CINXE.COM
Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia's Influence Operations
<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia's Influence Operations</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v24.4) - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="The DOJ's recent actions stand as proof that cyber threat intelligence and legal action can counter the Kremlin's subversive threats." /> <link rel="canonical" href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia's Influence Operations" /> <meta property="og:description" content="The DOJ's recent actions stand as proof that cyber threat intelligence and legal action can counter the Kremlin's subversive threats." /> <meta property="og:url" content="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2024-10-08T12:42:09+00:00" /> <meta property="article:modified_time" content="2024-10-08T22:08:09+00:00" /> <meta property="og:image" content="https://www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-21695855961.jpg" /> <meta property="og:image:width" content="1024" /> <meta property="og:image:height" content="683" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Mason W. Krusch" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:description" content="The DOJ's recent actions stand as proof that cyber threat intelligence and legal action can counter the Kremlin's subversive threats." /> <meta name="twitter:image" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-21695855961.jpg?fit=1024%2C683&ssl=1" /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Mason W. Krusch" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="9 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#article","isPartOf":{"@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/e6ab5af5ecacc189309dfeba8e39eed6"}],"headline":"Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations","datePublished":"2024-10-08T12:42:09+00:00","dateModified":"2024-10-08T22:08:09+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/"},"wordCount":1996,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2169585596-scaled-e1727702920774.jpg?fit=2560%2C1335&ssl=1","keywords":["2024 Presidential Election","Artificial Intelligence (AI)","Covert Influence","Cyber","Department of Justice (DOJ)","Disinformation","Russia","Russia-Ukraine War","sanctions","United States (US)"],"articleSection":["Cyber","Democracy","Disinformation","Featured Articles","Intelligence activities","International and Foreign","Russia"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/","url":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/","name":"Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia's Influence Operations","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2169585596-scaled-e1727702920774.jpg?fit=2560%2C1335&ssl=1","datePublished":"2024-10-08T12:42:09+00:00","dateModified":"2024-10-08T22:08:09+00:00","description":"The DOJ's recent actions stand as proof that cyber threat intelligence and legal action can counter the Kremlin's subversive threats.","breadcrumb":{"@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2169585596-scaled-e1727702920774.jpg?fit=2560%2C1335&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2169585596-scaled-e1727702920774.jpg?fit=2560%2C1335&ssl=1","width":2560,"height":1335,"caption":"WASHINGTON, DC - SEPTEMBER 4: U.S. Attorney General Merrick Garland (C) accompanied from left, Principal Deputy Assistant Attorney General Nicole Argentieri, head of the Justice Department's Criminal Division, Deputy Attorney General Lisa Monaco, Garland, FBI Director Christopher Wray, and U.S. Assistant Attorney General for the National Security Division Matt Olsen, takes a question from a reporter during an Election Threats Task Force meeting at the Justice Department on September 4, 2024 in Washington, DC. Garland, who launched the task force three years ago after a steep increase in violent threats to election workers, reaffirmed his commitment to safeguarding election workers domestically and also announced two actions against Russia for attempted covert influence operations. (Photo by Andrew Harnik/Getty Images)"},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","contentUrl":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/e6ab5af5ecacc189309dfeba8e39eed6","name":"Mason W. Krusch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/d2523b52812cc136d01d6a9696a14eb1","url":"https://secure.gravatar.com/avatar/84708731d8598b8e0422b8e0713ecef5?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/84708731d8598b8e0422b8e0713ecef5?s=96&d=mm&r=g","caption":"Mason W. Krusch"},"description":"Mason W. Krusch is an independent researcher specializing in disinformation and influence operations. He has published several articles in the Global Internet Forum to Counter Terrorism’s Global Network on Extremism & Technology (GNET) investigating and proposing technology- and education-based countermeasures to far-right online radicalization and the proliferation of conspiracy theories normalizing political violence. Additionally, his recent peer-reviewed journal article for Small Wars & Insurgencies (Routledge) traces the historical development of Russia’s influence operations over the past half-century from Afghanistan and Chechnya to Ukraine. He has also written on the nexus between Russia’s public diplomacy and malign influence operations in Georgia for The Defence Horizon Journal. He holds a MS in Global Studies and International Relations from Northeastern University (Boston, MA) and a BA in History from the University of North Carolina at Chapel Hill. He is also on LinkedIn.","url":"https://www.justsecurity.org/author/kruschmasonw/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='preconnect' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security » Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.4 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.4'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/103317\/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1735053534' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-default-css' href='https://www.justsecurity.org/wp-content/tablepress-combined.min.css?ver=42' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedheader-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedheader.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedcolumns-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedcolumns.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-scroll-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.scroll-buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-rowgroup-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.rowgroup.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-responsive-tables-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/responsive-tables.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-columnfilterwidgets-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.columnfilterwidgets.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-column-filter-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.column-filter.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-datetime-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.datetime.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchbuilder-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchbuilder.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchhighlight-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchhighlight.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-select-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.select.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchpanes-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchpanes.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-serverside-processing-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.serverside-processing.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.18' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='popup-maker-site-css' href='//www.justsecurity.org/wp-content/uploads/pum/pum-site-styles.css?generated=1739227473&ver=1.20.4' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.3' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.3' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.4" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/103317" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-qSp' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F103317%2Fshattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F103317%2Fshattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations%2F&format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.1.1 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&ssl=1" /> </head> <body class="post-template-default single single-post postid-103317 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> <li id="menu-item-107744" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107744"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Admin Litigation Tracker</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#fff"/></svg> </a><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu-mobile-container"><ul id="menu-mobile" class="menu"><li id="menu-item-733" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-733"><a href="https://www.justsecurity.org">Home</a></li> <li id="menu-item-76571" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76571"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-76565" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76565"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-76533" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76533"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-76566" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76566"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76572" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76572"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-106458" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-106458"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> </ul> </li> <li id="menu-item-83989" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83989"><a href="https://www.buzzsprout.com/2074610">NEW: Podcast</a></li> <li id="menu-item-107745" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107745"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Administration Litigation Tracker</a></li> <li id="menu-item-93849" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-93849"><a href="https://www.youtube.com/@JustSecurityForum">YouTube</a></li> <li id="menu-item-82330" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-82330"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94074" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94074"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84715" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84715"><a href="https://www.justsecurity.org/tag/climate-change/">Climate Change</a></li> <li id="menu-item-82331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82331"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-82332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82332"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-82336" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82336"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82354" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82354"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-82338" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82338"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84716" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84716"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-82345" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82345"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-82340" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82340"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-82341" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82341"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-82342" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82342"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> <li id="menu-item-91477" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91477"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82353" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82353"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-82343" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82343"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-82344" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82344"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-82346" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82346"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82542" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82542"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84718" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84718"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-82348" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82348"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-82349" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82349"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> </ul> </li> <li id="menu-item-82351" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-82351"><a href="https://www.justsecurity.org/category/featured-new/">Featured Articles</a></li> <li id="menu-item-76568" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76568"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li id="menu-item-37577" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-37577"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li id="menu-item-76569" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76569"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Signups for A.M. and P.M. emails</a></li> </ul></div></div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2169585596-scaled-e1727702920774.jpg?fit=2560%2C1335&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1>Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p><p class="date">October 8, 2024</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-bluesky"><a rel="nofollow noopener noreferrer" data-shared="sharing-bluesky-103317" class="share-bluesky sd-button share-icon no-text" href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/?share=bluesky" target="_blank" title="Click to share on Bluesky" ><span></span><span class="sharing-screen-reader-text">Click to share on Bluesky (Opens in new window)</span></a></li><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-103317" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-103317" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-103317" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/2024-presidential-election/" rel="tag">2024 Presidential Election</a>, <a href="https://www.justsecurity.org/tag/artificial-intelligence/" rel="tag">Artificial Intelligence (AI)</a>, <a href="https://www.justsecurity.org/tag/covert-influence-operations/" rel="tag">Covert Influence</a>, <a href="https://www.justsecurity.org/tag/cyber/" rel="tag">Cyber</a>, <a href="https://www.justsecurity.org/tag/department-of-justice/" rel="tag">Department of Justice (DOJ)</a>, <a href="https://www.justsecurity.org/tag/disinformation/" rel="tag">Disinformation</a>, <a href="https://www.justsecurity.org/tag/russia/" rel="tag">Russia</a>, <a href="https://www.justsecurity.org/tag/russia-ukraine-war/" rel="tag">Russia-Ukraine War</a>, <a href="https://www.justsecurity.org/tag/sanctions/" rel="tag">sanctions</a>, <a href="https://www.justsecurity.org/tag/united-states/" rel="tag">United States (US)</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p><p class="date">October 8, 2024</p></div><p>On Sept. 4–5, in a potent demonstration of the efficacy of legal countermeasures founded on actionable cyber threat intelligence, the U.S. Department of Justice (DOJ) and Treasury Department unleashed a <a href="https://www.lawfaremedia.org/article/the-u.s.-government's-busy-week-combating-russian-operatives">whirlwind</a> of seizures, indictments, and sanctions targeting assets of Russia’s malign influence operations. This spate of legal action comes as the Kremlin seeks to not only undermine U.S. support for Ukraine, but also erode Americans’ trust in democratic institutions in the lead-up to the 2024 presidential election. Russia’s efforts to influence U.S. public opinion, which the Office of the Director of National Intelligence (ODNI) has identified as the <a href="https://www.dni.gov/files/FMIC/documents/ODNI-Election-Security-Update-20240729.pdf">primary threat</a> to the U.S. elections, threaten the internal stability and national security of the United States by <a href="https://www.dni.gov/files/FMIC/documents/ODNI-Election-Security-Update-20240906.pdf">amplifying divisive rhetoric</a> over contentious U.S. domestic issues that exacerbate political polarization.</p> <p>The most striking aspect of the U.S. government’s response to Russia’s influence operations is the DOJ’s novel use of trademark law to <a href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">seize 32 web domains</a> that constituted part of <a href="https://www.disinfo.eu/doppelganger-operation/">Doppelganger</a>, a Russian operation that tried to pass off its pro-Kremlin news outlets as legitimate Western media. The seizure of these domains — together with other actions from the DOJ and Treasury — thus stands as a salient proof that the skillful joint employment of cyber threat intelligence and legal action can effectively counter the Kremlin’s subversive threats, even as Russia continues to violate international law. There remain, however, a variety of challenges to comprehensively mitigating foreign malign influence operations, and lawmakers, government officials, and social media companies must heed these difficulties in order to render ongoing countermeasures effective in the long run.</p> <h2><b>Parallel Worlds: How Doppelganger Creates Alternative Political Realities</b></h2> <p>Spearheaded by the Kremlin as an alternative way to reach western audiences in the aftermath of the February 2022 invasion of Ukraine — which saw influential Russian state-owned media outlets such as RT <a href="https://www.politico.com/news/2024/09/04/russia-election-interference-crackdown-merrick-garland-00177347">cease</a> televised broadcasts in the U.S. following bans by regulatory authorities in both the <a href="https://www.reuters.com/business/media-telecom/uk-media-regulator-revokes-russian-backed-television-channel-rts-licence-2022-03-18/">United Kingdom</a> and <a href="https://www.reuters.com/world/europe/eu-bans-rt-sputnik-banned-over-ukraine-disinformation-2022-03-02/">European Union</a> — Doppelganger <a href="https://www.cybercom.mil/Media/News/Article/3895345/russian-disinformation-campaign-doppelgnger-unmasked-a-web-of-deception/">utilizes a complex network</a> of social media accounts, automated bots, paid advertisements, and fraudulent news websites to deceive readers into believing that its Kremlin-aligned content is in fact authentically produced by domestic Western media.</p> <p>Since its inception in 2022, Doppelganger has evolved into a comprehensive operation that <a href="https://www.memeticwarfare.io/p/emergency-edition-got-that-doj-in">exploits divisive issues</a> – including immigration, energy prices, government spending, and the war in Ukraine – to foment discord within and among the United States and NATO. In doing so, Doppelganger — and Russian malign influence operations more broadly — aims to undermine U.S. national security by degrading political cohesion within the United States and with its partners abroad.</p> <p>Doppelganger operates through <a href="https://dfrlab.org/2024/09/06/how-doppelganger-and-other-russia-linked-operations-target-us-elections/">information laundering</a>, a process in which Russian operatives seed content containing Kremlin-aligned narratives into public discourse by using obscure “burner” social media accounts to share links to articles published on illegitimate web domains. Such illegitimate or “cybersquatting” domains — whose appearance is often virtually indistinguishable from the legitimate domains they imitate — mimic a variety of legitimate U.S. and international media outlets from across the political spectrum. Such illegitimate domains <a href="https://www.justice.gov/opa/media/1366261/dl#page=38">include</a>, for instance, washingtonpost[.]ltd and welt[.]media, spoofs of legitimate media outlets such as <i>The Washington Post</i> (washingtonpost.com) and <i>Die Welt</i> (welt.de).</p> <p>Not only is this content consumed by ordinary social media users, but some of it is also picked up by large influencer accounts which — often ignorant of the content’s pedigree — repost it to their own feeds, thus creating a layering process that generates a semblance of authenticity while obfuscating the original source. By leveraging influencer accounts’ broader audience, Doppelganger is able to disseminate its content to a large swath of users without having to first invest in the time-consuming process of building up an authentic following.</p> <p>Part of what enables Doppelganger to amplify its reach is its use of AI tools. In addition to using AI to <a href="https://www.justice.gov/opa/media/1366261/dl#page=31">generate images and video</a> as well as <a href="https://www.justice.gov/opa/media/1366261/dl#page=52">write and post articles and comments</a>, an OpenAI <a href="https://openai.com/index/disrupting-deceptive-uses-of-AI-by-covert-influence-operations/">report</a> from May revealed that Doppelganger has also employed its AI models to translate original content into multiple languages and convert articles into social media posts. The use of AI tools in influence operations is not unique to Russia — both <a href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf">Iran</a> and <a href="https://public-assets.graphika.com/reports/graphika-report-the-americans.pdf">China</a> have utilized such assets to generate content as part of their respective <a href="https://www.fdd.org/analysis/2024/08/19/openai-deactivates-iranian-chatgpt-accounts-involved-in-influence-operation/">Storm-2035</a> and <a href="https://www.forbes.com/sites/petersuciu/2024/09/10/chinas-spamouflage-aims-to-confuse-voters-ahead-of-election/">Spamouflage</a> operations aimed at influencing U.S. public opinion. In each case, AI tools have served to accelerate the pace of operations and further expand their scale by facilitating the rapid generation of content in multiple languages.</p> <h2><b>Unusual Measures for Unusual Beasts: Finding Effective Legal Mechanisms</b></h2> <p>Notwithstanding Russia’s employment of AI to expedite and broaden its content dissemination, the imitation of legitimate domains became Doppelganger’s Achilles’ heel. Because Doppelganger’s virtually identical twins of legitimate domains copied trademarked designs, the DOJ alleged that Doppelganger’s illegitimate spoofs <a href="https://www.justice.gov/opa/media/1366261/dl#page=4">violated the prohibition</a> against the trafficking in counterfeit goods and services <a href="https://www.law.cornell.edu/uscode/text/18/2320">codified</a> in 18 U.S.C. § 2320. Indeed, the use of trademark law to seize the domains is an innovative approach to countering foreign malign influence operations, and one whose legal ingenuity ought to serve as an inspirational basis for the resourceful wielding of conventional legal mechanisms as effective and actionable countermeasures against disinformation.</p> <p>In addition to using trademark laws to seize various Doppelganger domains, the DOJ has also utilized anti-money laundering (AML) laws <a href="https://www.law.cornell.edu/uscode/text/18/1956">codified</a> in 18 U.S.C. §1956 to counter Russia’s influence operations. In the recently released <a href="https://www.justice.gov/opa/media/1366261/dl#page=3">affidavit</a>, the DOJ maintained that Doppelganger operatives had violated AML laws by purchasing domains from U.S. registries or registrars (domain name providers) on behalf of sanctioned individuals and entities. These sanctioned individuals and entities include First Deputy Chief of Staff of the Presidential Executive Office Sergei Vladilenovich Kiriyenko, Ilya Gambashidze, Nikolai Tupikin, Social Design Agency (SDA), and Structura National Technology.</p> <p>Furthermore, in another <a href="https://www.justice.gov/d9/2024-09/u.s._v._kalashnikov_and_afanasyeva_indictment_0.pdf">indictment</a> from Sept. 4, the DOJ accused two Russian nationals and RT employees — Kostiantyn Kalashnikov and Elena Afanasyeva — of not only violating the Foreign Agents Registration Act, but for also laundering $10 million through foreign shell companies to fund and manage a Tennessee-based content creation company — since confirmed to be <a href="https://apnews.com/article/russia-justice-department-election-foreign-influence-4888f4bfc61e46173101060ad0321d2f">Tenet Media</a> — in order to advance Kremlin-aligned narratives. Similarly, on September 5 the DOJ unsealed yet another indictment <a href="https://www.justice.gov/opa/pr/tv-presenter-who-worked-channel-one-russia-charged-violating-us-sanctions-imposed-russia">accusing</a> U.S. citizens Dimitri and Anastasia Simes — the former of whom served as a host and producer of the sanctioned Russian media outlet Channel One Russia — of laundering $1 million in payments through the (also sanctioned) Russian bank Rosbank in <a href="https://www.justice.gov/opa/media/1366396/dl#page=7">violation</a> of the International Emergency Economic Powers Act.</p> <h2><b>What it All Means: How Cyber Intelligence Supports Legal Action</b><b> </b></h2> <p>The seizure of the Doppelganger domains evinces that existing legal mechanisms enacted in tandem with increased collaboration among federal law enforcement, the DOJ, and cyber threat intelligence investigators can constitute actionable and effective countermeasures against foreign malign influence operations. In the case of indictments, however, although “naming and shaming” might send a message to Russia or deter would-be hackers, it is unlikely to have significant impact so long as the indicted remain at large in countries not bound by any extradition treaty with the United States.</p> <p>Alternatively, the Treasury’s Sept. 4 decision to <a href="https://home.treasury.gov/news/press-releases/jy2559">sanction</a> 10 persons and two entities — including Kalashnikov and Afanasyeva — involved in Russia’s broader influence operations stands as a more effective legal mechanism insofar as it directly limits the sanctioned persons’ and entities’ financial maneuverability. Continuing to counter foreign malign influence operations by <a href="https://www.fdd.org/wp-content/uploads/2024/09/fdd-memo-how-u.s.-adversaries-undermine-the-perception-of-election-integrity.pdf#page=12">targeting operatives’ financial channels</a> is thus a prudent countermeasure that the Office of Foreign Assets Control should further pursue.</p> <p>Additionally, while existing AML laws are an important mechanism for countering influence operations, given that social media remains a largely permissive space in which foreign actors can conduct their malign operations — whether used to <a href="https://gnet-research.org/2024/09/04/inside-hamass-pocketbook-financing-terrorism-through-online-financial-platforms/">crowdfund for terrorist organizations</a> or to disseminate disinformation in general — lawmakers ought to consider increasing regulation of social media platforms’ content moderation policies. Although some analysts <a href="https://www.politico.com/news/magazine/2024/09/25/russian-disinformation-is-spreading-europe-could-learn-from-the-us-00180708">argue</a> that foreign malign influence operations can be countered most effectively by targeting the sources of disinformation rather than the channels propagating them, seizing domains is only practical when they are registered to registrars in the United States or partner states. Similarly, social media companies such as <a href="https://www.reuters.com/business/media-telecom/meta-bans-rt-other-russian-state-media-networks-2024-09-17/">Meta</a> and <a href="https://therecord.media/tiktok-russian-state-media-accounts-ban">TikTok</a> have recently moved to ban Russian state media outlets such as RT and Rossiya Segodnya for engaging in what the former <a href="https://www.cbsnews.com/news/meta-bans-rt-other-russian-state-media-outlets-foreign-interference-activity/">has called</a> “foreign interference activity.”</p> <p>While banning state media outlets engaged in foreign malign influence operations is an important step in stemming the flow of disinformation, it is only a partial solution. A report from the Institute for Strategic Dialogue <a href="https://www.isdglobal.org/wp-content/uploads/2022/10/Effectiveness-of-the-sanctions-on-Russian-state-media-1.pdf#page=5">demonstrate</a>d that, even after being banned in the European Union, content from Russian state media continued to reach European audiences, as Russian operatives utilized “mirror domains” – identical copies of banned domains that use different domain names – to bypass algorithms. Because a plethora of <a href="https://insightnews.media/how-rt-clones-websites-to-spread-kremlin-propaganda-and-circumvent-sanctions/">mirror domains</a> remain active and evade bans targeting official state media, social media companies must take further action to ensure that content derived from banned sources – even when not directly emanating from them – is still blocked. Such mirror domains – and instances where social media accounts simply <a href="https://ghostarchive.org/archive/oBliE">copy and paste</a> content from Russian state media – might, for instance, be countered through the use of <a href="https://gifct.org/wp-content/uploads/2021/07/GIFCT-TaxonomyReport-2021.pdf#page=19">text-detection methods</a> such as natural language processing.</p> <p>Given reasonable concerns over freedom of speech, such regulation ought to be handled with care and transparency so as to ensure the necessary maintenance of civil liberties. Rather than any draconian curtailment of freedom of speech, such regulation might involve mandating that social media companies create, maintain, and adequately enforce content moderation policies in line with standards set forth by government officials crafted through consultation with representatives from civil society. As noted in the E.U.’s 2022 Digital Services Act, responsible internal behavior by social media companies is not a hindrance to freedom of expression, but rather fosters a <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022R2065#page=2">“safe, predictable and trustworthy online environment”</a> in which those rights can be exercised while mitigating against foreign actors’ efforts to pervert those very rights and thus undermine states’ national security and the integrity of their democratic institutions.</p> <p>Furthermore, government officials would benefit from liaising with tech companies to develop more robust standards — rather than <a href="https://theconversation.com/algorithms-are-pushing-ai-generated-falsehoods-at-an-alarming-rate-how-do-we-stop-this-224626">“best effort”</a> approaches — for the regulation of AI content, placing transparency and reasonable disclosure requirements at the forefront. There are already a litany of bills <a href="https://www.brennancenter.org/our-work/research-reports/artificial-intelligence-legislation-tracker">proposing</a> various regulatory requirements for AI, though in general, such regulations might <a href="https://www.congress.gov/bill/118th-congress/senate-bill/4674/text">mandate watermarking or otherwise labeling</a> AI-generated content in concert with efforts to promote awareness of such content as part of broader <a href="https://ssir.org/articles/entry/strengthen_media_literacy_to_win_the_fight_against_misinformation">media and digital literacy</a> education initiatives. Finding constructive ways to regulate AI tools and content is particularly important since recent research suggests that search engines are increasingly <a href="https://www.techradar.com/computing/search-engines/google-search-might-be-getting-worse-and-ai-threatens-to-ruin-it-entirely">promoting AI-generated content</a> due to search engine optimization (SEO) algorithms’ preference for their simple and repetitive quality.</p> <p>As a final recommendation, cyber threat intelligence investigators and legal teams should work together more closely to identify and seize illegitimate domains before social media networks can share their content. Given that Doppelganger domains are <a href="https://www.qurium.org/alerts/exposing-the-evil-empire-of-doppelganger-disinformation/">hosted on a variety of foreign servers</a>, this necessitates increased interagency collaboration between foreign intelligence services. By deepening partnerships with private cybersecurity firms, social media and tech companies, non-profits, and foreign intelligence services, government agencies can further augment the resource pool at their disposal in countering disinformation. In total, leveraging existing laws, crafting new regulation to meet present challenges, enhancing industry partnerships, and bolstering ties between civil society and government constitute steps that collectively stand to facilitate the development of a more coordinated and adroit response force capable of effectively countering foreign malign influence operations.</p> <h6><em>IMAGE: U.S. Attorney General Merrick Garland (C) accompanied from left, Principal Deputy Assistant Attorney General Nicole Argentieri, head of the Justice Department’s Criminal Division, Deputy Attorney General Lisa Monaco, Garland, FBI Director Christopher Wray, and U.S. Assistant Attorney General for the National Security Division Matt Olsen, takes a question from a reporter during an Election Threats Task Force meeting at the Justice Department on September 4, 2024 in Washington, DC. (Photo by Andrew Harnik/Getty Images)<br /> </em></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/2024-presidential-election/" rel="tag">2024 Presidential Election</a>, <a href="https://www.justsecurity.org/tag/artificial-intelligence/" rel="tag">Artificial Intelligence (AI)</a>, <a href="https://www.justsecurity.org/tag/covert-influence-operations/" rel="tag">Covert Influence</a>, <a href="https://www.justsecurity.org/tag/cyber/" rel="tag">Cyber</a>, <a href="https://www.justsecurity.org/tag/department-of-justice/" rel="tag">Department of Justice (DOJ)</a>, <a href="https://www.justsecurity.org/tag/disinformation/" rel="tag">Disinformation</a>, <a href="https://www.justsecurity.org/tag/russia/" rel="tag">Russia</a>, <a href="https://www.justsecurity.org/tag/russia-ukraine-war/" rel="tag">Russia-Ukraine War</a>, <a href="https://www.justsecurity.org/tag/sanctions/" rel="tag">sanctions</a>, <a href="https://www.justsecurity.org/tag/united-states/" rel="tag">United States (US)</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/">The Disastrous Costs of the Foreign Aid Freeze on US Interests in the Middle East and North Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/binderseth/" title="Profile and articles by Seth Binder" class="author url fn" rel="author">Seth Binder</a>, <a href="https://www.justsecurity.org/author/colesheridan/" title="Profile and articles by Sheridan Cole" class="author url fn" rel="author">Sheridan Cole</a> and <a href="https://www.justsecurity.org/author/welchhaydn/" title="Profile and articles by Haydn Welch" class="author url fn" rel="author">Haydn Welch</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/">What Just Happened: Purges at the DOJ and FBI — How Do and Don’t the Civil Service Laws Apply</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hillsroderick/" title="Profile and articles by Roderick M. Hills" class="author url fn" rel="author">Roderick M. Hills</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/">Freezing Support to Democracy and Human Rights Activists Undermines US Interests</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/busbyscott/" title="Profile and articles by Scott Busby" class="author url fn" rel="author">Scott Busby</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/">Supporting Freedom and a Foreign Aid Freeze are Incompatible — But Perhaps the Point? A Case Study</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/thorntonlaura/" title="Profile and articles by Laura Thornton" class="author url fn" rel="author">Laura Thornton</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/givensalexandrareeve/" title="Profile and articles by Alexandra Reeve Givens" class="author url fn" rel="author">Alexandra Reeve Givens</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107770/cartels-foreign-terrorism-designation/">The Need for Course Correction: The Risks of Treating Drug Cartels as Terrorist Threats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/harvindonell/" title="Profile and articles by Donell Harvin" class="author url fn" rel="author">Donell Harvin</a></p> <p class="date">Feb 12th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/">What Just Happened: Security Implications of Trump’s Efforts to Trim the CIA Workforce</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finleyalex/" title="Profile and articles by Alex Finley" class="author url fn" rel="author">Alex Finley</a></p> <p class="date">Feb 7th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107245/deepseek-ai-competition/">What DeepSeek Really Changes About AI Competition</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pilzkonstantinf/" title="Profile and articles by Konstantin F. Pilz" class="author url fn" rel="author">Konstantin F. Pilz</a> and <a href="https://www.justsecurity.org/author/heimlennart/" title="Profile and articles by Lennart Heim" class="author url fn" rel="author">Lennart Heim</a></p> <p class="date">Feb 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107267/can-president-dissolve-usaid-by-executive-order/">Can the President Dissolve USAID by Executive Order?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Feb 1st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107110/trump-purge-justice-department/">The Real Reason Trump’s Purge of Career DOJ Officials Should Alarm You</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/zdebsara/" title="Profile and articles by Sara Zdeb" class="author url fn" rel="author">Sara Zdeb</a></p> <p class="date">Jan 30th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107094/deferred-resignation-dubious-federal-employees/">Beware the “Deferred Resignation” Offer: A Legally Dubious Proposal for Federal Employees</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/summerlinsuzanne/" title="Profile and articles by Suzanne Summerlin" class="author url fn" rel="author">Suzanne Summerlin</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107030/invasion-executive-order-military-authorities/">What Just Happened: The Framing of a Migration “Invasion” and the Use of Military Authorities</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bankswilliam/" title="Profile and articles by William Banks" class="author url fn" rel="author">William Banks</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107029/fbi-director-weaponization-government-executive-order/">Understanding Trump’s Choice for FBI Leadership in Light of the“Weaponization of the Federal Government” Executive Order</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gersonstuart/" title="Profile and articles by Stuart M. Gerson" class="author url fn" rel="author">Stuart M. Gerson</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106969/trump-dictatorial-theory-presidential-power-executive-orders/">Trump’s Dictatorial Theory of Presidential Power – What the Executive Orders, in the Aggregate, Tell Us</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/morrisontrevor/" title="Profile and articles by Trevor Morrison" class="author url fn" rel="author">Trevor Morrison</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106953/invasion-executive-order-implications/">What Just Happened: The “Invasion” Executive Order and Its Dangerous Implications</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106919/stopped-security-assistance/">Stopped Security Assistance: From Counter-Narcotics to Combating Human Trafficking Programs</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/randdafnah/" title="Profile and articles by Dafna H. Rand" class="author url fn" rel="author">Dafna H. Rand</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106856/international-criminal-court-call-for-justice/">We Need the International Legal Order: A Call to Protect the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/iccasppresidents/" title="Profile and articles by The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court" class="author url fn" rel="author">The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106775/israel-hamas-ceasefire/">Israel-Hamas Ceasefire: Temporary Reprieve or Sustainable Peace?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/millerandrew/" title="Profile and articles by Andrew Miller" class="author url fn" rel="author">Andrew Miller</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106846/syria-international-criminal-court/">Syria Needs the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rothkenneth/" title="Profile and articles by Kenneth Roth" class="author url fn" rel="author">Kenneth Roth</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106804/what-just-happened-trumps-executive-actions-us-climate-security/">What Just Happened: Trump’s Executive Actions on Environment and Implications for US Climate Security</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ellisontom/" title="Profile and articles by Tom Ellison" class="author url fn" rel="author">Tom Ellison</a></p> <p class="date">Jan 24th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106738/trump-privacy-oversight-board-surveillance/">What Just Happened: What Trump’s Hobbling of the Privacy Oversight Board Portends for Exercise of Surveillance Powers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106689/january-6-pardons-statistics/">What Just Happened: Trump’s January 6 Pardons and Assaults on Law Enforcement Officers By The Numbers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106593/national-emergency-southern-border-order/">What Just Happened: Unpacking Exec Order on National Emergency at the Southern Border</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nevittmark/" title="Profile and articles by Mark Nevitt" class="author url fn" rel="author">Mark Nevitt</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106627/what-just-happened-with-icc-sanctions/">What Just Happened: With ICC Sanctions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106567/bidens-cybersecurity-eo-what-comes-next-trump/">Biden’s Cybersecurity Executive Order and What Comes Next Under Trump</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106509/georgia-protests-trump-influence/">Crisis in Georgia: Why the Trump Administration Should Step In To Shore Up US Influence</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a> and <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a></p> <p class="date">Jan 17th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106427/unpacking-the-biden-administrations-executive-order-on-ai-infrastructure/">Unpacking the Biden Administration’s Executive Order on AI Infrastructure</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jan 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106278/highlights-jack-smith-january-6th-final-report/">3 Highlights in Special Counsel Jack Smith’s Final Report on 2020 Election Subversion Case</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106313/questions-pam-bondi-attorney-general/">Questions for Senators (And Journalists) to Ask Attorney General Nominee Pam Bondi</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106317/questions-rubio-secretary-of-state-nominee/">Questions for Senators (and Journalists) to Ask Secretary of State Nominee Marco Rubio</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106283/how-not-to-decide-tiktok-u-s-press-freedom-hangs-in-the-balance/">How Not to Decide TikTok: U.S. press freedom hangs in the balance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coledavid/" title="Profile and articles by David Cole" class="author url fn" rel="author">David Cole</a></p> <p class="date">Jan 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106247/inspector-general-january-6th/">Unpacking the Inspector General Report on January 6th and FBI “False Flag” Conspiracies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 10th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106146/national-security-resilience-reform/">National Security Resilience and Reform: Trump 2.0 and Beyond</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Jan 8th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106105/announcement-ai-emerging-technologies-initiative/">Announcing Just Security’s Artificial Intelligence and Emerging Technologies Initiative</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 6th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105879/suing-taliban-icj-abuses-afghan-women/">Suing the Taliban at the ICJ Over Abuses of Afghan Women Isn’t a Panacea. Countries Must Do More Now.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/huckerbyjayne/" title="Profile and articles by Jayne Huckerby" class="author url fn" rel="author">Jayne Huckerby</a></p> <p class="date">Jan 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105991/just-security-2024-book-recommendations/">The Just Security 2024 Year-End Book Recommendations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Dec 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105981/ukraine-russia-human-safari-tactic/">Russia’s “Human Safari” Terror Tactic in Key Southeastern Ukraine Region of Kherson</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sapuppomercedes/" title="Profile and articles by Mercedes Sapuppo" class="author url fn" rel="author">Mercedes Sapuppo</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105944/us-iran-diplomacy-nuclear/">U.S. Options for Iran Diplomacy in 2025</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/davenportkelsey/" title="Profile and articles by Kelsey Davenport" class="author url fn" rel="author">Kelsey Davenport</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105917/interim-report-icj-climate-opinion/">An Interim Report on the ICJ’s Climate Advisory Opinion</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hericorina/" title="Profile and articles by Corina Heri" class="author url fn" rel="author">Corina Heri</a></p> <p class="date">Dec 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105909/challenging-china-human-rights/">New Challenges to Xi Jinping’s Alternative Facts on Taiwan: Lessons for the Human Rights Space, Too</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/richardsonsophie/" title="Profile and articles by Sophie Richardson" class="author url fn" rel="author">Sophie Richardson</a></p> <p class="date">Dec 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105752/ai-presidency/">The AI Presidency: What “America First” Means for Global AI Governance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Dec 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105735/trump-administration-sanctions-africa/">The First Trump Administration Used Sanctions Effectively in Africa. Here’s How That Can Resume in the Second Term.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Dec 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105708/icc-standard-proof-head-state/">Does the Int’l Criminal Court Impose Too Low a Standard of Proof to Arrest a Head of State?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a> and <a href="https://www.justsecurity.org/author/trumbullcharlie/" title="Profile and articles by Charlie Trumbull" class="author url fn" rel="author">Charlie Trumbull</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105638/biden-bosnia-security-troops/">Biden’s Unfinished Business: A Bridge to Shore Up a European Flank – in the Balkans</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bassuenerkurt/" title="Profile and articles by Kurt Bassuener" class="author url fn" rel="author">Kurt Bassuener</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105640/georgia-protests-us-sanctions/">Georgia Risks Falling to a Violent One-Party Regime. The Biden Administration Must Act Now to Stop Its Slide.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105627/syria-freedom-governance-local-approach-constitutionalism/">Syrians’ Pursuit of Freedom and Self-Governance: Prioritizing a Locally-Driven and Incremental Approach to Constitutionalism</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alrwishdideyaa/" title="Profile and articles by Deyaa Alrwishdi" class="author url fn" rel="author">Deyaa Alrwishdi</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105593/foreign-agent-laws-impact/">The Spreading Impact of Restrictive ‘Foreign Agent’ Laws and How to Stop Them</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/cameronjasmine/" title="Profile and articles by Jasmine D. Cameron" class="author url fn" rel="author">Jasmine D. Cameron</a> and <a href="https://www.justsecurity.org/author/nicolafernandag/" title="Profile and articles by Fernanda G. Nicola" class="author url fn" rel="author">Fernanda G. Nicola</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105552/public-framing-mass-deportation/">The Public Framing of Mass Deportation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105538/interpol-transparency-reform/">Interpol General Assembly Inches Forward on Transparency, Still Needs Reform Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a> and <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105406/georgia-protests-letter-us-diplomats/">Open Letter on Georgia from Former US Diplomats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/herbstjohne/" title="Profile and articles by Ambassador (ret) John E. Herbst" class="author url fn" rel="author">Ambassador (ret) John E. Herbst</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105321/military-immigration-enforcement-deportation/">Deployment of the U.S. Military for Immigration Enforcement: A Primer</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105181/drones-graves-mexicos-disappeared/">Camera-Fitted Drones May Help Locate Graves of Mexico’s Disappeared</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/garciareyeskarina/" title="Profile and articles by Karina García-Reyes" class="author url fn" rel="author">Karina García-Reyes</a> and <a href="https://www.justsecurity.org/author/moctezumamiguel/" title="Profile and articles by Miguel Moctezuma" class="author url fn" rel="author">Miguel Moctezuma</a></p> <p class="date">Nov 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105176/birthright-citizenship-undocumented-immigrants-2/">Birthright Citizenship and Undocumented Immigrants</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Nov 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts & Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To ‘End’ War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine — and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon’s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who’s Who in Jack Smith’s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN’s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Litigation Tracker: Legal Challenges to Trump Administration Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia’s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis & Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine – The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security’s Series on Reparations in Russia’s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the “War on Terror”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 “Report Card” Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/kruschmasonw/">Mason W. <span>Krusch</span></a></h4><p>Mason W. Krusch is an independent researcher specializing in disinformation and influence operations.</p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/105451/trumps-endgame-ukraine-war/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/12/GettyImages-1152460290-scaled-e1733326565387.jpg?fit=768%2C372&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/105451/trumps-endgame-ukraine-war/">Trump’s Endgame for the War in Ukraine</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/kelly/" title="Profile and articles by Michael J. Kelly" class="author url fn" rel="author">Michael J. Kelly</a> and <a href="https://www.justsecurity.org/author/martincraig/" title="Profile and articles by Craig Martin" class="author url fn" rel="author">Craig Martin</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-1708090700-e1739498634981.jpg?fit=768%2C302&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/">The Disastrous Costs of the Foreign Aid Freeze on US Interests in the Middle East and North Africa</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/binderseth/" title="Profile and articles by Seth Binder" class="author url fn" rel="author">Seth Binder</a>, <a href="https://www.justsecurity.org/author/colesheridan/" title="Profile and articles by Sheridan Cole" class="author url fn" rel="author">Sheridan Cole</a> and <a href="https://www.justsecurity.org/author/welchhaydn/" title="Profile and articles by Haydn Welch" class="author url fn" rel="author">Haydn Welch</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-1319115983-scaled-e1739486983844.jpg?fit=768%2C385&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/">What Just Happened: Purges at the DOJ and FBI — How Do and Don’t the Civil Service Laws Apply</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/hillsroderick/" title="Profile and articles by Roderick M. Hills" class="author url fn" rel="author">Roderick M. Hills</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107832/us-china-standoff-afghanistan-un/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/china-security-council-e1739452564443.jpg?fit=768%2C269&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107832/us-china-standoff-afghanistan-un/">US-China Standoff on Who Runs the Afghanistan File at UN Signals Greater Tensions Ahead</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/gowanrichard/" title="Profile and articles by Richard Gowan" class="author url fn" rel="author">Richard Gowan</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/01/GettyImages-2194985261-scaled.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Georgia-protests-police-scaled-e1739431019325.jpg?fit=768%2C282&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/">Supporting Freedom and a Foreign Aid Freeze are Incompatible — But Perhaps the Point? A Case Study</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/thorntonlaura/" title="Profile and articles by Laura Thornton" class="author url fn" rel="author">Laura Thornton</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2176222391-scaled.jpg?fit=768%2C441&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/givensalexandrareeve/" title="Profile and articles by Alexandra Reeve Givens" class="author url fn" rel="author">Alexandra Reeve Givens</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107813/podcast-artificial-intelligence-action-summit/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Screenshot-2025-02-12-at-1.04.13%E2%80%AFPM.png?fit=677%2C293&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107813/podcast-artificial-intelligence-action-summit/">The Just Security Podcast: Key Takeaways from the Paris AI Action Summit</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Feb 12th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107718/trump-ukraine-deal-foreign-aid/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Ukraine-power-plant-war-damage-e1739241978685.jpg?fit=768%2C296&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107718/trump-ukraine-deal-foreign-aid/">Trump’s Ukraine Deal Requires Foreign Aid</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rudolphjoshua/" title="Profile and articles by Josh Rudolph" class="author url fn" rel="author">Josh Rudolph</a></p> <p class="date">Feb 11th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/04/BeFunky-collage-4-scaled.jpg?fit=768%2C293&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/">Just Security’s Artificial Intelligence Archive</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Feb 11th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107533/restarting-us-lng-permitting-geopolitical-benefits/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2193208056-scaled-e1738871611836.jpg?fit=768%2C406&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107533/restarting-us-lng-permitting-geopolitical-benefits/">Restarting US LNG Permitting Brings Geopolitical Benefits and the Potential for Climate Progress</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/lomaxsimon/" title="Profile and articles by Simon Lomax" class="author url fn" rel="author">Simon Lomax</a>, <a href="https://www.justsecurity.org/author/cloughgreg/" title="Profile and articles by Greg Clough" class="author url fn" rel="author">Greg Clough</a> and <a href="https://www.justsecurity.org/author/bazilianmorgan/" title="Profile and articles by Morgan Bazilian" class="author url fn" rel="author">Morgan Bazilian</a></p> <p class="date">Feb 10th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-6352696521-scaled-e1738895327729.jpg?fit=768%2C310&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/">What Just Happened: Security Implications of Trump’s Efforts to Trim the CIA Workforce</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/finleyalex/" title="Profile and articles by Alex Finley" class="author url fn" rel="author">Alex Finley</a></p> <p class="date">Feb 7th, 2025</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#2D8097"/></svg></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">© 2025 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <div id="pum-107566" role="dialog" aria-modal="false" aria-labelledby="pum_popup_title_107566" class="pum pum-overlay pum-theme-107555 pum-theme-default-theme-2 popmake-overlay pum-overlay-disabled auto_open click_open" data-popmake="{"id":107566,"slug":"finding-our-content-helpful","theme_id":107555,"cookies":[{"event":"on_popup_close","settings":{"name":"pum-107566","time":"1 week","path":true}}],"triggers":[{"type":"auto_open","settings":{"cookie_name":["pum-107566"],"delay":"30000"}},{"type":"click_open","settings":{"extra_selectors":"","cookie_name":null}}],"mobile_disabled":null,"tablet_disabled":null,"meta":{"display":{"stackable":"1","overlay_disabled":"1","scrollable_content":false,"disable_reposition":false,"size":"custom","responsive_min_width":"0px","responsive_min_width_unit":false,"responsive_max_width":"100px","responsive_max_width_unit":false,"custom_width":"300px","custom_width_unit":false,"custom_height":"380px","custom_height_unit":false,"custom_height_auto":"1","location":"right bottom","position_from_trigger":false,"position_top":"100","position_left":"0","position_bottom":"10","position_right":"10","position_fixed":"1","animation_type":"slide","animation_speed":"350","animation_origin":"bottom","overlay_zindex":false,"zindex":"1999999999"},"close":{"text":"","button_delay":"0","overlay_click":false,"esc_press":false,"f4_press":false},"click_open":[]}}"> <div id="popmake-107566" class="pum-container popmake theme-107555 size-custom pum-position-fixed"> <div id="pum_popup_title_107566" class="pum-title popmake-title"> Finding our content helpful? </div> <div class="pum-content popmake-content" tabindex="0"> <p><em>Just Security</em> is a non-profit, daily, digital law and policy journal that elevates the discourse on security, democracy and rights. We rely on donations from readers like you. Please consider supporting us with a tax-deductible donation today.<br /> <a class="button" style="margin-top: 15px;" href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" target="_blank" rel="noopener">Donate Now</a></p> </div> <button type="button" class="pum-close popmake-close" aria-label="Close"> CLOSE </button> </div> </div> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/103317\/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations\/":103317}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1739734945" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script type="text/javascript" id="popup-maker-site-js-extra"> /* <![CDATA[ */ var pum_vars = {"version":"1.20.4","pm_dir_url":"https:\/\/www.justsecurity.org\/wp-content\/plugins\/popup-maker\/","ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","restapi":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1","rest_nonce":null,"default_theme":"107546","debug_mode":"","disable_tracking":"","home_url":"\/","message_position":"top","core_sub_forms_enabled":"1","popups":[],"cookie_domain":"","analytics_route":"analytics","analytics_api":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1"}; var pum_sub_vars = {"ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","message_position":"top"}; var pum_popups = {"pum-107566":{"triggers":[{"type":"auto_open","settings":{"cookie_name":["pum-107566"],"delay":"30000"}}],"cookies":[{"event":"on_popup_close","settings":{"name":"pum-107566","time":"1 week","path":true}}],"disable_on_mobile":false,"disable_on_tablet":false,"atc_promotion":null,"explain":null,"type_section":null,"theme_id":"107555","size":"custom","responsive_min_width":"0px","responsive_max_width":"100px","custom_width":"300px","custom_height_auto":true,"custom_height":"380px","scrollable_content":false,"animation_type":"slide","animation_speed":"350","animation_origin":"bottom","open_sound":"none","custom_sound":"","location":"right bottom","position_top":"100","position_bottom":"10","position_left":"0","position_right":"10","position_from_trigger":false,"position_fixed":true,"overlay_disabled":true,"stackable":true,"disable_reposition":false,"zindex":"1999999999","close_button_delay":"0","fi_promotion":null,"close_on_form_submission":false,"close_on_form_submission_delay":"0","close_on_overlay_click":false,"close_on_esc_press":false,"close_on_f4_press":false,"disable_form_reopen":false,"disable_accessibility":false,"theme_slug":"default-theme-2","id":107566,"slug":"finding-our-content-helpful"}}; /* ]]> */ </script> <script type="text/javascript" src="//www.justsecurity.org/wp-content/uploads/pum/pum-site-scripts.js?defer&generated=1739227473&ver=1.20.4" id="popup-maker-site-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202507.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"103317\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.3\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "103317" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.3" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-bluesky' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-bluesky' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcombluesky', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <style> </style> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>