{"id":127518,"date":"2025-12-19T09:14:37","date_gmt":"2025-12-19T14:14:37","guid":{"rendered":"https:\/\/www.justsecurity.org\/?p=127518"},"modified":"2025-12-19T10:29:08","modified_gmt":"2025-12-19T15:29:08","slug":"jus-ad-bellum-syllabus-supplements","status":"publish","type":"post","link":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/","title":{"rendered":"Jus Ad Bellum: Syllabus Supplements"},"content":{"rendered":"<p>Access the Jus Ad Bellum \/ Use of Force Syllabus Supplement via PDF <a href=\"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-Syllabus-Supplement.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>. (Readers may also be interested in the <a href=\"https:\/\/www.justsecurity.org\/127521\/international-humanitarian-law-syllabus-supplements\/\">International Humanitarian Law \/ Law of Armed Conflict Syllabus Supplements<\/a>)<\/p>\n<h2>Table of Contents<\/h2>\n<p><a href=\"#post-127518-_pjkte142yh4x\">A. The Contours of Jus ad Bellum Self-Defense<\/a><\/p>\n<p><a href=\"#post-127518-_5torr96isy1g\">B. Non-State Actors and Imminence<\/a><\/p>\n<p><a href=\"#post-127518-_7nypm4tw6fes\">C. Humanitarian Intervention and the Responsibility to Protect<\/a><\/p>\n<p><a href=\"#post-127518-_7s7odljiun5g\">D. Jus ad Bellum Proportionality<\/a><\/p>\n<p><a href=\"#post-127518-_nqnyu8htp66w\">E. \u201cUnable or Unwilling\u201d Theory of Self Defense<\/a><\/p>\n<p><a href=\"#post-127518-_l6aiiwm0wa58\">F. Self-defense vs. Reprisal\/Retaliation<\/a><\/p>\n<p><a href=\"#post-127518-_drrb8ou5z13q\">G. Threat of Force<\/a><\/p>\n<p><a href=\"#post-127518-_fxsnsrazklpi\">H. Russia-Ukraine<\/a><\/p>\n<p><a href=\"#post-127518-_nvjzkjaetv1k\">I. U.S. Lethal Strikes on Suspected Drug Traffickers<\/a><\/p>\n<p><a href=\"#post-127518-_kot65wiq7y3l\">J. Cyber Operations<\/a><\/p>\n<hr \/>\n<h2><a id=\"post-127518-_pjkte142yh4x\"><\/a>A. The Contours of Jus ad Bellum Self-Defense<\/h2>\n<p><strong>1. Brianna Rosen, Tess Bridgeman, and Nima Gerami, <\/strong><a href=\"https:\/\/www.justsecurity.org\/115234\/intelligence-legal-iran-nuclear-strikes\"><strong><em>The Day After U.S. Strikes on Iran\u2019s Nuclear Program: A Policy and Legal Assessment<\/em><\/strong><\/a><strong> (June 2025) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. In your view, did the June 21 strikes on Iran\u2019s Fordow, Natanz, and Esfahan nuclear sites meet the international law requirements of <em>imminence, necessity, <\/em>and <em>proportionality<\/em>, or do they constitute <em>preventive <\/em>force prohibited by the United Nations Charter and customary international law? How should decision-makers distinguish legitimate self-defense from prevention when dealing with nuclear latency and ambiguous intelligence? Why would having a weapons capability, but not a specific intention to use it, be insufficient to justify an invocation of self-defense?<\/p>\n<p style=\"padding-left: 40px;\">ii. Do such attacks deter future nuclear proliferation or undermine the Nuclear Non-Proliferation Treaty (NPT) by discouraging cooperation with the International Atomic Energy Agency (IAEA) and normalizing force against nuclear infrastructure? If you were advising Congress or the National Security Council, what mix of legal authorization to use force, diplomatic engagement, and verification mechanisms would you recommend to best balance deterrence, escalation control, and the integrity of the global nonproliferation regime?<\/p>\n<p><strong>2. Adil Haque, <\/strong><a href=\"https:\/\/www.justsecurity.org\/115010\/israel-unlawful-attack-iran-charter\"><strong><em>Indefensible: Israel\u2019s Unlawful Attack on Iran<\/em><\/strong><\/a><strong> (June 2025); <\/strong>and<strong> Amichai Cohen and Yuval Shany,<\/strong><a href=\"https:\/\/www.justsecurity.org\/114641\/israel-iran-un-charter-jus-ad-bellum\/\"><strong> <em>A New War or a New Stage in an Ongoing War \u2013 Observations on June 13 Israeli Attack against Iran<\/em><\/strong><\/a> <strong>(June 2025)<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. What evidence should States invoke to demonstrate an \u201cimminent armed attack\u201d that meets the threshold to invoke article 51 self-defense measures under the United Nations Charter? In the specific context of the June 2025 Israeli strikes on Iran, what specific factors would need to be present for those strikes to be permissible under international law?<\/p>\n<p style=\"padding-left: 40px;\">ii. Can you articulate the difference between an \u201carmed attack\u201d and an \u201carmed conflict\u201d under international law? What would it mean if the type of use of force in self-defense that Israel engaged in targeting Iran\u2019s nuclear program were permissible at any point during an ongoing armed conflict, regardless of the imminence of an armed attack stemming from the nuclear program? What are the tradeoffs of the approach articulated by the author, such as to utilize lulls in fighting to settle disputes and\/or invite the U.N. Security Council to take measures to maintain international peace and security?<\/p>\n<p style=\"padding-left: 40px;\">iii. What do you make of the \u201congoing armed conflict framework\u201d and its application to the June 2025 Israeli attack on Iran? Do you think Israeli government lawyers were more likely to have made a preemptive strike argument with reference to Article 51 of the United Nations Charter, or an \u201congoing armed conflict\u201d argument? Based on an application of both the law and the facts of this particular context, which do you think would be the stronger argument for those lawyers to make on behalf of their government? Why? What if the argument were \u201congoing armed attack\u201d instead?<\/p>\n<p><strong>3. Oona Hathaway,<\/strong><a href=\"https:\/\/www.justsecurity.org\/88346\/the-expansion-of-self-defense\/\"><strong> <em>How the Expansion of \u201cSelf Defense\u201d Has Undermined Constraints on the Use of Force<\/em><\/strong><\/a><strong> (September 2023)<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<br \/>\n<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. What are the primary self-defense theories identified by the author, and how have they contributed to an expansionist approach to self-defense under international law? Evaluate the \u201cpreemptive self-defense\u201d framework set forth by the United States. Consider, too, the Bethlehem Principles, regarding self-defense against armed attacks by non-State actors. What are the strongest arguments in support of, and against, these positions?<\/p>\n<p><strong>4. Mehrnusch Anssari and Benjamin Nu\u00dfberger<\/strong>,<a href=\"https:\/\/www.justsecurity.org\/68173\/compilation-of-states-reactions-to-u-s-and-iranian-uses-of-force-in-iraq-in-january-2020\/\"> <strong><em>Compilation of States\u2019 Reactions to U.S. and Iranian Uses of Force in Iraq in January 2020<\/em><\/strong><\/a><strong> (January 2020)<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. If international law speaks through States, what do you think we should make of strategic silence in this case? When might a State choose to refrain from taking a public position, and why? Does this communicate anything significant about international law and how it is formed, in your view?<\/p>\n<p style=\"padding-left: 40px;\">ii. What do you make of the authors\u2019 questions regarding how to assess the legal relevance of certain statements, particularly those that avoid explicit reference to the law, that are ambiguous as to their support for an action, or that express understanding for another State\u2019s actions without invoking legal language? In your view, with particular consideration for the formation of customary international law, what must a State\u2019s official statement do (or not do) in order to constitute a clear legal position?<\/p>\n<h2><a id=\"post-127518-_5torr96isy1g\"><\/a>B. Non-State Actors and Imminence<\/h2>\n<p><strong>1. Adil Ahmad Haque<\/strong>, <a href=\"https:\/\/www.justsecurity.org\/75487\/self-defense-against-non-state-actors-all-over-the-map\/\"><strong><em>Self-Defense Against Non-State Actors: All Over the Map<\/em><\/strong><\/a><strong> (March 2021) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. If Article 51 permits self-defense against only State armed attacks, what \u2014 if anything \u2014 could legitimately extend the doctrine to non-State actors without territorial State consent? Evaluate three candidates: (a) the <em>unwilling or unable <\/em>doctrine as a customary rule; (b) an imminence-anchored first-strike theory with strict sunset\/verification; and (c) a narrow \u201cquasi-State\u201d exception for entities like ISIL. For each, specify any administrable elements (attribution\/threshold of violence, evidentiary standards, geographic limits, temporal limits, reporting to the Security Council) that would prevent a slide beyond imminence and guard against potential abuse.<\/p>\n<p style=\"padding-left: 40px;\">ii. The article identifies the United States as a potential outlier on four axes (imminence, continuation of force post-attack, origin-of-attack requirement, and breadth of \u201carmed attack\u201d). Choose one axis and make an argument for either convergence (tightening U.S. practice to the Netherlands\/UK model), or principled divergence. What concrete rule text would you write (e.g., an updated Article 51 letter template or coalition rules of engagement) to lock in your choice? How would your approach handle: (1) clear cessation vs. \u201ctemporary lull\u201d; (2) host-State consent refusals; and (3) documentation burdens to satisfy skeptical third States?<\/p>\n<h2><a id=\"post-127518-_7nypm4tw6fes\"><\/a>C. Humanitarian Intervention and the Responsibility to Protect<\/h2>\n<p><strong>1. Alonso Gurmendi Dunkelberg, Rebecca Ingber, Priya Pillai and Elvina Pothelet,<\/strong><a href=\"https:\/\/www.justsecurity.org\/55790\/update-mapping-states-reactions-syria-strikes-april-2018\/\"><strong> <em>UPDATE: Mapping States\u2019 Reactions to the Syria Strikes of April 2018<\/em><\/strong><\/a><strong> (May 2018)<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. When States politically support another State\u2019s strike but avoid overtly declaring it lawful, should political statements of support constitute evidence of <em>opinio juris <\/em>in the context of the formation of customary international law \u2014 or should they have no bearing on customary interpretation of the legal norm? What indicators best distinguish a political statement from a legal statement?<\/p>\n<p><strong>2. Jack Goldsmith and Oona Hathaway, <\/strong><a href=\"https:\/\/www.justsecurity.org\/54925\/bad-legal-arguments-syria-strikes\/\"><strong><em>Bad Legal Arguments for the Syria Strikes <\/em><\/strong><\/a><strong>(April 2018) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. In your opinion, are there any circumstances in which States should be allowed to use force to enforce international prohibitions like the chemical weapons ban, even without consent or United Nations Security Council authorization? Which kinds of international prohibitions, if any, should be subject to such unilateral enforcement, and which shouldn\u2019t? Why? What would be the basis for such action under international law? What do you see as the potential benefits and potential costs of the \u201cillegal but legitimate\u201d argument put forward by France?<\/p>\n<p><strong>3. Just Security,<\/strong><a href=\"https:\/\/www.justsecurity.org\/39712\/top-legal-experts-syria-strikes\/\"><strong> <em>What Do Top Legal Experts Say About the Syria Strikes?<\/em><\/strong><\/a><strong> (April 2017)<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. If the United Nations Charter\u2019s black-letter rules render the Syria strike unlawful, should the United States nonetheless advance a narrow humanitarian-intervention theory \u2014 or embrace an \u201cillegal but legitimate\u201d posture? Compare the systemic costs\/benefits of each path: precedent-setting, reciprocity risks, coalition politics, and effects on future crises (chemical weapons, mass atrocities). Are there any guardrails (criteria, process, reporting) that would make any humanitarian intervention theory minimally acceptable?<\/p>\n<p><strong>4. David Kaye,<\/strong><a href=\"https:\/\/www.justsecurity.org\/1730\/kaye-kohs-case\/\"><strong> <em>Harold Koh\u2019s Case for Humanitarian Intervention<\/em><\/strong><\/a><strong> (October 2013) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. When fundamental human rights aims collide with the United Nations Charter\u2019s allocation of authority for the use of force (for instance under Art. 2(4), Ch. VII, the Security Council veto), which should control as a matter of law? As a matter of morality? How does fidelity to law enhance or erode the morality of a use of force decision in this context? If you privilege human rights protection, what is a principled reading that keeps the prohibition of the use of force intact without turning it into a policy balancing test? An exception that swallows the rule or is ripe for abuse?<\/p>\n<p style=\"padding-left: 40px;\">ii. The article indicates that Kosovo provides little legal support for humanitarian intervention because States \u2014 especially the U.S. \u2014 framed their justification in policy terms and many States rejected the operation\u2019s legality. How should lawyers advise decision-makers when the policy equities (chemical-weapons norms, atrocity prevention, or similar) are strong, but legality is weak? Should governments ever embrace \u201cillegal but legitimate,\u201d or does this risk eroding the value of law and its power to constrain State action across the board? Given the formation of custom requires State practice and <em>opinio juris<\/em>, what specific State behavior or statements would be required to move humanitarian intervention from a contested policy to lawful norm?<\/p>\n<p><strong>5. Harold Koh, <\/strong><a href=\"https:\/\/www.justsecurity.org\/1506\/koh-syria-part2\/\"><strong><em>Syria and the Law of Humanitarian Intervention (Part II: International Law and the Way Forward)<\/em><\/strong><\/a><strong> (October 2013) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts: <\/em><\/p>\n<p style=\"padding-left: 40px;\">i. Koh advocates moving from an \u201cillegal but tolerated\u201d paradigm for humanitarian intervention, to a framework where such intervention is narrowly lawful in extreme cases. His framework relies on an Article 2(4) affirmative defense grounded in United Nations Charter purposes, an exhaustion of Security Council remedies, and strict proportionality. Does formalizing that exception reduce abuse \u2014 because it sets conditions for intervening \u2014 or increase abuse, by giving powerful States a ready-made script for unauthorized force?<\/p>\n<p style=\"padding-left: 40px;\">ii. Would you recommend any additional elements, such as some combination of United Nations General Assembly action (for example, \u201cUniting for Peace\u201d), regional-organization participation, independent findings on the underlying atrocities, or something else?<\/p>\n<p><strong>6. Ryan Goodman, <\/strong><a href=\"https:\/\/www.justsecurity.org\/1913\/humanitarian-intervention-global-legal-norms\/\"><strong><em>Humanitarian Intervention and Global Legal Norms<\/em><\/strong><\/a><strong> (October 2013) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. The article describes a practical space in which humanitarian intervention without United Nations Security Council authorization is still legally prohibited but sometimes tolerated (\u201cillegal but not unprecedented\u201d). In your opinion, does this kind of constructive ambiguity actually protect the Charter\u2019s baseline while allowing rescue in extreme cases, or does it reward powerful States for selective illegality and potentially make it harder to condemn pretextual interventions? Or do you evaluate this paradigm differently than either of these potential views?<\/p>\n<p style=\"padding-left: 40px;\">ii. If threats of force for humanitarian purposes already receive a de facto \u201cpass,\u201d does this signal that <em>opinio juris<\/em> is shifting toward a narrow humanitarian exception \u2014 or does it instead show that States prefer to manage these cases politically, outside the strict contours of law, precisely to avoid creating doctrine? What would be lost (or gained) by codifying Koh\u2019s \u201cambulance driver\u201d style exception as compared to keeping the current, practice-driven model?<\/p>\n<h2><a id=\"post-127518-_7s7odljiun5g\"><\/a>D. Jus ad Bellum Proportionality<\/h2>\n<p><strong>1. Charlie Trumbull, <\/strong><a href=\"https:\/\/www.justsecurity.org\/97365\/assessing-jus-ad-bellum-proportionality\/\"><strong><em>Assessing Jus Ad Bellum Proportionality: A Factored Approach<\/em><\/strong><\/a><strong> (July 2024); and Adil Ahmad Haque, <\/strong><a href=\"https:\/\/www.justsecurity.org\/89960\/enough-self-defense-and-proportionality-in-the-israel-hamas-conflict\/\"><strong><em>Enough: Self-Defense and Proportionality in the Israel-Hamas Conflict<\/em><\/strong><\/a><strong> (November 2023) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts: <\/em><\/p>\n<p style=\"padding-left: 40px;\">i. What is the relationship between proportionality under IHL and proportionality with respect to <em>jus ad bellum<\/em> claims of self-defense?<\/p>\n<p style=\"padding-left: 40px;\">ii. If proportionality in <em>jus ad bellum<\/em> requires weighing anticipated civilian harm against the strategic aims of self-defense when force is used, how does or doesn\u2019t this blur the line between <em>jus ad bellum<\/em> and <em>jus in bello<\/em>? If it does blur the line in your view, does such a blur create a more coherent legal framework or, conversely, risk undermining core protections in each body of law? How so?<\/p>\n<p><strong>2. Charles Kels, <\/strong><a href=\"https:\/\/www.justsecurity.org\/90071\/the-problem-of-proportionality-a-response-to-adil-haque\/\"><strong><em>The Problem of Proportionality: A Response to Adil Haque<\/em><\/strong><\/a><strong> (November 2023) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. With consideration for the article\u2019s analysis in mind, what, in your view, is the relationship between what is \u201cethical and wise\u201d and what is legal in international humanitarian law and <em>jus ad bellum<\/em>? What should it be?<\/p>\n<p style=\"padding-left: 40px;\">ii. If Kels is right that \u201cself-defense proportionality is about the strategic scope of the military response\u201d rather than the civilian harm it generates, what does that imply, in your view, for the ability of international law to constrain large-scale defensive wars, from a practical perspective?<\/p>\n<p><strong>3. Adil Ahmad Haque, <\/strong><a href=\"https:\/\/www.justsecurity.org\/90118\/proportionality-in-self-defense-a-brief-reply\/\"><strong><em>Proportionality in Self-Defense: A Brief Reply<\/em><\/strong><\/a><strong> (November 2023) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. Why might the law use a different assessment for proportionality with respect to <em>jus in bello<\/em>, as opposed to self-defense? Do you think this distinction in law has value, or do you take issue with this distinction? Why or why not?<\/p>\n<p style=\"padding-left: 40px;\">ii. What are the different sources of State practice cited in the article, and which is most compelling to you as evidence of customary law? What makes that State practice particularly compelling or less so, in your view?<\/p>\n<h2><a id=\"post-127518-_nqnyu8htp66w\"><\/a>E. \u201cUnable or Unwilling\u201d Theory of Self Defense<\/h2>\n<p><strong>1. Adil Ahmad Haque, <\/strong><a href=\"https:\/\/www.justsecurity.org\/57223\/self-defense-self-defense-syria\/\"><strong><em>Self-Defense Against Self-Defense, In Syria and Beyond <\/em><\/strong><\/a><strong>(May 2018) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion Prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. How do you view the concept that there can be \u201cno self-defense against self-defense\u201d? In your opinion, is this a necessary legal principle, or can you articulate a coherent legal order where both an intervening State and the territorial State simultaneously claim self-defense without contradiction? In the Syria tangle identified in the article (U.S. \u2194 SDF \u2194 Syria \u2194 Russia), who, if anyone, do you think forfeits or overrides their self-defense rights, and on what theory (waiver, wrongdoing, lesser-evil, something else)?<\/p>\n<p style=\"padding-left: 40px;\">ii. If you had to choose one of the three paths for potentially improving the doctrine identified in the article (implicit consent, broader forfeiture via support\/omission, and a genuinely impartial \u201clesser evil\u201d proportionality test), or design a fourth, what do you think a politically realistic <em>and<\/em> normatively defensible revision of the doctrine would look like, and what costs might it impose on weaker territorial States? How would your preferred approach handle a hypothetical case in which a near-peer power invoked \u201cunwilling or unable\u201d against the United States (e.g., claiming a right to strike a non-State group on U.S. soil over the United States\u2019 objection)?<\/p>\n<p><strong>2. Tess Bridgman, <\/strong><a href=\"https:\/\/www.justsecurity.org\/53810\/legal-basis-u-s-forces-syria-expire\/\"><strong><em>When Does the Legal Basis for U.S. Forces in Syria Expire?<\/em><\/strong><\/a><strong> (March 2018) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion Prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. How often must States invoking the unable or unwilling doctrine re-evaluate conditions underlying their claim of lawfully using force within a non-consenting State? In practice, what concrete indicators or \u201ctripwires\u201d would you use to decide that Syria is no longer unable or unwilling \u2014 change in territorial control, ISIL\u2019s operational capacity, a competent leader\u2019s offer of consent, or something else? And if the United States <em>doesn\u2019t<\/em> periodically re-evaluate but rather treats initial necessity as a blank check, does that undermine the doctrine itself, or expose particular uses of it as unlawful extensions?<\/p>\n<p style=\"padding-left: 40px;\">ii. As a matter of law, where would you draw the line between (a) legitimately staying in Syria until attacks from ISIL in\/through Syrian territory are no longer ongoing or imminent, and (b) an overbroad mission that effectively licenses semi-permanent occupation? How do concepts like Luban &amp; Blum\u2019s \u201cmorally legitimate bearable risk\u201d inform your thinking about when the United States must accept some residual risk of ISIL resurgence rather than continuing to shift that risk onto Syrian territory and sovereignty?<\/p>\n<p><strong>3. Fionnuala Ni Aolain, <\/strong><a href=\"https:\/\/www.justsecurity.org\/30481\/international-law-a-la-carte-brian-egans-ad-bellum-doctrine\/\"><strong><em>International Law a la Carte: Brian Egan\u2019s Jus ad Bellum Doctrine<\/em><\/strong><\/a><strong> (April 2016) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. Does the U.S. reliance on \u201cunwilling nor unable\u201d as a basis for self-defense in certain circumstances make future armed conflicts more likely? In what ways? Can you make legal arguments both for and against the validity of such a basis for self-defense? What are the relative weaknesses and strengths of each argument? If you were an attorney advising a policy-maker in a government other than the United States, how would you advise that policy-maker regarding legally-available bases for self-defense?<\/p>\n<p><strong>4. Marty Lederman, <\/strong><a href=\"https:\/\/www.justsecurity.org\/35239\/president-obamas-report-legal-policy-frameworks-guiding-united-states-military-force-related-national-security-operations\/\"><strong><em>President Obama\u2019s Report on the Legal and Policy Frameworks Guiding and Limiting the Use of Military Force<\/em> <\/strong><\/a><strong>(December 2016)<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. How does international law generally formulate the options available to States who have suffered an armed attack from a non-State actor, in situations where the host State is neither complicit in nor responsible for the non-State actor\u2019s armed attack? Can you briefly summarize the preconditions for use of force in this context and how this relates to the \u201cunwilling or unable\u201d doctrine, as articulated in the article?<\/p>\n<h2><a id=\"post-127518-_l6aiiwm0wa58\"><\/a>F. Self-defense vs. Reprisal\/Retaliation<\/h2>\n<p><strong>1. Eliav Lieblich, <\/strong><a href=\"https:\/\/www.justsecurity.org\/94635\/iran-israel-hostilities\/\"><strong><em>Q&amp;A with Eliav Lieblich on Iran-Israel Hostilities<\/em><\/strong><\/a> <strong>(April 2024) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts: <\/em><\/p>\n<p style=\"padding-left: 40px;\">i. How, in practice, should international law draw the line between genuinely preventive self-defense after a pattern of attacks and post-hoc punishment, especially when both sides raise the issue of \u201crestoring deterrence\u201d? If you were drafting reforms to the <em>jus ad bellum<\/em> standard, what indicators (timing, rhetoric, evidence of future threats, prior exchanges) would you use to decide when a strike is still defensive and when it has slid into an unlawful reprisal? In your view, what are the benefits and potential costs of developing specific criteria along these lines?<\/p>\n<p style=\"padding-left: 40px;\">ii. In your opinion, should IHL attach to each discrete Iran\u2013Israel exchange to maximize protection and clarify war-crimes liability, or would that potentially risk normalizing and routinizing uses of force that are shaky under <em>jus ad bellum<\/em>? How would you design a conflict-classification approach that accounts for proxy warfare, long pauses between strikes, and overlapping IHL\/IHRL obligations without either under- or over-extending the \u201carmed conflict\u201d frame?<\/p>\n<p><strong>2. Ryan Goodman,<\/strong><a href=\"https:\/\/www.justsecurity.org\/75056\/legal-questions-and-some-answers-concerning-the-u-s-military-strike-in-syria\/\"><strong> <em>Legal Questions (and Some Answers) Concerning the U.S. Military Strike in Syria<\/em><\/strong><\/a><strong> (March 2021); and Adil Ahmad Haque,<\/strong><a href=\"https:\/\/www.justsecurity.org\/75010\/bidens-first-strike-and-the-international-law-of-self-defense\/\"><strong> <em>Biden\u2019s First Strike and the International Law of Self-Defense<\/em><\/strong><\/a><strong> (February 2021)<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<br \/>\n<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. Of the analytic tools for assessing the legal justifications offered by the United States for the February strikes in Syria, which do you find the most compelling or unconvincing, and why? If you were a lawyer for the United States, which argument(s) would you gravitate toward, and why? What if you were a lawyer for the United Nations? For the Syrian Arab Republic?<\/p>\n<p style=\"padding-left: 40px;\">ii. Taking the two articles together, how do you answer the question as to whether international law permits States to take a proportionate military strike against an organized armed group that has subjected the State to a series of armed attacks, and the State has high confidence that such a strike will stop the attacks from continuing? Why? What factors are the most important to your assessment? For instance, how much does frequency of the recurring attacks by the organized armed group matter to your view? What are the strongest counterarguments against your position, and how would you address them?<\/p>\n<p><strong>3. Adil Ahmad Haque, <\/strong><a href=\"https:\/\/www.justsecurity.org\/67953\/irans-unlawful-reprisal-and-ours\/\"><strong><em>Iran\u2019s Unlawful Reprisal (and Ours) <\/em><\/strong><\/a><strong>(January 2020) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. How do you understand the immediacy standard highlighted in the article, both normatively and practically in a world of long-range strikes, dispersed decision-making, and complex threat assessments? How, if at all, should the law distinguish between an impermissible \u201clesson-teaching\u201d reprisal and a delayed but still genuinely protective strike aimed at neutralizing a real risk of future attacks?<\/p>\n<p style=\"padding-left: 40px;\">ii. In your opinion, should we understand the pattern of reciprocal violations detailed in the article as evidence that the customary law of self-defense is shifting toward a broader deterrence-based model, or as unlawful practice that other States and scholars ought to resist and treat as non<em>-opinio juris<\/em>? If the U.N. Security Council is structurally unable to act when its permanent members are involved, what realistic alternatives \u2014 regional arrangements, General Assembly action, tighter doctrinal rules, or something else \u2014 could channel responses away from cycles of unilateral armed reprisals?<\/p>\n<p><strong>4. Geoffrey Corn &amp; Rache VanLandingham, <\/strong><a href=\"https:\/\/www.justsecurity.org\/67970\/lawful-self-defense-vs-revenge-strikes-scrutinizing-iran-and-u-s-uses-of-force-under-international-law\/\"><strong><em>Lawful Self-Defense vs. Revenge Strikes: Scrutinizing Iran and U.S. Uses of Force under International Law<\/em><\/strong><\/a><strong> (January 2020).<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. As articulated in the article, what is the difference between lawful self-defense versus retaliation following an armed attack that is <em>not<\/em> permitted by international law? And, what are the lawfully-permitted options for a State to seek recourse, after a threat has been terminated?<\/p>\n<p style=\"padding-left: 40px;\">ii. What kinds of evidence do you think would be necessary to establish that a State\u2019s attack was necessary to prevent the imminent use of force by another State, and how might a State substantiate that? Can you think of reasons why a State would withhold its proof that its attack was justified under international law? How could a State balance the call to be forthcoming with evidence to support their legal right to exercise self-defense in a particular instance, and protecting sensitive intelligence or national security equities that might be impacted by such disclosure? If you were legal counsel to a State, how would you advise that the State balance these potentially competing interests?<\/p>\n<h2><a id=\"post-127518-_drrb8ou5z13q\"><\/a>G. Threat of Force<\/h2>\n<p><strong>1. Michael Schmitt,<\/strong><a href=\"https:\/\/www.justsecurity.org\/123896\/us-venezuela-threat-show-force\/\"><strong> <em>U.S. Saber Rattling and Venezuela: Lawful Show of Force or Unlawful Threat of Force?<\/em><\/strong><\/a><strong> (November 2025)<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<br \/>\n<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. What is the difference between a \u201cshow of force\u201d and an unlawful \u201cthreat\u201d of force under international law? What import does each designation have from a legal perspective? What would escalate a show of force into a threat, and what factors must be met in order for a threat to be unlawful? With these factors in mind, how do you evaluate the United States\u2019 actions in relation to Venezuela as described in the article? Do they rise to the level of an unlawful threat of force in violation of Article 2(4) of the United Nations Charter?<\/p>\n<h2><a id=\"post-127518-_fxsnsrazklpi\"><\/a>H. Russia-Ukraine<\/h2>\n<p><strong>1. Chris O&#8217;Meara,<\/strong><a href=\"https:\/\/www.justsecurity.org\/98847\/kursk-incursion-international-law\/\"><strong> <em>Ukraine\u2019s Incursion into Kursk Oblast: A Lawful Case of Defensive Invasion? <\/em>(August 2024) <\/strong><\/a><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. How do you evaluate whether Ukraine\u2019s advances into Russian territory in response to Russia\u2019s war of aggression were lawful under international law? Do you agree that the nature and scale of Russian aggression against Ukraine (and Russian occupation of Ukrainian territory) indicates that Ukrainian incursions into Russian territory meet the requirements of necessity and proportionality under the law governing the right to self-defense? If so, are there any potential slippery-slope consequences of such a position? Conversely, if not, what are the potential consequences of restricting States from making counter-incursions in a context like this? For either position, what incentives (positive or negative) might such an interpretation of the legal framework raise?<\/p>\n<p style=\"padding-left: 40px;\">i. What are the strategic and political risks for Ukraine if its incursion is viewed as unlawful by the international community? Can you think of any additional factors to complement (or counter) those raised by the author?<\/p>\n<p><strong>2. Dor Hai,<\/strong><a href=\"https:\/\/www.justsecurity.org\/98901\/kursk-invasion-international-law\/\"><strong> <em>A Reply to Chris O\u2019Meara: Necessity and Proportionality in International Law on the Use of Force<\/em><\/strong><\/a><strong> (August 2024) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts<\/em>:<\/p>\n<p style=\"padding-left: 40px;\">i. In your view, why might it be important to distinguish between necessity and proportionality in assessing self-defense under international law? What, if any, are the risks of inadvertently eliding these two concepts?<\/p>\n<p style=\"padding-left: 40px;\">ii. Consider the two approaches to assessing proportionality raised by the author in this article: the view that self-defense must not be \u201cexcessive\u201d when measured against the legitimate defensive purposes (and therefore only permits the halting and repelling of the aggressor\u2019s attacks), and Hai\u2019s articulation that to be proportional, a State\u2019s self-defense should be limited to measures that are proportional to the <em>anticipated value <\/em>or <em>benefit<\/em> of repelling the armed attack in question, and other imminent armed attacks. Which of these approaches aligns more closely with your own views, and why? Are there any potential problems or risks with either of these approaches?<\/p>\n<h2><a id=\"post-127518-_nvjzkjaetv1k\"><\/a>I. U.S. Lethal Strikes on Suspected Drug Traffickers<\/h2>\n<p><strong>1. Michael Schmitt, <\/strong><a href=\"https:\/\/www.justsecurity.org\/122756\/drug-cartels-venezuela-territory\/\"><strong><em>Attacking Drug Cartels in the Territory of Another State<\/em> <\/strong><\/a><strong>(October 2025)<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. What do you make of the debate regarding whether a State may exercise the right of self-defense by conducting operations into another State that is \u201cunwilling or unable\u201d to put an end to activities related to an armed attack against the first State? How would you argue in favor of the position that international law permits the right to self-defense to be exercised in such a manner? How would you argue against it?<\/p>\n<p><strong>2. Michael Schmitt, <\/strong><a href=\"https:\/\/www.justsecurity.org\/120235\/drug-cartels-jus-ad-bellum-loac\/\"><strong><em>Striking Drug Cartels Under the Jus ad Bellum and Law of Armed Conflict<\/em><\/strong><\/a><strong> (September 2025) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. What is the prevailing view of conduct that qualifies as an \u201carmed attack\u201d as that term is understood in international law?<\/p>\n<p style=\"padding-left: 40px;\">ii. How do you evaluate the legal position a few States have taken that views non-destructive or injurious cyber operations as a use of force potentially rising to the level of an armed attack? Do you agree with States that take this legal position? If you were legal counsel for these States, what arguments might you make to support this position, including (but not limited to) the causal relationship between the cyber operation and the harm caused? If you were arguing against this position, what arguments would you make? What are the potential consequences of a more expansive position regarding what types of actions constitute an armed attack? In your opinion, can this position be distinguished from cartel or criminal gang activities like shipment and sale of illicit drugs?<\/p>\n<p style=\"padding-left: 40px;\">iii. If you were legal counsel to a State, what position would you take in the debate surrounding the applicability of the right of self-defense to actions by non-State actors like drug cartels, and why? Conversely, if you were an ICJ judge, which arguments for or against such applicability would you find most compelling, and why?<\/p>\n<h2><a id=\"post-127518-_kot65wiq7y3l\"><\/a>J. Cyber Operations<\/h2>\n<p><strong>1. Michael Schmitt,<\/strong><a href=\"https:\/\/www.justsecurity.org\/73946\/russias-solarwinds-operation-and-international-law\/\"><strong> <em>Russia\u2019s SolarWinds Operation and International Law<\/em><\/strong><\/a><strong> (December 2020)<\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. What is your view as to whether a cyber operation that is not destructive nor injurious in its effects constitutes a use of force? Is it important whether there is a permanent loss of functionality of the targeted infrastructure or system(s)? What kinds of harm would need to have been committed to reach the use of force threshold, in your view? If the operation creates a vulnerability that allows a State to access another State\u2019s system and cause damage, but no damage has yet occurred, what is your view on whether the latter State ought to be able to act <em>preventatively<\/em> to prevent such damage from potentially occurring?<\/p>\n<p style=\"padding-left: 40px;\">ii. If the operation were to be physical instead of cyber in nature, i.e. (for the sake of this hypothetical), literally installing a \u201cback door\u201d into the Pentagon so that Russia could steal records if it chose, how would you understand that action under international law? Would this constitute an \u201carmed attack\u201d sufficient to trigger the right to self-defense under the U.N. Charter? How does your answer to this question inform your assessment of whether a cyber operation to gain data access ought to be understood under this legal framework?<\/p>\n<p><strong>2. Ryan Goodman,<\/strong><a href=\"https:\/\/www.justsecurity.org\/53495\/cyber-operations-u-s-definition-armed-attack\/\"><strong> <em>Cyber Operations and the U.S. Definition of \u201cArmed Attack\u201d<\/em><\/strong><\/a><strong> (March 2018) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. With particular consideration for the context of cyber operations, is the U.S. approach more or less compelling than a more conservative approach regarding what constitutes an \u201carmed attack,\u201d in your view? Why? What are the primary benefits, and drawbacks, to the U.S. approach? Can you think of any specific benefits or drawbacks that complement or add to those raised in the article?<\/p>\n<p><strong>3. Sean Watts,<\/strong><a href=\"https:\/\/www.justsecurity.org\/33558\/international-law-proposed-u-s-responses-d-n-c-hack\/\"><strong> <em>International Law and Proposed U.S. Responses to the DNC Hack<\/em><\/strong><\/a><strong> (October 2016) <\/strong><\/p>\n<p style=\"padding-left: 40px;\"><em>Discussion prompts:<\/em><\/p>\n<p style=\"padding-left: 40px;\">i. In your opinion, does it make sense to transpose the standards guiding countermeasures, developed in reference to a kinetic environment, into the cyber realm, or do these standards need to be tailored or updated in some way to specifically account for activity in cyberspace? What are the potential risks of creating two separate legal paradigms for kinetic environments versus cyberspace? Are there any potential risks to attempting to cover both environments with one unified legal framework?<\/p>\n<p style=\"padding-left: 40px;\">ii. What do you make of Admiral Stavridis\u2019 proposals, in light of the contours of countermeasures set forth by the author of the article? Is there any argument to be made that any of these proposals could be lawfully undertaken?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This syllabus supplement offers curated articles intended to be combined with traditional course books and other materials in a law school or higher education classroom.<\/p>\n","protected":false},"author":3238,"featured_media":127551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43206,41390,43214,17019],"tags":[1297,97,98,43675,43678],"coauthors":[43451,2309],"class_list":["post-127518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-armed-conflict","category-featured-new","category-international-law","category-use-of-force","tag-armed-conflict","tag-international-law","tag-jus-ad-bellum","tag-jus-ad-bellum-syllabus-supplement","tag-syllabus-supplements"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Jus Ad Bellum: Syllabus Supplements<\/title>\n<meta name=\"description\" content=\"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jus Ad Bellum: Syllabus Supplements\" \/>\n<meta property=\"og:description\" content=\"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/\" \/>\n<meta property=\"og:site_name\" content=\"Just Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/JSBlog\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-19T14:14:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T15:29:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Danae Askar, Rebecca Hamilton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.\" \/>\n<meta name=\"twitter:creator\" content=\"@just_security\" \/>\n<meta name=\"twitter:site\" content=\"@just_security\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Danae Askar, Rebecca Hamilton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/\"},\"author\":{\"name\":\"Danae Askar\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/fff109cf997add971412ded50d8bd72e\"},\"headline\":\"Jus Ad Bellum: Syllabus Supplements\",\"datePublished\":\"2025-12-19T14:14:37+00:00\",\"dateModified\":\"2025-12-19T15:29:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/\"},\"wordCount\":4627,\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1\",\"keywords\":[\"Armed Conflicts\",\"International Law\",\"Jus ad Bellum\",\"Jus Ad Bellum Syllabus Supplement\",\"Syllabus Supplements\"],\"articleSection\":[\"Armed Conflict\",\"Featured Articles\",\"International Law\",\"Use of Force\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/\",\"url\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/\",\"name\":\"Jus Ad Bellum: Syllabus Supplements\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1\",\"datePublished\":\"2025-12-19T14:14:37+00:00\",\"dateModified\":\"2025-12-19T15:29:08+00:00\",\"description\":\"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.justsecurity.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jus Ad Bellum: Syllabus Supplements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.justsecurity.org\/#website\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"name\":\"Just Security\",\"description\":\"A Forum on Law, Rights, and U.S. National Security\",\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.justsecurity.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.justsecurity.org\/#organization\",\"name\":\"Just Security\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"width\":5371,\"height\":1757,\"caption\":\"Just Security\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/JSBlog\/\",\"https:\/\/x.com\/just_security\",\"https:\/\/www.linkedin.com\/company\/just-security-linkedin\/\",\"https:\/\/www.instagram.com\/justsecurityforum\/\",\"https:\/\/www.youtube.com\/@JustSecurityForum\",\"https:\/\/bsky.app\/profile\/justsecurity.org\"],\"description\":\"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.\",\"email\":\"info@justsecurity.org\",\"legalName\":\"Just Security\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/fff109cf997add971412ded50d8bd72e\",\"name\":\"Danae Askar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/94b2e159a0a3a7d9c5ab732086f7ae4c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d8c4c669446ac882a7c594efe1fbea204284dbb6fc2e0b82c5912aef93050474?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d8c4c669446ac882a7c594efe1fbea204284dbb6fc2e0b82c5912aef93050474?s=96&d=mm&r=g\",\"caption\":\"Danae Askar\"},\"description\":\"Danae Askar (LinkedIn) is Legal Editor for Just Security and a research scholar at NYU School of Law, with a background in international law, U.S. government, and fundamental freedoms. She was previously an Attorney-Adviser for the Department of State\u2019s Office of the Legal Adviser, where her practice areas included transnational law enforcement and intelligence, cybercrime, and complex treaty negotiations. Her prior roles include Counsel for a global, pro bono law firm focused on peace processes, international criminal accountability, and post-conflict constitution-drafting. She has provided legal counsel for the UN-led Intra-Syrian Peace Process, advised on ceasefire negotiations in Yemen, supported victim participation in international criminal tribunals, and strengthened the evidence-collection capacity of human rights investigators for criminal accountability purposes. Askar\u2019s writing has appeared in the\u00a0Harvard Negotiation Law Review\u00a0and the\u00a0ILSA Journal of International and Comparative Law. She has also co-authored reports for Human Rights Watch. Askar holds a J.D. from Harvard Law School, where she was the Submissions Editor for the\u00a0Harvard Human Rights Journal,\u00a0an MSc in Comparative Politics from the London School of Economics, and a B.A. in Comparative Literature from the University of California \u2013 Los Angeles.\",\"url\":\"https:\/\/www.justsecurity.org\/author\/askardanae\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Jus Ad Bellum: Syllabus Supplements","description":"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/","og_locale":"en_US","og_type":"article","og_title":"Jus Ad Bellum: Syllabus Supplements","og_description":"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.","og_url":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/","og_site_name":"Just Security","article_publisher":"https:\/\/www.facebook.com\/JSBlog\/","article_published_time":"2025-12-19T14:14:37+00:00","article_modified_time":"2025-12-19T15:29:08+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png","type":"image\/png"}],"author":"Danae Askar, Rebecca Hamilton","twitter_card":"summary_large_image","twitter_description":"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.","twitter_creator":"@just_security","twitter_site":"@just_security","twitter_misc":{"Written by":"Danae Askar, Rebecca Hamilton","Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#article","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/"},"author":{"name":"Danae Askar","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/fff109cf997add971412ded50d8bd72e"},"headline":"Jus Ad Bellum: Syllabus Supplements","datePublished":"2025-12-19T14:14:37+00:00","dateModified":"2025-12-19T15:29:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/"},"wordCount":4627,"publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"image":{"@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1","keywords":["Armed Conflicts","International Law","Jus ad Bellum","Jus Ad Bellum Syllabus Supplement","Syllabus Supplements"],"articleSection":["Armed Conflict","Featured Articles","International Law","Use of Force"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/","url":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/","name":"Jus Ad Bellum: Syllabus Supplements","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage"},"image":{"@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1","datePublished":"2025-12-19T14:14:37+00:00","dateModified":"2025-12-19T15:29:08+00:00","description":"This jus ad bellum (JAB) syllabus supplement offers curated articles intended to be combined with traditional coursebooks.","breadcrumb":{"@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#primaryimage","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.justsecurity.org\/127518\/jus-ad-bellum-syllabus-supplements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.justsecurity.org\/"},{"@type":"ListItem","position":2,"name":"Jus Ad Bellum: Syllabus Supplements"}]},{"@type":"WebSite","@id":"https:\/\/www.justsecurity.org\/#website","url":"https:\/\/www.justsecurity.org\/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.justsecurity.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.justsecurity.org\/#organization","name":"Just Security","url":"https:\/\/www.justsecurity.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/JSBlog\/","https:\/\/x.com\/just_security","https:\/\/www.linkedin.com\/company\/just-security-linkedin\/","https:\/\/www.instagram.com\/justsecurityforum\/","https:\/\/www.youtube.com\/@JustSecurityForum","https:\/\/bsky.app\/profile\/justsecurity.org"],"description":"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.","email":"info@justsecurity.org","legalName":"Just Security"},{"@type":"Person","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/fff109cf997add971412ded50d8bd72e","name":"Danae Askar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/94b2e159a0a3a7d9c5ab732086f7ae4c","url":"https:\/\/secure.gravatar.com\/avatar\/d8c4c669446ac882a7c594efe1fbea204284dbb6fc2e0b82c5912aef93050474?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8c4c669446ac882a7c594efe1fbea204284dbb6fc2e0b82c5912aef93050474?s=96&d=mm&r=g","caption":"Danae Askar"},"description":"Danae Askar (LinkedIn) is Legal Editor for Just Security and a research scholar at NYU School of Law, with a background in international law, U.S. government, and fundamental freedoms. She was previously an Attorney-Adviser for the Department of State\u2019s Office of the Legal Adviser, where her practice areas included transnational law enforcement and intelligence, cybercrime, and complex treaty negotiations. Her prior roles include Counsel for a global, pro bono law firm focused on peace processes, international criminal accountability, and post-conflict constitution-drafting. She has provided legal counsel for the UN-led Intra-Syrian Peace Process, advised on ceasefire negotiations in Yemen, supported victim participation in international criminal tribunals, and strengthened the evidence-collection capacity of human rights investigators for criminal accountability purposes. Askar\u2019s writing has appeared in the\u00a0Harvard Negotiation Law Review\u00a0and the\u00a0ILSA Journal of International and Comparative Law. She has also co-authored reports for Human Rights Watch. Askar holds a J.D. from Harvard Law School, where she was the Submissions Editor for the\u00a0Harvard Human Rights Journal,\u00a0an MSc in Comparative Politics from the London School of Economics, and a B.A. in Comparative Literature from the University of California \u2013 Los Angeles.","url":"https:\/\/www.justsecurity.org\/author\/askardanae\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/12\/JAB-syllabus.png?fit=1920%2C1080&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p5gGh3-xaK","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/127518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/users\/3238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/comments?post=127518"}],"version-history":[{"count":14,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/127518\/revisions"}],"predecessor-version":[{"id":127639,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/127518\/revisions\/127639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media\/127551"}],"wp:attachment":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media?parent=127518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/categories?post=127518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/tags?post=127518"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/coauthors?post=127518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}