Publications

Here’s why Europe can’t police terrorism very well

Author(s): 
Henry Farrell
Publication Date: 
March 22, 2016
Publication Type: 
Other Writing

The terrorist attacks in Paris and Brussels highlight an important dilemma for the European Union. Over the past two decades, the E.U. has made it much easier for people to travel across borders, especially among countries which had signed the Schengen agreement.

Upcoming International Criminal Law Trifecta

Author(s): 
Beth Van Schaack
Publication Date: 
March 21, 2016
Publication Type: 
Other Writing

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks ahead to key developments on the horizon.

ISIL = Genocide, Per Secretary Kerry

Author(s): 
Beth Van Schaack
Publication Date: 
March 18, 2016
Publication Type: 
Other Writing

Secretary of State John Kerry announced on March 17 that, in his judgment, ISIL is committing genocide against a number of minority groups in Syria and Iraq, including Christians:

Bringing Cyber Security into Emergency Management

Author(s): 
Brian Nussbaum
Publication Date: 
March 18, 2016
Publication Type: 
Other Writing

In August 2015, I had the good fortune to present at the New York State Emergency Management Certification and Training (EMC&T) Academy in Albany, NY.  The EMC&T is a unique program New York State runs to provide training, insights into state operations and professional development to state and local emergency management officials.  The areas covered ranged from continuity of operations and social media to emergency operations center procedures, terrorism and natural hazard threats.

Show Us the Videotape

Author(s): 
Catherine Crump
Publication Date: 
March 18, 2016
Publication Type: 
Other Writing

The Feds Are Wrong to Warn of “Warrant-Proof” Phones

Author(s): 
Woodrow Hartzog
Publication Date: 
March 17, 2016
Publication Type: 
Other Writing

If you’ve been paying attention to the fight between Apple and the FBI over the San Bernardino shooter’s iPhone, you’ve probably heard the term “warrant-proof phones” thrown about in an ominous way.

Mapping War Crimes in Syria

Author(s): 
Beth Van Schaack
Publication Date: 
March 16, 2016
Publication Type: 
Academic Writing

This paper maps the range of war crimes being committed in Syria with reference to the applicable treaty and customary international law and prospects for prosecution. It begins by presenting the international legal framework employed to determine when an armed conflict began in Syria, how this conflict is classified under international law, and which multilateral treaties and customary rules are operative. This framework underlies the determination of which war crimes can be prosecuted, which tribunals might have jurisdiction, and which perpetrators may be made subject to indictment.

Bitcoin is losing the Midas touch

Author(s): 
Henry Farrell
Publication Date: 
March 9, 2016
Publication Type: 
Other Writing

Bitcoin, the decentralised, mainly digital currency that is neither issued nor guaranteed by central banks, has always seemed like a magic trick. Rather than spinning straw into gold it transforms wasted computing power into money that people will actually accept as payment.

Up from below: tackling cyber threats

Author(s): 
Scott Shackelford
Publication Date: 
March 8, 2016
Publication Type: 
Other Writing

More nations in the Asia-Pacific are adopting a bottom-up approach to cybersecurity regulation. That’s a good thing, Scott Shackelford writes.

Pages

Subscribe to Publications