-
Published by Yale University Press (2011)
Reviewed by Paul Rosenzweig
-
This is a nice illustration of the fact that in at least some circumstances, the United States simply must use civilian criminal courts if it wants to have its hands on a terrorism-related suspect--not t...
-
The New York Times reports that Chinese military engineers may have been allowed to examine a scuttled American stealth helicopter after the raid that killed Osama bin Laden.
Dennis Blair, the former DN...
-
...and guess what? This post is not about any gross factual errors in either of them concerning the legality of detention. Perhaps that's because neither editorial really deals with the legality of deten...
-
Al Qaeda of the Arabian Peninsula is working on a ricin attack:
WASHINGTON — American counterterrorism officials are increasingly concerned that the most dangerous regional arm of Al Qaeda is trying to p...
-
The Washington Post is reporting, in what is hardly a surprise, that we shouldn't expect the United States to give up the Bagram detention facility any time soon:
BAGRAM AIRFIELD, Afghanistan — The Unite...
-
This case may have almost nothing to do with national security law. But it has infuriated me ever since, as a Post editorial writer some years back, I spent a lot of time writing about criminal justice i...
-
Julian Barnes and Evan Perez have an interesting piece today in the Wall Street Journal, suggesting that at least some military officers are increasingly concerned about the lack of a clear option for de...
-
As Raff notes, the Washington Post has an editorial this week drawing attention to the important case of Ali Mussa Daqduq, the Lebanese Hezbollah commander who entered Iraq to participate in the insurgen...
-
Scott Shane has an important story in the New York Times on the controversy over the number of civilian deaths caused by the CIA's drones program outside of Afghanistan. Shane reports that,
The civilian ...
-
The Department of State is indirectly financing private security firms to train African soldiers to fight al Shabab in Somalia, reports the New York Times.
The Washington Post has this editorial which p...
-
Cybersecurity studies distinguish between a cyber-attack, which alters, degrades, or destroys adversary computer systems or the information in or transiting through those systems, and cyber-expolitation,...
-
A grand jury yesterday returned an indictment in the case of Naser Abdo, the guy recently arrested in connection with an alleged bomb plot in relation to Killeen (the same guy who shouted “Major Nidal Ha...
-
During the early months of the Arab Spring phenomenon, there was much discussion of the role that technology played in undermining the capacity of authoritarian regimes to suppress political dissent. So...
-
Earlier we posted Ramzi Kassem's criticism of commentary from Ben and Tom Joscelyn concerning the al-Alwi case. Tom has asked us to share the following response:
Ramzi Kassem is bothered by the use of t...
-
Emerson Begolly pled guilty today, ending what would otherwise likely have been a very interesting First Amendment case involving the constitutionality of charging solicitation based on online incitement...
-
I was trying to formulate my mixed feelings about the Vance and Doe decisions when I received the following email from a Lawfare reader.
-
Habeas laywer David Remes writes in with the following thoughts on Ramadan at Guantanamo:
In her story on Ramadan fasting in Guantanamo, which you blogged about on August 6, Carol Rosenberg quoted Navy C...
-
There are none.
Apparently, absolutely nothing has happened in the war on terror or cybersecurity policy since yesterday.
Follow us on Twitter for interesting law and security-related articles (if we m...
-
Josh Gerstein at the Politico beat me to the punch with a point I have been meaning to make since looking at the Seventh Circuit's Vance decision yesterday: The viability of civil cases against former of...