Below are links by topical categories to resources primarily in English providing information on constitution-making processes and the role of public participation.

These links complement the following Institute Special Reports: (1) Democratic Constitution Making, and (2) Iraq's Constitutional Process: Shaping a Vision for the Country's Future.

These links also support the work of the Institute's Rule of Law Program and its project on Constitution-Making, Peacebuilding, and National Reconciliation. Related Congressional testimony from Program Director Neil Kritz looks at Constitution-Making Process: Lessons for Iraq.

General Resources

The sites below collect links to the texts of national constitutions as well as related documents, such as charters, amendments and analysis.


National Constitutional Assemblies

Rwanda

South Africa

  • Constitutional Assembly Database
    "A searchable database of submissions, reports and law during the government transition. The material on the database covers the period 1992 to end 1994."

Non-Governmental Organizations and Constitutional Studies

Selected Documents and Decisions

Updated: April 9, 2007


Latest Research & Analysis

Philippines: Former Combatants Help Keep the Peace During Recent Polls

Philippines: Former Combatants Help Keep the Peace During Recent Polls

Wednesday, June 25, 2025

By: Haroro Ingram, Country Director, Philippines, USIP

For decades, the struggle for peace in the Philippines’ southernmost island of Mindanao has been characterized by armed conflict between the Philippines government and Moro separatist groups, like the Moro Islamic Liberation Front (MILF), and cycles of failed peace processes. The historic 2014 peace agreement between the Philippines government and MILF led to the granting of greater self-governance with the creation of the Bangsamoro Autonomous Region in Muslim Mindanao (BARMM) five years later. What has followed since is an unprecedented, yet very fragile, period of peace and stability.

Type: Analysis

With Cease-fire Holding, Can Israel and Iran Move Toward De-escalation?

With Cease-fire Holding, Can Israel and Iran Move Toward De-escalation?

Wednesday, June 25, 2025

Israel’s stunning and sophisticated June 13 attack on Iran set off a worrying 12-day escalatory spiral. Iran responded in short order with ballistic missile and drone strikes, which led to a series of tit-for-tat exchanges between the two sides. A cease-fire is now in place -- but will it hold?

Type: Analysis

What Are the Limits of U.S.-India Security Burden-Sharing in the Indian Ocean?

What Are the Limits of U.S.-India Security Burden-Sharing in the Indian Ocean?

Monday, June 23, 2025

By: Nilanthi Samaranayake, Adjunct Fellow, East-West Center

When viewing U.S. partnerships in the maritime domain, relations with India, in particular, have thrived — especially over the past decade. Moreover, the partnership enjoys bipartisan support in the United States. Indications after Prime Minister Narendra Modi’s visit to the White House in February 2025 are that U.S.-India security relations will continue to be strong in the second Trump administration.

Type: Analysis

What’s at Stake for China in the Iran War?

What’s at Stake for China in the Iran War?

Monday, June 23, 2025

China has major energy and economic interests that are threatened by an escalating conflict. But Beijing may also see some strategic opportunities with the U.S. focused on the war. Ultimately, China is likely unwilling, and unable, to make a serious effort to broker peace.

Type: Analysis

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

Wednesday, June 18, 2025

The 2024 revelations over China’s effort to implant malware in critical U.S. infrastructure by the Volt Typhoon hacking group — as well as the Salt Typhoon group’s successful breaching of at least nine major U.S. telecoms — have renewed concern over Beijing’s constant, ongoing efforts to hack Western companies, governments and non-governmental organizations. Unlike past incidents, like those involving Chinese military unit 61398, which were largely about cyber espionage, the Volt Typhoon group was actively implanting malware designed to disrupt critical infrastructure such as water and power systems.

Type: Analysis

View All Research & Analysis