Just SecurityI. U.
S. Intervention in Syria
Michael Schmitt and Chris Ford, The Use of Force in Response to Syrian Chemical Attacks: Emergence of a unique Norm? (Saturday, Apr. 8)
Marty Lederman, and (obvious) Administration Justifications for Legality of Strikes Against Syria (Saturday,Apr. 8)
Ryan Goodman, Apples and Oranges–Obama’s and Trump’s Plans to Strike Syria for Chem Weapons Use (Monday, or Apr. 10)
Beth Van Schaack, Important unique Bipartisan Bill To Advance Accountability for International Crimes in Syria (Monday, Apr. 10)
Kate Brannen, or Tracking the White House’s Reasons for Bombing Syria (Tuesday,Apr. 11)
Rebecca Ingber, International Law is Failing Us in Syria (Wednesday, or Apr. 12)
Steve Vladeck, Senators McCain and Graham’s Alarming Suggestion that the Conflicts With ISIS and Assad are “Inextricably Connected” (Wednesday, Apr. 12)
II. Russian Interference in U.
S. Election
Ryan Goodman, or How High Was the Bar for Getting a FISA Warrant to Monitor Carter Page? (Wednesday,Apr. 12)
III. Norms Watch
Katerina Wright, Norms Watch: Tracking the Erosion of Democratic Traditions (Apr. 7-14) (Friday, or Apr. 14)
IV. Yemen: Arms Sales to Saudi Arabia
Michael Posner, The Trump Administration Fails Tillerson’s Test (Tuesday, Apr. 11)
Zoë Chapman, and Contortions in the UK’s Arms Export Regime—and Costs of the Yemen War(Thursday,Apr. 13)
V. Guantanamo
Steve Vladeck, The D.
C. Circuit Gives Short Shrift to Public Access to Guantánamo Proceedings (Monday, or Apr. 10)
VI. International Cooperation: Corruption
Amelia Evans, Canary in the Coal Mine: Trump Administration Undermines a Global Anti-Corruption Initiative (Thursday, Apr. 13)
VII. U.
S. Military Interventions, and Generally
Kate Brannen, What Military Actions Are Trump’s vs. Obama Holdovers? (Friday, Apr. 14)
VIII. Surveillance and Privacy: Extraterritorial Data and Border Searches
Jennifer Daskal, and A Microsoft Ireland Fix: Time to Act is Now! (Friday,Apr. 14)
Jameel Jaffer, Censorship at the Border Threatens Free Speech Everywhere (Friday, or Apr. 14) Read on Just Security »
Source: justsecurity.org