CINXE.COM

The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress

<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v24.4) - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="Implementation can strengthen the data contractors have to provide. And Congress should pass legislation to apply these measures across the economy." /> <link rel="canonical" href="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress" /> <meta property="og:description" content="Implementation can strengthen the data contractors have to provide. And Congress should pass legislation to apply these measures across the economy." /> <meta property="og:url" content="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2021-05-13T18:01:38+00:00" /> <meta property="article:modified_time" content="2021-05-18T21:03:04+00:00" /> <meta property="og:image" content="https://i2.wp.com/www.justsecurity.org/wp-content/uploads/2021/05/Colonial-Pipeline-cybersecurity-small.jpg?fit=1024%2C683&ssl=1" /> <meta property="og:image:width" content="1024" /> <meta property="og:image:height" content="683" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Adam Bobrow" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="New Cyber Executive Order is a Good Start, But Needs More Steps" /> <meta name="twitter:description" content="Protection requires more data from contractors. And Congress should pass legislation to apply these measures across the economy." /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Adam Bobrow" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="7 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#article","isPartOf":{"@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/65949fb642073d4729939041e0b1bc10"}],"headline":"The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress","datePublished":"2021-05-13T18:01:38+00:00","dateModified":"2021-05-18T21:03:04+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/"},"wordCount":1394,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/05/Colonial-Pipeline-cybersecurity-e1620925927219.jpg?fit=6000%2C2250&ssl=1","keywords":["Biden administration","congressional authorization","Critical Infrastructure","Cyber","Cybersecurity","Cybersecurity and Infrastructure Security Agency (CISA)","Department of Commerce","Executive Orders","Technology"],"articleSection":["Congress","Cyber","Cybersecurity","Executive Branch","Featured Articles","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/","url":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/","name":"The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/05/Colonial-Pipeline-cybersecurity-e1620925927219.jpg?fit=6000%2C2250&ssl=1","datePublished":"2021-05-13T18:01:38+00:00","dateModified":"2021-05-18T21:03:04+00:00","description":"Implementation can strengthen the data contractors have to provide. And Congress should pass legislation to apply these measures across the economy.","breadcrumb":{"@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/05/Colonial-Pipeline-cybersecurity-e1620925927219.jpg?fit=6000%2C2250&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/05/Colonial-Pipeline-cybersecurity-e1620925927219.jpg?fit=6000%2C2250&ssl=1","width":6000,"height":2250,"caption":"A Colonial Pipeline storage site in Charlotte, North Carolina on May 12, 2021. - Fears the shutdown of the Colonial Pipeline because of a cyberattack would cause a gasoline shortage led to some panic buying and prompted US regulators on May 11, 2021 to temporarily suspend clean fuel requirements in three eastern states and the nation's capital. (Photo by Logan Cyrus / AFP) (Photo by LOGAN CYRUS/AFP via Getty Images)"},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","contentUrl":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/65949fb642073d4729939041e0b1bc10","name":"Adam Bobrow","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/f7d368d33557c24886348ae1458ed1f3","url":"https://secure.gravatar.com/avatar/0f881014f70ec2a94da673d30f9027b2?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/0f881014f70ec2a94da673d30f9027b2?s=96&d=mm&r=g","caption":"Adam Bobrow"},"description":"Adam Bobrow (@afbobrow) is the Founder and CEO of Foresight Resilience Strategies (@4rsllc), a strategic consultancy helping organizations adopt a cybersecurity risk approach prioritizing cybersecurity activities to match their risk profile. Adam is recognized as an expert on the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity (CSF), including working as a session moderator at NIST-sponsored CSF workshops. Before starting Foresight, Adam served in the Obama White House at the Office of Science and Technology Policy (OSTP) and in several positions at the Commerce Department, including China policy advisor to Secretary Gary Locke, Deputy General Counsel for Strategic Initiatives (acting), and Deputy Chief of Staff to the Department (acting). In those positions, Adam participated in making key decisions related to trade, investment, and intellectual property policy related to China as well as cybersecurity, consumer privacy, and intellectual property-related issues related to Internet policy. He is a non-resident Senior Fellow at the German Marshall Fund of the United States, focusing on cybersecurity and resilience for the digital program. Adam received his JD from Washington University in St. Louis and is a member of the DC Bar. His undergraduate degree is in Chinese language from Georgetown University.","url":"https://www.justsecurity.org/author/bobrowadam/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='preconnect' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security &raquo; Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.4 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.4'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/76154\/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&#038;family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&#038;display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1735053534' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-default-css' href='https://www.justsecurity.org/wp-content/tablepress-combined.min.css?ver=42' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedheader-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedheader.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedcolumns-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedcolumns.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-scroll-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.scroll-buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-rowgroup-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.rowgroup.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-responsive-tables-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/responsive-tables.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-columnfilterwidgets-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.columnfilterwidgets.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-column-filter-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.column-filter.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-datetime-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.datetime.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchbuilder-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchbuilder.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchhighlight-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchhighlight.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-select-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.select.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchpanes-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchpanes.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-serverside-processing-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.serverside-processing.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.18' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='popup-maker-site-css' href='//www.justsecurity.org/wp-content/uploads/pum/pum-site-styles.css?generated=1739227473&#038;ver=1.20.4' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.3' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.3' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.4" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/76154" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-jOi' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F76154%2Fthe-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F76154%2Fthe-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress%2F&#038;format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.1.1 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&#038;ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&#038;ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&#038;ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&#038;ssl=1" /> </head> <body class="post-template-default single single-post postid-76154 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> <li id="menu-item-107744" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107744"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Admin Litigation Tracker</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#fff"/></svg> </a><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu-mobile-container"><ul id="menu-mobile" class="menu"><li id="menu-item-733" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-733"><a href="https://www.justsecurity.org">Home</a></li> <li id="menu-item-76571" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76571"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-76565" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76565"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-76533" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76533"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-76566" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76566"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76572" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76572"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-106458" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-106458"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> </ul> </li> <li id="menu-item-83989" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83989"><a href="https://www.buzzsprout.com/2074610">NEW: Podcast</a></li> <li id="menu-item-107745" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107745"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Administration Litigation Tracker</a></li> <li id="menu-item-93849" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-93849"><a href="https://www.youtube.com/@JustSecurityForum">YouTube</a></li> <li id="menu-item-82330" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-82330"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94074" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94074"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84715" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84715"><a href="https://www.justsecurity.org/tag/climate-change/">Climate Change</a></li> <li id="menu-item-82331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82331"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-82332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82332"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-82336" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82336"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82354" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82354"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-82338" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82338"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84716" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84716"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-82345" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82345"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-82340" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82340"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-82341" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82341"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-82342" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82342"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> <li id="menu-item-91477" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91477"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82353" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82353"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-82343" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82343"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-82344" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82344"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-82346" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82346"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82542" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82542"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84718" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84718"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-82348" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82348"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-82349" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82349"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> </ul> </li> <li id="menu-item-82351" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-82351"><a href="https://www.justsecurity.org/category/featured-new/">Featured Articles</a></li> <li id="menu-item-76568" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76568"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li id="menu-item-37577" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-37577"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li id="menu-item-76569" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76569"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Signups for A.M. and P.M. emails</a></li> </ul></div></div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/05/Colonial-Pipeline-cybersecurity-e1620925927219.jpg?fit=6000%2C2250&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1>The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/bobrowadam/" title="Profile and articles by Adam Bobrow" class="author url fn" rel="author">Adam Bobrow</a></p><p class="date">May 13, 2021</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-bluesky"><a rel="nofollow noopener noreferrer" data-shared="sharing-bluesky-76154" class="share-bluesky sd-button share-icon no-text" href="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/?share=bluesky" target="_blank" title="Click to share on Bluesky" ><span></span><span class="sharing-screen-reader-text">Click to share on Bluesky (Opens in new window)</span></a></li><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-76154" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-76154" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-76154" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/76154/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/biden-administration/" rel="tag">Biden administration</a>, <a href="https://www.justsecurity.org/tag/congressional-authorization/" rel="tag">congressional authorization</a>, <a href="https://www.justsecurity.org/tag/critical-infrastructure/" rel="tag">Critical Infrastructure</a>, <a href="https://www.justsecurity.org/tag/cyber/" rel="tag">Cyber</a>, <a href="https://www.justsecurity.org/tag/cybersecurity/" rel="tag">Cybersecurity</a>, <a href="https://www.justsecurity.org/tag/cybersecurity-and-infrastructure-security-agency-cisa/" rel="tag">Cybersecurity and Infrastructure Security Agency (CISA)</a>, <a href="https://www.justsecurity.org/tag/department-of-commerce/" rel="tag">Department of Commerce</a>, <a href="https://www.justsecurity.org/tag/executive-orders/" rel="tag">Executive Orders</a>, <a href="https://www.justsecurity.org/tag/technology/" rel="tag">Technology</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/bobrowadam/" title="Profile and articles by Adam Bobrow" class="author url fn" rel="author">Adam Bobrow</a></p><p class="date">May 13, 2021</p></div><p>Yesterday, President Joe Biden signed a <a href="https://fcw.com/articles/2021/05/12/cyber-executive-order.aspx">broad</a> <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">executive order on cybersecurity</a> to fill gaps exposed by several massive recent cyber incidents. The executive order is a good <a href="https://www.warner.senate.gov/public/index.cfm/2021/5/statement-of-sen-warner-on-facebook-advisory-panel-upholding-ban-of-former-president-donald-trump">first step</a>, but it won’t stop the constant barrage of cyber incidents that has overwhelmed the United States over the last six months. Unfortunately, the insecurity of networked computer systems is simply too great for any single effort to solve the problem. Instead, the solutions lie on a distant horizon. It is not too soon to start charting a course, and Congress can help.</p> <p>The recent incidents, taken as a whole, collectively crossed a threshold from the familiar series of serious, but isolated, attacks to <a href="https://www.washingtonpost.com/business/2021/05/12/ransomware-attack/">cascading crises</a> that expose the United States to systemic danger. Most recently, the Colonial Pipeline “<a href="https://www.zdnet.com/article/colonial-pipeline-paid-close-to-5-million-in-ransomware-blackmail-payment/">double extortion</a>” ransomware attack demonstrated that one critical infrastructure company impacts the lives of tens of millions of Americans. In two other cases, Russian hackers compromised the update process for network administration software from <a href="https://www.msn.com/en-us/money/other/solarwinds-says-russian-group-likely-took-data-during-cyber-attack/ar-BB1guhWC">Solar Winds</a> to introduce back doors onto private and federal computer networks, and <a href="https://www.zdnet.com/article/everything-you-need-to-know-about-microsoft-exchange-server-hack/">vulnerabilities</a> in Microsoft’s email server software reportedly meant that until patches were available on March 2, <a href="https://unit42.paloaltonetworks.com/remediation-steps-for-the-microsoft-exchange-server-vulnerabilities/">more than 100,000 systems</a> may have been accessible to attackers from as early as January of this year. And then there are the <a href="https://www.sandiegouniontribune.com/news/health/story/2021-05-05/state-regulator-watching-scripps-ransomware-attack-closely">ransomware attacks on hospitals</a> in the middle of a global pandemic, and a targeted attack on a <a href="https://www.wired.com/story/oldsmar-florida-water-utility-hack/">water system</a> in Florida, both of which threatened fatal consequences.</p> <p>Officials charged with protecting U.S. critical infrastructure do not have visibility into the computer networks that control that infrastructure because it is largely owned and operated by the private sector. The new executive order will start a process that will modify Federal Acquisition Regulations (FAR) to require federal contractors to report cyber incidents promptly and to share more information with the federal government about both incidents and security practices on contractor networks. Administration officials hope this new stream of information will offer more clarity on the best ways to deter bad actors, whether that might include sanctions, indictments, or naming and shaming attackers. The information may also facilitate retribution by the authorized agencies against the attackers’ infrastructure.</p> <p>But even the officials directly involved know these measures will not change the behavior of adversaries, end the tsunami of ransomware attacks, or get stolen information back. With this executive order, the administration has taken the action available to the executive, focusing on federal networks and contractors. Implementation will matter, specifically what information contractors will have to provide. And Congress will need to pass legislation to make these measures apply across the economy.</p> <p><strong>Thinking Further Ahead</strong></p> <p>During the next 60 days, the agencies charged with translating the executive order into regulatory action could ensure the federal government is thinking more than one step ahead. The requirements the new regulations will impose on contractors to share information about known and suspected incidents could become a first step toward collecting the necessary information for a different and longer-term purpose: developing standardized risk models and metrics. If contractors share the right details about cyber incidents, the federal government would have a dataset to support an analytic approach to understanding cyber risk through powerful statistical analysis of attacks and attackers. That dataset should be maintained separately from the agencies that would use it for operational or law enforcement purposes, and should be used instead to provide better tools and guidance to cybersecurity programs in private industry and throughout government on making their networks more resilient.</p> <p>In 2020, the <a href="https://www.justsecurity.org/tag/u-s-cyberspace-solarium-commission/">Cyberspace Solarium Commission</a>, a bipartisan panel comprised of members of Congress, senators, executive branch officials, and private sector experts, recommended creating a new federal agency for this purpose: a Bureau of Cyber Statistics (BCS), housed at the Commerce Department, away from the operational and enforcement-oriented functions of the Cybersecurity and Infrastructure Security Agency (CISA), and staffed with cybersecurity and statistical analysts. The BCS would have no enforcement or operational responsibilities for federal agency or private-sector cybersecurity; rather it would aggregate detailed information about cyber incidents and then publicly release datasets and models describing the risk. Those datasets would be anonymous, maintaining the confidentiality of the reports provided by private-sector organizations, and providing the raw material to conduct robust risk assessments to help organizations improve cybersecurity programs.</p> <p>The Commerce Department would be a better fit for a BCS than CISA’s parent agency, the Department of Homeland Security, because Commerce already has the Economics and Statistics Administration, which houses both the Bureau of Economic Analysis and the Census Bureau, and it has the National Institute of Standards and Technology. Commerce also houses the National Weather Service (a bureau of the National Oceanic and Atmospheric Administration), which supports all things weather-related in the private sector through the daily release of over <a href="https://www.weather.gov/about/forecastsandservice">6.3 billion</a> weather, water, and climate observations. At Commerce, the more research-oriented work of a BCS would be situated in a familiar environment.</p> <p>The BCS, similar to other statistical agencies, should have the means to compel private companies to share such information, coupled with a stringent requirement to protect the identifiable information about companies and incidents from release. BCS could not take action against breached companies for cyber incidents; those authorities would remain with the Department of Justice and other law enforcement agencies.</p> <p><strong>Independence for the Cyber Safety Review Board</strong></p> <p>Another cyber-specific agency would also help. The executive order creates a cyber-focused panel, the Cyber Safety Review Board, modeled on the National Transportation Safety Board, but established as a federal advisory committee, led by and reporting to the Secretary of Homeland Security. The NTSB is called in when a transportation accident takes place and has broad powers to investigate, but it is separate from the regulators or the enforcers; a full-fledged Cyber Safety Review Board would fulfill a similar role with regard to cyber incidents, but creating it by executive order limits its authorities, responsibilities, and independence. Only a statutorily created board that is independent from agencies like DHS and has clear authority to discover evidence and take sworn testimony would have the kinds of authorities that give NTSB and its investigations teeth.</p> <p>The NTSB is highly respected and has changed the entire way safety works in transportation, because it is separated from operational, regulatory, and enforcement elements of the rest of the federal bureaucracy. The Cyber Safety Review Board needs similarly delineated responsibilities. The root causes of incidents published by such a board would, in combination with the datasets released by the BCS, permit organizations to understand clearly how the threats they face and vulnerabilities they tolerate actually interact to give rise to incidents and — better understanding the risk — how to address it.</p> <p>All of these changes would support national security policymakers seeking to get ahead of the cyber risks facing critical infrastructure. Right now, federal cybersecurity officials do not have the ability to compare risk across sectors or good visibility into how critical infrastructure companies overall are modeling risk and then making risk management decisions, because the risk models are too individualized to specific companies (when they exist at all). Put another way, even if Colonial Pipeline had shared its risk assessment with CISA, CISA would not have been able to understand what was different between Colonial and another pipeline company, because the agency wouldn’t have a way of comparing different companies or analyzing the sector as a whole.</p> <p>Once a BCS and CSRB-driven risk approach is available, companies could use those data and models to assess risk on a common set of assumptions. Officials at CISA would then be in a better position to identify gaps in cybersecurity and use their authorities to fill them.</p> <p>The new executive order is a first step in the right direction. If the information shared is sufficient to start data collection along the lines the Solarium Commission recommended for a BCS, Congress can take the next steps by creating both the BCS, with the mandate to collect cyber-incident information from a broader swath of the private sector, and the CSRB, with a set of expert leaders to independently investigate cyber incidents and report their conclusions. The route to solving this problem is long; it is past time to start traveling it.</p> <h6><em>IMAGE: A Colonial Pipeline storage site in Charlotte, North Carolina on May 12, 2021. (Photo by LOGAN CYRUS/AFP via Getty Images)</em></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/biden-administration/" rel="tag">Biden administration</a>, <a href="https://www.justsecurity.org/tag/congressional-authorization/" rel="tag">congressional authorization</a>, <a href="https://www.justsecurity.org/tag/critical-infrastructure/" rel="tag">Critical Infrastructure</a>, <a href="https://www.justsecurity.org/tag/cyber/" rel="tag">Cyber</a>, <a href="https://www.justsecurity.org/tag/cybersecurity/" rel="tag">Cybersecurity</a>, <a href="https://www.justsecurity.org/tag/cybersecurity-and-infrastructure-security-agency-cisa/" rel="tag">Cybersecurity and Infrastructure Security Agency (CISA)</a>, <a href="https://www.justsecurity.org/tag/department-of-commerce/" rel="tag">Department of Commerce</a>, <a href="https://www.justsecurity.org/tag/executive-orders/" rel="tag">Executive Orders</a>, <a href="https://www.justsecurity.org/tag/technology/" rel="tag">Technology</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/">The Disastrous Costs of the Foreign Aid Freeze on US Interests in the Middle East and North Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/binderseth/" title="Profile and articles by Seth Binder" class="author url fn" rel="author">Seth Binder</a>, <a href="https://www.justsecurity.org/author/colesheridan/" title="Profile and articles by Sheridan Cole" class="author url fn" rel="author">Sheridan Cole</a> and <a href="https://www.justsecurity.org/author/welchhaydn/" title="Profile and articles by Haydn Welch" class="author url fn" rel="author">Haydn Welch</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/">What Just Happened: Purges at the DOJ and FBI — How Do and Don’t the Civil Service Laws Apply</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hillsroderick/" title="Profile and articles by Roderick M. Hills" class="author url fn" rel="author">Roderick M. Hills</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/">Freezing Support to Democracy and Human Rights Activists Undermines US Interests</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/busbyscott/" title="Profile and articles by Scott Busby" class="author url fn" rel="author">Scott Busby</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/">Supporting Freedom and a Foreign Aid Freeze are Incompatible &#8212; But Perhaps the Point? A Case Study</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/thorntonlaura/" title="Profile and articles by Laura Thornton" class="author url fn" rel="author">Laura Thornton</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/givensalexandrareeve/" title="Profile and articles by Alexandra Reeve Givens" class="author url fn" rel="author">Alexandra Reeve Givens</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107770/cartels-foreign-terrorism-designation/">The Need for Course Correction: The Risks of Treating Drug Cartels as Terrorist Threats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/harvindonell/" title="Profile and articles by Donell Harvin" class="author url fn" rel="author">Donell Harvin</a></p> <p class="date">Feb 12th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/">What Just Happened: Security Implications of Trump’s Efforts to Trim the CIA Workforce</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finleyalex/" title="Profile and articles by Alex Finley" class="author url fn" rel="author">Alex Finley</a></p> <p class="date">Feb 7th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107245/deepseek-ai-competition/">What DeepSeek Really Changes About AI Competition</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pilzkonstantinf/" title="Profile and articles by Konstantin F. Pilz" class="author url fn" rel="author">Konstantin F. Pilz</a> and <a href="https://www.justsecurity.org/author/heimlennart/" title="Profile and articles by Lennart Heim" class="author url fn" rel="author">Lennart Heim</a></p> <p class="date">Feb 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107267/can-president-dissolve-usaid-by-executive-order/">Can the President Dissolve USAID by Executive Order?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Feb 1st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107110/trump-purge-justice-department/">The Real Reason Trump’s Purge of Career DOJ Officials Should Alarm You</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/zdebsara/" title="Profile and articles by Sara Zdeb" class="author url fn" rel="author">Sara Zdeb</a></p> <p class="date">Jan 30th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107094/deferred-resignation-dubious-federal-employees/">Beware the &#8220;Deferred Resignation&#8221; Offer: A Legally Dubious Proposal for Federal Employees</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/summerlinsuzanne/" title="Profile and articles by Suzanne Summerlin" class="author url fn" rel="author">Suzanne Summerlin</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107030/invasion-executive-order-military-authorities/">What Just Happened: The Framing of a Migration “Invasion” and the Use of Military Authorities</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bankswilliam/" title="Profile and articles by William Banks" class="author url fn" rel="author">William Banks</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107029/fbi-director-weaponization-government-executive-order/">Understanding Trump’s Choice for FBI Leadership in Light of the“Weaponization of the Federal Government” Executive Order</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gersonstuart/" title="Profile and articles by Stuart M. Gerson" class="author url fn" rel="author">Stuart M. Gerson</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106969/trump-dictatorial-theory-presidential-power-executive-orders/">Trump’s Dictatorial Theory of Presidential Power &#8211; What the Executive Orders, in the Aggregate, Tell Us</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/morrisontrevor/" title="Profile and articles by Trevor Morrison" class="author url fn" rel="author">Trevor Morrison</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106953/invasion-executive-order-implications/">What Just Happened: The “Invasion” Executive Order and Its Dangerous Implications</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106919/stopped-security-assistance/">Stopped Security Assistance: From Counter-Narcotics to Combating Human Trafficking Programs</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/randdafnah/" title="Profile and articles by Dafna H. Rand" class="author url fn" rel="author">Dafna H. Rand</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106856/international-criminal-court-call-for-justice/">We Need the International Legal Order: A Call to Protect the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/iccasppresidents/" title="Profile and articles by The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court" class="author url fn" rel="author">The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106775/israel-hamas-ceasefire/">Israel-Hamas Ceasefire: Temporary Reprieve or Sustainable Peace?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/millerandrew/" title="Profile and articles by Andrew Miller" class="author url fn" rel="author">Andrew Miller</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106846/syria-international-criminal-court/">Syria Needs the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rothkenneth/" title="Profile and articles by Kenneth Roth" class="author url fn" rel="author">Kenneth Roth</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106804/what-just-happened-trumps-executive-actions-us-climate-security/">What Just Happened: Trump’s Executive Actions on Environment and Implications for US Climate Security</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ellisontom/" title="Profile and articles by Tom Ellison" class="author url fn" rel="author">Tom Ellison</a></p> <p class="date">Jan 24th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106738/trump-privacy-oversight-board-surveillance/">What Just Happened: What Trump&#8217;s Hobbling of the Privacy Oversight Board Portends for Exercise of Surveillance Powers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106689/january-6-pardons-statistics/">What Just Happened: Trump’s January 6 Pardons and Assaults on Law Enforcement Officers By The Numbers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106593/national-emergency-southern-border-order/">What Just Happened: Unpacking Exec Order on National Emergency at the Southern Border</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nevittmark/" title="Profile and articles by Mark Nevitt" class="author url fn" rel="author">Mark Nevitt</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106627/what-just-happened-with-icc-sanctions/">What Just Happened: With ICC Sanctions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106567/bidens-cybersecurity-eo-what-comes-next-trump/">Biden’s Cybersecurity Executive Order and What Comes Next Under Trump</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106509/georgia-protests-trump-influence/">Crisis in Georgia: Why the Trump Administration Should Step In To Shore Up US Influence</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a> and <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a></p> <p class="date">Jan 17th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106427/unpacking-the-biden-administrations-executive-order-on-ai-infrastructure/">Unpacking the Biden Administration’s Executive Order on AI Infrastructure</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jan 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106278/highlights-jack-smith-january-6th-final-report/">3 Highlights in Special Counsel Jack Smith&#8217;s Final Report on 2020 Election Subversion Case</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106313/questions-pam-bondi-attorney-general/">Questions for Senators (And Journalists) to Ask Attorney General Nominee Pam Bondi</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106317/questions-rubio-secretary-of-state-nominee/">Questions for Senators (and Journalists) to Ask Secretary of State Nominee Marco Rubio</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106283/how-not-to-decide-tiktok-u-s-press-freedom-hangs-in-the-balance/">How Not to Decide TikTok: U.S. press freedom hangs in the balance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coledavid/" title="Profile and articles by David Cole" class="author url fn" rel="author">David Cole</a></p> <p class="date">Jan 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106247/inspector-general-january-6th/">Unpacking the Inspector General Report on January 6th and FBI “False Flag” Conspiracies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 10th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106146/national-security-resilience-reform/">National Security Resilience and Reform: Trump 2.0 and Beyond</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Jan 8th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106105/announcement-ai-emerging-technologies-initiative/">Announcing Just Security’s Artificial Intelligence and Emerging Technologies Initiative</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 6th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105879/suing-taliban-icj-abuses-afghan-women/">Suing the Taliban at the ICJ Over Abuses of Afghan Women Isn’t a Panacea. Countries Must Do More Now.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/huckerbyjayne/" title="Profile and articles by Jayne Huckerby" class="author url fn" rel="author">Jayne Huckerby</a></p> <p class="date">Jan 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105991/just-security-2024-book-recommendations/">The Just Security 2024 Year-End Book Recommendations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Dec 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105981/ukraine-russia-human-safari-tactic/">Russia’s “Human Safari” Terror Tactic in Key Southeastern Ukraine Region of Kherson</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sapuppomercedes/" title="Profile and articles by Mercedes Sapuppo" class="author url fn" rel="author">Mercedes Sapuppo</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105944/us-iran-diplomacy-nuclear/">U.S. Options for Iran Diplomacy in 2025</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/davenportkelsey/" title="Profile and articles by Kelsey Davenport" class="author url fn" rel="author">Kelsey Davenport</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105917/interim-report-icj-climate-opinion/">An Interim Report on the ICJ’s Climate Advisory Opinion</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hericorina/" title="Profile and articles by Corina Heri" class="author url fn" rel="author">Corina Heri</a></p> <p class="date">Dec 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105909/challenging-china-human-rights/">New Challenges to Xi Jinping’s Alternative Facts on Taiwan: Lessons for the Human Rights Space, Too</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/richardsonsophie/" title="Profile and articles by Sophie Richardson" class="author url fn" rel="author">Sophie Richardson</a></p> <p class="date">Dec 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105752/ai-presidency/">The AI Presidency: What “America First” Means for Global AI Governance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Dec 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105735/trump-administration-sanctions-africa/">The First Trump Administration Used Sanctions Effectively in Africa. Here’s How That Can Resume in the Second Term.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Dec 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105708/icc-standard-proof-head-state/">Does the Int’l Criminal Court Impose Too Low a Standard of Proof to Arrest a Head of State?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a> and <a href="https://www.justsecurity.org/author/trumbullcharlie/" title="Profile and articles by Charlie Trumbull" class="author url fn" rel="author">Charlie Trumbull</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105638/biden-bosnia-security-troops/">Biden’s Unfinished Business: A Bridge to Shore Up a European Flank – in the Balkans</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bassuenerkurt/" title="Profile and articles by Kurt Bassuener" class="author url fn" rel="author">Kurt Bassuener</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105640/georgia-protests-us-sanctions/">Georgia Risks Falling to a Violent One-Party Regime. The Biden Administration Must Act Now to Stop Its Slide.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105627/syria-freedom-governance-local-approach-constitutionalism/">Syrians’ Pursuit of Freedom and Self-Governance: Prioritizing a Locally-Driven and Incremental Approach to Constitutionalism</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alrwishdideyaa/" title="Profile and articles by Deyaa Alrwishdi" class="author url fn" rel="author">Deyaa Alrwishdi</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105593/foreign-agent-laws-impact/">The Spreading Impact of Restrictive ‘Foreign Agent’ Laws and How to Stop Them</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/cameronjasmine/" title="Profile and articles by Jasmine D. Cameron" class="author url fn" rel="author">Jasmine D. Cameron</a> and <a href="https://www.justsecurity.org/author/nicolafernandag/" title="Profile and articles by Fernanda G. Nicola" class="author url fn" rel="author">Fernanda G. Nicola</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105552/public-framing-mass-deportation/">The Public Framing of Mass Deportation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105538/interpol-transparency-reform/">Interpol General Assembly Inches Forward on Transparency, Still Needs Reform Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a> and <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105406/georgia-protests-letter-us-diplomats/">Open Letter on Georgia from Former US Diplomats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/herbstjohne/" title="Profile and articles by Ambassador (ret) John E. Herbst" class="author url fn" rel="author">Ambassador (ret) John E. Herbst</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105321/military-immigration-enforcement-deportation/">Deployment of the U.S. Military for Immigration Enforcement: A Primer</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105181/drones-graves-mexicos-disappeared/">Camera-Fitted Drones May Help Locate Graves of Mexico’s Disappeared</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/garciareyeskarina/" title="Profile and articles by Karina García-Reyes" class="author url fn" rel="author">Karina García-Reyes</a> and <a href="https://www.justsecurity.org/author/moctezumamiguel/" title="Profile and articles by Miguel Moctezuma" class="author url fn" rel="author">Miguel Moctezuma</a></p> <p class="date">Nov 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105176/birthright-citizenship-undocumented-immigrants-2/">Birthright Citizenship and Undocumented Immigrants</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Nov 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts &#038; Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To &#8216;End&#8217; War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine &#8212; and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon&#8217;s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia&#8217;s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who&#8217;s Who in Jack Smith&#8217;s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN&#8217;s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Litigation Tracker: Legal Challenges to Trump Administration Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia&#8217;s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis &#038; Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine &#8211; The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security&#8217;s Series on Reparations in Russia&#8217;s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the &#8220;War on Terror&#8221;</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 &#8220;Report Card&#8221; Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/bobrowadam/">Adam <span>Bobrow</span></a></h4><p>Adam Bobrow (<a href="https://twitter.com/afbobrow?lang=en">@afbobrow</a>) is the Founder and CEO of Foresight Resilience Strategies (<a href="https://twitter.com/4rsllc">@4rsllc</a>), a strategic cybersecurity risk consultancy.</p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/01/GettyImages-14867850291-e1738614282494.jpg?fit=768%2C325&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Litigation Tracker: Legal Challenges to Trump Administration Actions</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 16th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107918/dismantle-department-education-executive-order/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2198217852-e1739488295364.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107918/dismantle-department-education-executive-order/">Can the President Dismantle the Department of Education by Executive Order?</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/boothlaura/" title="Profile and articles by Laura Booth" class="author url fn" rel="author">Laura Booth</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-1708090700-e1739498634981.jpg?fit=768%2C302&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/">The Disastrous Costs of the Foreign Aid Freeze on US Interests in the Middle East and North Africa</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/binderseth/" title="Profile and articles by Seth Binder" class="author url fn" rel="author">Seth Binder</a>, <a href="https://www.justsecurity.org/author/colesheridan/" title="Profile and articles by Sheridan Cole" class="author url fn" rel="author">Sheridan Cole</a> and <a href="https://www.justsecurity.org/author/welchhaydn/" title="Profile and articles by Haydn Welch" class="author url fn" rel="author">Haydn Welch</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/01/GettyImages-2194985261-scaled.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107885/trump-impoundment-control-act/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2194442044-1-scaled-e1738683669864.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107885/trump-impoundment-control-act/">President Trump Is Ignoring the Impoundment Control Act, Welcoming a Fight in the Courts</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/harrisonsarah/" title="Profile and articles by Sarah Harrison" class="author url fn" rel="author">Sarah Harrison</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2176222391-scaled.jpg?fit=768%2C441&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/givensalexandrareeve/" title="Profile and articles by Alexandra Reeve Givens" class="author url fn" rel="author">Alexandra Reeve Givens</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107753/goma-drc-usaid-crucial/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2198178328-scaled.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107753/goma-drc-usaid-crucial/">As Sexual Violence Surges in Goma, DR Congo, US Aid Remains Crucial</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/xuwinona/" title="Profile and articles by Winona Xu" class="author url fn" rel="author">Winona Xu</a></p> <p class="date">Feb 12th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107770/cartels-foreign-terrorism-designation/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2198363327-e1739310035545.jpg?fit=768%2C280&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107770/cartels-foreign-terrorism-designation/">The Need for Course Correction: The Risks of Treating Drug Cartels as Terrorist Threats</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/harvindonell/" title="Profile and articles by Donell Harvin" class="author url fn" rel="author">Donell Harvin</a></p> <p class="date">Feb 12th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107533/restarting-us-lng-permitting-geopolitical-benefits/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2193208056-scaled-e1738871611836.jpg?fit=768%2C406&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107533/restarting-us-lng-permitting-geopolitical-benefits/">Restarting US LNG Permitting Brings Geopolitical Benefits and the Potential for Climate Progress</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/lomaxsimon/" title="Profile and articles by Simon Lomax" class="author url fn" rel="author">Simon Lomax</a>, <a href="https://www.justsecurity.org/author/cloughgreg/" title="Profile and articles by Greg Clough" class="author url fn" rel="author">Greg Clough</a> and <a href="https://www.justsecurity.org/author/bazilianmorgan/" title="Profile and articles by Morgan Bazilian" class="author url fn" rel="author">Morgan Bazilian</a></p> <p class="date">Feb 10th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-6352696521-scaled-e1738895327729.jpg?fit=768%2C310&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/">What Just Happened: Security Implications of Trump’s Efforts to Trim the CIA Workforce</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/finleyalex/" title="Profile and articles by Alex Finley" class="author url fn" rel="author">Alex Finley</a></p> <p class="date">Feb 7th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107530/trump-china-nippon-us-steel-acquisition/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-1707395357-scaled-e1738873543380.jpg?fit=768%2C270&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107530/trump-china-nippon-us-steel-acquisition/">For Trump&#8217;s China Agenda the Best Deal is to Reverse Biden and let Nippon Buy U.S. Steel</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/schiffermichael/" title="Profile and articles by Michael Schiffer" class="author url fn" rel="author">Michael Schiffer</a></p> <p class="date">Feb 6th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107405/what-just-happened-guantanamo/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2162696368-scaled-e1738715406432.jpg?fit=768%2C412&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107405/what-just-happened-guantanamo/">What Just Happened: At Guantanamo&#8217;s Migrant Operation Center</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/hafetzjonathan/" title="Profile and articles by Jonathan Hafetz" class="author url fn" rel="author">Jonathan Hafetz</a> and <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Feb 6th, 2025</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#2D8097"/></svg></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">&copy; 2025 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <div id="pum-107566" role="dialog" aria-modal="false" aria-labelledby="pum_popup_title_107566" class="pum pum-overlay pum-theme-107555 pum-theme-default-theme-2 popmake-overlay pum-overlay-disabled auto_open click_open" data-popmake="{&quot;id&quot;:107566,&quot;slug&quot;:&quot;finding-our-content-helpful&quot;,&quot;theme_id&quot;:107555,&quot;cookies&quot;:[{&quot;event&quot;:&quot;on_popup_close&quot;,&quot;settings&quot;:{&quot;name&quot;:&quot;pum-107566&quot;,&quot;time&quot;:&quot;1 week&quot;,&quot;path&quot;:true}}],&quot;triggers&quot;:[{&quot;type&quot;:&quot;auto_open&quot;,&quot;settings&quot;:{&quot;cookie_name&quot;:[&quot;pum-107566&quot;],&quot;delay&quot;:&quot;30000&quot;}},{&quot;type&quot;:&quot;click_open&quot;,&quot;settings&quot;:{&quot;extra_selectors&quot;:&quot;&quot;,&quot;cookie_name&quot;:null}}],&quot;mobile_disabled&quot;:null,&quot;tablet_disabled&quot;:null,&quot;meta&quot;:{&quot;display&quot;:{&quot;stackable&quot;:&quot;1&quot;,&quot;overlay_disabled&quot;:&quot;1&quot;,&quot;scrollable_content&quot;:false,&quot;disable_reposition&quot;:false,&quot;size&quot;:&quot;custom&quot;,&quot;responsive_min_width&quot;:&quot;0px&quot;,&quot;responsive_min_width_unit&quot;:false,&quot;responsive_max_width&quot;:&quot;100px&quot;,&quot;responsive_max_width_unit&quot;:false,&quot;custom_width&quot;:&quot;300px&quot;,&quot;custom_width_unit&quot;:false,&quot;custom_height&quot;:&quot;380px&quot;,&quot;custom_height_unit&quot;:false,&quot;custom_height_auto&quot;:&quot;1&quot;,&quot;location&quot;:&quot;right bottom&quot;,&quot;position_from_trigger&quot;:false,&quot;position_top&quot;:&quot;100&quot;,&quot;position_left&quot;:&quot;0&quot;,&quot;position_bottom&quot;:&quot;10&quot;,&quot;position_right&quot;:&quot;10&quot;,&quot;position_fixed&quot;:&quot;1&quot;,&quot;animation_type&quot;:&quot;slide&quot;,&quot;animation_speed&quot;:&quot;350&quot;,&quot;animation_origin&quot;:&quot;bottom&quot;,&quot;overlay_zindex&quot;:false,&quot;zindex&quot;:&quot;1999999999&quot;},&quot;close&quot;:{&quot;text&quot;:&quot;&quot;,&quot;button_delay&quot;:&quot;0&quot;,&quot;overlay_click&quot;:false,&quot;esc_press&quot;:false,&quot;f4_press&quot;:false},&quot;click_open&quot;:[]}}"> <div id="popmake-107566" class="pum-container popmake theme-107555 size-custom pum-position-fixed"> <div id="pum_popup_title_107566" class="pum-title popmake-title"> Finding our content helpful? </div> <div class="pum-content popmake-content" tabindex="0"> <p><em>Just Security</em> is a non-profit, daily, digital law and policy journal that elevates the discourse on security, democracy and rights. We rely on donations from readers like you. Please consider supporting us with a tax-deductible donation today.<br /> <a class="button" style="margin-top: 15px;" href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" target="_blank" rel="noopener">Donate Now</a></p> </div> <button type="button" class="pum-close popmake-close" aria-label="Close"> CLOSE </button> </div> </div> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/76154\/the-new-cyber-executive-order-is-a-good-start-but-needs-a-supercharge-from-congress\/":76154}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1739786441" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script type="text/javascript" id="popup-maker-site-js-extra"> /* <![CDATA[ */ var pum_vars = {"version":"1.20.4","pm_dir_url":"https:\/\/www.justsecurity.org\/wp-content\/plugins\/popup-maker\/","ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","restapi":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1","rest_nonce":null,"default_theme":"107546","debug_mode":"","disable_tracking":"","home_url":"\/","message_position":"top","core_sub_forms_enabled":"1","popups":[],"cookie_domain":"","analytics_route":"analytics","analytics_api":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1"}; var pum_sub_vars = {"ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","message_position":"top"}; var pum_popups = {"pum-107566":{"triggers":[{"type":"auto_open","settings":{"cookie_name":["pum-107566"],"delay":"30000"}}],"cookies":[{"event":"on_popup_close","settings":{"name":"pum-107566","time":"1 week","path":true}}],"disable_on_mobile":false,"disable_on_tablet":false,"atc_promotion":null,"explain":null,"type_section":null,"theme_id":"107555","size":"custom","responsive_min_width":"0px","responsive_max_width":"100px","custom_width":"300px","custom_height_auto":true,"custom_height":"380px","scrollable_content":false,"animation_type":"slide","animation_speed":"350","animation_origin":"bottom","open_sound":"none","custom_sound":"","location":"right bottom","position_top":"100","position_bottom":"10","position_left":"0","position_right":"10","position_from_trigger":false,"position_fixed":true,"overlay_disabled":true,"stackable":true,"disable_reposition":false,"zindex":"1999999999","close_button_delay":"0","fi_promotion":null,"close_on_form_submission":false,"close_on_form_submission_delay":"0","close_on_overlay_click":false,"close_on_esc_press":false,"close_on_f4_press":false,"disable_form_reopen":false,"disable_accessibility":false,"theme_slug":"default-theme-2","id":107566,"slug":"finding-our-content-helpful"}}; /* ]]> */ </script> <script type="text/javascript" src="//www.justsecurity.org/wp-content/uploads/pum/pum-site-scripts.js?defer&amp;generated=1739227473&amp;ver=1.20.4" id="popup-maker-site-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202508.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"76154\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.3\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "76154" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.3" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-bluesky' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-bluesky' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcombluesky', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <style> </style> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10