CINXE.COM
United States v. Nixon at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel
<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>United States v. Nixon at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="Legal expert discusses the constitutional and statutory authority of U.S. Attorneys General to appoint Special Counsels from outside the DOJ to investigate and prosecute criminal cases." /> <link rel="canonical" href="https://www.justsecurity.org/98037/doj-special-counsel/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="United States v. Nixon at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel" /> <meta property="og:description" content="Legal expert discusses the constitutional and statutory authority of U.S. Attorneys General to appoint Special Counsels from outside the DOJ to investigate and prosecute criminal cases." /> <meta property="og:url" content="https://www.justsecurity.org/98037/doj-special-counsel/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2024-07-24T13:27:24+00:00" /> <meta property="article:modified_time" content="2024-10-27T18:24:17+00:00" /> <meta property="og:image" content="https://www.justsecurity.org/wp-content/uploads/2024/07/11th-circuit.jpg" /> <meta property="og:image:width" content="1024" /> <meta property="og:image:height" content="696" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Marty Lederman" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="<i> United States v. Nixon </i> at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel" /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Marty Lederman" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="48 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/98037/doj-special-counsel/#article","isPartOf":{"@id":"https://www.justsecurity.org/98037/doj-special-counsel/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/fa3c29cfd932614b4314a1f09bf706cb"}],"headline":"United States v. Nixon at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel","datePublished":"2024-07-24T13:27:24+00:00","dateModified":"2024-10-27T18:24:17+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/98037/doj-special-counsel/"},"wordCount":10717,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/98037/doj-special-counsel/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/07/11th-circuit.jpg?fit=1024%2C696&ssl=1","keywords":["Department of Justice (DOJ)","Mar-a-Lago","Special Counsel","Special Counsel Jack Smith"],"articleSection":["Courts","Executive","Featured Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/98037/doj-special-counsel/","url":"https://www.justsecurity.org/98037/doj-special-counsel/","name":"United States v. Nixon at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/98037/doj-special-counsel/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/98037/doj-special-counsel/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/07/11th-circuit.jpg?fit=1024%2C696&ssl=1","datePublished":"2024-07-24T13:27:24+00:00","dateModified":"2024-10-27T18:24:17+00:00","description":"Legal expert discusses the constitutional and statutory authority of U.S. Attorneys General to appoint Special Counsels from outside the DOJ to investigate and prosecute criminal cases.","breadcrumb":{"@id":"https://www.justsecurity.org/98037/doj-special-counsel/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/98037/doj-special-counsel/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/98037/doj-special-counsel/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/07/11th-circuit.jpg?fit=1024%2C696&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/07/11th-circuit.jpg?fit=1024%2C696&ssl=1","width":1024,"height":696,"caption":"Elbert P. Tuttle Courthouse - US Court of Appeals for the Eleventh Circuit"},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/98037/doj-special-counsel/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"United States v. Nixon at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/fa3c29cfd932614b4314a1f09bf706cb","name":"Marty Lederman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/a90f416ed44831b02317f41bf29d5f67","url":"https://secure.gravatar.com/avatar/7c2ca412b1b73d28866190ee54545f9d?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/7c2ca412b1b73d28866190ee54545f9d?s=96&d=mm&r=g","caption":"Marty Lederman"},"description":"Marty Lederman (@marty_lederman) is a professor at the Georgetown University Law Center. He was Deputy Assistant Attorney General in the Department of Justice's Office of Legal Counsel from 2021-2023 and 2009-2010, and an Attorney Advisor in OLC from 1994-2002. Areas of Expertise: Constitutional Law, National Security Law, Separation of Powers, War Powers, Torture, Detention, Interrogation, International Law, Treaties, Executive Branch, Surveillance","url":"https://www.justsecurity.org/author/ledermanmarty/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//secure.gravatar.com' /> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='dns-prefetch' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security » Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.2 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.2'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/98037\/doj-special-counsel\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=949a533b99c553f1c91109435e76337f"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1728684854' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.17' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.0' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.0' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=949a533b99c553f1c91109435e76337f" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.2" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=949a533b99c553f1c91109435e76337f" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/98037" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-pvf' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F98037%2Fdoj-special-counsel%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F98037%2Fdoj-special-counsel%2F&format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.0.2 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&ssl=1" /> </head> <body class="post-template-default single single-post postid-98037 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu"><ul> <li class="page_item page-item-97906"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Come Join <i>Just Security</i>! 2025-26 Postgraduate Legal Fellow Positions</a></li> <li class="page_item page-item-75155"><a href="https://www.justsecurity.org/records-obtained-via-goodman-v-department-of-defense/">Records obtained via Goodman v. Department of Defense </a></li> <li class="page_item page-item-47833"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a></li> <li class="page_item page-item-76521"><a href="https://www.justsecurity.org/search-results/">Search Results</a></li> <li class="page_item page-item-76522"><a href="https://www.justsecurity.org/author-search/">Author Search</a></li> <li class="page_item page-item-76531"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li class="page_item page-item-66815"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li class="page_item page-item-47828"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li class="page_item page-item-47818"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li class="page_item page-item-61915"><a href="https://www.justsecurity.org/trump-russia-timeline/">The Trump-Russia-Ukraine Timeline</a></li> <li class="page_item page-item-47830"><a href="https://www.justsecurity.org/the-pipeline/">Upcoming Events</a></li> <li class="page_item page-item-62780"><a href="https://www.justsecurity.org/updates-trump-russia-timeline/">Updates to The Trump-Russia Timeline</a></li> <li class="page_item page-item-52075"><a href="https://www.justsecurity.org/deep-dives/">Deep Dives</a></li> <li class="page_item page-item-52444"><a href="https://www.justsecurity.org/microsoft-ireland-symposium/">Microsoft Ireland Symposium</a></li> <li class="page_item page-item-49225"><a href="https://www.justsecurity.org/acting-dod-general-counsel-william-s-castles-speech-aumfs-global-war-terrorism/">Acting DOD General Counsel William S. Castle’s Speech on AUMFs in the “Global War on Terrorism”</a></li> <li class="page_item page-item-51186"><a href="https://www.justsecurity.org/glenn-simpson-fusion-gps/">Transcript: Glenn Simpson Fusion GPS Testimony House Intelligence Committee</a></li> <li class="page_item page-item-4"><a href="https://www.justsecurity.org/privacy/">Privacy</a></li> <li class="page_item page-item-47829"><a href="https://www.justsecurity.org/home-page/">Home Page</a></li> <li class="page_item page-item-5"><a href="https://www.justsecurity.org/terms/">Terms</a></li> <li class="page_item page-item-34570"><a href="https://www.justsecurity.org/donation-confirmation/">Donation Confirmation</a></li> <li class="page_item page-item-34571"><a href="https://www.justsecurity.org/transaction-failed/">Transaction Failed</a></li> <li class="page_item page-item-34572"><a href="https://www.justsecurity.org/donation-history/">Donation History</a></li> <li class="page_item page-item-37408"><a href="https://www.justsecurity.org/modern-surveillance-trump-administration/">Modern Surveillance Under the Trump Administration</a></li> <li class="page_item page-item-36664"><a href="https://www.justsecurity.org/norms-watch-inbox/">Get Norms Watch in Your Inbox</a></li> <li class="page_item page-item-1083"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li class="page_item page-item-43595"><a href="https://www.justsecurity.org/federal-prosecutor-dissects-kushners-statement/">A Former Federal Prosecutor Dissects Kushner’s Statement</a></li> <li class="page_item page-item-1885"><a href="https://www.justsecurity.org/recap-guide-weeks-posts-security-oct-4-oct-11/">Recap: A Guide to the Past Week’s Posts on Just Security (Oct. 4-Oct.11)</a></li> <li class="page_item page-item-35680"><a href="https://www.justsecurity.org/httpswww-justsecurity-orgabout-us/">https://www.justsecurity.org/about-us/</a></li> <li class="page_item page-item-97"><a href="https://www.justsecurity.org/editors-pickshot-battlefield-areas-of-active-hostilities/">Editors’ Picks</a></li> <li class="page_item page-item-30826"><a href="https://www.justsecurity.org/dod-report-oct-2015-airstrike-medecins-sans-frontieres-hospital-kunduz-afghanistan/">DOD Report on the Oct. 2015 Airstrike on Médecins Sans Frontières Hospital in Kunduz, Afghanistan</a></li> <li class="page_item page-item-108"><a href="https://www.justsecurity.org/books-written/">Books We’ve Written</a></li> <li class="page_item page-item-45429"><a href="https://www.justsecurity.org/rfi-interview-hiftar/">RFI Interview on Hiftar</a></li> <li class="page_item page-item-128 page_item_has_children"><a href="https://www.justsecurity.org/books-read/">Books We’ve Read</a> <ul class='children'> <li class="page_item page-item-533"><a href="https://www.justsecurity.org/books-read/book-synopsis-knife/">Book Synopsis: The Way of the Knife</a></li> <li class="page_item page-item-555"><a href="https://www.justsecurity.org/books-read/book-synopsis-governing-lethal-behavior-autonomous-robots/">Book Synopsis: Governing Lethal Behavior in Autonomous Robots</a></li> <li class="page_item page-item-47"><a href="https://www.justsecurity.org/books-read/book-synopsis-kill-capture-war-terror-soul-obama-presidency/">Book Synopsis: Kill or Capture</a></li> <li class="page_item page-item-1598"><a href="https://www.justsecurity.org/books-read/lincolns-code/">Book Review — Lincoln’s Code: The Laws of War in American History</a></li> <li class="page_item page-item-333"><a href="https://www.justsecurity.org/books-read/books-synopsis-justice-cascade-rights-prosecutions-world-politics/">Books Synopsis: The Justice Cascade</a></li> <li class="page_item page-item-365"><a href="https://www.justsecurity.org/books-read/books-synopsis-terror-presidency-law-judgment-bush-administration/">Book Synopsis: The Terror Presidency</a></li> <li class="page_item page-item-4254"><a href="https://www.justsecurity.org/books-read/book-synopsis-cost-counterterrorism-power-politics-liberty/">Book Synopsis – The Cost of Counterterrorism: Power, Politics, and Liberty</a></li> <li class="page_item page-item-11755"><a href="https://www.justsecurity.org/books-read/book-synopsis-place-left-hide/">Book Synopsis: No Place Left to Hide</a></li> </ul> </li> <li class="page_item page-item-386 page_item_has_children"><a href="https://www.justsecurity.org/editors-picks/">Editors’ Picks: Reading Lists</a> <ul class='children'> <li class="page_item page-item-9526"><a href="https://www.justsecurity.org/editors-picks/regulation-risks-cryptocurrency/">Editors’ Picks: The Regulation and Risks of Cryptocurrency</a></li> <li class="page_item page-item-852"><a href="https://www.justsecurity.org/editors-picks/executive-power-counterterrorism-policy/">Editors’ Picks: Executive Power & Counterterrorism Policy</a></li> <li class="page_item page-item-2146"><a href="https://www.justsecurity.org/editors-picks/power-detain/">Editors’ Picks: The Power to Detain</a></li> <li class="page_item page-item-394"><a href="https://www.justsecurity.org/editors-picks/areas-active-hostilities/">Editors’ Picks: Hot Battlefields and Areas of Active Hostilities</a></li> <li class="page_item page-item-9454"><a href="https://www.justsecurity.org/editors-picks/international-human-law-privacy-and-surveillance/">Editors’ Picks: International Human Right Law on Privacy (and Surveillance)</a></li> </ul> </li> <li class="page_item page-item-5257"><a href="https://www.justsecurity.org/recaps-archive/">Recaps Archive</a></li> <li class="page_item page-item-13962"><a href="https://www.justsecurity.org/book-synopsis-terror-courts/">Book Synopsis – The Terror Courts</a></li> <li class="page_item page-item-2449"><a href="https://www.justsecurity.org/recap-mid-week-guide-posts-security-oct-19-23/">Recap: A Mid-Week Guide to Posts on Just Security (Oct. 19-23)</a></li> <li class="page_item page-item-2710"><a href="https://www.justsecurity.org/early-edition-signup/">Signups for A.M. and P.M. Emails</a></li> <li class="page_item page-item-46495"><a href="https://www.justsecurity.org/asil-live-webcast-international-law-trump-administration-force-international-law/">ASIL Live Webcast: “International Law and the Trump Administration: The Use of Force Under International Law”</a></li> <li class="page_item page-item-33442"><a href="https://www.justsecurity.org/securitys-three-year-anniversary-event-state-secrets-whistleblowers-drone-memos/">National Security and Transparency in this Administration and the Next</a></li> <li class="page_item page-item-437"><a href="https://www.justsecurity.org/about-us/">About Us</a></li> <li class="page_item page-item-37819"><a href="https://www.justsecurity.org/excerpts-stephen-miller-interviews-meet-press-fox-news-sunday/">Excerpts of Stephen Miller Interviews on Meet the Press and Fox News Sunday</a></li> <li class="page_item page-item-42944"><a href="https://www.justsecurity.org/conversation-david-cole-authoritarianism-prevent/">David Cole on Stopping Authoritarianism’s Rise in the United States</a></li> <li class="page_item page-item-37578"><a href="https://www.justsecurity.org/call-papers-revisiting-role-international-law-national-security-workshop/">Workshop and Call for Papers: Revisiting the Role of International Law in National Security</a></li> <li class="page_item page-item-16331"><a href="https://www.justsecurity.org/surveille-scoring-methodology/">SURVEILLE Scoring Methodology</a></li> <li class="page_item page-item-2771"><a href="https://www.justsecurity.org/early-edition-email-signup/">Email Signups</a></li> <li class="page_item page-item-6362"><a href="https://www.justsecurity.org/security-reader-survey/">Just Security Reader Survey</a></li> <li class="page_item page-item-37619"><a href="https://www.justsecurity.org/securitys-coverage-immigration-refugee-executive-order/">Just Security’s Coverage of Immigration and Refugee Executive Order</a></li> <li class="page_item page-item-35062"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li class="page_item page-item-47831"><a href="https://www.justsecurity.org/early-edition/">Early Edition</a></li> <li class="page_item page-item-47832"><a href="https://www.justsecurity.org/weekend-edition/">Norms Watch</a></li> <li class="page_item page-item-47827"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Email Signup</a></li> </ul></div> </div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/07/11th-circuit.jpg?fit=1024%2C696&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1><i> United States v. Nixon </i> at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/ledermanmarty/" title="Profile and articles by Marty Lederman" class="author url fn" rel="author">Marty Lederman</a></p><p class="date">July 24, 2024</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-98037" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/98037/doj-special-counsel/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-98037" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/98037/doj-special-counsel/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-98037" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/98037/doj-special-counsel/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/98037/doj-special-counsel/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/98037/doj-special-counsel/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/department-of-justice/" rel="tag">Department of Justice (DOJ)</a>, <a href="https://www.justsecurity.org/tag/mar-a-lago/" rel="tag">Mar-a-Lago</a>, <a href="https://www.justsecurity.org/tag/special-counsel/" rel="tag">Special Counsel</a>, <a href="https://www.justsecurity.org/tag/special-counsel-jack-smith/" rel="tag">Special Counsel Jack Smith</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/ledermanmarty/" title="Profile and articles by Marty Lederman" class="author url fn" rel="author">Marty Lederman</a></p><p class="date">July 24, 2024</p></div><p>Fifty years ago today, the Supreme Court issued its landmark ruling in <a href="https://www.oyez.org/cases/1973/73-1766"><em>United States v. Nixon</em></a>. <em>Nixon </em>involved the constitutionality of a subpoena for tapes that District Judge John Sirica issued to the sitting President at the behest of Leon Jaworski, a “special prosecutor” who had an unprecedented degree of independence from DOJ leadership (and from the President). Jaworski was appointed to his position by Acting Attorney General Robert Bork. (Indeed, Bork separately created the office that he appointed Jaworski to fill, as I explain below.) In the course of his opinion for a unanimous Court, Chief Justice Warren Burger held that Congress had vested the Attorney General with the power to make such a delegation of authority to the special prosecutor. <em>United States v. Nixon</em>, 418 U.S. 683, 694 & n.8 (1974). As I discuss at the end of this essay, that was not a controversial position at the time—indeed, even President Richard Nixon himself, represented by esteemed counsel, concurred that the Acting Attorney General had such statutory authority, and no one in Congress or the legal community (to my knowledge) suggested otherwise.</p> <p>For almost a half-century thereafter, the Supreme Court’s conclusion about the Attorney General’s authority became common, uncontradicted wisdom. No one in any of the three branches of government ever questioned it, and Attorneys General repeatedly acted in accord with, and reliance upon, it.</p> <p>Until last Monday. On July 15, U.S. District Judge Aileen Cannon <a href="https://storage.courtlistener.com/recap/gov.uscourts.flsd.648652/gov.uscourts.flsd.648652.672.0_2.pdf">concluded</a> that the Supreme Court was wrong about the Attorney General’s authority. And on the basis of that holding, Judge Cannon granted former President Donald Trump’s motion to dismiss the indictment against him in the Mar-a-Lago retained-documents case.</p> <p>This essay explains why the Supreme Court (and virtually everyone else for 50 years) was right about the Attorney General’s authority and why Judge Cannon therefore erred in dismissing the indictment. [Disclosure: I was a Deputy Assistant Attorney General in the DOJ Office of Legal Counsel at the time of the Attorney General’s appointment of Jack Smith as Special Counsel. Nothing in this essay, however, reflects any confidential information from my tenure at OLC.]</p> <h2><strong>How the Question Arises in the <i>Trump </i>Case</strong></h2> <p>When former President Trump announced in 2022 that he would run for another term as President, Attorney General Merrick Garland deemed it appropriate to appoint a special counsel to supervise two pending criminal investigations of Trump. <em>See </em>28 C.F.R. 600.1 (requiring the Attorney General to appoint a Special Counsel “when he or she determines that criminal investigation of a person or matter is warranted and—(a) That investigation or prosecution of that person or matter by a United States Attorney’s Office or litigating Division of the Department of Justice would present a conflict of interest for the Department or other extraordinary circumstances; and (b) That under the circumstances, it would be in the public interest to appoint an outside Special Counsel to assume responsibility for the matter”). Accordingly, on November 18, 2022, Garland <a href="https://www.justice.gov/d9/press-releases/attachments/2022/11/18/2022.11.18_order_5559-2022.pdf">appointed Jack Smith</a>—who before that day was not employed at the Department of Justice—“to serve as Special Counsel for the United States Department of Justice.” In his appointment memorandum, the Attorney General authorized Smith to, among other things, “conduct the ongoing investigation into whether any person or entity violated the law in connection with efforts to interfere with the lawful transfer of power following the 2020 presidential election or the certification of the Electoral College vote held on or about January 6, 2021”; “conduct the ongoing investigation” in the Mar-a-Lago documents case; and “prosecute federal crimes arising from the investigation of these matters.” This assignment of authority transferred the supervision of the Mar-a-Lago case to the Special Counsel from the National Security Division within DOJ.</p> <p>The Attorney General’s appointment memorandum specified that “Sections 600.4 to 600.10 of title 28 of the Code of Federal Regulations are applicable to the Special Counsel.” The cited regulations are among those Attorney General Reno promulgated in 1999, which apply to a “Special Counsel” who is “selected from outside the United States Government.” 28 C.F.R. § 600.3(a). Those regulations provide (<em>id. </em>§ 600.6) that such a Special Counsel “shall exercise, within the scope of his or her jurisdiction, the full power and independent authority to exercise all investigative and prosecutorial functions of any United States Attorney” and “shall determine whether and to what extent to inform or consult with the Attorney General or others within the Department about the conduct of his or her duties and responsibilities.” Although a Special Counsel such as Jack Smith is required to comply with DOJ’s rules, regulations, procedures, practices and policies, <em>id.</em> § 600.7(a), he is “not … subject to the day-to-day supervision of any official of the Department,” <em>id. </em>§ 600.7(b).</p> <p>Nevertheless, the Attorney General retains authority to substantially supervise and oversee the Special Counsel. The Attorney General may determine annually “whether the investigation should continue.” <em>Id. </em>§ 600.8(a)(2). And he “may request that the Special Counsel provide an explanation for any investigative or prosecutorial step.” <em>Id.</em> § 600.7(b). Although the Attorney General must “give great weight to the views of the Special Counsel” in reviewing such an explanation, he might nonetheless “conclude that the action is so inappropriate or unwarranted under established Departmental practices that it should not be pursued,” <em>id.</em>, in which case the Attorney General may countermand Smith’s decision. Accordingly, as Attorney General Reno explained when she promulgated the regulations, the Attorney General has “ultimate responsibility for the matter and how it is handled.” 64 Fed. Reg. 37,038, 37,038 (July 9, 1999); <em>see also id.</em> at 37,040 (“notification of proposed indictments and other significant events in the course of the investigation, with the resulting opportunity for consultation, is a critical part of the mechanism through which the Attorney General can discharge his or her responsibilities with respect to the investigation”).</p> <p>Trump <a href="https://www.courtlistener.com/docket/67490070/326/united-states-v-trump/">moved to dismiss</a> the Mar-a-Lago indictment on the ground that Special Counsel Smith lacks legal authority to prosecute the case. Judge Cannon <a href="https://storage.courtlistener.com/recap/gov.uscourts.flsd.648652/gov.uscourts.flsd.648652.672.0_2.pdf">ruled last Monday</a> that Smith lacks such authority because Attorney General Garland himself did not have the power to confer such authority upon an individual who was not already employed at DOJ.</p> <p>Trump’s motion and Judge Cannon’s opinion are styled as if the question is a constitutional one—namely, whether the Attorney General’s appointment of the Special Counsel “violate[d]” the Appointments Clause of the Constitution (Art. II, § 2, cl. 2). But as Judge Cannon herself acknowledged on page 3 of her opinion, <strong>in truth it’s not a constitutional question at all</strong>. The Appointments Clause provides that the Head of a Department, such as the Attorney General, may appoint what the Clause refers to as an “inferior” officer. Judge Cannon assumed, correctly, that the Special Counsel <em>is </em>an inferior officer, at least as a matter of governing precedent.<a href="#_ftn1" name="_ftnref1">[1]</a></p> <p>Accordingly, even if we assume that Attorney General Garland appointed Smith to an “office” (but see my discussion below, suggesting to the contrary), the method of appointment here <em>complied</em> with the Appointments Clause.</p> <p>If that’s the case, then what was the legal basis for Judge Cannon’s ruling? As Judge Cannon concedes, the determinative question is a <em>statutory </em>one—namely, whether Congress has conferred upon the Attorney General the power to hire someone previously employed outside DOJ to perform the investigatory and prosecutorial functions Garland has assigned to Smith. It’s common ground between the parties that if an Attorney General lacks statutory authority to authorize a Special Counsel to prosecute the case in the way the Smith appointment order contemplates, then that would resolve the legal question on <em>statutory </em>grounds (namely, that the Attorney General’s appointment order was <em>ultra vires</em>), regardless of the Appointments Clause. DOJ does not argue—no one does—that the Attorney General could have conferred that authority absent any statutory authority to do so. On the other hand, however, if the Attorney General <em>has </em>such statutory authority, then Garland’s November 2022 appointment and authorization to Jack Smith were constitutional.<a href="#_ftn2" name="_ftnref2">[2]</a></p> <h2><strong>The Attorney General’s Statutory Authorities to Hire Individuals to Work at DOJ, to Exercise Prosecutorial Functions, and to Delegate Those Functions to DOJ Personnel</strong></h2> <p>In order to properly examine the pertinent statutory question about Congress’s conferral of authority to the Attorney General, it is important to understand that, regardless of whether Attorney General Garland had statutory authority to create an <em>office </em>of Special Counsel for the Mar-a-Lago and January 6 cases—a question I address later in this essay—two other things are clear:</p> <p style="padding-left: 40px;">(i) The Attorney General had statutory authority to hire Jack Smith to work in the Department of Justice (which Trump does not contest); and</p> <p style="padding-left: 40px;">(ii) The Attorney General also had authority to assign the supervision of the two criminal cases <em>to anyone </em>working at DOJ.</p> <p>Those two Attorney General authorities, together, are sufficient to resolve the question before Judge Cannon—namely, whether it is lawful for Jack Smith to supervise the Mar-a-Lago prosecution.</p> <p>As for the first: The Attorney General had statutory authority to hire Jack Smith to work in the Department of Justice pursuant to 5 U.S.C. 3101 (affording each Executive agency the power to hire employees, defined to include officers, <em>id.</em> § 2105(a)). <em>See also </em>28 U.S.C. §§ 503, 509 (designating the Attorney General “the head of the Department of Justice” and vesting the Attorney General with the authority to perform virtually all DOJ functions, which includes hiring). (At one point in her opinion (p.41), Judge Cannon described Smith as a “<em>private citizen</em> exercising the full power of a United States Attorney.” He is not: Jack Smith is employed by DOJ. Indeed, Attorney General Garland’s appointment memorandum specifies that Smith is “to serve as Special Counsel <em>for the United States Department of Justice</em>.”)</p> <p>OK, but what about the second key proposition above—that the Attorney General has authority to assign the supervision of the two criminal cases <em>to anyone </em>working at DOJ? The basis for that conclusion is a combination of 28 U.S.C. §§ 509 and 510.</p> <p>Section 509 provides that, with discrete exceptions not relevant here, “<em>[a]ll</em>” DOJ functions “are vested in the Attorney General,” even where another statute specifically assigns a particular function to other DOJ officials (such as 28 U.S.C. § 547(1), which authorizes U.S. Attorneys to prosecute offenses against the United States). Therefore, the Attorney General himself may supervise a criminal investigation and prosecution. This has been true since 1870, when Congress enacted the law establishing DOJ. <em>See </em>Act of June 22, 1870, ch. 150, § 3, 16 Stat. 162, 163 (providing that “the Attorney-General may, whenever he deems it for the interest of the United States, conduct and argue any case in which the government is interested, in any court of the United States”).<a href="#_ftn3" name="_ftnref3">[3]</a></p> <p>Section 510, in turn, provides the Attorney General a virtually unlimited power to <em>delegate </em>those authorities. It provides that the Attorney General “may from time to time make such provisions as he considers appropriate authorizing the performance by any other officer, employee, or agency of the Department of Justice of any function of the Attorney General.” (Congress has vested the Attorney General with such a broad delegation power since at least 1950. <em>See </em>Reorganization Plan No. 2 of 1950, § 2, 64 Stat. 1261, 1261.) This means that the Attorney General may assign the functions of criminal investigation and prosecution of a particular case—powers he may personally exercise, per Section 509—to <em>any </em>other officer, employee, or agency of DOJ. For example, Section 510 would have authorized Attorney General Garland to assign supervision of the Mar-a-Lago investigation, and any subsequent prosecution, to an attorney employed in the Office of the Attorney General (OAG), or to an attorney in the Tax Division, or to an attorney in the Environment and Natural Resources Division, etc.</p> <p>Of particular note with respect to the Mar-a-Lago case, for the past 17 years the Attorney General has exercised his Section 510 delegation authority to assign supervision of criminal investigations and prosecutions involving <em>national-security-related offenses </em>to the DOJ National Security Division (NSD), even though Congress has not vested the Assistant Attorney General for NSD with any statutory authority to prosecute criminal cases. <em>See </em>28 U.S.C. § 507A(b) (setting forth the statutory functions of the NSD AAG). In 2007, Attorney General Alberto Gonzales promulgated a regulation, 28 C.F.R. § 0.72(a)(7), conferring upon NSD the power to “[p]rosecute Federal crimes involving national security.” <em>See </em>72 Fed. Reg. 10,064, 10,066 (Mar. 7, 2007). Not surprisingly, Attorney General Gonzales cited Sections 509 and 510 as authority for that regulatory conferral of prosecutorial power to NSD (together with 5 U.S.C. § 301, which vests the head of every Executive department with authority to “prescribe regulations for the government of his department [and] the distribution and performance of its business”). <em>Id. </em>at 10,065. What’s more, the DOJ <em>Justice Manual </em>prescribes NSD control of such cases as the default rule. <em>See </em>United States Dep’t of Justice, <em>Justice Manual </em>§ 9-90.010(A) (“The enforcement of all criminal laws affecting, involving or relating to the national security, and the responsibility for prosecuting criminal offenses, such as conspiracy, perjury and false statements, arising out of offenses related to national security, is assigned to the Assistant Attorney General (AAG) of the National Security Division. <em>Where a matter affects the national security</em>, regardless of the specific statute(s) implicated, <em>prosecutions shall be instituted and conducted under the supervision of the Assistant Attorney General, National Security Division</em>, or higher authority.”) (emphasis added). (Although NSD often prosecutes such cases in conjunction with a U.S. Attorney’s office, it need not do so, and my understanding is that NSD regularly supervises such prosecutions even when there is some involvement by attorneys in a U.S. Attorney’s office.)</p> <p>Accordingly, before Attorney General Garland appointed a Special Counsel in November 2022, the Mar-a-Lago investigation and litigation itself were “instituted and conducted under the supervision of” NSD Assistant Attorney General Matt Olsen, rather than a U.S. Attorney. Such NSD direction of the case was the result of an Attorney General delegation of his own authority to NSD pursuant to Section 510.</p> <p>It follows that Attorney General Garland could have first hired Jack Smith to work in one of those DOJ components—in OAG, for example, or NSD—and then used his power under Section 510 to delegate to Smith the responsibility to supervise the Mar-a-Lago case.</p> <p>Judge Cannon appears to concede this point on page 24 of her opinion; there, she writes that Section 510 “gives the Attorney General flexibility to authorize <em>existing </em>DOJ officers, employees, or agencies to perform the functions of the Attorney General, consistent with the nature of those functions” (emphasis in original). Indeed, throughout her opinion Judge Cannon appears to acknowledge (e.g., pp. 27, 29, 38) that Attorney General Garland could have assigned the authority in question to any “already-retained” DOJ attorney. If that is correct (and it is), then Attorney General Garland could have authorized Smith to handle the Mar-a-Lago case had he done so five minutes <em>after</em> hiring Smith to work at DOJ. Judge Cannon’s holding that Section 510 is inadequate in this case, then, appears to be premised upon her assumption that Congress has insisted upon some temporal separation, no matter how brief, between the act of hiring an individual and the act of authorizing that DOJ official to supervise a prosecution.</p> <p>There is, however, no basis for assuming Congress has required such a two-step dance. Indeed, there would be no reason for Congress to have imposed such a requirement, which would serve no useful purpose and that would have contravened a longstanding practice of hiring individuals from outside DOJ to commence employment at DOJ in order to handle a particular case. Section 510 empowers the Attorney General to delegate his functions—including criminal-law investigation and prosecution—to an incoming DOJ employee who has been hired <em>for the specific purpose of exercising that delegated authority</em>. As noted below, that has happened quite frequently.</p> <p>Sections 509 and 510 thus are sufficient to afford the Attorney General the authority to delegate the Attorney General’s own investigatory and prosecutorial functions to an attorney hired into DOJ for that purpose from outside the Department.</p> <p>Section 515 of Title 28, which Judge Cannon discusses more extensively than Sections 509 and 510, is not necessary to establish this point—but it strongly confirms Congress’ understanding that “special” counsels can be hired into the Department <em>specifically in order to investigate and prosecute an identified case</em>.<a href="#_ftn4" name="_ftnref4">[4]</a></p> <p>First, subsection 515(a) expressly establishes that such prosecutorial functions are <em>not</em> the exclusive province of U.S. Attorneys. It provides:</p> <blockquote><p>The Attorney General or any other officer of the Department of Justice, or any attorney specially appointed by the Attorney General under law, may, when specifically directed by the Attorney General, conduct any kind of legal proceeding, civil or criminal, including grand jury proceedings and proceedings before committing magistrate judges, which United States attorneys are authorized by law to conduct, whether or not he is a resident of the district in which the proceeding is brought.</p></blockquote> <p>In other words, even though criminal trials are proceedings that “United States attorneys are authorized by law to conduct,” the Attorney General himself may conduct such proceedings or “specifically direct” any DOJ officer or “or any attorney specially appointed by the Attorney General under law” to conduct them. That is why it is uncontroverted that the Attorney General can give NSD the authority to prosecute national-security-related cases—as Attorney General Gonzales did in 2007—even though the Assistant Attorney General for NSD, <em>unlike </em>a U.S. Attorney, has no express statutory authority to prosecute cases. The reference in subsection 515 to “any attorney specially appointed by the Attorney General under law” further reflects Congress’s view that the Attorney General can, and occasionally does, make <em>case-specific</em> (i.e., “special”) assignments of such criminal investigative and prosecutorial authority, which can thereby displace the ordinary supervision of a U.S. Attorney.</p> <p>Subsection 515(b), in turn, reflects a congressional understanding that such an Attorney General may in some cases make such a case-specific “special appointment” <em>to persons who weren’t previously employed at DOJ</em>. It provides that “[e]ach attorney specially retained under authority of the Department of Justice shall be commissioned as special assistant to the Attorney General or special attorney, <em>and shall take the oath required by law</em>” (emphasis added). (Judge Cannon offers a couple of arguments about why subsection 515(b) shouldn’t be construed to cover a case such as the Attorney General’s appointment of Special Counsel Smith. For reasons I briefly explain in the footnote below, however, those arguments aren’t persuasive.<a href="#_ftn5" name="_ftnref5">[5]</a>)</p> <p>It might well be the case that Section 515, standing alone, would be sufficient to establish the Attorney General’s authority to appoint a Special Counsel such as Jack Smith, even if Congress had never enacted the broad delegation authority found in Section 510. Indeed, Congress enacted earlier versions of Section 515 many decades before it enacted Section 510, and did so in part to empower the Attorney General—rather than other cabinet Secretaries, who previously had the authority—to control when and under what circumstances to hire attorneys from outside the government to represent the United States. <em>See In re Grand Jury Investigation</em>, 315 F. Supp. 3d 602, 615-17 (D.D.C. 2018) (discussing the 1870 and 1906 enactments); <em>see also </em>Cong. Globe, 41st Cong., 2d Sess. 3037 (1870) (statement of principal sponsor Rep. Jenckes) (“We propose to make it illegal for the Secretary of the Treasury to [hire persons from the private sector to prosecute cases]. If he wishes to engage counsel in any case he must send to the Attorney General. If the Attorney General cannot try the case and the emergency requires assistant counsel, he can employ them. It is then done by the head of the law department, and not by the head of the Interior Department or the head of the Treasury Department. He is responsible as the chief law officer of the Government. If any error is committed we shall know who is chargeable with it. We have then the assurance, if he be the proper person, that the office will be administered economically. These are the principal provisions of the bill.”).</p> <p>In the Theodore Roosevelt administration, Attorney General Philander Knox exercised this authority at least twice by hiring attorneys from private practice to supervise prosecutions.<a href="#_ftn6" name="_ftnref6">[6]</a> Several other Attorneys General did likewise in (at least) the Wilson, Hoover, FDR and Truman administrations.<a href="#_ftn7" name="_ftnref7">[7]</a></p> <p>But whether or not Section 515, standing alone, would be enough, surely the combination of Sections 509, 510 and 515—together with the Attorney General’s authority to hire persons to work at DOJ—is more than sufficient to establish that Attorney General Garland had statutory authority to assign Jack Smith the responsibility to manage the Mar-a-Lago investigation and prosecution, just as those statutes gave the Attorney General the power earlier to assign the case to the National Security Division. As the U.S. Court of Appeals for the District of Columbia Circuit held in 1987: “Together, [Sections 509, 510 and 515] vest in the Attorney General the ‘investigative and prosecutorial functions and powers’ [of the Department] … and authorize him to delegate such functions and powers to others within the Department of Justice.” <em>In re Sealed Case</em>, 829 F.2d 50, 55 n.29 (D.C. Cir. 1987).</p> <h2><strong>The Attorney General’s Authority to Create Positions Within DOJ, Including “Offices” that Must be Filled in Conformity with the Appointments Clause</strong></h2> <p>In support of Attorney General Garland’s appointment of Jack Smith as Special Counsel, DOJ has also cited another statute, 28 U.S.C. § 533(1), which Judge Cannon discussed at length in her opinion. Section 533(1) provides that “[t]he Attorney General may appoint officials— … to detect and prosecute crimes against the United States.” Attorneys General did not invoke Section 533(1) for special counsel appointments before Attorney General Garland included it in his 2022 appointment memorandum for Jack Smith.<a href="#_ftn8" name="_ftnref8">[8]</a> Special Prosecutor Leon Jaworski relied upon it, however, along with other statutes, in his Supreme Court brief in the <em>Nixon </em>tapes case. And in the Court’s decision in that case, Chief Justice Burger identified Section 533, together with Sections 509, 510 and 515, as establishing that Congress has vested the Attorney General with “the power to appoint subordinate officers”—including the special prosecutor there, Jaworski—“to assist him in the discharge of his duties.” 418 U.S. at 694.</p> <p>Judge Cannon’s arguments for why Section 533(1)’s straightforward text isn’t an additional (or at least a confirmatory) source of authority for the Attorney General’s appointment of Special Counsel Smith are unconvincing. However, because the other statutes I discuss above (including Sections 509, 510 and 515) are more than sufficient to do the trick, and because there is some uncertainty whether Congress intended Section 533 to create any authority the Attorney General doesn’t otherwise have (see footnote 8), I’ll simply point interested readers to <a href="https://www.justsecurity.org/wp-content/uploads/2018/10/Miller.SCBrief.CTADC_.pdf#page=50">DOJ’s persuasive arguments about Section 533(1) in its 2018 court of appeals brief</a> in the case challenging Acting Attorney General Rosenstein’s authority to appoint Special Counsel Robert Mueller. <em>See also In re Grand Jury Investigation</em>, 315 F. Supp. 3d at 652-54.</p> <p>For present purposes, I’ll confine my analysis to one particular argument Judge Cannon makes regarding Section 533(1), because it raises an additional, important issue that’s lurking throughout her opinion, concerning whether the Attorney General has statutory authority to <em>establish a continuing position, or “office,” </em>to handle a particular criminal proceeding.</p> <p>Judge Cannon insists that Section 533(1)’s reference to the appointment of “officials” to “detect and prosecute crimes against the United States” does not authorize the Attorney General to appoint someone to “prosecute crimes” if that person would, by virtue of the assignment, be an “officer” for purposes of the Article II’s Appointments Clause.</p> <p>Simply as a matter of statutory construction, I don’t think that argument holds water, for at least three reasons. First, although the term “officials” might be broader than the term “officers” (at least in some statutes), the term “officials” necessarily <em>encompasses</em> constitutional officers as well as mere employees. <em>See </em>Black’s Law Dictionary (12th ed. 2024) (defining “officer” as “[s]omeone who holds or is invested <em>with a public office</em>”) (emphasis added). Second, the prosecution of federal crimes is a significant governmental authority, and therefore someone assigned to perform that function pursuant to Section 533(1) will virtually <em>always </em>be an “officer” for Appointments Clause purposes, at least where the “appoint[ment]” in question is to a continuing position in the U.S. government (see below). Therefore, if Judge Cannon were correct that the word “official” <em>excluded</em> an “officer,” the reference to “prosecution” in section 533(1) might be rendered a virtual dead letter. Third, there is no reason to assume Congress had the Appointments Clause in mind at all when it enacted Section 533 (or its predecessors, going back to 1921). Therefore, the legislature’s use of the broad and generic term “officials” wasn’t designed to imply anything one way or the other about whether such officials might include DOJ actors who occupy constitutional “offices” and thus must be appointed in conformity with the Appointments Clause. <em>Cf. Steele v. United States</em>, 267 U.S. 505, 507 (1925) (use of the term “civil officer of the United States” in the Espionage Act “does not mean an officer in the constitutional sense”).</p> <p>For these and other reasons, Judge Cannon’s argument about the meaning of “official” in Section 533(1) is less than compelling.</p> <p>Her discussion of that statutory term, however, reflects a related concern that lurks throughout Judge Cannon’s opinion—namely, her apparent view that even if Congress has afforded the Attorney General with authority to assign a prosecutorial function to DOJ personnel who would be deemed “employees” for purposes of the Appointments Clause, Congress has <em>not </em>vested the Attorney General with the power <em>to create a Special Counsel “office” in the constitutional sense</em>, i.e., to create a continuing DOJ <em>position </em>that must be filled in conformity with the Appointments Clause. <em>See, e.g.</em>, p.25 (“Section 515(a) does not authorize the creation of any office.”), p.84 (“the problem is the absence of a statutorily created office to fill in the first place”).</p> <p>In order to grapple with this issue, it’s necessary to establish some Appointments Clause basics. I discussed this topic in far greater detail in <a href="https://www.justsecurity.org/61227/constitutional-challenge-special-counsel-mueller-post-no-2-office-appointments-clause-applies/">this 2018 post</a>, during the challenge to Robert Mueller’s appointment. Go there if you want the details. Here’s the short version:</p> <p>The Appointments Clause applies to prescribe the manner of appointment <em>only </em>of individuals who occupy a federal “office.” And as the Supreme Court reiterated in <a href="https://www.supremecourt.gov/opinions/17pdf/17-130_4f14.pdf"><em>Lucia v. SEC</em></a> (2018), such an individual occupies an “office,” and is thus an Appointments Clause “officer,” only if two conditions are met:</p> <p style="padding-left: 40px;">(i) The individual is empowered to “exercise[] significant authority pursuant to the laws of the United States”; and</p> <p style="padding-left: 40px;">(ii) She occupies “a ‘continuing’ position established by law” within the U.S. government.</p> <p>If either of those conditions isn’t satisfied, the individual is not an “officer” for Appointments Clause purposes, and the Clause therefore doesn’t constrain the manner in which she may be selected. As Justice Kagan put the point for the Supreme Court in <em>Lucia</em>: If the government actor is not an officer, “the Appointments Clause cares not a whit about who named them.”</p> <p>So does Jack Smith satisfy the dual criteria for holding an “office” subject to the Appointments Clause?</p> <p>It is uncontroverted that supervising a criminal prosecution for violations of federal law, in the way Jack Smith is doing with respect to the Mar-a-Lago case, is an exercise of “significant authority” that satisfies the first prong of the Appointments Clause “officer” test. But what about the second condition?</p> <p>Trump and DOJ have litigated the case on the shared assumption that that condition is also satisfied, i.e., that Attorney General Garland appointed Smith to serve in a “continuing position established by law.” I have serious doubts about that conclusion, for reasons I offered in <a href="https://www.justsecurity.org/61227/constitutional-challenge-special-counsel-mueller-post-no-2-office-appointments-clause-applies/">my 2018 post</a>. I won’t belabor that argument here. Suffice it to say that I questioned whether the second condition for “officer” status is satisfied because of a combination of three characteristics of Special Counsel Mueller that also apply to Special Counsel Smith:</p> <p style="padding-left: 40px;">(i) The Attorney General has hired the Special Counsel only to perform a discrete and limited task—Jack Smith was “selected for the special case,” as an “expert assistant” to the Attorney General to help perform the Attorney General’s own, delegated statutory functions. <em>Auffmordt v. Hedden</em>, 137 U.S. 310, 326-27 (1890) (emphasis added). Smith himself has “no general functions, nor any employment which has any duration as to time, or which extends over any case further than as he is selected to act in that particular case.” <em>Id.</em> at 327.<a href="#_ftn9" name="_ftnref9">[9]</a></p> <p style="padding-left: 40px;">(ii) In contrast with some past instances where an Attorney General has appointed “special” or “independent” counsels (including the Watergate Special Prosecutors), Attorney General Garland has not purported to establish an “Office” independent of Smith’s appointment. He did not, for example, expressly create an “Office of Special Counsel for the Mar-a-Lago Investigation,” separate and apart from his selection of Jack Smith as Special Counsel. Thus, if Smith were to resign his post next week, there would be no “office” to be filled by another appointee—in that case, the prosecution would simply revert back to the control of the National Security Division, absent further action by the Attorney General. In order to constitute an “office” for Appointments Clause purposes, “[t]he position’s existence should not be personal: The duties should ‘continue, though the person be changed.’” <em>United States v. Maurice</em>, 26 F. Cas. 1211, 1214 (C.C.D. Va. 1823) (No. 15,747) (Marshall, C.J., sitting as Circuit Justice). That’s not the case here. There is no formal DOJ position that would persist beyond Jack Smith’s tenure.</p> <p style="padding-left: 40px;">(iii) Smith’s position and its duties are not “established by law” in the sense of being specified by or delineated <em>in a statute</em>. As I explained in 2018, the historical lessons are not uniform concerning whether a position established by regulation rather than directly by a statute can be an Appointments Clause “office.” At a minimum, however, there are some precedents suggesting that a position created pursuant to an Executive officer’s authority to delegate functions is not an “office” that requires compliance with the Appointments Clause. <em>See, e.g.</em>,<em> United States v. Smith</em>, 124 U.S. 525, 532 (1888) (holding that a clerk “discharging only such duties as may be assigned to him by [an] officer” is not himself an officer “charged by some act of Congress with duties”); <em>Freytag v. Commissioner</em>, 501 U.S. 868, 881 (1991) (distinguishing the office of trial judge, which was “established by Law” with its “duties, salary, and means of appointment … specified by statute,” from “special masters,” who courts hire “on a temporary, episodic basis, whose positions are not established by law, and whose duties and functions are not delineated in a statute,” and who are therefore mere employees who need not be appointed in conformity with the Appointments Clause).</p> <p>I <a href="https://www.justsecurity.org/61227/constitutional-challenge-special-counsel-mueller-post-no-2-office-appointments-clause-applies/">argued in 2018</a> that, whether or not any one of these characteristics standing alone would render a Special Counsel such as Robert Mueller (or Jack Smith) an “employee” rather than an officer, the three of them <em>taken together</em> point strongly against the conclusion that such a Special Counsel holds an “office” to which the Appointments Clause applies.</p> <p>As noted above, however, the parties in <em>Trump v. United States </em>disagree with me on this, and therefore there’s little chance that the appellate courts will hold that Attorney General Garland hasn’t (implicitly) created a constitutional “office” that he has filled by appointing Jack Smith to occupy it. So let’s assume, at least for the sake of argument, that by virtue of his <a href="https://www.justice.gov/opa/file/1553901/dl">appointment memorandum in November 2022</a>, the Attorney General <em>has </em>created an “office” within DOJ to which the Appointments Clause applies.<a href="#_ftn10" name="_ftnref10">[10]</a></p> <p>Again, there is no dispute that an Attorney General may not create a continuing position within DOJ—whether it is an Appointments Clause “office” or not—absent statutory authorization to do so, either express or implied. Which prompts this question: Has Congress provided such authority—i.e., has Congress vested the Attorney General with the power to establish new DOJ positions that meet the two conditions of an Appointments Clause “office”?</p> <p>Before answering this question, I should emphasize that the answer <em>should not matter for purposes of Trump’s motion to dismiss the indictment</em>. Assume, for example (and for the sake of argument), that although Attorney General Garland <em>had </em>authority to delegate the supervision of the Mar-a-Lago case to a DOJ employee (see above), he did <em>not </em>have authority to establish a distinct, continuing DOJ position of “Special Counsel for the Mar-a-Lago Case.” In that case, the proper remedy would be simply to construe the Attorney General’s November 2022 appointment memorandum, in accord with its plain language, to confer delegated authority to Jack Smith, a newly hired DOJ employee, <em>without </em>establishing a new DOJ position the duties of which would “continue” even after “the person be changed.” <em>Maurice</em>, 26 F. Cas. at 1214 (Marshall, C.J., sitting as Circuit Justice). In that case, Smith would continue to have authority to handle the case, and accordingly there would be no ground for dismissing the indictment.</p> <p>In any event, the Attorney General <em>does</em> have statutory authority to create a new DOJ position that meets the conditions for an Appointments Clause “office.” Once again, the primary source of that authority is 28 U.S.C. § 510, which provides that the Attorney General “may from time to time make such provisions as he considers appropriate authorizing the performance by any other officer, employee, or agency of the Department of Justice of any function of the Attorney General.” This broad delegation authority, together with the general authority of the head of every Executive Department “to prescribe regulations for the government of his department [and] <em>the distribution and performance of its business</em>,” 5 U.S.C. § 301 (emphasis added), not only empowers the Attorney General to delegate the exercise of his authorities to another DOJ officer, employee, or agency in a discrete, particular case (“from time to time” in the usual DOJ parlance), but also to create <em>continuing positions in DOJ </em>that are to be filled by individuals whose duties are to exercise such delegated functions.</p> <p>For example, in 1973, before Congress had created the U.S. Marshals Service, Attorney General Richard Kleindienst established an office of the “U.S. Marshals Service” within DOJ. Kleindienst appropriately cited, inter alia, Section 510 and Section 301, as the basis for the creation of that office because the persons occupying the office were assigned to perform functions delegated from (and by) the Attorney General. <em>See </em>38 Fed. Reg. 12,917 (1973). Several years later, in referring to this Attorney General creation of the “Marshals Service,” the Office of Legal Counsel cited Section 510 in explaining that “Congress has by statute vested the Attorney General with the authority to take certain measures<em>, including the creation of inferior offices within the Department of Justice</em>, to carry out the functions of his office.” <em>Applicability of Appointment Provisions of the Anti-Drug Abuse Act of 1988 to Incumbent Officeholders</em>, 12 Op. O.L.C. 286, 288 n.5 (1988) (emphasis added).</p> <p>Although I have not done a deep dive into the Code of Federal Regulations, let alone internal DOJ documents, I would not be surprised if they contain many such references to Section 510 (often in conjunction with 5 U.S.C. § 301) in instances when DOJ has established subordinate positions within the Department that are to be filled by individuals who can exercise significant government authority.<a href="#_ftn11" name="_ftnref11">[11]</a> Nor is this practice unique to the Department of Justice.<a href="#_ftn12" name="_ftnref12">[12]</a></p> <p>That has certainly been the case when it comes to “independent” and “special” counsels hired to work at DOJ. In several instances where the Attorney General has appointed such counsels, the appointment followed (or was contemporaneous with) <em>the express creation of an office itself</em>.</p> <ul> <li>First, and most famously, on June 4, 1973, Attorney General Elliot Richardson, citing 28 U.S.C. §§ 509 and 510, and 5 U.S.C. § 301, formally established within the Department of Justice “the Office of Watergate Special Prosecution Force, to be headed by a Director.” 38 Fed. Reg. 14,688 (1973). He thereafter appointed Archibald Cox to be the Director of that Office. After Cox was removed in the so-called “Saturday Night Massacre,” Acting Attorney General Robert Bork formally abolished the Office. 38 Fed. Reg. 29,466 (Oct. 23, 1973). Less than two weeks later, however, Bork was compelled to reestablish the office—once again citing Sections 509, 510, and 301 as his authority to do so. <em>See </em>38 Fed. Reg. 30,738 (Nov. 2, 1973). Contemporaneously with the reestablishment of the office, Acting Attorney General Bork appointed Leon Jaworski to fill it. (For much more about this episode surrounding the Saturday Night Massacre and its aftermath, see <a href="https://balkin.blogspot.com/2019/12/who-massacred-whom-on-that-saturday.html">this post</a>. Both Cox and Jaworski, incidentally, enjoyed a greater degree of “independence” than what the current regulations afford Jack Smith.)</li> <li>In March 1987, there was ongoing litigation about whether the “independent counsel” provisions of the Ethics in Government Act of 1978 were constitutional, and the Reagan Administration was arguing to the courts that they were <em>not </em>constitutional (a view the Supreme Court rejected the next year in <em>Morrison v. Olson</em>). Therefore, in order to sustain the independence of the special prosecutor in the Iran/Contra investigation, Attorney General Edwin Meese established a <em>regulatory </em>“Office of Independent Counsel: Iran/Contra, to be headed by an Independent Counsel.” 52 Fed. Reg. 7270 (Mar. 10, 1987) (again citing 28 U.S.C. §§ 509, 510, and 515, and 5 U.S.C. § 301). Meese then appointed Lawrence Walsh to head that regulatory office. Several months later, in the course of adjudicating Oliver North’s challenge to Walsh’s authority, the U.S. Court of Appeals for the D.C. Circuit had “no difficulty concluding that the Attorney General possessed the statutory authority <em>to create the Office of Independent Counsel: Iran/Contra</em> and to convey to it the ‘investigative and prosecutorial functions and powers’ described in [AG regulations].” <em>In re Sealed Case</em>, 829 F.2d 50, 55 (D.C. Cir. 1987) (emphasis added); <em>see also id. </em>at 55 n.29 (“Together, [Sections 509, 510 and 515] vest in the Attorney General the “investigative and prosecutorial functions and powers” described in the [Meese] regulation, … and authorize him to delegate such functions and powers to others within the Department of Justice.”); <em>id. </em>at 63 (Williams, J., concurring and dissenting) (“I concur in the court’s opinion insofar as it upholds the authority of Independent Counsel Walsh and his subordinates under the Attorney General’s regulations creating ‘Independent Counsel: Iran/Contra’”).<a href="#_ftn13" name="_ftnref13">[13]</a></li> <li>The following year, Attorney General Meese effectively established yet another DOJ office of a “special independent counsel,” this one to manage any future allegations of criminal conduct by members of Congress. 53 Fed. Reg. 31,322-23 (Aug. 18, 1988) (citing 28 U.S.C. §§ 509, 510, 515, 516, 517 and 519, and 5 U.S.C. §§ 301 and 3101). (Early in the George H.W. Bush Administration, Attorney General Thornburgh “suspended” the regulation Meese had promulgated. 54 Fed. Reg. 15,752 (Apr. 19, 1989). As far as I know, the position remains “suspended” and no Attorney General has ever appointed a special independent counsel to that office.) <ul> <li>Appearing as an amicus in the Mar-a-Lago <em>Trump </em>case, Meese now insists that Congress hasn’t authorized the Attorney General to create such offices within DOJ. But Meese certainly thought he had such authority when he was the Attorney General—and he twice cited Sections 510 and 301, among other statutes, as providing such authority when he himself established such positions for the performance of criminal investigative and prosecutive functions delegated from the Attorney General himself. <em>See </em>52 Fed. Reg. at 7270; 53 Fed. Reg. at 31,323.</li> </ul> </li> <li>Finally, in 1994, during a period in which the independent counsel provisions of the Ethics in Government Act had lapsed, Attorney General Janet Reno promulgated regulations that effectively established an office of “the Independent Counsel: In re Madison Guaranty Savings & Loan Association,” again citing Section 510 and 301, among other authorities. 59 Fed. Reg. 5321, 5321-22 (Feb. 4, 1994). (Attorney General Reno had separately appointed Robert Fiske to perform the functions of what became that office.)</li> </ul> <p>If no statute authorized the Attorney General to create continuing DOJ positions for the exercise of significant government functions, then all of these past actions by Attorneys General would have been unlawful. But Sections 510 and 301 (at a minimum) <em>do </em>confer such authority, which is why this practice (and similar practices in other agencies) has until recently virtually <em>never </em>been questioned by anyone in any of the three branches.</p> <p>Attorneys General have made other appointments, as well, of “special” counsels to handle criminal cases with an unusual degree of independence, even where the Attorney General did not separately and expressly establish a formal “office.” For example:</p> <ul> <li>On March 29, 1979, Attorney General Griffin Bell, citing Section 515, appointed Paul Curran as special counsel to investigate allegations of questionable financial dealings involving President Carter’s family peanut warehouse—an investigation that included the issuance of subpoenas to the President’s brother Billy and his wife. <em>See Future of the Independent Counsel Act: Hearings Before the Senate Comm. On Governmental </em>Affairs, 106th Cong., 1st Sess. 113 (1999). Bell later explained that this was a delegation of “all the power I had to [Curran].” <em>Id. </em>at 37. Although Attorney General Bell originally did not delegate to Curran the power to bring prosecutions, that limitation was met with “a rain of criticism from Republicans,” and so three days later Bell <a href="https://www.nytimes.com/1979/03/24/archives/bell-increases-currans-authority-to-examine-carter-business-loans.html">gave Curran</a> “the power accorded the two special prosecutors in the Watergate affair, Leon Jaworski and Archibald Cox,” including “the authority to seek indictments without clearance from anyone in the Justice Department.”</li> <li>On June 30, 1999, Attorney General Reno promulgated the regulations that currently govern Special Counsels “selected [by the Attorney General] from outside the United States Government.” 28 C.F.R. § 600.3(a). Reno announced that she did so “by virtue of the authority vested in me as Attorney General, including 5 U.S.C. 301 and 28 U.S.C. 509 and 510.” 64 Fed. Reg. 37,038, 37,042 (July 9, 1999). The prospect of creating such a regulatory special counsel regime in lieu of the Independent Counsel statute was the subject of a great deal of attention in Congress both before and after Attorney General Reno acted. Yet, as far as I know, no one in Congress (or elsewhere) so much as mentioned any issue, let alone expressed any doubts, about the Attorney General’s statutory authority to promulgate such regulations, or to hire a Special Counsel from outside the government with the power to prosecute criminal cases.Two months later, in September 1999, Attorney General Reno made the first selection under the new regulations: She <a href="https://www.justice.gov/archive/opa/pr/1999/September/400ag.htm">appointed Jack Danforth</a> to be a Special Counsel to investigate possible misconduct on the part of federal law enforcement personnel in connection with the Branch Davidian incident near Waco, Texas. Under the regulations Reno had issued that June—the same regulations that also govern Special Counsel Smith—Danforth had the “full power and independent authority to exercise all investigative and prosecutorial functions of any United States Attorney.” 28 C.F.R. § 600.6.</li> <li>In 2017, Acting Attorney General Rod Rosenstein, citing 28 U.S.C. §§ 509, 510 and 515, <a href="https://www.justice.gov/archives/opa/press-release/file/967231/dl">appointed Robert Mueller</a> to investigate the Russian government’s efforts to interfere in the 2016 presidential election and any links or coordination between individuals associated with the Trump campaign and the Russian government. Mueller, too, was given the investigative and prosecutorial powers prescribed in the 1999 Special Counsel regulations.</li> <li>In January 2023, Attorney General Garland, citing Sections 509, 510, 515 and 533, <a href="https://www.justice.gov/opa/press-release/file/1562301/dl">appointed Robert Hur as “Special Counsel for the United States Department of Justice” </a>to conduct an investigation of possible unauthorized removal and retention of classified documents or other records discovered at the Penn Biden Center and at President Biden’s personal residence in Wilmington, with the delegated authority to prosecute federal crimes arising from that investigation.</li> </ul> <p>In light of all these examples (as well as those in the first half of the Twentieth Century (see footnotes 6 and 7, supra), Judge Cannon understandably acknowledged (p.40) that if her holding is correct, it would call into legal question a “‘tradition’ of appointing special-attorney-like figures in moments of political scandal throughout the country’s history.”<a href="#_ftn14" name="_ftnref14">[14]</a> Yet she plowed ahead nonetheless, apparently untroubled by the fact that no one in any of the three branches (or within Colonel North’s or President Nixon’s litigation teams) challenged the lawfulness of this “tradition”—and, in particular, Congress’ statutory authorization to the Attorney General to establish such offices and to appoint persons from outside DOJ to fill them—until the challenge to the Mueller appointment in 2018, which the unanimous court of appeals briskly (and appropriately) dispatched.</p> <h2><strong>The <i>United States v. Nixon</i> Precedent</strong></h2> <p>Which brings back me, finally, to the Supreme Court’s 1974 decision in <em>Nixon v. United States</em>. In that case, Chief Justice Burger wrote this for a unanimous Court (418 U.S. at 694):</p> <blockquote><p>Congress has vested in the Attorney General the power to conduct the criminal litigation of the United States Government. … It has also vested in him the power to appoint subordinate officers to assist him in the discharge of his duties.</p></blockquote> <p>In support of the latter statement about the Attorney General’s power to appoint “subordinate officers to assist him in the discharge of his duties,” the Court cited 28 U.S.C. §§ 509, 510, 515 and 533. And it added in footnote 8 that Acting Attorney General Bork issued the regulation establishing the Office of Watergate Special Prosecution Force “pursuant to his statutory authority.”</p> <p>The U.S. Court of Appeals for the D.C. Circuit recently held that these holdings in <em>Nixon </em>settle the legal question Judge Cannon addressed: “[W]hether Congress has ‘by law’ vested appointment of [a] Special Counsel … in the Attorney General has already been decided by the Supreme Court.” <em>In re Grand Jury Investigation</em>, 916 F.3d 1047, 1053 (D.C. Cir. 2019); <em>accord United States v. Concord Mgmt. & Consulting LLC</em>, 317 F. Supp. 3d 598, 622-23 (D.D.C. 2018) (Friedrich, J.).</p> <p>Judge Cannon disagrees. She insists that the relevant sentences in <em>Nixon </em>were dicta because Nixon hadn’t contested Acting Attorney General Bork’s statutory authority to establish the Office of Watergate Special Prosecution Force and appoint Leon Jaworski to head it.</p> <p>If I had to guess, I’d predict the U.S. Court of Appeals for the Eleventh Circuit will agree with the D.C. Circuit that the <em>Nixon </em>passage is binding on lower courts. But the statutory ruling in <em>Nixon</em> is important for yet another reason, as well.</p> <p>Judge Cannon is right that President Nixon did not contest Acting Attorney General Bork’s statutory authority to (re-)create the Office of Watergate Special Prosecution Force and to appoint Leon Jaworski to be its Director. “Across hundreds of pages of briefing (and hours of oral argument) in <em>Nixon</em>,” she notes (pp. 61-62), “neither party challenged the Special Prosecutor’s validity or the Attorney General’s appointment authority.”</p> <p>Yet this was not simply a matter of deliberate or negligent <em>waiver </em>on Nixon’s part. Far from it.</p> <p>Nixon was represented by James St. Clair, Charles Alan Wright, Leonard Garment, and other savvy, experienced counsel. Those esteemed attorneys offered numerous arguments on Nixon’s behalf in their zealous effort to challenge the tapes subpoena. Had there been a respectable argument that Acting Attorney General Bork had acted without statutory authority in appointing Jaworski, they certainly would have made it. (And others in the legal community would have flagged it.) Yet they did not. To the contrary, after Jaworski had expressly cited §§ 509, 510, 515 and 533 in his brief as the grounds for Acting Attorney General Bork’s authority to appoint a Special Prosecutor, Nixon’s counsel wrote in their reply brief (pp. 7-8) that “<em>[w]e do not contest</em> the Special Prosecutor’s assertion that his authority is derived from the Attorney General” (emphasis added). In other words, Nixon’s savvy counsel <em>acknowledged </em>that the Acting Attorney General had delegated his own authority to Jaworski—something Section 510 plainly authorized—and that therefore Jaworski was (in the words of the reply brief) “the alter ego of the Attorney General” in the “particular matter.” Nor was this simply a throwaway point: St. Clair, et al., insisted upon it because it was central to their (unsuccessful) argument that because the Attorney General allegedly lacked the authority to seek the subpoena, therefore his delegee, Jaworski, could not do so, either.</p> <p>The most important point about the <em>Nixon </em>decision, therefore, is not that the pertinent passages in the Court’s opinion are binding on lower courts (though they are), but that Nixon himself, as well as his experienced counsel, and all eight Justices on the Supreme Court who participated, unanimously <em>agreed </em>with Jaworski that Section 510 and other statutes gave the Attorney General authority to delegate his own criminal law-enforcement authorities to a prosecutor hired from outside the Department of Justice (and to afford that prosecutor even greater independence from the Attorney General’s control than Jack Smith has in the Mar-a-Lago case). (As noted in footnote 13, Oliver North’s Williams and Connolly attorneys made the same assessment fourteen years later.) For Judge Cannon, none of this matters. As Adam Unikowsky <a href="https://adamunikowsky.substack.com/p/dont-be-a-visionary">pithily observes</a>, under her reading, <em>everyone </em>in the <em>Nixon </em>case “messed up”:</p> <blockquote><p>President Nixon’s army of lawyers messed up by failing to raise, or even notice, the winning argument. The Supreme Court messed up too. On its face, the Court’s opinion states without reservation that the Attorney General had the statutory authority to hire Leon Jaworski. All of the Justices who heard the case, and all of their law clerks, carelessly failed to notice that this was an open issue.</p></blockquote> <p>Of course, they didn’t all mess up. The consensus understanding of the Attorney General’s statutory authority in the <em>Nixon </em>case was uncontested because it was incontestable. It has persisted for half a century. Actors in all three branches have relied upon it—and never questioned it—ever since.</p> <p>Judge Cannon ought to have done likewise.</p> <p>– – – – – – – – –</p> <p><a href="#_ftnref1" name="_ftn1">[1]</a> Amici Meese, Calabresi, et al., argued to Judge Cannon that Smith is a <em>principal </em>officer, and that therefore the Appointments Clause required him to be appointed by the President, by and with the advice and consent of the Senate. That argument, however, cannot be squared with the Supreme Court’s 1988 decision in <em>Morrison v. Olson </em>that the Independent Counsel there (who had much more independence than does Jack Smith) was an inferior officer. It would also contravene an extensive practice of special counsel appointments by Attorneys General. Therefore, although she expressed considerable disdain for <em>Morrison</em>, Judge Cannon declined to rest her ruling on the ground that Smith is a principal officer. “For purposes of this Order, the Court accepts the Special Counsel’s contested view that he qualifies as an ‘inferior Officer,’” she wrote (p.2).</p> <p><a href="#_ftnref2" name="_ftn2">[2]</a> In the final sections of her opinion, Judge Cannon also purported to find that Special Counsel Smith has expended funds “in violation of” the Appropriations Clause of Article I. That holding, however, is predicated entirely on the judge’s earlier conclusion that the Attorney General lacked statutory authority to appoint Jack Smith and to authorize him to prosecute the case. Therefore, the question of whether the Attorney General has such statutory appointment/delegation authority is really the only relevant question.</p> <p><a href="#_ftnref3" name="_ftn3">[3]</a> Before 1870, the Secretaries of the State, War, and Treasury Departments were authorized to bring federal criminal actions without participation by the Attorney General, and they regularly paid substantial sums for the services of attorneys from the private sector in order to prosecute such cases. One of the primary reasons Congress passed the 1870 Act was to consolidate all such authority with the Attorney General and the new Department of Justice—including, as explained below, the authority to hire attorneys from the private sector to represent the United States in particular cases.</p> <p><a href="#_ftnref4" name="_ftn4">[4]</a> Judge Cannon notes (p.37) that in 1973, when Acting Attorney General Robert Bork created the Office of Special Watergate Prosecution Force, headed by Leon Jaworski, Bork cited only Sections 509 and 510 (as well as the general authority given to Department Heads in 5 U.S.C. § 301), and did not mention Section 515. That makes sense because, as I explained above, Sections 509 and 510 are sufficient to establish the authority. Section 515 merely confirms it.</p> <p><a href="#_ftnref5" name="_ftn5">[5]</a> First, Judge Cannon asserts (p.26) that the term “retained” refers to a hiring that occurs <em>before</em> the assignment to the individual of authority to prosecute. But there’s no basis for thinking that’s what Congress meant. To the contrary, the reference in § 515(b) to the need for the individual to take an oath—something the person presumably would already have done had they been previously hired to work at DOJ—indicates otherwise. And even the 1951 version of Black’s Law Dictionary that Justice Cannon herself cites as authority (p.28) defined “retain” to mean, inter alia, “to engage the services of an attorney or counselor <em>to manage a case</em>”—which describes to a tee what happened when Attorney General Garland hired Jack Smith to a DOJ position in order to prosecute (“manage”) particular cases.</p> <p>Judge Cannon also contends (pp. 30-33) that the reference to “special attorneys” in § 515(b) can mean only such attorneys hired pursuant to 28 U.S.C. § 543 <em>to a</em>ssist <em>U.S. Attorneys</em>. There is little reason to conclude, however, that Congress intended the term “special attorneys” in § 515(b) to be so limited. In any event, § 515(b) refers <em>both </em>to a “special attorney” <em>and </em>to a “special assistant <em>to the Attorney General</em>,” and the latter plainly refers to an attorney hired to assist the Attorney General rather than a U.S. Attorney. That makes perfect sense, because § 515(b) is the latest iteration of section 17 of the 1870 Act creating the Justice Department, which deliberately authorized the Attorney General to hire “a special assistant to the Attorney-General, <em>or </em>to some one of the district attorneys,” 16 Stat. at 165 (emphasis added), thereby affording the Attorney General two different options, only one of which involved assigning a special counsel to assist a district attorney (the predecessor to today’s U.S. Attorney). <em>See In re Grand Jury Investigation</em>, 315 F. Supp. 3d 602, 617 (D.D.C. 2018) (detailing this history). As I discuss in the text of this essay, since early in the Twentieth Century, Attorneys General have used the “special assistant to the Attorney General” provision of the statute to hire counsel to displace, rather than to assist, the district attorney (or U.S. Attorney) in the prosecution of a particular case.</p> <p><a href="#_ftnref6" name="_ftn6">[6]</a> In 1902, Knox appointed Wickham Smith to be a Special Assistant to the Attorney General, assigned to investigate and possibly prosecute persons suspected of fraudulently importing Japanese silks. A federal judge later granted a motion to quash indictments brought by Smith, largely on the ground that the 1870 statute allegedly had not vested the Attorney General with the power to authorize such Special Assistants to the AG to seek indictments in a grand jury. <em>See United States v. Rosenthal</em>, 121 F. 862 (C.C.S.D.N.Y. 1903). In 1906, Congress amended the statute to make clear that the authority <em>did </em>extend to the function of seeking grand jury indictments. <em>See In re Grand Jury Investigation</em>, 315 F. Supp. 3d at 616-17.</p> <p>In 1903, Attorney General Knox appointed Francis Heney of the San Francisco Bar as a “special assistant” to the Attorney General “to take charge of the prosecution of the land fraud cases in Oregon.” Letter to President Roosevelt from Attorney General Knox, Dec. 2, 1903, at 1. The sitting District Attorney in Oregon, John Hall, planned to treat Heney as his assistant, but Attorney General Knox assured Heney that he was “to be in full charge,” and Knox telegraphed Hall to instruct him that Heney represented the Attorney General and was to be obeyed as Knox himself would be obeyed. <em>See </em>Lincoln Steffens, <a href="https://en.wikisource.org/wiki/The_American_Magazine_(1906-1956)/Volume_64/The_Taming_of_the_West/Heney_Grapples"><em>The Taming of the West, Pt. II</em></a>, in The American Magazine, vol. 64, at 587-88 (Oct. 1907); <em>see also id. </em>at 594 (recounting how Heney took over all witness examination from District Attorney Hall once he realized that Hall was “crooked” and was conspiring to protect possible defendants). Heney eventually haled District Attorney Hall himself before the grand jury, and then inveighed upon the President to remove Hall from office. <em>Id. </em>at 597. Several years later, Heney had Hall indicted for “conspiracy to defeat the administration of justice,” <em>id. </em>at 599, and secured a conviction against Hall in 1908, <em>see </em>John Messing, <em>Public Lands, Politics, and Progressives: The Oregon Land Fraud Trials, 1903-1910</em>, in Pacific Historical Rev., Vol. 35, No. 1, at 61 (Feb. 1966).</p> <p><a href="#_ftnref7" name="_ftn7">[7]</a> <em>See United States v. May</em>, 236 F. 495, 498 (8th Cir. 1916) (describing a 1914 appointment by Attorney General Gregory); <em>United States v. Cohen</em>, 273 F. 620, 621-22 (D. Mass. 1921) (describing 1921 appointments by Attorney General Palmer and Acting Attorney General Nebeker); <em>United States v. Amazon Ind. Chem. Corp.</em>, 55 F.2d 254, 256 (D. Md. 1931) (describing a 1931 appointment by Attorney General Mitchell); <em>Shushan v. United States</em>, 117 F.2d 110, 113-14 (5th Cir. 1941) (describing what were likely two 1939 appointments by Attorney General Murphy); <em>United States v. Powell</em>, 81 F. Supp. 288, 289 n.1 (E.D. Mo. 1948) (describing a 1948 appointment by Attorney General Clark). <em>See also Ewert v. Bluejacket</em>, 259 U.S. 129, 133-34 (1922) (describing an appointment by Attorney General Bonaparte of a special assistant to the Attorney General to assist in the institution and prosecution of suits to set aside deeds to certain allotments in the Quapaw Indian Agency). There might have been many other such appointments, as well. These are merely those I was able to identify in a very rudimentary Westlaw search.</p> <p><a href="#_ftnref8" name="_ftn8">[8]</a> I do not know why Section 533 wasn’t cited in earlier appointment documents, but one reason might be uncertainty about whether Congress intended that provision to establish any authority the Attorney General did not otherwise have. Congress first enacted it in a 1921 appropriations act that authorized DOJ expenditures of funds “for the detection and prosecution of crimes against the United States.” Act of Mar. 4, 1921, Pub. L. No. 66-389, 41 Stat. 1367, 1410. That provision included a proviso that “for the purpose of executing the duties for which provision is made by this appropriation, the Attorney General is authorized to appoint officials who shall be designated ‘special agents of the Department of Justice,’ and who shall be vested with the authority necessary for the execution of such duties.” <em>Id.</em> at 1411. Congress included similar provisos in appropriation statutes over the following six years. <em>See Delegation of the Att’y Gen.’s Auth. to Investigate Credit Card Fraud</em>, 7 U.S. Op. O.L.C. 172, 173 (1983). In 1922, the Chair of the relevant House subcommittee stated that it did not “creat[e] any power or greater authority” and that the Attorney General already “ha[d] the general authority” to hire such personnel. 62 Cong. Rec. 5209 (statement of Rep. Husted). I haven’t done any legislative history research beyond that, however.</p> <p><a href="#_ftnref9" name="_ftn9">[9]</a> As I discussed in my 2018 Mueller post, this was true, as well, of Independent Counsel Alexia Morrison in <em>Morrison v. Olson</em>, yet the Court in <em>Morrison </em>held, in an unelaborated footnote, that it was “clear” Morrison was “an ‘officer’ of the United States” who had to be appointed as the Appointments Clause prescribes. 487 U.S. at 671 n.12. That drive-by holding in <em>Morrison </em>is difficult to square with <em>Auffmordt </em>and other decisions, but nevertheless it is governing precedent. Therefore, although this factor is <em>relevant</em> to the question of whether Smith is an “officer,” it can’t be determinative.</p> <p><a href="#_ftnref10" name="_ftn10">[10]</a> Appearing as an amicus in the Mar-a-Lago <em>Trump </em>case, Professor Seth Barrett Tillman has argued that if (as I suggest) Jack Smith does not hold a “continuing” position and therefore is not an “officer” to whom the Appointments Clause applies, it would mean that the Constitution prohibits him from prosecuting Trump, even if Congress <em>did </em>vest the Attorney General with the power to appoint Smith to do so. This argument is simply backwards, and Tillman doesn’t cite any authority to support it. The purpose of the “continuing position” test, in conjunction with the “significant government authority” test, is simply to assess whether Congress is limited by the Appointments Clause in prescribing who may appoint the official. There is nothing in the Constitution that requires holding a “continuing position” in the federal government <em>in order to exercise significant government functions </em>such as prosecution. The Supreme Court has long recognized that non-officers may exercise such functions. In the leading <em>Auffmordt </em>case, for example, the Court upheld import duties imposed by Hedden, an independent contractor acting as a collector at the port of New York, even though he was not appointed in a manner prescribed by the Appointments Clause, because the Court found that Hedden didn’t hold a continuing position in the government. The fact that the Appointments Clause didn’t apply to Hedden because he was not an “officer” for purposes of that Clause did <em>not </em>mean that his exercise of significant authority was invalid—to the contrary, the Court upheld the import duties he imposed upon Auffmordt. Similarly, although <em>qui tam </em>relators and individuals acting as arbitrators in cases involving the government exercise significant authority under federal law, there is nothing constitutionally problematic about their doing so, even though they need not be chosen in conformity with the Appointments Clause because they do not satisfy the second criterion for being an “officer.” <em>See The Constitutional Separation of Powers Between the President and Congress</em>. 20 Op. O.L.C. 124, 146 & n.65, 148-49 (1996); <em>Officers of the United States Within the Meaning of the Appointments Clause</em>, 31 Op. O.L.C. 73, 114 (2007).</p> <p><a href="#_ftnref11" name="_ftn11">[11]</a> To take the example closest to home, Attorneys General have twice appointed me to be a Deputy Assistant Attorney General in OLC, in which capacity I conveyed binding legal advice to executive branch actors, acting pursuant to delegated statutory authority belonging in the first instance to the Attorney General. <em>See </em>28 U.S.C. 511, 512. Similarly, as Judge Sri Srinivasan explained during the 2018 oral argument in the case challenging the Mueller appointment, Attorney General Holder appointed Srinivasan himself, from outside DOJ, to be Principal Deputy Solicitor General in 2011. Similarly, in 1989, Attorney General Thornburgh appointed John G. Roberts from Hogan & Hartson to be Principal Deputy Solicitor General. That officer typically signs briefs articulating the views of the United States in the Supreme Court when the Solicitor General is recused, as John Roberts did in, for example, <a href="https://www.justice.gov/sites/default/files/osg/briefs/1989/01/01/sg890279.txt">the government’s brief in <em>Metro Broadcasting v. FCC</em></a>, asking the Court to declare certain federal statutes unconstitutional. If, as Judge Cannon suggested, there were no statutory authority to establish such DOJ positions in the first instance, then the legality of such very common appointments would be called into question.</p> <p><a href="#_ftnref12" name="_ftn12">[12]</a> The heads of other agencies likewise have used delegation authorities analogous to that found in Section 510, together with Section 301, to establish positions within their departments to be filled by individuals assigned to perform significant delegated authorities of the department head. <em>See, e.g.</em>, <em>Willy v. Admin. Rev. Bd.</em>, 423 F.3d 483, 491–92 (5th Cir. 2005) (“Even though we recognize that no specific federal statute creates the [DOL Administrative Review Board], … [t]he broad language employed by Congress in the Reorganization Plan No. 6 of 1950 [which, like DOJ’s Section 510, provides that ‘[t]he Secretary of Labor may from time to time make such provisions as he shall deem appropriate authorizing the performance by any other officer, or by any agency or employee, of the Department of Labor of any function of the Secretary’] and in 5 U.S.C. § 301 vests the Secretary with ample authority <em>to create the ARB</em>, appoint its members, and delegate final decision-making authority to them.”) (emphasis added).</p> <p><a href="#_ftnref13" name="_ftn13">[13]</a> In a recent article, Professors Calabresi and Lawson <a href="https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=4873&context=ndlr#page=41">note</a> that North did not specifically argue that Meese lacked statutory authority to establish and fill the office; apparently his attorneys’ principal statutory argument was that the Ethics in Government Act had <em>preempted </em>(or superseded) that earlier authority. But even if that is so, it simply helps prove the point: The statutory authority for Meese’s actions was so clear and uncontestable that even North’s resolute Williams and Connolly lawyers, including Barry Simon, Brendan Sullivan and Nicole Seligman, apparently chose not to challenge it.</p> <p><a href="#_ftnref14" name="_ftn14">[14]</a> There might be other examples, as well. I have not tried to perform a comprehensive historical search. Nor have I listed other cases in which Attorneys General have invoked their statutory authorities to authorize “outside” counsel to investigate possible crimes, including the power to compel production of evidence, without conferring upon them the power to seek grand jury indictments or to prosecute a case at trial—something that Attorney General William Barr, for example, appears to have done at least three times in the George H.W. Bush administration. In 1991, Barr appointed Nicholas Bua to investigate the so-called “Inslaw Affair,” which involved allegations that certain high-level DOJ officials had stolen software from a computer company. In 1992, Barr appointed Malcolm Wilkey to conduct a preliminary review of the alleged abuses of the “House Bank” by Members and officers in the House of Representatives. And, also in 1992, Barr appointed Frederick Lacey to conduct a preliminary investigation of any wrongdoing by DOJ or CIA officials concerning an illegal loan to Iraq from the Atlanta branch of an Italian bank, Banca Nationale del Laroro. Similarly, in 2000 Attorney General Reno appointed Paul Coffey, a <em>former </em>DOJ prosecutor, to investigate whether CIA Director John Deutch had unlawfully stored classified information on home computers and to recommend whether a prosecution was warranted.</p> <h6><strong><em>Image: Elbert P. Tuttle Courthouse, U.S. Court of Appeals for the Eleventh Circuit</em></strong></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/department-of-justice/" rel="tag">Department of Justice (DOJ)</a>, <a href="https://www.justsecurity.org/tag/mar-a-lago/" rel="tag">Mar-a-Lago</a>, <a href="https://www.justsecurity.org/tag/special-counsel/" rel="tag">Special Counsel</a>, <a href="https://www.justsecurity.org/tag/special-counsel-jack-smith/" rel="tag">Special Counsel Jack Smith</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts & Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To ‘End’ War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine — and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gwenadmin/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon’s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who’s Who in Jack Smith’s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN’s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103164/usaid-digital-policy-conflict-peacebuilding/">The Next Step for USAID’s New Digital Policy: Account for Conflict Risks and Include Peacebuilding</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/guintaclaire/" title="Profile and articles by Claire Guinta" class="author url fn" rel="author">Claire Guinta</a> and <a href="https://www.justsecurity.org/author/zuroskinick/" title="Profile and articles by Nick Zuroski" class="author url fn" rel="author">Nick Zuroski</a></p> <p class="date">Sep 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103184/amended-protocol-booby-traps-pagers/">Article 7(2) of Amended Protocol II on Conventional Weapons and the Lebanon Pager Explosions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100374/ukraine-us-public-support-election/">Will US Public Support for Ukraine Aid Survive the Presidential Campaign?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mironrobert/" title="Profile and articles by Robert Miron" class="author url fn" rel="author">Robert Miron</a> and <a href="https://www.justsecurity.org/author/feaver-peter/" title="Profile and articles by Peter Feaver" class="author url fn" rel="author">Peter Feaver</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100333/rethinking-united-nations-cybercrime-treaty/">Rethinking the United Nations Cybercrime Treaty</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pielemeierjason/" title="Profile and articles by Jason Pielemeier" class="author url fn" rel="author">Jason Pielemeier</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100172/why-criminalize-ecocide-experts/">Why Criminalize Ecocide? Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100265/musk-trump-legal-boundaries/">Musk, X, and Trump 2024: Where are the Legal and Ethical Boundaries?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/jacksondean/" title="Profile and articles by Dean Jackson" class="author url fn" rel="author">Dean Jackson</a></p> <p class="date">Sep 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100259/u-n-general-assembly-high-level-week-2024-what-experts-are-looking-for/">U.N. General Assembly High-Level Week 2024 : What Experts Are Looking For</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100195/a-2024-election-litigation-hot-list/">A 2024 Election Litigation Hot List</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100193/law-war-exploding-pagers-lebanon/">Law of War Questions Raised by Exploding Pagers in Lebanon</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100130/competition-not-control-is-key-to-winning-the-global-ai-race/">Competition, Not Control, is Key to Winning the Global AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mittelsteadtmatthew/" title="Profile and articles by Matthew Mittelsteadt" class="author url fn" rel="author">Matthew Mittelsteadt</a> and <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a></p> <p class="date">Sep 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97864/political-violence-us-enough/">Political Violence in the United States Is Rising – and It Might Be Up to Americans to Say “Enough!”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Sep 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99994/americas-national-security-threat/">America’s Overlooked National Security Threat</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Sep 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99964/challenging-state-capture/">To Challenge State Capture, the US Needs a Strategy of State Retrieval</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/prendergastjohn/" title="Profile and articles by John Prendergast" class="author url fn" rel="author">John Prendergast</a> and <a href="https://www.justsecurity.org/author/wilsondamon/" title="Profile and articles by Damon Wilson" class="author url fn" rel="author">Damon Wilson</a></p> <p class="date">Sep 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99869/telegrams-security-sham/">Telegram’s Security Sham</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vanlandinghammichael/" title="Profile and articles by Michael Van Landingham" class="author url fn" rel="author">Michael Van Landingham</a> and <a href="https://www.justsecurity.org/author/wildeg/" title="Profile and articles by Gavin Wilde" class="author url fn" rel="author">Gavin Wilde</a></p> <p class="date">Sep 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99841/public-safety-reform-targeted-violence/">Public-Safety Reform and Preventing Targeted Violence: Two Sides of the Same Public-Health Coin</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosanderic/" title="Profile and articles by Eric Rosand" class="author url fn" rel="author">Eric Rosand</a>, <a href="https://www.justsecurity.org/author/weinestevan/" title="Profile and articles by Stevan Weine" class="author url fn" rel="author">Stevan Weine</a> and <a href="https://www.justsecurity.org/author/gimenezalejandrosantana/" title="Profile and articles by Alejandro Giménez Santana" class="author url fn" rel="author">Alejandro Giménez Santana</a></p> <p class="date">Sep 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99831/reaim-second-summit-context/">Putting the Second REAIM Summit into Context</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vestnertobias/" title="Profile and articles by Tobias Vestner" class="author url fn" rel="author">Tobias Vestner</a> and <a href="https://www.justsecurity.org/author/cleoburysimon/" title="Profile and articles by Simon Cleobury" class="author url fn" rel="author">Simon Cleobury</a></p> <p class="date">Sep 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99113/north-korea-growing-threat/">The Growing Threat from North Korea</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kirbymichael/" title="Profile and articles by The Hon. Michael Kirby" class="author url fn" rel="author">The Hon. Michael Kirby</a></p> <p class="date">Aug 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98855/good-moral-character-trump-immigrants/">‘Good Moral Character?’ Holding Trump to the Same Standards as the Immigrants He Vilifies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/chenedgar/" title="Profile and articles by Edgar Chen" class="author url fn" rel="author">Edgar Chen</a> and <a href="https://www.justsecurity.org/author/rossdan/" title="Profile and articles by Dan Ross" class="author url fn" rel="author">Dan Ross</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99069/artificial-intelligence-democracy-effects/">Don’t Downplay Risks of AI for Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nosselsuzanne/" title="Profile and articles by Suzanne Nossel" class="author url fn" rel="author">Suzanne Nossel</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98844/dont-sanction-icc/">Don’t Sanction the ICC for Doing its Job</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mayamichael/" title="Profile and articles by Michael Maya" class="author url fn" rel="author">Michael Maya</a></p> <p class="date">Aug 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia’s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98895/presidential-immunity-congressional-contempt/">Presidential Immunity Decision May Have Implications for Congressional-Executive Divide on Criminal Contempt</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/wrightandy/" title="Profile and articles by Andy Wright" class="author url fn" rel="author">Andy Wright</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98847/kursk-incursion-international-law/">Ukraine’s Incursion into Kursk Oblast: A Lawful Case of Defensive Invasion?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/omearachris/" title="Profile and articles by Chris O'Meara" class="author url fn" rel="author">Chris O'Meara</a></p> <p class="date">Aug 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98812/icc-amicus-brief-israel-palestine/">Expert Explainer: The US for the first time submits a formal brief to the International Criminal Court on the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a></p> <p class="date">Aug 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98787/icc-disability-slave-trade/">Time for the International Criminal Court to Recognize Persons with Disabilities and the Slave Trade</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lordjanet/" title="Profile and articles by Janet Lord" class="author url fn" rel="author">Janet Lord</a>, <a href="https://www.justsecurity.org/author/schwarzpace/" title="Profile and articles by Pace Schwarz" class="author url fn" rel="author">Pace Schwarz</a>, <a href="https://www.justsecurity.org/author/smithmatthew/" title="Profile and articles by Matthew "Hezzy" Smith" class="author url fn" rel="author">Matthew "Hezzy" Smith</a>, <a href="https://www.justsecurity.org/author/steinmichael/" title="Profile and articles by Michael Ashley Stein" class="author url fn" rel="author">Michael Ashley Stein</a>, <a href="https://www.justsecurity.org/author/greenalex/" title="Profile and articles by Alex Green" class="author url fn" rel="author">Alex Green</a> and <a href="https://www.justsecurity.org/author/kayessrosemary/" title="Profile and articles by Rosemary Kayess" class="author url fn" rel="author">Rosemary Kayess</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98801/podcast-international-law-israel-palestine/">The Just Security Podcast: Assessing the Recent Response of International Law and Institutions in Palestine and Israel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/imseisardi/" title="Profile and articles by Ardi Imseis" class="author url fn" rel="author">Ardi Imseis</a>, <a href="https://www.justsecurity.org/author/hammourishahd/" title="Profile and articles by Shahd Hammouri" class="author url fn" rel="author">Shahd Hammouri</a>, <a href="https://www.justsecurity.org/author/kattanvictor/" title="Profile and articles by Victor Kattan" class="author url fn" rel="author">Victor Kattan</a>, <a href="https://www.justsecurity.org/author/sirleafmatiangai/" title="Profile and articles by Matiangai Sirleaf" class="author url fn" rel="author">Matiangai Sirleaf</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98754/biden-end-iraq-war/">A Presidential Proclamation to End the Iraq War: Unilateral Executive Action to Defang a Zombie AUMF</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98733/ukraine-icc-ratification/">Unforced Error: Article 124 and the Regrettable Caveat to Ukraine’s Proposed Ratification of the ICC Statute</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98674/911-plea-deals-revoked/">Revoking the 9/11 Plea Deals: Human Rights Consequences</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a></p> <p class="date">Aug 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98652/afghanistan-taliban-third-anniversary/">Collecting Just Security’s Afghanistan Coverage on Third Anniversary of Taliban Takeover</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a></p> <p class="date">Aug 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98592/sudan-talks-deadlock/">Breaking the Deadlock: New Talks Needed to Help End Sudan’s Violence and Offer a Glimmer of Hope</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/abdulshafiquscondy/" title="Profile and articles by Quscondy Abdulshafi" class="author url fn" rel="author">Quscondy Abdulshafi</a></p> <p class="date">Aug 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98543/fara-sue-mi-terry/">The Perils of Expertise: How the DOJ Indictment of Sue Mi Terry Can Chill the Think Tank World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/craiggregory/" title="Profile and articles by Gregory B. Craig" class="author url fn" rel="author">Gregory B. Craig</a></p> <p class="date">Aug 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98501/israel-trans-border-torture/">Justice for Trans-border Torture Requires Rethinking the International Criminal Court’s Jurisdiction in the Israel-Palestine Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ben-natansmadar/" title="Profile and articles by Smadar Ben-Natan" class="author url fn" rel="author">Smadar Ben-Natan</a> and <a href="https://www.justsecurity.org/author/mannitamar/" title="Profile and articles by Itamar Mann" class="author url fn" rel="author">Itamar Mann</a></p> <p class="date">Aug 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98445/our-lives-depend-on-cloud/">Our Lives Depend on the Cloud. Now What?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pendletonjohn/" title="Profile and articles by John Pendleton" class="author url fn" rel="author">John Pendleton</a> and <a href="https://www.justsecurity.org/author/leviteariel/" title="Profile and articles by Ariel Levite" class="author url fn" rel="author">Ariel Levite</a></p> <p class="date">Aug 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98429/security-council-report-isis-qaeda/">Wake Up Call: UN Security Council’s Report on ISIS and al-Qaeda</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Aug 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98378/podcast-assessing-laws-of-war/">The Just Security Podcast: Assessing the Laws of War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/droegecordula/" title="Profile and articles by Cordula Droege" class="author url fn" rel="author">Cordula Droege</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98313/podcast-hostage-policy/">The Just Security Podcast: The Evolution of U.S. Hostage Policy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/foleydiane/" title="Profile and articles by Diane Foley" class="author url fn" rel="author">Diane Foley</a>, <a href="https://www.justsecurity.org/author/hartigluke/" title="Profile and articles by Luke Hartig" class="author url fn" rel="author">Luke Hartig</a>, <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98273/the-aftermath-of-the-haniyeh-killing-how-to-avoid-a-new-middle-east-war/">The Aftermath of the Haniyeh Killing: How to Avoid a New Middle East War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98261/disability-think-differently-trump/">Donald Trump’s Dangerous Views on Disability and the Power to Think Differently</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97738/just-security-analysis-supreme-court/">Collecting Just Security’s Analysis of the Supreme Court’s Term</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a> and <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98205/prudential-trump-v-united-states/">A Prudential Way Forward in <i>Trump v. United States</i></a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bobbittphilip/" title="Profile and articles by Philip Bobbitt" class="author url fn" rel="author">Philip Bobbitt</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98091/negotiations-with-iran-now/">Space May be Opening for Negotiations with Iran</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brewgregory/" title="Profile and articles by Gregory Brew" class="author url fn" rel="author">Gregory Brew</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98128/united-nations-pact-for-future/">What the Draft UN “Pact for the Future” Tells Us About International Insecurity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gowanrichard/" title="Profile and articles by Richard Gowan" class="author url fn" rel="author">Richard Gowan</a></p> <p class="date">Jul 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98082/international-court-of-justices-call-on-all-states-to-end-israels-occupation-and-find-a-path-to-peace/">International Court of Justice’s Call on All States to End Israel’s Occupation and Find a Path to Peace</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nowrojeebinaifer/" title="Profile and articles by Binaifer Nowrojee" class="author url fn" rel="author">Binaifer Nowrojee</a></p> <p class="date">Jul 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98037/doj-special-counsel/"><i> United States v. Nixon </i> at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ledermanmarty/" title="Profile and articles by Marty Lederman" class="author url fn" rel="author">Marty Lederman</a></p> <p class="date">Jul 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97937/azerbaijan-arbitrary-detentions-host-cop29/">Azerbaijan’s Aliyev Extends Arbitrary Detentions Even as He Prepares to Host Global Climate Conference COP29</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bayramovazhala/" title="Profile and articles by Zhala Bayramova" class="author url fn" rel="author">Zhala Bayramova</a>, <a href="https://www.justsecurity.org/author/bayramovibad/" title="Profile and articles by Ibad Bayramov" class="author url fn" rel="author">Ibad Bayramov</a> and <a href="https://www.justsecurity.org/author/bayramliemin/" title="Profile and articles by Emin Bayramli" class="author url fn" rel="author">Emin Bayramli</a></p> <p class="date">Jul 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92714/american-autocracy-threat-tracker/">American Autocracy Threat Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/ben-ghiatruth/" title="Profile and articles by Ruth Ben-Ghiat" class="author url fn" rel="author">Ruth Ben-Ghiat</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a>, <a href="https://www.justsecurity.org/author/kolbjoshua/" title="Profile and articles by Joshua Kolb" class="author url fn" rel="author">Joshua Kolb</a>, <a href="https://www.justsecurity.org/author/warrenandrew/" title="Profile and articles by Andrew Warren" class="author url fn" rel="author">Andrew Warren</a>, <a href="https://www.justsecurity.org/author/kovacs-goodmanjacob/" title="Profile and articles by Jacob Kovacs-Goodman" class="author url fn" rel="author">Jacob Kovacs-Goodman</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97922/non-state-civilian-political-institutions/">Assessing the Civilian and Political Institutions of Armed Non-State Actors under International Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/fortinkatharine/" title="Profile and articles by Katharine Fortin" class="author url fn" rel="author">Katharine Fortin</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97826/state-departments-civilian-harm-incident-response/">The State Department’s Civilian Harm Incident Response Guidance: How to Make a Good Thing Better</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blahacharles/" title="Profile and articles by Charles O. (Cob) Blaha" class="author url fn" rel="author">Charles O. (Cob) Blaha</a></p> <p class="date">Jul 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/">Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jul 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97760/economic-security-presidential-power/">How ‘Economic Security’ is Re-shaping Presidential Power</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/claussenkathleen/" title="Profile and articles by Kathleen Claussen" class="author url fn" rel="author">Kathleen Claussen</a> and <a href="https://www.justsecurity.org/author/meyertimothy/" title="Profile and articles by Timothy Meyer" class="author url fn" rel="author">Timothy Meyer</a></p> <p class="date">Jul 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97747/trump-docs-case-dismissed/">Judge Cannon Finds Special Counsel Unconstitutional in Trump Classified Documents Case: What’s Next for Jack Smith?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Jul 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97718/nato-summit-ukraine-russia-china/">After the NATO Summit, Allies Need to Step Up Their Game on Ukraine, Russia, and China</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Jul 15th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia’s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis & Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/77022/january-6-clearinghouse/">January 6 Clearinghouse</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a></p> <p class="date">Mar 14th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine – The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security’s Series on Reparations in Russia’s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the “War on Terror”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 “Report Card” Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76692/introduction-to-just-securitys-series-on-tulsa-race-massacre-of-1921/">Introduction to Just Security’s Series on Tulsa Race Massacre of 1921</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bergerchristine/" title="Profile and articles by Christine Berger" class="author url fn" rel="author">Christine Berger</a></p> <p class="date">May 29th, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/ledermanmarty/">Marty <span>Lederman</span></a></h4><p>Marty Lederman (<a href="https://twitter.com/marty_lederman">@marty_lederman</a>) is Executive Editor at Just Security. He is a professor at the Georgetown University Law Center. He served as Deputy Assistant Attorney General at the Office of Legal Counsel from 2021-2023 and 2009-2010, and as an Attorney Advisor at the Office of Legal Counsel from 1994-2002.</p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104488/trump-brief-jack-smith-authority/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/07/DOJ-OLC-GettyImages-1137627140-scaled.jpg?fit=768%2C497&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104488/trump-brief-jack-smith-authority/">A Review of Donald Trump’s Appellate Brief, and Amicus Briefs, Concerning the Appointment of Jack Smith as Special Counsel</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/ledermanmarty/" title="Profile and articles by Marty Lederman" class="author url fn" rel="author">Marty Lederman</a></p> <p class="date">Nov 4th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/89121/clearinghouse-mar-a-lago-documents-case-southern-district-of-florida/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/10/GettyImages-1258564531-scaled-e1696358294467.jpg?fit=768%2C298&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/89121/clearinghouse-mar-a-lago-documents-case-southern-district-of-florida/">Clearinghouse: Mar-a-Lago Documents Case – Southern District of Florida</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Nov 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/89122/clearinghouse-january-6th-election-interference-case-district-of-columbia/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/10/GettyImages-1570153687-scaled-e1696358396342.jpg?fit=768%2C333&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/89122/clearinghouse-january-6th-election-interference-case-district-of-columbia/">Clearinghouse: January 6th Election Interference Case – District of Columbia</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Nov 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/88175/trump-trials-clearinghouse/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/10/collage-for-clearinghouse-1-1-scaled.jpg?fit=768%2C204&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/88175/trump-trials-clearinghouse/">Trump Trials Clearinghouse</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Nov 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/08/GettyImages-1477112831-scaled-e1730205864291.jpg?fit=768%2C404&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/tarrio-pic.jpeg?fit=768%2C426&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/07/specialcounseljacksmith.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-2160420069-scaled-e1728478531450.jpg?fit=768%2C379&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2169585596-scaled-e1727702920774.jpg?fit=768%2C401&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/BeFunky-collage1-1-scaled.jpg?fit=768%2C337&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who’s Who in Jack Smith’s Immunity Brief</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2023/09/GettyImages-1636798170-scaled-e1693915298873.jpg?fit=768%2C247&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103304/senate-judiciary-committee-presidential-immunity/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/BeFunky-collage-4-scaled.jpg?fit=768%2C293&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103304/senate-judiciary-committee-presidential-immunity/">A Confusing Rule for the Ages: A Review of the Senate Judiciary Committee Hearing on Presidential Immunity</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/buckisaac/" title="Profile and articles by Isaac Buck" class="author url fn" rel="author">Isaac Buck</a></p> <p class="date">Sep 30th, 2024</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">© 2024 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/98037\/doj-special-counsel\/":98037}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1732368403" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202447.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"98037\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.0\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "98037" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.0" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>