CINXE.COM

Three Flaws in the Supreme Court’s Presidential Immunity Decision

<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Three Flaws in the Supreme Court’s Presidential Immunity Decision</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v24.4) - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="The Court’s presidential immunity decision suffers from shallow reasoning, lack of historical support, and distortion of legal precedent." /> <link rel="canonical" href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity" /> <meta property="og:description" content="&quot;A lawless Supreme Court is as anathema to a democracy as a lawless president,&quot; writes @AWeissmann in an analysis of the #SCOTUS presidential immunity decision." /> <meta property="og:url" content="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2024-07-17T12:53:58+00:00" /> <meta property="article:modified_time" content="2025-01-24T01:38:14+00:00" /> <meta property="og:image" content="https://www.justsecurity.org/wp-content/uploads/2024/03/GettyImages-14032358811.jpg" /> <meta property="og:image:width" content="1024" /> <meta property="og:image:height" content="683" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Andrew Weissmann" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Andrew Weissmann" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="13 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#article","isPartOf":{"@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/2309642fa99d8d08b3487bff3db0fe57"}],"headline":"Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity","datePublished":"2024-07-17T12:53:58+00:00","dateModified":"2025-01-24T01:38:14+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/"},"wordCount":2956,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/GettyImages-14032358811.jpg?fit=1024%2C683&ssl=1","keywords":["Congress","constitutional law","Democracy","Donald Trump","executive branch","Immunity","John Roberts","Presidential Powers","Rule of Law","Separation of powers","Supreme Court (SCOTUS)","Trump administration first term","Trump v Hawaii","Trump v. United States"],"articleSection":["Congress","Courts","Elections","Executive Branch","Featured Articles","Law Enforcement","Rule of Law/ Accountability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/","url":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/","name":"Three Flaws in the Supreme Court’s Presidential Immunity Decision","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/GettyImages-14032358811.jpg?fit=1024%2C683&ssl=1","datePublished":"2024-07-17T12:53:58+00:00","dateModified":"2025-01-24T01:38:14+00:00","description":"The Court’s presidential immunity decision suffers from shallow reasoning, lack of historical support, and distortion of legal precedent.","breadcrumb":{"@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/GettyImages-14032358811.jpg?fit=1024%2C683&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/GettyImages-14032358811.jpg?fit=1024%2C683&ssl=1","width":1024,"height":683,"caption":"The U.S. Supreme Court building at dawn in Washington, D.C., U.S. Photographer: Samuel Corum/Bloomberg"},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","contentUrl":"https://www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/2309642fa99d8d08b3487bff3db0fe57","name":"Andrew Weissmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/c6ce4b43e29f1cae290a26e43c3a2ed8","url":"https://secure.gravatar.com/avatar/dfae43af03b442dda5a41ab672bf8f43?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/dfae43af03b442dda5a41ab672bf8f43?s=96&d=mm&r=g","caption":"Andrew Weissmann"},"description":"Andrew Weissmann (Bluesky - LinkedIn - Substack - Threads) is Professor of Practice and Distinguished Senior Fellow at the Reiss Center on Law and Security and at the Center on the Administration of Criminal Law at NYU School of Law. He served as a lead prosecutor in Robert S. Mueller’s Special Counsel’s Office (2017-19) and as Chief of the Fraud Section in the Department of Justice (2015-2019). During his previous tenure at NYU Law (2013-2015), Weissmann was a Senior Fellow at both the Reiss Center on Law and Security and the Center for the Administration of Criminal Law. He taught courses in national security and criminal procedure. From 2011 to 2013, Weissmann served as the General Counsel for the Federal Bureau of Investigation. He previously served as special counsel to then-Director Mueller in 2005, after which he was a partner at Jenner &amp; Block in New York City. From 2002-2005, he served as the Deputy and then the Director of the Enron Task Force in Washington, D.C., where he supervised the prosecution of more than 30 individuals in connection with the company’s collapse. Weissmann was a federal prosecutor for 15 years in the Eastern District of New York, where he served as the Chief of the Criminal Division. He prosecuted numerous members of the Colombo, Gambino, and Genovese families, including the bosses of the Colombo and Genovese families. Weissmann has extensive experience in private practice. Weissmann won the largest Financial Industry Regulatory Authority arbitration award in history. He has taught criminal law and procedure at Fordham Law School and Brooklyn Law School. He holds a Juris Doctor degree from Columbia Law School and was on the managing board of the Columbia Law Review. He has a Bachelor of Arts degree from Princeton University and attended the University of Geneva on a Fulbright Fellowship. He is the author of the book, Where Law Ends: Inside the Mueller Investigation and co-author, with Melissa Murray, of the book The Trump Indictments The Historic Charging Documents with Commentary. He is co-host. with Mary McCord, of the podcast Main Justice and of the former podcast Prosecuting Donald Trump.","url":"https://www.justsecurity.org/author/weissmannandrew/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='preconnect' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security &raquo; Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.4 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.4'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/97781\/three-flaws-supreme-court-immunity\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=752c17b67996bc9ed79dd24275b3a6cc' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&#038;family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&#038;display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1735053534' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-default-css' href='https://www.justsecurity.org/wp-content/tablepress-combined.min.css?ver=42' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedheader-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedheader.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-fixedcolumns-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.fixedcolumns.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-scroll-buttons-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.scroll-buttons.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-rowgroup-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.rowgroup.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-responsive-tables-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/responsive-tables.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-columnfilterwidgets-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.columnfilterwidgets.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-column-filter-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.column-filter.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-datetime-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.datetime.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchbuilder-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchbuilder.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchhighlight-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchhighlight.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-select-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.select.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-searchpanes-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.searchpanes.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-datatables-serverside-processing-css' href='https://www.justsecurity.org/wp-content/plugins/tablepress-premium/modules/css/build/datatables.serverside-processing.css?ver=3.0.3' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.18' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='popup-maker-site-css' href='//www.justsecurity.org/wp-content/uploads/pum/pum-site-styles.css?generated=1739227473&#038;ver=1.20.4' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.3' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.3' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.4" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=752c17b67996bc9ed79dd24275b3a6cc" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/97781" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-pr7' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F97781%2Fthree-flaws-supreme-court-immunity%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F97781%2Fthree-flaws-supreme-court-immunity%2F&#038;format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.1.1 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&#038;ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&#038;ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&#038;ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&#038;ssl=1" /> </head> <body class="post-template-default single single-post postid-97781 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> <li id="menu-item-107744" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107744"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Admin Litigation Tracker</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#fff"/></svg> </a><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu-mobile-container"><ul id="menu-mobile" class="menu"><li id="menu-item-733" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-733"><a href="https://www.justsecurity.org">Home</a></li> <li id="menu-item-76571" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76571"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-76565" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76565"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-76533" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76533"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-76566" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76566"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76572" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76572"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-106458" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-106458"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> </ul> </li> <li id="menu-item-83989" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83989"><a href="https://www.buzzsprout.com/2074610">NEW: Podcast</a></li> <li id="menu-item-107745" class="menu-item menu-item-type-post_type menu-item-object-post menu-item-107745"><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/" title="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Trump Administration Litigation Tracker</a></li> <li id="menu-item-93849" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-93849"><a href="https://www.youtube.com/@JustSecurityForum">YouTube</a></li> <li id="menu-item-82330" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-82330"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94074" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94074"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84715" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84715"><a href="https://www.justsecurity.org/tag/climate-change/">Climate Change</a></li> <li id="menu-item-82331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82331"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-82332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82332"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-82336" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82336"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82354" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82354"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-82338" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82338"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84716" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84716"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-82345" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82345"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-82340" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82340"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-82341" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82341"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-82342" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82342"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> <li id="menu-item-91477" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91477"><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82353" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82353"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-82343" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82343"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li> <li id="menu-item-82344" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82344"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-82346" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82346"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82542" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82542"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84718" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84718"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-82348" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82348"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li> <li id="menu-item-82349" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82349"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> </ul> </li> <li id="menu-item-82351" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-82351"><a href="https://www.justsecurity.org/category/featured-new/">Featured Articles</a></li> <li id="menu-item-76568" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76568"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li id="menu-item-37577" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-37577"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li id="menu-item-76569" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76569"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Signups for A.M. and P.M. emails</a></li> </ul></div></div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/GettyImages-14032358811.jpg?fit=1024%2C683&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1>Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p><p class="date">July 17, 2024</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-bluesky"><a rel="nofollow noopener noreferrer" data-shared="sharing-bluesky-97781" class="share-bluesky sd-button share-icon no-text" href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/?share=bluesky" target="_blank" title="Click to share on Bluesky" ><span></span><span class="sharing-screen-reader-text">Click to share on Bluesky (Opens in new window)</span></a></li><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-97781" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-97781" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-97781" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/congress/" rel="tag">Congress</a>, <a href="https://www.justsecurity.org/tag/constitutional-law/" rel="tag">constitutional law</a>, <a href="https://www.justsecurity.org/tag/democracy/" rel="tag">Democracy</a>, <a href="https://www.justsecurity.org/tag/donald-trump/" rel="tag">Donald Trump</a>, <a href="https://www.justsecurity.org/tag/executive-branch/" rel="tag">executive branch</a>, <a href="https://www.justsecurity.org/tag/immunity/" rel="tag">Immunity</a>, <a href="https://www.justsecurity.org/tag/john-roberts/" rel="tag">John Roberts</a>, <a href="https://www.justsecurity.org/tag/presidential-powers/" rel="tag">Presidential Powers</a>, <a href="https://www.justsecurity.org/tag/rule-of-law/" rel="tag">Rule of Law</a>, <a href="https://www.justsecurity.org/tag/separation-of-powers/" rel="tag">Separation of powers</a>, <a href="https://www.justsecurity.org/tag/supreme-court/" rel="tag">Supreme Court (SCOTUS)</a>, <a href="https://www.justsecurity.org/tag/trump-administration/" rel="tag">Trump administration first term</a>, <a href="https://www.justsecurity.org/tag/trump-v-hawaii/" rel="tag">Trump v Hawaii</a>, <a href="https://www.justsecurity.org/tag/trump-v-united-states/" rel="tag">Trump v. United States</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p><p class="date">July 17, 2024</p></div><p><span style="font-weight: 400;">The Supreme Court’s presidential criminal immunity decision in </span><a href="https://www.supremecourt.gov/opinions/23pdf/23-939_e2pg.pdf"><i><span style="font-weight: 400;">Trump v. United States</span></i></a><span style="font-weight: 400;">  suffers from shallow reasoning, lack of historical support, and distortion of legal precedent. This piece addresses three major flaws in the decision. All three derive from the Court’s failure to examine and differentiate the source and scope of presidential power &#8212; whether constitutionally or congressionally derived and, where the former, whether exclusively committed to the president or not. The three flaws are: the majority’s reliance on separation of powers to justify finding criminal immunity for all official presidential action (even outside the areas of exclusive presidential authority) despite its absence from the text or history of the constitution, its seeming preclusion of reliance on the criminal law to differentiate official from unofficial presidential conduct (again even outside of areas of exclusive presidential authority), and its similar preclusion of the president’s motives in making the determination as to whether conduct is official or not. </span></p> <p><span style="font-weight: 400;">Chief Justice John Roberts penned the majority </span><a href="https://www.supremecourt.gov/opinions/23pdf/23-939_e2pg.pdf"><span style="font-weight: 400;">opinion</span></a><span style="font-weight: 400;">, which created (at the very least) a strong presumption of immunity for any official act taken by the president. It also precludes using evidence of such acts in a criminal case against the president, even one for private conduct – say, for example, paying hush money to a porn star to mislead the voting public in advance of the 2016 presidential election. </span></p> <p><span style="font-weight: 400;">The Court makes the presumption of immunity exceedingly difficult to overcome. The government must establish that there is “no” danger “of intrusion on the authority and functions of the Executive Branch,” with no other factors to consider or balance. This new test is a bastardization of a test from a Supreme Court civil immunity case that did require balancing (in that case, </span><a href="https://supreme.justia.com/cases/federal/us/457/731/"><i><span style="font-weight: 400;">Nixon v. Fitzgerald</span></i></a><span style="font-weight: 400;">, 457 U.S. 731, 754 (1982), weighing “broad public interests,” specifically identifying vindication of the public interest in an ongoing criminal prosecution), without so much as a nod to the fact that its new test lops off consideration of the other side of the equation. </span></p> <p><span style="font-weight: 400;">Finally, the Court grants absolute immunity for a subset of “core” presidential functions. The Court interprets these “core” functions broadly to encompass the president’s interactions with the Department of Justice (DOJ) – remarkably, even if it is to direct DOJ to commence “sham” investigations into fraud in a presidential election. The Court left for another day whether the conduct entitled to strong presumptive immunity should also be entitled to absolute immunity.</span></p> <h2><b>1. Separation of powers</b></h2> <p><span style="font-weight: 400;">The Trump criminal immunity decision is grounded on a sleight of hand that masks its naked twin goals of aiding Donald Trump and creating a presidency with broad unchecked powers.</span></p> <p><span style="font-weight: 400;">To justify this new-found presidential immunity, Chief Justice Roberts could not draw on the text of the constitution or even any history around the time of its adoption. Instead, Roberts justified the criminal immunity protection by resort to the Court’s role in protecting the executive branch from encroachment by the legislative branch – what is termed in the law as “separation of powers” principles that prevent one branch of government from impermissibly encroaching on the constitutional functions delegated to another branch. </span></p> <p><span style="font-weight: 400;">Roberts wrote, for instance, that “separation of powers principles … necessitate at least a </span><i><span style="font-weight: 400;">presumptive</span></i><span style="font-weight: 400;"> immunity from criminal prosecution for a President’s acts within the outer perimeter of his official responsibility.” To the dissents’ criticism about the majority’s lack of textual support, Roberts retorted that the Court’s civil immunity decisions similarly did not have textual support, and both are supported by implicit separation of powers principles in the constitution. </span></p> <p><span style="font-weight: 400;">The Court’s cloak of separation of powers to justify its ruling is threadbare. The criminal case before the Court in </span><i><span style="font-weight: 400;">Trump v. United States</span></i><span style="font-weight: 400;"> is one instituted by the executive branch against a former head of the executive branch. The Court’s decision operates not to restrict any branch of government from intruding on another, but the current executive branch from prosecuting a former executive branch member.. </span></p> <p><span style="font-weight: 400;">Of note, Justice Amy Coney Barrett in her concurrence would apply a legal methodology that asks whether Congress has the power to criminalize a particular presidential function, in which case the statute would be unconstitutional as applied to the president. Such an approach requires differentiating when the presidency has been accorded exclusive power by the constitution or whether Congress has the ability to regulate in that sphere.  But no one joined her concurrence, and the majority opinion ignores this crucial distinction. In short, the executive branch decision to prosecute a former president may present an important executive branch policy issue, but absent application to a core and exclusive presidential function it is not a question of separation of powers between any of the three branches of government.</span></p> <p><span style="font-weight: 400;">The Court does not justify why it should play any role in that issue whatsoever. Indeed, the Court says that prosecution is a core executive branch function. The fallacy in the Court’s “separation of powers” analysis is nowhere more transparent in its paeon to the unchecked power of the presidency to determine whether, when, and who to prosecute criminally. Roberts describes the executive branch’s authority over such matters as “conclusive and preclusive.” It has “‘exclusive authority and absolute discretion’ to decide which crimes to investigate and prosecute,” including with respect to allegations of election crime, citing ironically its </span><i><span style="font-weight: 400;">Nixon</span></i><span style="font-weight: 400;"> precedent, which required a sitting president to turn over to prosecutors damning tapes regarding his official (and criminal) acts while in office that ended his presidency.</span></p> <p><span style="font-weight: 400;">The irony, of course, is that Chief Justice Roberts gives the </span><i><span style="font-weight: 400;">current</span></i><span style="font-weight: 400;"> president and his Attorney General no such “conclusive and preclusive” authority with respect to the prosecution of a former president. Instead, under bogus “separation of powers” intonements, it took away such power, arrogating to the court itself the policy decision of whether the executive branch can prosecute a former leader. In doing so, Roberts had to ignore substantial legal precedent, including another </span><a href="https://supreme.justia.com/cases/federal/us/433/425/"><span style="font-weight: 400;">Nixon era decision</span></a><span style="font-weight: 400;"> in which the Court held that it must be presumed that “the incumbent President is vitally concerned with and in the best position to assess the present and future needs of the Executive Branch…”</span></p> <p><span style="font-weight: 400;">Justice Barrett, in her separate concurrence, appears to have been wise to this stratagem and, in her concurrence at least, rejects it. She agrees that when it comes to the small number of functions that the constitution delegates exclusively to the president – the pardon power, for instance – Congress cannot criminalize its exercise, as such a statute would be unconstitutional. That, indeed, would be a violation of the separation of powers. </span></p> <p><span style="font-weight: 400;">But those core powers given exclusively to the president, Justice Barrett notes, are small in number. “Properly conceived, the President’s constitutional protections from prosecution is narrow.” Here, Justice Barrett’s concurrence conforms to another influential concurrence, this one by Justice Robert Jackson in the enduring framework on separation of powers he laid out in </span><a href="https://scholar.google.com/scholar_case?case=14460863599772421355&amp;q=youngstown+sheet+%26+tube+co+v+sawyer&amp;hl=en&amp;as_sdt=2006"><i><span style="font-weight: 400;">Youngstown Sheet &amp; Tube Co. v. Sawyer</span></i></a><span style="font-weight: 400;">. He admonished that “a Presidential claim to a power at once so conclusive and preclusive must be scrutinized with caution, for what is at stake is the equilibrium established by our constitutional system.”</span></p> <p><span style="font-weight: 400;">The separation of powers concerns do not apply, however, with the same force to the far greater range of “official actions” by the president, as to which the presidency does not have exclusive authority under the constitution. Nevertheless, in the name of separation of powers, the majority restricted one executive from prosecuting another based on a newly coined criminal immunity doctrine. To achieve that result, Justice Roberts could not proceed down the more honest and legally sound path articulated by Justice Barrett, in which the question was whether a statute was constitutional as applied to the executive branch, as that would not have justified immunity for all official acts.</span></p> <p><span style="font-weight: 400;">In sum, the majority decision operates as a thinly veiled and poorly reasoned get-out-of-jail-free card for one former president, while creating a presidency untethered to normal Congressional checks and balances. </span></p> <h2><b>2. Relevance of the illegality of the presidential conduct</b></h2> <p><span style="font-weight: 400;">Justice Roberts appears to hold that in determining whether presidential conduct is entitled to some form of immunity, a court cannot consider whether it is illegal. In determining if the conduct is “official” conduct (entitled to presumptive or absolute immunity) or “unofficial” conduct (entitled to no such immunity) the decision says that a court may not consider illegality. “Nor may courts deem an action unofficial merely because it allegedly violates a generally applicable law…. Otherwise Presidents could be subject to trial on ‘every allegation that an action was unlawful,’” the Court wrote in </span><i><span style="font-weight: 400;">Trump</span></i><span style="font-weight: 400;">, quoting </span><i><span style="font-weight: 400;">Harlow v Fitzgerald</span></i><span style="font-weight: 400;">, 457 U.S. at 756 (addressing qualified civil immunity for executive branch officials).</span></p> <p><span style="font-weight: 400;">The Court’s reliance on civil immunity decisions to support presumptive criminal immunity for all official acts is questionable, as Judge Tanya Chutkan, the district court judge in the case, detailed in her decision rejecting such immunity. The Supreme Court’s concern about the floodgates created by “every allegation” of illegality is far less pronounced in a criminal context than in a civil one. A criminal allegation of illegality requires a finding by a majority of independent grand jurors of probable cause – none of which is required to file a civil complaint (which was at issue in the </span><i><span style="font-weight: 400;">Harlow</span></i><span style="font-weight: 400;"> case). And although probable cause is not the highest standard, a prosecutor has little incentive to bring a criminal indictment with a bare showing of probable cause, given that she will need to establish guilt beyond a reasonable doubt at trial. And the criminal indictment is the culmination of the grand jury discovery process as to the charges against the defendant. But a civil litigator will seek to make an allegation that will then permit commencement of ample civil discovery to support that bare allegation. </span></p> <p><span style="font-weight: 400;">Leaving aside the questionable applicability of civil immunity decisions, the Court’s methodological rule that a court may not consider the mere allegation of illegality only makes sense when applied to actions that derive from true core powers delegated exclusively to the presidency by the constitution. Congress has no power to regulate at all in such areas and thus it makes sense that a court not consider an allegation of criminality. Legality, after all, is a congressional construct, and if it cannot act to make the president’s actions illegal, then it should not be considered. A simpler way to think about this is simply to note that a statute that purports to regulate a core presidential function is unconstitutional as applied, as Justice Barrett reasoned in her concurrence. (It is worth noting that even as to core powers, Congress presumably could have related criminal authority. For instance, Congress may presumably constitutionally criminalize selling pardons in exchange for personal or political gifts, or selling national security secrets to foreign enemies, but the Roberts majority does not deign to address how the contours of its immunity decision would handle such issues.)</span></p> <p><span style="font-weight: 400;">The application of the Court’s categorical methodological rule is on shaky ground where a court is assessing presidential action that is </span><i><span style="font-weight: 400;">not</span></i><span style="font-weight: 400;"> among the true core functions &#8212; i.e., presidential functions that are constitutionally derived but not “core” &#8212; and powers emanating from congressional authority. Congress has the power to regulate in both spheres and the Court does not give any reason why here illegality should not be a factor in differentiating official from unofficial presidential action. </span></p> <p><span style="font-weight: 400;">To put it another way, if Congress can restrict what is a legitimate presidential function, and can accord the president legal authority, how can it never have the ability to render the action illegal, in whole or part?  Illustrative hypotheticals abound. For instance, suppose a president decides it is in the best interest of the nation to assist a political ally to inflate his stock artificially or to promote false narratives to its shareholders – i.e., official acts, but not within core and exclusive presidential functions. Why can’t Congress criminalize such actions as violations of wire and securities fraud statutes? </span></p> <p><span style="font-weight: 400;">There is even more reason to consider illegality if the president is acting in an official capacity pursuant to a statutory grant of authority. Indeed, the majority recognizes congressional statutes are a source of presidential authority. “When the President acts pursuant to ‘constitutional and statutory authority,’ he takes official action to perform the functions of his office.” If Congress can grant such authority, why can’t it limit the grant solely to legal actions and criminalize transgressions? Wouldn’t doing so be a proper way for Congress to effectuate its statutory purpose? </span></p> <p><span style="font-weight: 400;">Given the broad definition of the “outer perimeter” of official presidential conduct used by the Court, and the inability for a court to consider illegality, one can imagine numerous situations where a president is, paradoxically, both acting in his official capacity and illegally under a statute. This Alice-in-Wonderland result is not addressed by the Court.  But the anomaly is in keeping with its reliance on the constitution’s “take care” clause to support presidential immunity even when alleged to be violating the very law as to which the president is constitutionally required to take care. </span></p> <p><span style="font-weight: 400;">The careful reader will note that the majority opinion speaks of the mere allegation of criminality not being a basis to differentiate official and unofficial conduct. It thus theoretically remains to be seen if the word “merely” in the court’s opinion will provide a means to limit its decision, where there is more than just the bare allegation of illegality (but it would appear to require more than an allegation in an indictment, even though that is found by probable cause). For the reasons noted here, it would be wise if it were to do so.</span></p> <h2><b>3. Relevance of the motive for the presidential conduct</b><span style="font-weight: 400;"><br /> </span></h2> <p><span style="font-weight: 400;">Prosecutors routinely consider motive as a source of valuable proof in proving the commission of a crime, and seek to establish motive at a trial. The Court does not alter that ability at trial (assuming it does not require proof of official action). But the Court precludes consideration of motive before trial, in determining whether a presidential action is official or unofficial. This is as nonsensical as the flat prohibition by the Court to consider illegality in making such a determination. </span></p> <p><span style="font-weight: 400;">Justice Roberts noted that “[i]n dividing official from unofficial conduct, courts may not inquire into the President’s motives. Such an inquiry would risk exposing even the most obvious instances of official conduct to judicial examination on the mere allegation of improper purpose, thereby intruding on the Article II interests that immunity seeks to protect.”</span></p> <p><span style="font-weight: 400;">Where motive evidence would help establish the necessary showing of illegality noted above for functions that are not core constitutional presidential functions, then the consideration of motive evidence is a logical companion to the consideration of illegality. This is particularly so where a statute makes motive an element of the crime – for instance, criminal civil rights crimes. For example, 18 USC Section 249 prohibits, among other things, willfully causing bodily injury, when the crime was committed because of the actual or perceived race, color, religion, or national origin of any person. Under the majority decision, a president who orders the physical attack of a black or Muslim member of the press, who he deemed an enemy of the people, could violate the congressional statute, but be deemed to enjoy at least presumptive immunity because the action was taken within the outer perimeter of his official actions as determined without regard to the illegality of his conduct. </span><span style="font-weight: 400;"><br /> </span><span style="font-weight: 400;"><br /> </span><span style="font-weight: 400;">The Court’s broad-brush approach again fails to differentiate when the president is acting pursuant to core constitutional powers and when not. Subjective motive would be arguably irrelevant in the former only. That would be consistent with how the Court handled </span><a href="https://www.supremecourt.gov/opinions/17pdf/17-965_h315.pdf"><i><span style="font-weight: 400;">Trump v. Hawaii</span></i></a><span style="font-weight: 400;">, for instance — if any president could enact this version of the so-called “Muslim ban,” whether this president did so with a discriminatory motive and animus was deemed irrelevant to the Court’s analysis. But the Court then grafted that on to a situation where the issues of legality and motive can be highly relevant to whether an action is official or not.</span></p> <h2><b>A Lawless Supreme Court?</b></h2> <p><span style="font-weight: 400;">As noted here, much remains to be worked out as to how the Court’s criminal immunity decision will be applied going forward. The need for clarity was paramount, whereas the Court’s broad and sloppy analysis risks engendering dangerous conduct by any future president who shows a lack of restraint or a penchant to test boundaries. It is remarkable that the majority stooped to criticize the lower courts for a lack of thoroughness in their addressing the immunity issue as a result of their haste, when the majority opinion is so slapdash even with the fullness of time. </span></p> <p><span style="font-weight: 400;">It is hard not to be cynical about the opinion, and its bona fides, when the majority opinion boldly avers that it “expedited” the review of this matter, without so much as a word about why it was not heard six months ago when the government first sought review or why it was not handled with the same speed as the decision not to disqualify Trump from the presidential ballot in Colorado (or to hear anti-abortion appeals).</span></p> <p><span style="font-weight: 400;">That a Court that overturned </span><i><span style="font-weight: 400;">Roe v. Wade</span></i><span style="font-weight: 400;"> on the grounds that it was purportedly not sufficiently tethered to the constitution issued an immunity decision that is untethered to the constitution is not just ironic, it is revelatory of what we are now dealing with. A lawless Supreme Court is as anathema to a democracy as a lawless president. </span></p> <h6><em><strong> IMAGE: The U.S. Supreme Court building at dawn in Washington, D.C. (Photo by Samuel Corum via Bloomberg)</strong></em><span style="font-weight: 400;"><br /> </span></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/congress/" rel="tag">Congress</a>, <a href="https://www.justsecurity.org/tag/constitutional-law/" rel="tag">constitutional law</a>, <a href="https://www.justsecurity.org/tag/democracy/" rel="tag">Democracy</a>, <a href="https://www.justsecurity.org/tag/donald-trump/" rel="tag">Donald Trump</a>, <a href="https://www.justsecurity.org/tag/executive-branch/" rel="tag">executive branch</a>, <a href="https://www.justsecurity.org/tag/immunity/" rel="tag">Immunity</a>, <a href="https://www.justsecurity.org/tag/john-roberts/" rel="tag">John Roberts</a>, <a href="https://www.justsecurity.org/tag/presidential-powers/" rel="tag">Presidential Powers</a>, <a href="https://www.justsecurity.org/tag/rule-of-law/" rel="tag">Rule of Law</a>, <a href="https://www.justsecurity.org/tag/separation-of-powers/" rel="tag">Separation of powers</a>, <a href="https://www.justsecurity.org/tag/supreme-court/" rel="tag">Supreme Court (SCOTUS)</a>, <a href="https://www.justsecurity.org/tag/trump-administration/" rel="tag">Trump administration first term</a>, <a href="https://www.justsecurity.org/tag/trump-v-hawaii/" rel="tag">Trump v Hawaii</a>, <a href="https://www.justsecurity.org/tag/trump-v-united-states/" rel="tag">Trump v. United States</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/">The Disastrous Costs of the Foreign Aid Freeze on US Interests in the Middle East and North Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/binderseth/" title="Profile and articles by Seth Binder" class="author url fn" rel="author">Seth Binder</a>, <a href="https://www.justsecurity.org/author/colesheridan/" title="Profile and articles by Sheridan Cole" class="author url fn" rel="author">Sheridan Cole</a> and <a href="https://www.justsecurity.org/author/welchhaydn/" title="Profile and articles by Haydn Welch" class="author url fn" rel="author">Haydn Welch</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/">What Just Happened: Purges at the DOJ and FBI — How Do and Don’t the Civil Service Laws Apply</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hillsroderick/" title="Profile and articles by Roderick M. Hills" class="author url fn" rel="author">Roderick M. Hills</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/">Freezing Support to Democracy and Human Rights Activists Undermines US Interests</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/busbyscott/" title="Profile and articles by Scott Busby" class="author url fn" rel="author">Scott Busby</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/">Supporting Freedom and a Foreign Aid Freeze are Incompatible &#8212; But Perhaps the Point? A Case Study</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/thorntonlaura/" title="Profile and articles by Laura Thornton" class="author url fn" rel="author">Laura Thornton</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107809/tech-companies-election-threats-regulation/">The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/givensalexandrareeve/" title="Profile and articles by Alexandra Reeve Givens" class="author url fn" rel="author">Alexandra Reeve Givens</a></p> <p class="date">Feb 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107770/cartels-foreign-terrorism-designation/">The Need for Course Correction: The Risks of Treating Drug Cartels as Terrorist Threats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/harvindonell/" title="Profile and articles by Donell Harvin" class="author url fn" rel="author">Donell Harvin</a></p> <p class="date">Feb 12th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107584/what-just-happened-security-implications-of-trumps-efforts-to-trim-the-cia-workforce/">What Just Happened: Security Implications of Trump’s Efforts to Trim the CIA Workforce</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finleyalex/" title="Profile and articles by Alex Finley" class="author url fn" rel="author">Alex Finley</a></p> <p class="date">Feb 7th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107245/deepseek-ai-competition/">What DeepSeek Really Changes About AI Competition</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pilzkonstantinf/" title="Profile and articles by Konstantin F. Pilz" class="author url fn" rel="author">Konstantin F. Pilz</a> and <a href="https://www.justsecurity.org/author/heimlennart/" title="Profile and articles by Lennart Heim" class="author url fn" rel="author">Lennart Heim</a></p> <p class="date">Feb 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107267/can-president-dissolve-usaid-by-executive-order/">Can the President Dissolve USAID by Executive Order?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Feb 1st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107110/trump-purge-justice-department/">The Real Reason Trump’s Purge of Career DOJ Officials Should Alarm You</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/zdebsara/" title="Profile and articles by Sara Zdeb" class="author url fn" rel="author">Sara Zdeb</a></p> <p class="date">Jan 30th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107094/deferred-resignation-dubious-federal-employees/">Beware the &#8220;Deferred Resignation&#8221; Offer: A Legally Dubious Proposal for Federal Employees</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/summerlinsuzanne/" title="Profile and articles by Suzanne Summerlin" class="author url fn" rel="author">Suzanne Summerlin</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107030/invasion-executive-order-military-authorities/">What Just Happened: The Framing of a Migration “Invasion” and the Use of Military Authorities</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bankswilliam/" title="Profile and articles by William Banks" class="author url fn" rel="author">William Banks</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107029/fbi-director-weaponization-government-executive-order/">Understanding Trump’s Choice for FBI Leadership in Light of the“Weaponization of the Federal Government” Executive Order</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gersonstuart/" title="Profile and articles by Stuart M. Gerson" class="author url fn" rel="author">Stuart M. Gerson</a></p> <p class="date">Jan 29th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106969/trump-dictatorial-theory-presidential-power-executive-orders/">Trump’s Dictatorial Theory of Presidential Power &#8211; What the Executive Orders, in the Aggregate, Tell Us</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/morrisontrevor/" title="Profile and articles by Trevor Morrison" class="author url fn" rel="author">Trevor Morrison</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106953/invasion-executive-order-implications/">What Just Happened: The “Invasion” Executive Order and Its Dangerous Implications</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106919/stopped-security-assistance/">Stopped Security Assistance: From Counter-Narcotics to Combating Human Trafficking Programs</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/randdafnah/" title="Profile and articles by Dafna H. Rand" class="author url fn" rel="author">Dafna H. Rand</a></p> <p class="date">Jan 28th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106856/international-criminal-court-call-for-justice/">We Need the International Legal Order: A Call to Protect the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/iccasppresidents/" title="Profile and articles by The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court" class="author url fn" rel="author">The Current and Former Presidents of the Assembly of States Parties of the International Criminal Court</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106775/israel-hamas-ceasefire/">Israel-Hamas Ceasefire: Temporary Reprieve or Sustainable Peace?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/millerandrew/" title="Profile and articles by Andrew Miller" class="author url fn" rel="author">Andrew Miller</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106846/syria-international-criminal-court/">Syria Needs the International Criminal Court</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rothkenneth/" title="Profile and articles by Kenneth Roth" class="author url fn" rel="author">Kenneth Roth</a></p> <p class="date">Jan 27th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106804/what-just-happened-trumps-executive-actions-us-climate-security/">What Just Happened: Trump’s Executive Actions on Environment and Implications for US Climate Security</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ellisontom/" title="Profile and articles by Tom Ellison" class="author url fn" rel="author">Tom Ellison</a></p> <p class="date">Jan 24th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106738/trump-privacy-oversight-board-surveillance/">What Just Happened: What Trump&#8217;s Hobbling of the Privacy Oversight Board Portends for Exercise of Surveillance Powers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106689/january-6-pardons-statistics/">What Just Happened: Trump’s January 6 Pardons and Assaults on Law Enforcement Officers By The Numbers</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 22nd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106593/national-emergency-southern-border-order/">What Just Happened: Unpacking Exec Order on National Emergency at the Southern Border</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nevittmark/" title="Profile and articles by Mark Nevitt" class="author url fn" rel="author">Mark Nevitt</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106627/what-just-happened-with-icc-sanctions/">What Just Happened: With ICC Sanctions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106567/bidens-cybersecurity-eo-what-comes-next-trump/">Biden’s Cybersecurity Executive Order and What Comes Next Under Trump</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Jan 21st, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106509/georgia-protests-trump-influence/">Crisis in Georgia: Why the Trump Administration Should Step In To Shore Up US Influence</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a> and <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a></p> <p class="date">Jan 17th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106427/unpacking-the-biden-administrations-executive-order-on-ai-infrastructure/">Unpacking the Biden Administration’s Executive Order on AI Infrastructure</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jan 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106278/highlights-jack-smith-january-6th-final-report/">3 Highlights in Special Counsel Jack Smith&#8217;s Final Report on 2020 Election Subversion Case</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106313/questions-pam-bondi-attorney-general/">Questions for Senators (And Journalists) to Ask Attorney General Nominee Pam Bondi</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106317/questions-rubio-secretary-of-state-nominee/">Questions for Senators (and Journalists) to Ask Secretary of State Nominee Marco Rubio</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106283/how-not-to-decide-tiktok-u-s-press-freedom-hangs-in-the-balance/">How Not to Decide TikTok: U.S. press freedom hangs in the balance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coledavid/" title="Profile and articles by David Cole" class="author url fn" rel="author">David Cole</a></p> <p class="date">Jan 13th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106247/inspector-general-january-6th/">Unpacking the Inspector General Report on January 6th and FBI “False Flag” Conspiracies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Jan 10th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106146/national-security-resilience-reform/">National Security Resilience and Reform: Trump 2.0 and Beyond</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Jan 8th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/106105/announcement-ai-emerging-technologies-initiative/">Announcing Just Security’s Artificial Intelligence and Emerging Technologies Initiative</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Jan 6th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105879/suing-taliban-icj-abuses-afghan-women/">Suing the Taliban at the ICJ Over Abuses of Afghan Women Isn’t a Panacea. Countries Must Do More Now.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/huckerbyjayne/" title="Profile and articles by Jayne Huckerby" class="author url fn" rel="author">Jayne Huckerby</a></p> <p class="date">Jan 3rd, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105991/just-security-2024-book-recommendations/">The Just Security 2024 Year-End Book Recommendations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Dec 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105981/ukraine-russia-human-safari-tactic/">Russia’s “Human Safari” Terror Tactic in Key Southeastern Ukraine Region of Kherson</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sapuppomercedes/" title="Profile and articles by Mercedes Sapuppo" class="author url fn" rel="author">Mercedes Sapuppo</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105944/us-iran-diplomacy-nuclear/">U.S. Options for Iran Diplomacy in 2025</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/davenportkelsey/" title="Profile and articles by Kelsey Davenport" class="author url fn" rel="author">Kelsey Davenport</a></p> <p class="date">Dec 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105917/interim-report-icj-climate-opinion/">An Interim Report on the ICJ’s Climate Advisory Opinion</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hericorina/" title="Profile and articles by Corina Heri" class="author url fn" rel="author">Corina Heri</a></p> <p class="date">Dec 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105909/challenging-china-human-rights/">New Challenges to Xi Jinping’s Alternative Facts on Taiwan: Lessons for the Human Rights Space, Too</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/richardsonsophie/" title="Profile and articles by Sophie Richardson" class="author url fn" rel="author">Sophie Richardson</a></p> <p class="date">Dec 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105752/ai-presidency/">The AI Presidency: What “America First” Means for Global AI Governance</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Dec 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105735/trump-administration-sanctions-africa/">The First Trump Administration Used Sanctions Effectively in Africa. Here’s How That Can Resume in the Second Term.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Dec 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105708/icc-standard-proof-head-state/">Does the Int’l Criminal Court Impose Too Low a Standard of Proof to Arrest a Head of State?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a> and <a href="https://www.justsecurity.org/author/trumbullcharlie/" title="Profile and articles by Charlie Trumbull" class="author url fn" rel="author">Charlie Trumbull</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105638/biden-bosnia-security-troops/">Biden’s Unfinished Business: A Bridge to Shore Up a European Flank – in the Balkans</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bassuenerkurt/" title="Profile and articles by Kurt Bassuener" class="author url fn" rel="author">Kurt Bassuener</a></p> <p class="date">Dec 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105640/georgia-protests-us-sanctions/">Georgia Risks Falling to a Violent One-Party Regime. The Biden Administration Must Act Now to Stop Its Slide.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105627/syria-freedom-governance-local-approach-constitutionalism/">Syrians’ Pursuit of Freedom and Self-Governance: Prioritizing a Locally-Driven and Incremental Approach to Constitutionalism</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alrwishdideyaa/" title="Profile and articles by Deyaa Alrwishdi" class="author url fn" rel="author">Deyaa Alrwishdi</a> and <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Dec 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105593/foreign-agent-laws-impact/">The Spreading Impact of Restrictive ‘Foreign Agent’ Laws and How to Stop Them</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/cameronjasmine/" title="Profile and articles by Jasmine D. Cameron" class="author url fn" rel="author">Jasmine D. Cameron</a> and <a href="https://www.justsecurity.org/author/nicolafernandag/" title="Profile and articles by Fernanda G. Nicola" class="author url fn" rel="author">Fernanda G. Nicola</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105552/public-framing-mass-deportation/">The Public Framing of Mass Deportation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/coxadam/" title="Profile and articles by Adam Cox" class="author url fn" rel="author">Adam Cox</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105538/interpol-transparency-reform/">Interpol General Assembly Inches Forward on Transparency, Still Needs Reform Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a> and <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a></p> <p class="date">Dec 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105406/georgia-protests-letter-us-diplomats/">Open Letter on Georgia from Former US Diplomats</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/herbstjohne/" title="Profile and articles by Ambassador (ret) John E. Herbst" class="author url fn" rel="author">Ambassador (ret) John E. Herbst</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105321/military-immigration-enforcement-deportation/">Deployment of the U.S. Military for Immigration Enforcement: A Primer</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Dec 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105181/drones-graves-mexicos-disappeared/">Camera-Fitted Drones May Help Locate Graves of Mexico’s Disappeared</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/garciareyeskarina/" title="Profile and articles by Karina García-Reyes" class="author url fn" rel="author">Karina García-Reyes</a> and <a href="https://www.justsecurity.org/author/moctezumamiguel/" title="Profile and articles by Miguel Moctezuma" class="author url fn" rel="author">Miguel Moctezuma</a></p> <p class="date">Nov 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105176/birthright-citizenship-undocumented-immigrants-2/">Birthright Citizenship and Undocumented Immigrants</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sominilya/" title="Profile and articles by Ilya Somin" class="author url fn" rel="author">Ilya Somin</a></p> <p class="date">Nov 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts &#038; Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To &#8216;End&#8217; War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine &#8212; and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon&#8217;s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia&#8217;s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who&#8217;s Who in Jack Smith&#8217;s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN&#8217;s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/107087/tracker-litigation-legal-challenges-trump-administration/">Litigation Tracker: Legal Challenges to Trump Administration Actions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 16th, 2025</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Arrest Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Dec 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia&#8217;s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis &#038; Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine &#8211; The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jan 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security&#8217;s Series on Reparations in Russia&#8217;s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the &#8220;War on Terror&#8221;</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 &#8220;Report Card&#8221; Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/armed-conflict/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict-loac/">Law of Armed Conflict (LOAC)</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations (UN)</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/weissmannandrew/">Andrew <span>Weissmann</span></a></h4><p>Andrew Weissmann (<a href="https://bsky.app/profile/weissmann11.bsky.social">Bluesky</a> - <a href="https://www.linkedin.com/in/andrew-weissmann-043030232/">LinkedIn</a> - <a href="https://substack.com/@weissmann">Substack</a> - <a href="https://www.threads.net/@weissmann11">Threads</a>) is Professor of Practice and Distinguished Senior Fellow at the Reiss Center on Law and Security and at the Center on the Administration of Criminal Law at NYU School of Law. He served as a lead prosecutor in Robert S. Mueller’s Special Counsel’s Office (2017-2019), as Chief of the Fraud Section in the Department of Justice (2015-2019), and as General Counsel for the Federal Bureau of Investigation (2011-2013).</p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/105451/trumps-endgame-ukraine-war/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/12/GettyImages-1152460290-scaled-e1733326565387.jpg?fit=768%2C372&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/105451/trumps-endgame-ukraine-war/">Trump’s Endgame for the War in Ukraine</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/kelly/" title="Profile and articles by Michael J. Kelly" class="author url fn" rel="author">Michael J. Kelly</a> and <a href="https://www.justsecurity.org/author/martincraig/" title="Profile and articles by Craig Martin" class="author url fn" rel="author">Craig Martin</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-1708090700-e1739498634981.jpg?fit=768%2C302&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107929/us-foreign-aid-freeze-middle-east-north-africa/">The Disastrous Costs of the Foreign Aid Freeze on US Interests in the Middle East and North Africa</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/binderseth/" title="Profile and articles by Seth Binder" class="author url fn" rel="author">Seth Binder</a>, <a href="https://www.justsecurity.org/author/colesheridan/" title="Profile and articles by Sheridan Cole" class="author url fn" rel="author">Sheridan Cole</a> and <a href="https://www.justsecurity.org/author/welchhaydn/" title="Profile and articles by Haydn Welch" class="author url fn" rel="author">Haydn Welch</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-1319115983-scaled-e1739486983844.jpg?fit=768%2C385&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107708/purges-doj-fbi-civil-service-laws/">What Just Happened: Purges at the DOJ and FBI — How Do and Don’t the Civil Service Laws Apply</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/hillsroderick/" title="Profile and articles by Roderick M. Hills" class="author url fn" rel="author">Roderick M. Hills</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/01/GettyImages-2194985261-scaled.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/106653/collection-trump-administration-executive-actions/">Collection: Just Security’s Coverage of the Trump Administration Executive Actions</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Feb 14th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/China-Uyghur-homes-scaled-e1739461476251.jpg?fit=768%2C303&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107842/democracy-human-rights-activists-undermined/">Freezing Support to Democracy and Human Rights Activists Undermines US Interests</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/busbyscott/" title="Profile and articles by Scott Busby" class="author url fn" rel="author">Scott Busby</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107885/trump-impoundment-control-act/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2194442044-1-scaled-e1738683669864.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107885/trump-impoundment-control-act/">President Trump Is Ignoring the Impoundment Control Act, Welcoming a Fight in the Courts</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/harrisonsarah/" title="Profile and articles by Sarah Harrison" class="author url fn" rel="author">Sarah Harrison</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Georgia-protests-police-scaled-e1739431019325.jpg?fit=768%2C282&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107864/foreign-aid-freeze-incompatible-freedom/">Supporting Freedom and a Foreign Aid Freeze are Incompatible &#8212; But Perhaps the Point? A Case Study</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/thorntonlaura/" title="Profile and articles by Laura Thornton" class="author url fn" rel="author">Laura Thornton</a></p> <p class="date">Feb 13th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107718/trump-ukraine-deal-foreign-aid/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Ukraine-power-plant-war-damage-e1739241978685.jpg?fit=768%2C296&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107718/trump-ukraine-deal-foreign-aid/">Trump’s Ukraine Deal Requires Foreign Aid</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rudolphjoshua/" title="Profile and articles by Josh Rudolph" class="author url fn" rel="author">Josh Rudolph</a></p> <p class="date">Feb 11th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/04/BeFunky-collage-4-scaled.jpg?fit=768%2C293&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/99958/just-securitys-artificial-intelligence-archive/">Just Security&#8217;s Artificial Intelligence Archive</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Feb 11th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107612/just-security-podcast-repression-lawyers-belarus/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/Screenshot-2025-02-07-at-9.51.41%E2%80%AFAM.png?fit=768%2C354&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107612/just-security-podcast-repression-lawyers-belarus/">The Just Security Podcast: Repression of Lawyers in Belarus and Around the World</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/muiznieksnils/" title="Profile and articles by Nils Muiznieks" class="author url fn" rel="author">Nils Muiznieks</a>, <a href="https://www.justsecurity.org/author/polovinkomaksim/" title="Profile and articles by Maksim Polovinko" class="author url fn" rel="author">Maksim Polovinko</a>, <a href="https://www.justsecurity.org/author/satterthwaitemeg/" title="Profile and articles by Meg Satterthwaite" class="author url fn" rel="author">Meg Satterthwaite</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Feb 7th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107571/solidarity-stranglehold-belarusian-lawyers/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2195448311-scaled-e1738894042671.jpg?fit=768%2C411&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107571/solidarity-stranglehold-belarusian-lawyers/">Solidarity Needed Amid Stranglehold on Belarusian Lawyers</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/muiznieksnils/" title="Profile and articles by Nils Muiznieks" class="author url fn" rel="author">Nils Muiznieks</a>, <a href="https://www.justsecurity.org/author/satterthwaitemeg/" title="Profile and articles by Meg Satterthwaite" class="author url fn" rel="author">Meg Satterthwaite</a> and <a href="https://www.justsecurity.org/author/sonnetaloysia/" title="Profile and articles by Aloysia Sonnet" class="author url fn" rel="author">Aloysia Sonnet</a></p> <p class="date">Feb 7th, 2025</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/107377/trump-control-us-media-information/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2025/02/GettyImages-2197489691-scaled-e1738714616899.jpg?fit=768%2C379&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/107377/trump-control-us-media-information/">Connecting the Dots: Trump’s Tightening Grip on Press Freedom</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Feb 6th, 2025</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://bsky.app/profile/justsecurity.org" class="social bluesky" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 530"> <path d="M135.72 44.03C202.216 93.951 273.74 195.17 300 249.49c26.262-54.316 97.782-155.54 164.28-205.46C512.26 8.009 590-19.862 590 68.825c0 17.712-10.155 148.79-16.111 170.07-20.703 73.984-96.144 92.854-163.25 81.433 117.3 19.964 147.14 86.092 82.697 152.22-122.39 125.59-175.91-31.511-189.63-71.766-2.514-7.38-3.69-10.832-3.708-7.896-.017-2.936-1.193.516-3.707 7.896-13.714 40.255-67.233 197.36-189.63 71.766-64.444-66.128-34.605-132.26 82.697-152.22-67.108 11.421-142.55-7.45-163.25-81.433C20.15 217.613 9.997 86.535 9.997 68.825c0-88.687 77.742-60.816 125.72-24.795z" fill="#2D8097"/></svg></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">&copy; 2025 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <div id="pum-107566" role="dialog" aria-modal="false" aria-labelledby="pum_popup_title_107566" class="pum pum-overlay pum-theme-107555 pum-theme-default-theme-2 popmake-overlay pum-overlay-disabled auto_open click_open" data-popmake="{&quot;id&quot;:107566,&quot;slug&quot;:&quot;finding-our-content-helpful&quot;,&quot;theme_id&quot;:107555,&quot;cookies&quot;:[{&quot;event&quot;:&quot;on_popup_close&quot;,&quot;settings&quot;:{&quot;name&quot;:&quot;pum-107566&quot;,&quot;time&quot;:&quot;1 week&quot;,&quot;path&quot;:true}}],&quot;triggers&quot;:[{&quot;type&quot;:&quot;auto_open&quot;,&quot;settings&quot;:{&quot;cookie_name&quot;:[&quot;pum-107566&quot;],&quot;delay&quot;:&quot;30000&quot;}},{&quot;type&quot;:&quot;click_open&quot;,&quot;settings&quot;:{&quot;extra_selectors&quot;:&quot;&quot;,&quot;cookie_name&quot;:null}}],&quot;mobile_disabled&quot;:null,&quot;tablet_disabled&quot;:null,&quot;meta&quot;:{&quot;display&quot;:{&quot;stackable&quot;:&quot;1&quot;,&quot;overlay_disabled&quot;:&quot;1&quot;,&quot;scrollable_content&quot;:false,&quot;disable_reposition&quot;:false,&quot;size&quot;:&quot;custom&quot;,&quot;responsive_min_width&quot;:&quot;0px&quot;,&quot;responsive_min_width_unit&quot;:false,&quot;responsive_max_width&quot;:&quot;100px&quot;,&quot;responsive_max_width_unit&quot;:false,&quot;custom_width&quot;:&quot;300px&quot;,&quot;custom_width_unit&quot;:false,&quot;custom_height&quot;:&quot;380px&quot;,&quot;custom_height_unit&quot;:false,&quot;custom_height_auto&quot;:&quot;1&quot;,&quot;location&quot;:&quot;right bottom&quot;,&quot;position_from_trigger&quot;:false,&quot;position_top&quot;:&quot;100&quot;,&quot;position_left&quot;:&quot;0&quot;,&quot;position_bottom&quot;:&quot;10&quot;,&quot;position_right&quot;:&quot;10&quot;,&quot;position_fixed&quot;:&quot;1&quot;,&quot;animation_type&quot;:&quot;slide&quot;,&quot;animation_speed&quot;:&quot;350&quot;,&quot;animation_origin&quot;:&quot;bottom&quot;,&quot;overlay_zindex&quot;:false,&quot;zindex&quot;:&quot;1999999999&quot;},&quot;close&quot;:{&quot;text&quot;:&quot;&quot;,&quot;button_delay&quot;:&quot;0&quot;,&quot;overlay_click&quot;:false,&quot;esc_press&quot;:false,&quot;f4_press&quot;:false},&quot;click_open&quot;:[]}}"> <div id="popmake-107566" class="pum-container popmake theme-107555 size-custom pum-position-fixed"> <div id="pum_popup_title_107566" class="pum-title popmake-title"> Finding our content helpful? </div> <div class="pum-content popmake-content" tabindex="0"> <p><em>Just Security</em> is a non-profit, daily, digital law and policy journal that elevates the discourse on security, democracy and rights. We rely on donations from readers like you. Please consider supporting us with a tax-deductible donation today.<br /> <a class="button" style="margin-top: 15px;" href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" target="_blank" rel="noopener">Donate Now</a></p> </div> <button type="button" class="pum-close popmake-close" aria-label="Close"> CLOSE </button> </div> </div> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/97781\/three-flaws-supreme-court-immunity\/":97781}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1739737656" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script type="text/javascript" id="popup-maker-site-js-extra"> /* <![CDATA[ */ var pum_vars = {"version":"1.20.4","pm_dir_url":"https:\/\/www.justsecurity.org\/wp-content\/plugins\/popup-maker\/","ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","restapi":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1","rest_nonce":null,"default_theme":"107546","debug_mode":"","disable_tracking":"","home_url":"\/","message_position":"top","core_sub_forms_enabled":"1","popups":[],"cookie_domain":"","analytics_route":"analytics","analytics_api":"https:\/\/www.justsecurity.org\/wp-json\/pum\/v1"}; var pum_sub_vars = {"ajaxurl":"https:\/\/www.justsecurity.org\/wp-admin\/admin-ajax.php","message_position":"top"}; var pum_popups = {"pum-107566":{"triggers":[{"type":"auto_open","settings":{"cookie_name":["pum-107566"],"delay":"30000"}}],"cookies":[{"event":"on_popup_close","settings":{"name":"pum-107566","time":"1 week","path":true}}],"disable_on_mobile":false,"disable_on_tablet":false,"atc_promotion":null,"explain":null,"type_section":null,"theme_id":"107555","size":"custom","responsive_min_width":"0px","responsive_max_width":"100px","custom_width":"300px","custom_height_auto":true,"custom_height":"380px","scrollable_content":false,"animation_type":"slide","animation_speed":"350","animation_origin":"bottom","open_sound":"none","custom_sound":"","location":"right bottom","position_top":"100","position_bottom":"10","position_left":"0","position_right":"10","position_from_trigger":false,"position_fixed":true,"overlay_disabled":true,"stackable":true,"disable_reposition":false,"zindex":"1999999999","close_button_delay":"0","fi_promotion":null,"close_on_form_submission":false,"close_on_form_submission_delay":"0","close_on_overlay_click":false,"close_on_esc_press":false,"close_on_f4_press":false,"disable_form_reopen":false,"disable_accessibility":false,"theme_slug":"default-theme-2","id":107566,"slug":"finding-our-content-helpful"}}; /* ]]> */ </script> <script type="text/javascript" src="//www.justsecurity.org/wp-content/uploads/pum/pum-site-scripts.js?defer&amp;generated=1739227473&amp;ver=1.20.4" id="popup-maker-site-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202507.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"97781\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.3\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "97781" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.3" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-bluesky' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-bluesky' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcombluesky', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <style> </style> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10