CINXE.COM

The “War Game” Documentary, and Simulating a Worse January 6th

<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>The “War Game” Documentary, and Simulating a Worse January 6th</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="A review of what the &quot;War Game&quot; documentary can and can&#039;t tell us about how government leaders should respond to another January 6th attack." /> <link rel="canonical" href="https://www.justsecurity.org/103818/scenario-planning-january-6th/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="The “War Game” Documentary, and Simulating a Worse January 6th" /> <meta property="og:description" content="A review of what the &quot;War Game&quot; documentary can and can&#039;t tell us about how government leaders should respond to another January 6th attack." /> <meta property="og:url" content="https://www.justsecurity.org/103818/scenario-planning-january-6th/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2024-10-10T12:53:16+00:00" /> <meta property="article:modified_time" content="2024-10-11T19:17:35+00:00" /> <meta property="og:image" content="https://www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-10078630781.jpg" /> <meta property="og:image:width" content="1024" /> <meta property="og:image:height" content="683" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Dakota S. Rudesill" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:description" content="The War Game documentary is excellently crafted but depicts an inactive White House and makes flawed assumptions about the Insurrection Act." /> <meta name="twitter:image" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-10078630781.jpg?fit=1024%2C683&ssl=1" /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Dakota S. Rudesill" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="18 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/#article","isPartOf":{"@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/ab07c34aafbe94f1312ae8481c5b902f"}],"headline":"The “War Game” Documentary, and Simulating a Worse January 6th","datePublished":"2024-10-10T12:53:16+00:00","dateModified":"2024-10-11T19:17:35+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/"},"wordCount":3870,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1007863078-scaled-e1728564234416.jpg?fit=2560%2C1024&ssl=1","keywords":["2024 Presidential Election","Democracy","Disinformation","Foreign Intelligence Surveillance Act (FISA)","Insurrection Act","January 6th Attack on US Capitol","Law enforcement","Military","National Guard","U.S. Military","White House"],"articleSection":["Democracy","Executive","Featured Articles","Law Enforcement","Military"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/","url":"https://www.justsecurity.org/103818/scenario-planning-january-6th/","name":"The “War Game” Documentary, and Simulating a Worse January 6th","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1007863078-scaled-e1728564234416.jpg?fit=2560%2C1024&ssl=1","datePublished":"2024-10-10T12:53:16+00:00","dateModified":"2024-10-11T19:17:35+00:00","description":"A review of what the \"War Game\" documentary can and can't tell us about how government leaders should respond to another January 6th attack.","breadcrumb":{"@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/103818/scenario-planning-january-6th/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1007863078-scaled-e1728564234416.jpg?fit=2560%2C1024&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1007863078-scaled-e1728564234416.jpg?fit=2560%2C1024&ssl=1","width":2560,"height":1024,"caption":"The main conference room is shown inside the Situation Room complex at the White House in Washington, DC, 18 May 2007. In 2006, the Situation Room, where the US president receives security briefings, was renovated with updated technology and allows secure video conferencing with world leaders. AFP PHOTO/SAUL LOEB (Photo by Saul LOEB / AFP) (Photo by SAUL LOEB/AFP via Getty Images)"},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/103818/scenario-planning-january-6th/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"The “War Game” Documentary, and Simulating a Worse January 6th"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/ab07c34aafbe94f1312ae8481c5b902f","name":"Dakota S. Rudesill","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/1796214509245e2ec1d2f5b35f57259d","url":"https://secure.gravatar.com/avatar/c81769b72b4d116d0429bf97f7570e40?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/c81769b72b4d116d0429bf97f7570e40?s=96&d=mm&r=g","caption":"Dakota S. Rudesill"},"description":"Dakota S. Rudesill (@DakotaRudesill) is Associate Professor of Law at the Moritz College of Law at The Ohio State University and Simulation Director at the Mershon Center for International Security Studies. He teaches and writes about national security and legislation. Previously he taught at Georgetown Law, and was a visiting fellow at the Center for Strategic and International Studies. He has served in all three branches of government, including in the U.S. intelligence community and as a U.S. Senate committee professional staff member. Find his scholarship here on SSRN. He is also on LinkedIn.","url":"https://www.justsecurity.org/author/rudesilldakota/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//secure.gravatar.com' /> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='dns-prefetch' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security &raquo; Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.2 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.2'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/103818\/scenario-planning-january-6th\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=949a533b99c553f1c91109435e76337f"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&#038;family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&#038;display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1728684854' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.17' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.0' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.0' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=949a533b99c553f1c91109435e76337f" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.2" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=949a533b99c553f1c91109435e76337f" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/103818" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-r0u' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F103818%2Fscenario-planning-january-6th%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F103818%2Fscenario-planning-january-6th%2F&#038;format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.0.2 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&#038;ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&#038;ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&#038;ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&#038;ssl=1" /> </head> <body class="post-template-default single single-post postid-103818 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu"><ul> <li class="page_item page-item-97906"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Come Join <i>Just Security</i>! 2025-26 Postgraduate Legal Fellow Positions</a></li> <li class="page_item page-item-75155"><a href="https://www.justsecurity.org/records-obtained-via-goodman-v-department-of-defense/">Records obtained via Goodman v. Department of Defense </a></li> <li class="page_item page-item-47833"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a></li> <li class="page_item page-item-76521"><a href="https://www.justsecurity.org/search-results/">Search Results</a></li> <li class="page_item page-item-76522"><a href="https://www.justsecurity.org/author-search/">Author Search</a></li> <li class="page_item page-item-76531"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li class="page_item page-item-66815"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li class="page_item page-item-47828"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li class="page_item page-item-47818"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li class="page_item page-item-61915"><a href="https://www.justsecurity.org/trump-russia-timeline/">The Trump-Russia-Ukraine Timeline</a></li> <li class="page_item page-item-47830"><a href="https://www.justsecurity.org/the-pipeline/">Upcoming Events</a></li> <li class="page_item page-item-62780"><a href="https://www.justsecurity.org/updates-trump-russia-timeline/">Updates to The Trump-Russia Timeline</a></li> <li class="page_item page-item-52075"><a href="https://www.justsecurity.org/deep-dives/">Deep Dives</a></li> <li class="page_item page-item-52444"><a href="https://www.justsecurity.org/microsoft-ireland-symposium/">Microsoft Ireland Symposium</a></li> <li class="page_item page-item-49225"><a href="https://www.justsecurity.org/acting-dod-general-counsel-william-s-castles-speech-aumfs-global-war-terrorism/">Acting DOD General Counsel William S. Castle&#8217;s Speech on AUMFs in the &#8220;Global War on Terrorism&#8221;</a></li> <li class="page_item page-item-51186"><a href="https://www.justsecurity.org/glenn-simpson-fusion-gps/">Transcript: Glenn Simpson Fusion GPS Testimony House Intelligence Committee</a></li> <li class="page_item page-item-4"><a href="https://www.justsecurity.org/privacy/">Privacy</a></li> <li class="page_item page-item-47829"><a href="https://www.justsecurity.org/home-page/">Home Page</a></li> <li class="page_item page-item-5"><a href="https://www.justsecurity.org/terms/">Terms</a></li> <li class="page_item page-item-34570"><a href="https://www.justsecurity.org/donation-confirmation/">Donation Confirmation</a></li> <li class="page_item page-item-34571"><a href="https://www.justsecurity.org/transaction-failed/">Transaction Failed</a></li> <li class="page_item page-item-34572"><a href="https://www.justsecurity.org/donation-history/">Donation History</a></li> <li class="page_item page-item-37408"><a href="https://www.justsecurity.org/modern-surveillance-trump-administration/">Modern Surveillance Under the Trump Administration</a></li> <li class="page_item page-item-36664"><a href="https://www.justsecurity.org/norms-watch-inbox/">Get Norms Watch in Your Inbox</a></li> <li class="page_item page-item-1083"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li class="page_item page-item-43595"><a href="https://www.justsecurity.org/federal-prosecutor-dissects-kushners-statement/">A Former Federal Prosecutor Dissects Kushner’s Statement</a></li> <li class="page_item page-item-1885"><a href="https://www.justsecurity.org/recap-guide-weeks-posts-security-oct-4-oct-11/">Recap: A Guide to the Past Week’s Posts on Just Security (Oct. 4-Oct.11)</a></li> <li class="page_item page-item-35680"><a href="https://www.justsecurity.org/httpswww-justsecurity-orgabout-us/">https://www.justsecurity.org/about-us/</a></li> <li class="page_item page-item-97"><a href="https://www.justsecurity.org/editors-pickshot-battlefield-areas-of-active-hostilities/">Editors&#8217; Picks</a></li> <li class="page_item page-item-30826"><a href="https://www.justsecurity.org/dod-report-oct-2015-airstrike-medecins-sans-frontieres-hospital-kunduz-afghanistan/">DOD Report on the Oct. 2015 Airstrike on Médecins Sans Frontières Hospital in Kunduz, Afghanistan</a></li> <li class="page_item page-item-108"><a href="https://www.justsecurity.org/books-written/">Books We&#8217;ve Written</a></li> <li class="page_item page-item-45429"><a href="https://www.justsecurity.org/rfi-interview-hiftar/">RFI Interview on Hiftar</a></li> <li class="page_item page-item-128 page_item_has_children"><a href="https://www.justsecurity.org/books-read/">Books We&#8217;ve Read</a> <ul class='children'> <li class="page_item page-item-533"><a href="https://www.justsecurity.org/books-read/book-synopsis-knife/">Book Synopsis: The Way of the Knife</a></li> <li class="page_item page-item-555"><a href="https://www.justsecurity.org/books-read/book-synopsis-governing-lethal-behavior-autonomous-robots/">Book Synopsis: Governing Lethal Behavior in Autonomous Robots</a></li> <li class="page_item page-item-47"><a href="https://www.justsecurity.org/books-read/book-synopsis-kill-capture-war-terror-soul-obama-presidency/">Book Synopsis: Kill or Capture</a></li> <li class="page_item page-item-1598"><a href="https://www.justsecurity.org/books-read/lincolns-code/">Book Review &#8212; Lincoln’s Code: The Laws of War in American History</a></li> <li class="page_item page-item-333"><a href="https://www.justsecurity.org/books-read/books-synopsis-justice-cascade-rights-prosecutions-world-politics/">Books Synopsis: The Justice Cascade</a></li> <li class="page_item page-item-365"><a href="https://www.justsecurity.org/books-read/books-synopsis-terror-presidency-law-judgment-bush-administration/">Book Synopsis: The Terror Presidency</a></li> <li class="page_item page-item-4254"><a href="https://www.justsecurity.org/books-read/book-synopsis-cost-counterterrorism-power-politics-liberty/">Book Synopsis – The Cost of Counterterrorism: Power, Politics, and Liberty</a></li> <li class="page_item page-item-11755"><a href="https://www.justsecurity.org/books-read/book-synopsis-place-left-hide/">Book Synopsis: No Place Left to Hide</a></li> </ul> </li> <li class="page_item page-item-386 page_item_has_children"><a href="https://www.justsecurity.org/editors-picks/">Editors&#8217; Picks: Reading Lists</a> <ul class='children'> <li class="page_item page-item-9526"><a href="https://www.justsecurity.org/editors-picks/regulation-risks-cryptocurrency/">Editors&#8217; Picks: The Regulation and Risks of Cryptocurrency</a></li> <li class="page_item page-item-852"><a href="https://www.justsecurity.org/editors-picks/executive-power-counterterrorism-policy/">Editors&#8217; Picks: Executive Power &#038; Counterterrorism Policy</a></li> <li class="page_item page-item-2146"><a href="https://www.justsecurity.org/editors-picks/power-detain/">Editors&#8217; Picks: The Power to Detain</a></li> <li class="page_item page-item-394"><a href="https://www.justsecurity.org/editors-picks/areas-active-hostilities/">Editors&#8217; Picks: Hot Battlefields and Areas of Active Hostilities</a></li> <li class="page_item page-item-9454"><a href="https://www.justsecurity.org/editors-picks/international-human-law-privacy-and-surveillance/">Editors’ Picks: International Human Right Law on Privacy (and Surveillance)</a></li> </ul> </li> <li class="page_item page-item-5257"><a href="https://www.justsecurity.org/recaps-archive/">Recaps Archive</a></li> <li class="page_item page-item-13962"><a href="https://www.justsecurity.org/book-synopsis-terror-courts/">Book Synopsis &#8211; The Terror Courts</a></li> <li class="page_item page-item-2449"><a href="https://www.justsecurity.org/recap-mid-week-guide-posts-security-oct-19-23/">Recap: A Mid-Week Guide to Posts on Just Security (Oct. 19-23)</a></li> <li class="page_item page-item-2710"><a href="https://www.justsecurity.org/early-edition-signup/">Signups for A.M. and P.M. Emails</a></li> <li class="page_item page-item-46495"><a href="https://www.justsecurity.org/asil-live-webcast-international-law-trump-administration-force-international-law/">ASIL Live Webcast: &#8220;International Law and the Trump Administration: The Use of Force Under International Law&#8221;</a></li> <li class="page_item page-item-33442"><a href="https://www.justsecurity.org/securitys-three-year-anniversary-event-state-secrets-whistleblowers-drone-memos/">National Security and Transparency in this Administration and the Next</a></li> <li class="page_item page-item-437"><a href="https://www.justsecurity.org/about-us/">About Us</a></li> <li class="page_item page-item-37819"><a href="https://www.justsecurity.org/excerpts-stephen-miller-interviews-meet-press-fox-news-sunday/">Excerpts of Stephen Miller Interviews on Meet the Press and Fox News Sunday</a></li> <li class="page_item page-item-42944"><a href="https://www.justsecurity.org/conversation-david-cole-authoritarianism-prevent/">David Cole on Stopping Authoritarianism&#8217;s Rise in the United States</a></li> <li class="page_item page-item-37578"><a href="https://www.justsecurity.org/call-papers-revisiting-role-international-law-national-security-workshop/">Workshop and Call for Papers: Revisiting the Role of International Law in National Security</a></li> <li class="page_item page-item-16331"><a href="https://www.justsecurity.org/surveille-scoring-methodology/">SURVEILLE Scoring Methodology</a></li> <li class="page_item page-item-2771"><a href="https://www.justsecurity.org/early-edition-email-signup/">Email Signups</a></li> <li class="page_item page-item-6362"><a href="https://www.justsecurity.org/security-reader-survey/">Just Security Reader Survey</a></li> <li class="page_item page-item-37619"><a href="https://www.justsecurity.org/securitys-coverage-immigration-refugee-executive-order/">Just Security’s Coverage of Immigration and Refugee Executive Order</a></li> <li class="page_item page-item-35062"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li class="page_item page-item-47831"><a href="https://www.justsecurity.org/early-edition/">Early Edition</a></li> <li class="page_item page-item-47832"><a href="https://www.justsecurity.org/weekend-edition/">Norms Watch</a></li> <li class="page_item page-item-47827"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Email Signup</a></li> </ul></div> </div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1007863078-scaled-e1728564234416.jpg?fit=2560%2C1024&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1>The “War Game” Documentary, and Simulating a Worse January 6th </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p><p class="date">October 10, 2024</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-103818" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/103818/scenario-planning-january-6th/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-103818" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/103818/scenario-planning-january-6th/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-103818" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/103818/scenario-planning-january-6th/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/103818/scenario-planning-january-6th/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/103818/scenario-planning-january-6th/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/2024-presidential-election/" rel="tag">2024 Presidential Election</a>, <a href="https://www.justsecurity.org/tag/democracy/" rel="tag">Democracy</a>, <a href="https://www.justsecurity.org/tag/disinformation/" rel="tag">Disinformation</a>, <a href="https://www.justsecurity.org/tag/foreign-intelligence-surveillance-act-fisa/" rel="tag">Foreign Intelligence Surveillance Act (FISA)</a>, <a href="https://www.justsecurity.org/tag/insurrection-act/" rel="tag">Insurrection Act</a>, <a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/" rel="tag">January 6th Attack on US Capitol</a>, <a href="https://www.justsecurity.org/tag/law-enforcement/" rel="tag">Law enforcement</a>, <a href="https://www.justsecurity.org/tag/military/" rel="tag">Military</a>, <a href="https://www.justsecurity.org/tag/national-guard/" rel="tag">National Guard</a>, <a href="https://www.justsecurity.org/tag/u-s-military/" rel="tag">U.S. Military</a>, <a href="https://www.justsecurity.org/tag/white-house/" rel="tag">White House</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p><p class="date">October 10, 2024</p></div><p>The scenario is simply terrifying and sadly all too plausible even if not highly likely. It’s January 6th, 2025 – a date now less than three months away – and a major party presidential candidate has responded to his opponent’s victory with false allegations of widespread election fraud. The losing candidate’s supporters – joined by militias and some members of the National Guard and active-duty U.S. military – are moved to violence by disinformation. An American General rises against the Commander-in-Chief and rallies other troops to join him. The attackers breach the U.S. Capitol and interrupt the counting of electoral votes. They seize the Arizona State Capitol and take half its state senators hostage, amass threatening crowds in other state capitals, and take over a major military base.</p> <p>A high-level simulation of White House management of this scenario is what producer Jesse Moss and co-director Tony Gerber chronicle in their documentary film, <i>War Game</i>, now streaming and in theaters.</p> <p>Overall, <i>War Game</i> is impressive. But the film also has confusing elements and leaves key questions unanswered.</p> <p>The scarring events of Jan 6, 2021 were especially terrible because of the risk of repetition – including the prospect of next time being even worse. How would – and how should – our most senior government leaders respond?</p> <p>Seasoned former government officials and other experts have participated in table-top exercises in recent years that have explored a range of similar <a href="https://www.washingtonpost.com/opinions/2024/07/30/trump-authoritarian-president-government-defend/">post-election day</a> scenarios. These simulations have echoed <a href="https://www.washingtonpost.com/outlook/2020/09/03/trump-stay-in-office/?arc404=true">table-top exercises</a> and <a href="https://mershoncenter.osu.edu/events/civil-military-relations-and-2020-election">discussions</a> held in 2020, when a good many of us <a href="https://www.justsecurity.org/73047/preventing-a-military-decision-about-who-won-a-disputed-election/">warned</a> of Jan. 6-like calamities or worse. In the wake of Jan. 6, 2021, these exercises have continued, informed by dire warnings from close observers, including <a href="https://www.washingtonpost.com/opinions/2021/12/17/eaton-taguba-anderson-generals-military/">retired generals</a>.</p> <p>In one hour and 34 minutes, <i>War Game</i> chronicles a six-hour table-top exercise that was staged on Jan. 6, 2023, the two year anniversary of the attack on the U.S. Capitol. The simulated presidential administration in the movie has enough bipartisan talent to staff a real one. The President is convincingly role-played by former Montana Governor Steve Bullock. Other players include former U.S. Senator Heidi Heitkamp as senior White House advisor, General Wesley Clark (ret.) as Chairman of the Joint Chiefs of Staff, former U.S. Senator and former U.S. Attorney Doug Jones as Attorney General, and former CIA presidential intelligence briefer David Priess as the Director of National Intelligence, among others. Behind the scenes, extremism expert Kristofer Goldsmith and Vet Voice Foundation CEO Janessa Goldbeck work with former Trump National Security Council (NSC) staffer Lt. Col. <a href="https://www.justsecurity.org/tag/lt-col-alexander-vindman/">Alexander Vindman</a> (ret.) and conservative thinker William Kristol to present the players with a first-order constitutional crisis.</p> <p><i>War Game</i>, like the exercise it documents, is excellently crafted. Anyone who cares about democracy in America and is concerned that we are sleepwalking into another Jan. 6-or-worse should watch it. As a scholar of the relevant law and processes, advisor to senior leaders in the three branches of the federal government, and having staged <a href="https://www.aals.org/app/uploads/2023/11/Sim-Overview-2021-for-future-players-PDF.pdf">similar</a> <a href="https://www.instagram.com/p/C0w6P95uR6B/?img_index=1">exercises</a> at Yale, Georgetown, and <a href="https://mershoncenter.osu.edu/research-projects/ohio-state-university-national-security-simulation-0">Ohio State</a>, however, it is also my impression that the documentary depicts a remarkably inactive White House. It also insufficiently explains its surprisingly happy outcomes. Those impressions, however, may be the result of two constraints that possibly shaped <i>War Game</i> in significant ways: mistaken assumptions about the <a href="https://www.justsecurity.org/tag/insurrection-act/">Insurrection Act</a> statute that is central to the scenario at issue, and most of the game-play ending up on the cutting room floor.</p> <h2><b>Simulation Design and Execution</b></h2> <p>I will start with the positives – and lay down at this point a spoiler warning. <i>War Game</i> cannot be analyzed carefully without engaging key plot points.</p> <p>A first success is the impressive design of the exercise. Depicted in the documentary is a well-conceived, well-resourced, and well-executed table-top simulation of cabinet-level decision-making. The storyline (sketched above) is all too plausible.</p> <p>The simulation presents the players with realistic dilemmas and tough decision points. High-quality injects – mainly social media posts and high-production video clips – are ably deployed by the exercise’s string-pullers behind the curtain (think of them as Wizards of Oz, Architects from <i>The Matrix</i> movies, or the Gamemakers of <i>The Hunger Games</i> franchise). Realistic injects help keep players in their roles and <i>War Game</i> viewers in their seats. The Control Team’s designers and controllers are staffed by experienced people who keep the initiative. (And I can tell you, that is not always easy; complex scenarios can overwhelm the controllers as easily as they do the players). We see the team capably monitor player decisions and promptly respond with both pre-written injects and new ones crafted on the spot. Their moves to escalate the threat are especially impactful.</p> <h2><b>Player Quality</b></h2> <p>Another big win for <i>War Game</i> is player quality. As I have discovered designing and running The Ohio State National Security Simulation, having seasoned practitioners, and especially politicians, in the top roles adds so much depth in terms of modeling professionalism and realism. (And here, our larger Ohio State biennial exercise and <i>War Game</i> overlap: Senator Heitkamp is one of several former federal legislators and other distinguished practitioners who have role-played in our <a href="https://www.aals.org/app/uploads/2023/11/Sim-Overview-2021-for-future-players-PDF.pdf">simulation</a>). Practitioner players help everyone involved appreciate the unforgiving realities that they have navigated during their careers.</p> <p>One such reality is the lack of clear, accurate, and relevant information in crisis situations. A solid grasp of the facts is integral to good decision-making. And yet, especially in crises, policymakers are often met with a blizzard of too much information, too little high-quality information, and a great deal of bad information. The latter includes inevitable simple misunderstandings. Sadly, too often organizational decision-making comes close to resembling the grade-school telephone game. Overload and quotidian confusion combine with viral falsehoods – misinformation and disinformation – to disorient decisionmakers. <i>War Game</i> expertly replicates these information challenges.</p> <p>Another problem the star players in <i>War Game</i> understand is time pressure. Information gathering and analysis, discussion about what to do, decision-making, memorializing decisions in writing, and bureaucratic implementation are each their own challenges. Combined, these organizational tasks can easily take more time than is actually available. The harsh reality is that the decision-making process tends to lag the pace of real-world events so badly that top officials can become irrelevant in the process. In the best of times, defeating that default is a constant challenge for leaders. In a fast-moving crisis, it becomes profoundly difficult.</p> <p>The Bullock Administration looks pretty swamped, but to its credit does do several timely things. Here, a good comparison is the George W. Bush White House on 9/11. The <i>War Game</i> White House, like the Bush Administration, does a reasonably good job of keeping current and issuing timely public statements.</p> <p>The Bullock team tracks the Bush team in another respect: in haste it may have exceeded its authority. One longtime question about crisis management on 9/11 is whether Vice President Dick Cheney ordered the shoot-down of an airliner thought to be hijacked and heading for Washington, D.C. The problem is that the Vice President is not in the chain of command. Bush says that he authorized it in a call with Cheney, disputing credible concerns that the order initially lacked legal basis. (Ultimately, the shoot-down question was overtaken by events: the courageous passenger uprising aboard<a href="https://www.nps.gov/flni/index.htm"> Flight 93</a> that brought the airliner down before it reached the White House or <a href="https://www.instagram.com/p/CTr9nOXrpxC/?img_index=1">the Capitol</a>). Questions can similarly be raised about the <i>War Game</i> White House’s efforts to surveil the insurrectionists. Although we are not shown all deliberations, the Bullock Administration also with the best of intentions similarly appears to go down a path that is not legally available: the<a href="https://www.law.cornell.edu/uscode/text/50/1801"> Foreign Intelligence Surveillance Act (FISA)</a>. The FISA statute allows surveillance of suspected U.S. agents of <b>foreign</b> powers with a purpose of collecting <b>foreign</b> intelligence information, but from what we see the <i>War Game</i> scenario lacks any of those foreign aspects.</p> <h2><b>Missing Pieces: Crisp Framing of the Issues</b></h2> <p>In addition to showing how easily pressure to act can result in top officials exceeding their authority, the designers and its players of <i>War Game</i> clearly do a lot right. Additionally, the film is a very effective wake-up call about the peril to the rule of law presented by the mainstreaming of extremism in recent years.</p> <p>All of that said, there is also a good deal here that left me frustrated and concerned.</p> <p>To begin, the deliberations depicted in <i>War Game</i> were tough to watch for me as a practitioner and teacher of decision-making processes and briefing skills. At several points throughout the Situation Room deliberations there should have been moments when top advisors set the agenda and manage deliberations: cut through the fog to concisely identify the pending policy questions, appraise the available information, and frame the legal issues. I counted four core issues for decision-making by the President and NSC. But, at no point do we see anyone doing the National Security Advisor’s work of listing issues for decision, setting out options for discussion, and guiding the process. Intelligence, military, and law enforcement advisors acknowledge confusion, but are not shown distinguishing mere reports or raw intelligence from known facts, or saying “here is what we know, and here is what we do not know,” as they would in a real-life event like the one depicted in the film.</p> <p>What’s more, no legal issue is effectively briefed on-screen for the benefit of the other players or the public audience. That includes FISA, and the law that is central to their deliberations: the <a href="https://policy.defense.gov/portals/11/documents/hdasa/references/insurrection_act.pdf">Insurrection Act</a> (more on that below). True, the statutory text of both laws is a challenging read. But, any competent legal adviser could have been shown crisply and (for non-lawyers in the room and watching at home) identifying, in accessible language, each law’s key authorities and dangers in 30 seconds. Instead, over 94 minutes, the viewer hears about the law in dribs and drabs, ranging in quality from accurate to quite misleading (a game designer is not accurately describing the Insurrection Act, for example, when he tells the audience that it “suspends certain civil rights and liberties”).</p> <h2><b>Deliberation, Inaction, and a </b><a href="https://en.wikipedia.org/wiki/Deus_ex_machina"><b>Deus Ex Machina</b></a></h2> <p>Crisis decision-making is hard. Even so, when colleagues and I screened the documentary we all agreed that the players were slower to react to this hypothetical Jan. 6, 2025, than would be realistic, especially with their background knowledge of Jan. 6, 2021. The players appear astonishingly reluctant to direct the federal government to take action, even though the simulated Jan. 6 was worse in multiple ways than the real one. Even more surprising is how well inaction worked out in the end.</p> <p>Start with the assault on the U.S. Capitol. When the players learn about 20 minutes into the film that the constitutional electoral count process had been interrupted, the president’s cabinet talks a lot but its only decision is a public statement. They are told that additional National Guard forces are ready in nearby states, and hear that the loyal Guard troops at the Capitol are trying to deal with the faction of Guard mutineers. But, from what the audience can see, this second attack on the U.S. Capitol falls off the White House agenda for quite some time. It takes sharp words from Heitkamp about half-way through the exercise to refocus the team on the realities that the constitutional vote-counting process is still suspended and Congress is still in hiding. The response? Again, to prepare troops in nearby states (this time the active-duty 82nd Airborne Division) and release another statement telling the attackers to stand down. Again, no on-the-ground federal action is directed. Law enforcement and loyal National Guard for hours now have failed to protect the U.S. Capitol with the resources they have, and apparently are left on their own.</p> <p>The <i>War Game</i> White House is even more stunningly passive in the face of the first U.S. military insurrection since General Robert E. Lee and other troops took up arms for the secessionist states in the U.S. Civil War. A serving general (identified as a fictitious Lieutenant General Gabriel King) mutinies, announcing in public that the armed forces should not follow any orders from the still-serving but allegedly “illegitimate” Commander in Chief. Some other active-duty and retired generals and admirals express support. All of this comes after a retired General earlier called for a military revolt and the defeated presidential candidate promised pardons to military mutineers if they desert and help elevate him to power. The media tells the public that “the military is now split,” for the first time since the Civil War. Some personnel from the National Guard and active-duty military assault federal and state capitol buildings. The response this time? The simulated Army Secretary says that General King has been suspended pending investigation.</p> <p>Yes, of course, suspend him – and then take a slate of other really urgent steps, starting with immediately ordering all of the mutineers to disarm and then promptly arresting every one of them for <a href="https://www.law.cornell.edu/uscode/text/10/894">profound violations</a> of the Uniform Code of Military Justice (UCMJ). Many of the insurrectionists can also presumably be charged under the criminal laws used to successfully prosecute and convict Jan. 6, 2021 attackers (<a href="https://www.justsecurity.org/tag/january-6th-prosecution/">seditious conspiracy, trespass, etc.</a>). Heitkamp forcefully warns of a coup that demands action, and we hear the Attorney General say that Lt. Gen. King has committed a crime. Good. And yet, we learn of no orders issued to bring the real strength of the law to bear.</p> <p>The situation further deteriorates. The military mutineer-aided violence in state capitals continues. The White House also learns that the mutineers have seized weapons and taken control of MacDill Air Force Base in Florida. The players note that two four-star generals are at the base. This vital installation in Florida is home to two Air Force wings and headquarters of the U.S. Central Command (CENTCOM) and the U.S. Special Operations Command (SOCOM), which have primary responsibility for day-to-day counter-terrorism operations in the Middle East and worldwide. This stunning victory by the military insurrectionists prompts an unidentified voice in the Situation Room to advise, “I would let the [military police] deal with that.” Again, we see no orders given.</p> <p>From all we know, the President never directs the federal government to take on-the-ground action of any kind. If you track the issues with a notepad, at the end of <i>War Game</i> you see that the simulated White House team has discussed a wide array of potential actions, put out some statements, readied federal troops and encouraged a couple states to activate their National Guards, but otherwise (with the exception of the FISA misfire and administratively placing Lt. Gen. King on leave) has issued zero orders.</p> <p>Amazingly, inaction works, partially. After the President, late in <i>War Game</i>, decides not to send active-duty troops anywhere, the sun starts to come out. The media reports that the U.S. Capitol has been secured by D.C. National Guard and law enforcement. The counting of electoral votes resumes. Things seem to get better in several states. It is not clear why, because circumstances everywhere were trending so terribly just a moment ago. The President indicates in his closing statement of the simulation that state officials are still held hostage by militants and insurrectionists, and Lt. Gen. King and some number of his fellow military mutineers remain at large, but the Commander-in-Chief and his team seem guardedly upbeat. Ultimately, <i>War Game</i> wraps with a sense that on this simulated second Jan. 6, the White House notched a win and the nation dodged a bullet.</p> <h2><b>The Insurrection Act and Worries of Civil War</b></h2> <p>As we watched the credits, a couple colleagues and I tried to make sense of this evident <i>deus ex machina</i>. What had (partially) saved the day? How did the dots connect to reach this result?</p> <p>Much of the answer probably lies in the pleased wrap-up observation of retired General Wesley Clark, the Joint Chiefs of Staff Chairman role-player, that the President did not invoke the Insurrection Act. Clark here reflected what was clearly a shared assumption by many in <i>War Game</i>: invoking the Insurrection Act would backfire and spark the very civil war that both the controllers and players repeatedly emphasize is an endpoint that the Bullock Administration must prevent. When the players decide against invoking the Insurrection Act, the next thing we see is the controllers rewarding them with good news at the U.S. Capitol.</p> <p>In <i>War Game</i>, several arguments are surfaced against invoking the Insurrection Act, which is a set of statutes that allow the President to deploy active duty armed forces and the National Guard on federal duty to enforce the law against assemblages that infringe on civil rights (such as the right to vote) and otherwise defy the rule of law. Domestic use of the armed forces disrupts usual civil-military relations by turning to the military rather than civilian authorities for law enforcement purposes and otherwise solve problems. The U.S. armed forces’ training is optimally designed for use of military force, not law enforcement. As <a href="https://avalon.law.yale.edu/18th_Century/fed08.asp">the Framers</a> of the U.S. Constitution understood, the use of military forces on <a href="https://www.hup.harvard.edu/books/9780674736740">the home front</a> inevitably imperils liberty. In this simulated scenario, the controllers and players were concerned that federal armed forces on the ground would be precipitous and would play into the election deniers’ false narrative of federal oppression and only provoke more violence. Another concern of the players was that it would set a precedent for a future president to make unnecessary, repressive use of the Insurrection Act, along the lines contemplated by then-President Trump and others during civil unrest in 2020 after the murder of George Floyd.</p> <p>These are all legitimate concerns. Constitutionally rooted in Congress’s powers over <a href="https://jnslp.com/wp-content/uploads/2010/08/02-Banks-V13-8-18-09.pdf">calling forth</a> of the militia (and, in our times, the National Guard) and to <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3022012">make rules</a> for the armed forces, the text of the Insurrection Act is ripe for abuse. As <a href="https://www.justsecurity.org/72959/good-governance-paper-no-6-part-one-domestic-military-operations-reforming-the-insurrection-act/">many</a> experts have <a href="https://www.acslaw.org/issue_brief/briefs-landing/the-presidents-legal-authority-to-commit-troops-domestically-under-the-insurrection-act/">observed</a>, the law’s text is ambiguous and overbroad. It includes too few limitations on presidential discretion to use military force against Americans. It urgently needs to be <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4872783">reformed</a> and <a href="https://jnslp.com/wp-content/uploads/2023/05/Reforming_the_Insurrection_Act_to_Guard_Against_Abuse.pdf">narrowed</a> by Congress. A wicked President could even invoke the Insurrection Act to put extremist militias on federal duty to carry out political violence, as requested by Jan. 6, 2021 militia leader <a href="https://www.justice.gov/usao-dc/pr/court-sentences-two-oath-keepers-leaders-18-years-prison-seditious-conspiracy-and-other">Stewart Rhodes</a>.</p> <p>Even so, the Insurrection Act, if wisely used, can be a vital tool against violent civil disorder and rebellion. Indeed, that is the stabilizing purpose for which it was designed. Provisions of the modern law were enacted to suppress the Confederacy and deal with white militia violence against African Americans after the Civil War. In the 1950s and 1960s, several presidents invoked it to deploy the U.S. Army to enforce federal civil rights laws in the U.S. South and take National Guard troops away from segregationist states defying federal law. Those were explosive times, but none of those invocations led to civil war. On the contrary, the Act was used to enforce the law and uphold constitutional values.</p> <p>All controllers in simulations must have a theory of their scenario’s central dynamics and decide when to reward players, but, the simulation participants in <i>War Game</i> did not need to assume that invocation of the Insurrection Act in the circumstances depicted would be the wrong move. Violent interruption of constitutional processes, raids on capitol buildings, taking governors and legislators hostage, overwhelming state and local authorities, and especially a military mutiny are clearly sufficient circumstances. Indeed, at one point, five states were requesting federal help via the invocation of the law. Civil war did not follow the Act’s use in the Civil Rights Era, and it is not clear that would happen now. (Indeed, perhaps the game designers and players thought it would have deleterious results because of a mistaken belief that invocation of this authority would suspend civil rights and liberties.) Invocation, in short, would have been a warranted step if the Bullock Administration decided to take it. Additionally or alternatively, the administration could have directed a wide variety of other helpful actions, using other existing authorities to enforce military justice and make use of the U.S. military in support of civil authorities.</p> <h2><b>The Cutting Room Floor</b></h2> <p>For all we know, President Bullock did issue such orders and they were instrumental in the happy turn of events at the end. An appropriate legal basis for surveilling the insurrectionists may have been found. The policy, factual, and legal questions may well have been framed crisply by the seasoned professionals at the <i>War Game</i> White House. It is quite possible that these moments, or at least a good portion of them, were in the four and a half hours of the simulation left on the cutting room floor. Indeed, the producer in a <a href="https://www.lawfaremedia.org/article/chatter--gaming-out-an-insurrection-with-jesse-moss">recent interview</a> noted that they removed a deep dive into legal issues.</p> <p>Even a half dozen clips of concise, real-time framing of the issues by presidential advisors, totaling no more than two or three minutes, would have made a considerable difference. These moments would have brought greater clarity (and reality) to 94 minutes of meandering deliberation. They would also have performed a public service: showing the general viewer about what “good process” looks like at the highest levels of government.</p> <h2><b>It Could Have Been Worse</b></h2> <p>A final thought on missed opportunities: the scenario in <i>War Game</i> focused on a Jan. 6, 2021 repeat plus a partial US military mutiny that I believe are highly unlikely but in our extraordinarily polarized times are all too plausible. Left unaddressed is where I thought the scenario was heading.</p> <p>What I expected was something even worse in some respects, along these lines. State officials either interfere with the presidential election in their home state, for example after falsely claiming widespread voter fraud. Or, they poorly manage disruptions to the election such as militia or partisan violence at the polls. Next, a wicked governor uses their National Guard or state defense forces in ways that muck up the election outcome even more, or defy federal authority (or, the legislature tries to exploit all the confusion to appoint its own slate of electors on a partisan basis).</p> <p>What I have just sketched would be a complete nightmare for the nation, and is horrifyingly conceivable. It would tee up consequential decisions for the President about federalizing the National Guard and the small but appreciable risk that some National Guard forces, including commanders, would refuse the federalization order. Another awful prospect is armed resistance to federalized Guard and active-duty federal forces by state defense forces. Under federal statute, those state forces cannot be federalized along with the National Guard, setting the stage for another horrific storyline.</p> <p>Such developments would further fuel the civil war fantasies that have excited and radicalized too many Americans in recent years and that have become a threat to public order and our republic. Active-duty federal troops would quickly prevail, perhaps at great cost to long-term domestic tranquility and to public faith in American democratic institutions. But <i>War Game</i> – for all of its many virtues as a simulation and a documentary – does not go there. I hope the real world does not either.</p> <h6><em>IMAGE: The main conference room is shown inside the Situation Room complex at the White House in Washington, DC, 18 May 2007. (Photo by SAUL LOEB/AFP via Getty Images)<br /> </em></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/2024-presidential-election/" rel="tag">2024 Presidential Election</a>, <a href="https://www.justsecurity.org/tag/democracy/" rel="tag">Democracy</a>, <a href="https://www.justsecurity.org/tag/disinformation/" rel="tag">Disinformation</a>, <a href="https://www.justsecurity.org/tag/foreign-intelligence-surveillance-act-fisa/" rel="tag">Foreign Intelligence Surveillance Act (FISA)</a>, <a href="https://www.justsecurity.org/tag/insurrection-act/" rel="tag">Insurrection Act</a>, <a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/" rel="tag">January 6th Attack on US Capitol</a>, <a href="https://www.justsecurity.org/tag/law-enforcement/" rel="tag">Law enforcement</a>, <a href="https://www.justsecurity.org/tag/military/" rel="tag">Military</a>, <a href="https://www.justsecurity.org/tag/national-guard/" rel="tag">National Guard</a>, <a href="https://www.justsecurity.org/tag/u-s-military/" rel="tag">U.S. Military</a>, <a href="https://www.justsecurity.org/tag/white-house/" rel="tag">White House</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts &#038; Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To &#8216;End&#8217; War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine &#8212; and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gwenadmin/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon&#8217;s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia&#8217;s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who&#8217;s Who in Jack Smith&#8217;s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN&#8217;s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103164/usaid-digital-policy-conflict-peacebuilding/">The Next Step for USAID’s New Digital Policy: Account for Conflict Risks and Include Peacebuilding</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/guintaclaire/" title="Profile and articles by Claire Guinta" class="author url fn" rel="author">Claire Guinta</a> and <a href="https://www.justsecurity.org/author/zuroskinick/" title="Profile and articles by Nick Zuroski" class="author url fn" rel="author">Nick Zuroski</a></p> <p class="date">Sep 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103184/amended-protocol-booby-traps-pagers/">Article 7(2) of Amended Protocol II on Conventional Weapons and the Lebanon Pager Explosions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100374/ukraine-us-public-support-election/">Will US Public Support for Ukraine Aid Survive the Presidential Campaign?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mironrobert/" title="Profile and articles by Robert Miron" class="author url fn" rel="author">Robert Miron</a> and <a href="https://www.justsecurity.org/author/feaver-peter/" title="Profile and articles by Peter Feaver" class="author url fn" rel="author">Peter Feaver</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100333/rethinking-united-nations-cybercrime-treaty/">Rethinking the United Nations Cybercrime Treaty</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pielemeierjason/" title="Profile and articles by Jason Pielemeier" class="author url fn" rel="author">Jason Pielemeier</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100172/why-criminalize-ecocide-experts/">Why Criminalize Ecocide? Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100265/musk-trump-legal-boundaries/">Musk, X, and Trump 2024: Where are the Legal and Ethical Boundaries?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/jacksondean/" title="Profile and articles by Dean Jackson" class="author url fn" rel="author">Dean Jackson</a></p> <p class="date">Sep 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100259/u-n-general-assembly-high-level-week-2024-what-experts-are-looking-for/">U.N. General Assembly High-Level Week 2024 : What Experts Are Looking For</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100195/a-2024-election-litigation-hot-list/">A 2024 Election Litigation Hot List</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100193/law-war-exploding-pagers-lebanon/">Law of War Questions Raised by Exploding Pagers in Lebanon</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100130/competition-not-control-is-key-to-winning-the-global-ai-race/">Competition, Not Control, is Key to Winning the Global AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mittelsteadtmatthew/" title="Profile and articles by Matthew Mittelsteadt" class="author url fn" rel="author">Matthew Mittelsteadt</a> and <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a></p> <p class="date">Sep 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97864/political-violence-us-enough/">Political Violence in the United States Is Rising – and It Might Be Up to Americans to Say “Enough!”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Sep 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99994/americas-national-security-threat/">America’s Overlooked National Security Threat</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Sep 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99964/challenging-state-capture/">To Challenge State Capture, the US Needs a Strategy of State Retrieval</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/prendergastjohn/" title="Profile and articles by John Prendergast" class="author url fn" rel="author">John Prendergast</a> and <a href="https://www.justsecurity.org/author/wilsondamon/" title="Profile and articles by Damon Wilson" class="author url fn" rel="author">Damon Wilson</a></p> <p class="date">Sep 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99869/telegrams-security-sham/">Telegram’s Security Sham</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vanlandinghammichael/" title="Profile and articles by Michael Van Landingham" class="author url fn" rel="author">Michael Van Landingham</a> and <a href="https://www.justsecurity.org/author/wildeg/" title="Profile and articles by Gavin Wilde" class="author url fn" rel="author">Gavin Wilde</a></p> <p class="date">Sep 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99841/public-safety-reform-targeted-violence/">Public-Safety Reform and Preventing Targeted Violence: Two Sides of the Same Public-Health Coin</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosanderic/" title="Profile and articles by Eric Rosand" class="author url fn" rel="author">Eric Rosand</a>, <a href="https://www.justsecurity.org/author/weinestevan/" title="Profile and articles by Stevan Weine" class="author url fn" rel="author">Stevan Weine</a> and <a href="https://www.justsecurity.org/author/gimenezalejandrosantana/" title="Profile and articles by Alejandro Giménez Santana" class="author url fn" rel="author">Alejandro Giménez Santana</a></p> <p class="date">Sep 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99831/reaim-second-summit-context/">Putting the Second REAIM Summit into Context</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vestnertobias/" title="Profile and articles by Tobias Vestner" class="author url fn" rel="author">Tobias Vestner</a> and <a href="https://www.justsecurity.org/author/cleoburysimon/" title="Profile and articles by Simon Cleobury" class="author url fn" rel="author">Simon Cleobury</a></p> <p class="date">Sep 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99113/north-korea-growing-threat/">The Growing Threat from North Korea</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kirbymichael/" title="Profile and articles by The Hon. Michael Kirby" class="author url fn" rel="author">The Hon. Michael Kirby</a></p> <p class="date">Aug 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98855/good-moral-character-trump-immigrants/">&#8216;Good Moral Character?&#8217; Holding Trump to the Same Standards as the Immigrants He Vilifies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/chenedgar/" title="Profile and articles by Edgar Chen" class="author url fn" rel="author">Edgar Chen</a> and <a href="https://www.justsecurity.org/author/rossdan/" title="Profile and articles by Dan Ross" class="author url fn" rel="author">Dan Ross</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99069/artificial-intelligence-democracy-effects/">Don’t Downplay Risks of AI for Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nosselsuzanne/" title="Profile and articles by Suzanne Nossel" class="author url fn" rel="author">Suzanne Nossel</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98844/dont-sanction-icc/">Don&#8217;t Sanction the ICC for Doing its Job</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mayamichael/" title="Profile and articles by Michael Maya" class="author url fn" rel="author">Michael Maya</a></p> <p class="date">Aug 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia&#8217;s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98895/presidential-immunity-congressional-contempt/">Presidential Immunity Decision May Have Implications for Congressional-Executive Divide on Criminal Contempt</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/wrightandy/" title="Profile and articles by Andy Wright" class="author url fn" rel="author">Andy Wright</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98847/kursk-incursion-international-law/">Ukraine’s Incursion into Kursk Oblast: A Lawful Case of Defensive Invasion?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/omearachris/" title="Profile and articles by Chris O&#039;Meara" class="author url fn" rel="author">Chris O&#039;Meara</a></p> <p class="date">Aug 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98812/icc-amicus-brief-israel-palestine/">Expert Explainer: The US for the first time submits a formal brief to the International Criminal Court on the &#8216;Situation in Palestine&#8217;</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a></p> <p class="date">Aug 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98787/icc-disability-slave-trade/">Time for the International Criminal Court to Recognize Persons with Disabilities and the Slave Trade</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lordjanet/" title="Profile and articles by Janet Lord" class="author url fn" rel="author">Janet Lord</a>, <a href="https://www.justsecurity.org/author/schwarzpace/" title="Profile and articles by Pace Schwarz" class="author url fn" rel="author">Pace Schwarz</a>, <a href="https://www.justsecurity.org/author/smithmatthew/" title="Profile and articles by Matthew &quot;Hezzy&quot; Smith" class="author url fn" rel="author">Matthew &quot;Hezzy&quot; Smith</a>, <a href="https://www.justsecurity.org/author/steinmichael/" title="Profile and articles by Michael Ashley Stein" class="author url fn" rel="author">Michael Ashley Stein</a>, <a href="https://www.justsecurity.org/author/greenalex/" title="Profile and articles by Alex Green" class="author url fn" rel="author">Alex Green</a> and <a href="https://www.justsecurity.org/author/kayessrosemary/" title="Profile and articles by Rosemary Kayess" class="author url fn" rel="author">Rosemary Kayess</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98801/podcast-international-law-israel-palestine/">The Just Security Podcast: Assessing the Recent Response of International Law and Institutions in Palestine and Israel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/imseisardi/" title="Profile and articles by Ardi Imseis" class="author url fn" rel="author">Ardi Imseis</a>, <a href="https://www.justsecurity.org/author/hammourishahd/" title="Profile and articles by Shahd Hammouri" class="author url fn" rel="author">Shahd Hammouri</a>, <a href="https://www.justsecurity.org/author/kattanvictor/" title="Profile and articles by Victor Kattan" class="author url fn" rel="author">Victor Kattan</a>, <a href="https://www.justsecurity.org/author/sirleafmatiangai/" title="Profile and articles by Matiangai Sirleaf" class="author url fn" rel="author">Matiangai Sirleaf</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98754/biden-end-iraq-war/">A Presidential Proclamation to End the Iraq War: Unilateral Executive Action to Defang a Zombie AUMF</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98733/ukraine-icc-ratification/">Unforced Error: Article 124 and the Regrettable Caveat to Ukraine’s Proposed Ratification of the ICC Statute</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98674/911-plea-deals-revoked/">Revoking the 9/11 Plea Deals: Human Rights Consequences</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a></p> <p class="date">Aug 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98652/afghanistan-taliban-third-anniversary/">Collecting Just Security&#8217;s Afghanistan Coverage on Third Anniversary of Taliban Takeover</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a></p> <p class="date">Aug 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98592/sudan-talks-deadlock/">Breaking the Deadlock: New Talks Needed to Help End Sudan’s Violence and Offer a Glimmer of Hope</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/abdulshafiquscondy/" title="Profile and articles by Quscondy Abdulshafi" class="author url fn" rel="author">Quscondy Abdulshafi</a></p> <p class="date">Aug 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98543/fara-sue-mi-terry/">The Perils of Expertise: How the DOJ Indictment of Sue Mi Terry Can Chill the Think Tank World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/craiggregory/" title="Profile and articles by Gregory B. Craig" class="author url fn" rel="author">Gregory B. Craig</a></p> <p class="date">Aug 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98501/israel-trans-border-torture/">Justice for Trans-border Torture Requires Rethinking the International Criminal Court’s Jurisdiction in the Israel-Palestine Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ben-natansmadar/" title="Profile and articles by Smadar Ben-Natan" class="author url fn" rel="author">Smadar Ben-Natan</a> and <a href="https://www.justsecurity.org/author/mannitamar/" title="Profile and articles by Itamar Mann" class="author url fn" rel="author">Itamar Mann</a></p> <p class="date">Aug 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98445/our-lives-depend-on-cloud/">Our Lives Depend on the Cloud. Now What?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pendletonjohn/" title="Profile and articles by John Pendleton" class="author url fn" rel="author">John Pendleton</a> and <a href="https://www.justsecurity.org/author/leviteariel/" title="Profile and articles by Ariel Levite" class="author url fn" rel="author">Ariel Levite</a></p> <p class="date">Aug 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98429/security-council-report-isis-qaeda/">Wake Up Call: UN Security Council’s Report on ISIS and al-Qaeda</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Aug 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98378/podcast-assessing-laws-of-war/">The Just Security Podcast: Assessing the Laws of War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/droegecordula/" title="Profile and articles by Cordula Droege" class="author url fn" rel="author">Cordula Droege</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98313/podcast-hostage-policy/">The Just Security Podcast: The Evolution of U.S. Hostage Policy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/foleydiane/" title="Profile and articles by Diane Foley" class="author url fn" rel="author">Diane Foley</a>, <a href="https://www.justsecurity.org/author/hartigluke/" title="Profile and articles by Luke Hartig" class="author url fn" rel="author">Luke Hartig</a>, <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98273/the-aftermath-of-the-haniyeh-killing-how-to-avoid-a-new-middle-east-war/">The Aftermath of the Haniyeh Killing: How to Avoid a New Middle East War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98261/disability-think-differently-trump/">Donald Trump’s Dangerous Views on Disability and the Power to Think Differently</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97738/just-security-analysis-supreme-court/">Collecting Just Security&#8217;s Analysis of the Supreme Court&#8217;s Term</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a> and <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98205/prudential-trump-v-united-states/">A Prudential Way Forward in <i>Trump v. United States</i></a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bobbittphilip/" title="Profile and articles by Philip Bobbitt" class="author url fn" rel="author">Philip Bobbitt</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98091/negotiations-with-iran-now/">Space May be Opening for Negotiations with Iran</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brewgregory/" title="Profile and articles by Gregory Brew" class="author url fn" rel="author">Gregory Brew</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98128/united-nations-pact-for-future/">What the Draft UN &#8220;Pact for the Future&#8221; Tells Us About International Insecurity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gowanrichard/" title="Profile and articles by Richard Gowan" class="author url fn" rel="author">Richard Gowan</a></p> <p class="date">Jul 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98082/international-court-of-justices-call-on-all-states-to-end-israels-occupation-and-find-a-path-to-peace/">International Court of Justice’s Call on All States to End Israel’s Occupation and Find a Path to Peace</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nowrojeebinaifer/" title="Profile and articles by Binaifer Nowrojee" class="author url fn" rel="author">Binaifer Nowrojee</a></p> <p class="date">Jul 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98037/doj-special-counsel/"><i> United States v. Nixon </i> at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ledermanmarty/" title="Profile and articles by Marty Lederman" class="author url fn" rel="author">Marty Lederman</a></p> <p class="date">Jul 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97937/azerbaijan-arbitrary-detentions-host-cop29/">Azerbaijan’s Aliyev Extends Arbitrary Detentions Even as He Prepares to Host Global Climate Conference COP29</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bayramovazhala/" title="Profile and articles by Zhala Bayramova" class="author url fn" rel="author">Zhala Bayramova</a>, <a href="https://www.justsecurity.org/author/bayramovibad/" title="Profile and articles by Ibad Bayramov" class="author url fn" rel="author">Ibad Bayramov</a> and <a href="https://www.justsecurity.org/author/bayramliemin/" title="Profile and articles by Emin Bayramli" class="author url fn" rel="author">Emin Bayramli</a></p> <p class="date">Jul 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92714/american-autocracy-threat-tracker/">American Autocracy Threat Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/ben-ghiatruth/" title="Profile and articles by Ruth Ben-Ghiat" class="author url fn" rel="author">Ruth Ben-Ghiat</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a>, <a href="https://www.justsecurity.org/author/kolbjoshua/" title="Profile and articles by Joshua Kolb" class="author url fn" rel="author">Joshua Kolb</a>, <a href="https://www.justsecurity.org/author/warrenandrew/" title="Profile and articles by Andrew Warren" class="author url fn" rel="author">Andrew Warren</a>, <a href="https://www.justsecurity.org/author/kovacs-goodmanjacob/" title="Profile and articles by Jacob Kovacs-Goodman" class="author url fn" rel="author">Jacob Kovacs-Goodman</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97922/non-state-civilian-political-institutions/">Assessing the Civilian and Political Institutions of Armed Non-State Actors under International Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/fortinkatharine/" title="Profile and articles by Katharine Fortin" class="author url fn" rel="author">Katharine Fortin</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97826/state-departments-civilian-harm-incident-response/">The State Department’s Civilian Harm Incident Response Guidance: How to Make a Good Thing Better</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blahacharles/" title="Profile and articles by Charles O. (Cob) Blaha" class="author url fn" rel="author">Charles O. (Cob) Blaha</a></p> <p class="date">Jul 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/">Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jul 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97760/economic-security-presidential-power/">How ‘Economic Security’ is Re-shaping Presidential Power</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/claussenkathleen/" title="Profile and articles by Kathleen Claussen" class="author url fn" rel="author">Kathleen Claussen</a> and <a href="https://www.justsecurity.org/author/meyertimothy/" title="Profile and articles by Timothy Meyer" class="author url fn" rel="author">Timothy Meyer</a></p> <p class="date">Jul 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97747/trump-docs-case-dismissed/">Judge Cannon Finds Special Counsel Unconstitutional in Trump Classified Documents Case: What’s Next for Jack Smith?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Jul 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97718/nato-summit-ukraine-russia-china/">After the NATO Summit, Allies Need to Step Up Their Game on Ukraine, Russia, and China</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Jul 15th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia&#8217;s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis &#038; Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/77022/january-6-clearinghouse/">January 6 Clearinghouse</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a></p> <p class="date">Mar 14th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine &#8211; The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security&#8217;s Series on Reparations in Russia&#8217;s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the &#8220;War on Terror&#8221;</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 &#8220;Report Card&#8221; Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76692/introduction-to-just-securitys-series-on-tulsa-race-massacre-of-1921/">Introduction to Just Security’s Series on Tulsa Race Massacre of 1921</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bergerchristine/" title="Profile and articles by Christine Berger" class="author url fn" rel="author">Christine Berger</a></p> <p class="date">May 29th, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/rudesilldakota/">Dakota S. <span>Rudesill</span></a></h4><p>Dakota S. Rudesill (<a href="https://twitter.com/DakotaRudesill">@DakotaRudesill</a>) is Associate Professor of Law at the Moritz College of Law at The Ohio State University and Simulation Director at the Mershon Center for International Security Studies.</p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104922/early-warning-atrocities-technology/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/Xinjiang-surveillance-scaled-e1731983570416.jpg?fit=768%2C287&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104922/early-warning-atrocities-technology/">Early Warning in Atrocity Scenarios Must Account for the Effects of Technology, Good or Bad</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/dealessandrafederica/" title="Profile and articles by Federica D&#039;Alessandra" class="author url fn" rel="author">Federica D&#039;Alessandra</a> and <a href="https://www.justsecurity.org/author/gildeaross/" title="Profile and articles by Ross Gildea" class="author url fn" rel="author">Ross Gildea</a></p> <p class="date">Nov 19th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/12/Climate-collage-scaled.jpg?fit=768%2C308&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Just Security’s Climate Archive</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Nov 19th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/Ukraine-draft-scaled-e1731031520844.jpg?fit=768%2C290&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/04/BeFunky-collage-4-scaled.jpg?fit=768%2C293&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/">Just Security&#8217;s Artificial Intelligence Archive</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Nov 10th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104604/algorithm-driven-recruiter-federal-workers/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/GettyImages-1613530040-scaled.jpg?fit=768%2C677&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104604/algorithm-driven-recruiter-federal-workers/">What’s to Stop Algorithm-Driven Recruiters From Rejecting Able Federal Workers With Neuro-Divergent Disabilities?</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/sternsteinaliya/" title="Profile and articles by Aliya Sternstein" class="author url fn" rel="author">Aliya Sternstein</a></p> <p class="date">Nov 8th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/Kyrgyzstan-rally-for-Bolot-Temirov-scaled-e1730766826586.jpg?fit=768%2C309&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/2024-election-litigation-tracker-featured-image-3-scaled.jpg?fit=768%2C229&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104564/election-top-10-nov-4/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-1355381242-scaled-e1726616473587.jpg?fit=768%2C425&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104496/withdrawal-international-agreements-tailored-out/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2017/06/UN-Secretary-General-Major-Signatories-Hold-Press-Conference-on-Paris-Agreement-GettyImages-523215460.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104496/withdrawal-international-agreements-tailored-out/">Withdrawal from International Agreements: Toward a “Tailored Out”</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/amirfarcatherine/" title="Profile and articles by Catherine Amirfar" class="author url fn" rel="author">Catherine Amirfar</a> and <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a></p> <p class="date">Nov 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1645773156-1-scaled-e1730378694743.jpg?fit=768%2C295&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/89123/clearinghouse-georgia-election-interference-case/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/10/GettyImages-1615636969-scaled-e1696358547104.jpg?fit=768%2C397&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/89123/clearinghouse-georgia-election-interference-case/">Clearinghouse: Georgia Election Interference Case</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Nov 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/89121/clearinghouse-mar-a-lago-documents-case-southern-district-of-florida/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/10/GettyImages-1258564531-scaled-e1696358294467.jpg?fit=768%2C298&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/89121/clearinghouse-mar-a-lago-documents-case-southern-district-of-florida/">Clearinghouse: Mar-a-Lago Documents Case &#8211; Southern District of Florida</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Nov 1st, 2024</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">&copy; 2024 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/103818\/scenario-planning-january-6th\/":103818}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1732367063" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202447.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"103818\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.0\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "103818" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.0" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10