US government revealed that Guantánamo detainee Mustafa al-Aziz al-Shamiri was a low-level fighter, not the al-Qaeda courier and trainer the government…
Just Security

Human Shields: The Dialogue Continues

As avid readers of Just Security may recall, last summer Professor Adil Ahmad Haque and I engaged in an animated discussion about the new Defense Department Law of War Manual’s…
Just Security

The FBI Should Stop Undermining Norms Before They Take Root

Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet…
Just Security

War-Sustaining Activities and Direct Participation in the DOD Law of War Manual

In a recent post on Lawfare, Butch Bracknell discussed the use of leaflets by the United States to warn truck drivers transporting oil for ISIL of an impending attack. Bracknell…
Just Security

Military Commissions and Fairness

My friend Marty Lederman provides a lot of fascinating commentary about the en banc rehearing in the Al-Bahlul case (here and here). I’d like to focus on just part of Marty’s…
Just Security

Why Aren’t Criminal Defendants Getting Notice of Section 702 Surveillance — Again?

Since the Snowden disclosures began, the government’s massive surveillance operations under Section 702 of FISA have increasingly drawn public scrutiny. Section 702 is the authority…
1-12 of 681 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: