CINXE.COM
The Biden Administration’s Options for Responding to Abbott’s Unconstitutional Border Enforcement Executive Order
<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>The Biden Administration’s Options for Responding to Abbott’s Unconstitutional Border Enforcement Executive Order</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https://yoast.com/wordpress/plugins/seo/ --> <link rel="canonical" href="https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="The Biden Administration’s Options for Responding to Abbott’s Unconstitutional Border Enforcement Executive Order" /> <meta property="og:description" content="The Texas governor has invoked war powers to respond to migrant arrivals at the border - potentially usurping federal prerogatives." /> <meta property="og:url" content="https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2022-07-13T14:43:27+00:00" /> <meta property="og:image" content="https://www.justsecurity.org/wp-content/uploads/2022/07/GettyImages-1233910333-1-scaled-e1657718862920.jpg" /> <meta property="og:image:width" content="1000" /> <meta property="og:image:height" content="667" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Katherine Yon Ebright, Joseph Nunn" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:description" content="The Texas governor has invoked war powers to respond to migrant arrivals at the border - potentially usurping federal prerogatives." /> <meta name="twitter:image" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/07/GettyImages-1233910333-1-scaled-e1657718862920.jpg?fit=1000%2C667&ssl=1" /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Katherine Yon Ebright, Joseph Nunn" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="7 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#article","isPartOf":{"@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/61c2393dfbf12c1cf2dae1f25f403e67"},{"@id":"https://www.justsecurity.org/#/schema/person/b0460b8ae8a69857356abe3239df5fb8"}],"headline":"The Biden Administration’s Options for Responding to Abbott’s Unconstitutional Border Enforcement Executive Order","datePublished":"2022-07-13T14:43:27+00:00","dateModified":"2022-07-13T14:43:27+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/"},"wordCount":1571,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/07/GettyImages-1233910333-scaled.jpg?fit=2560%2C1707&ssl=1","keywords":["Article I","asylum","Borders","Constitution","constitutional law","Emergency Powers","Executive Orders","Immigration","migration","National Guard","U.S. Customs and Border Protection","undocumented immigrants","War Powers"],"articleSection":["Immigration","Rule of Law","War Powers"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/","url":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/","name":"The Biden Administration’s Options for Responding to Abbott’s Unconstitutional Border Enforcement Executive Order","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/07/GettyImages-1233910333-scaled.jpg?fit=2560%2C1707&ssl=1","datePublished":"2022-07-13T14:43:27+00:00","dateModified":"2022-07-13T14:43:27+00:00","breadcrumb":{"@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/07/GettyImages-1233910333-scaled.jpg?fit=2560%2C1707&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/07/GettyImages-1233910333-scaled.jpg?fit=2560%2C1707&ssl=1","width":2560,"height":1707,"caption":"Image: AUSTIN, TX - JULY 10: Texas Gov. Greg Abbott speaks during a border security briefing with sheriffs from border communities at the Texas State Capitol on July 10, 2021 in Austin, Texas. (Photo by Tamir Kalifa/Getty Images)"},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"The Biden Administration’s Options for Responding to Abbott’s Unconstitutional Border Enforcement Executive Order"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/61c2393dfbf12c1cf2dae1f25f403e67","name":"Katherine Yon Ebright","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/0ed2057a0f0a98e034c76abc7c150dc1","url":"https://secure.gravatar.com/avatar/82a8bb666548aa40091887563e832dc0?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/82a8bb666548aa40091887563e832dc0?s=96&d=mm&r=g","caption":"Katherine Yon Ebright"},"description":"Katherine Yon Ebright (@EbrightYon) serves as counsel with the Brennan Center’s Liberty & National Security Program, where she focuses on war powers and the constitutional separation of powers. Before joining the Brennan Center, Katherine served as a fellow at the Public International Law & Policy Group and as a law clerk on the Second Circuit and the Southern District of New York. She is also on LinkedIn.","url":"https://www.justsecurity.org/author/ebrightkatherineyon/"},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/b0460b8ae8a69857356abe3239df5fb8","name":"Joseph Nunn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/d92813b4690891b19adda3ac8ba2348a","url":"https://secure.gravatar.com/avatar/0722efca75fdd5ad0fc0f92b0abfd3cc?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/0722efca75fdd5ad0fc0f92b0abfd3cc?s=96&d=mm&r=g","caption":"Joseph Nunn"},"description":"Joseph Nunn (@josephanunn) is a Counsel with the Brennan Center for Justice’s Liberty and National Security Program, where his research focuses on federal and state emergency powers and the domestic role of the U.S. military. Joseph is the author of the Brennan Center’s report, Martial Law in the United States: Its Meaning, Its History, and Why the President Can’t Declare It. He is a graduate of the University of Chicago Law School.","url":"https://www.justsecurity.org/author/nunnjoseph/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//secure.gravatar.com' /> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='dns-prefetch' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security » Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.2 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.2'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/82298\/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=949a533b99c553f1c91109435e76337f"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1728684854' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.17' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.0' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.0' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=949a533b99c553f1c91109435e76337f" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.2" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=949a533b99c553f1c91109435e76337f" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/82298" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-lpo' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F82298%2Fthe-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F82298%2Fthe-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order%2F&format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.0.2 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&ssl=1" /> </head> <body class="post-template-default single single-post postid-82298 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu"><ul> <li class="page_item page-item-97906"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Come Join <i>Just Security</i>! 2025-26 Postgraduate Legal Fellow Positions</a></li> <li class="page_item page-item-75155"><a href="https://www.justsecurity.org/records-obtained-via-goodman-v-department-of-defense/">Records obtained via Goodman v. Department of Defense </a></li> <li class="page_item page-item-47833"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a></li> <li class="page_item page-item-76521"><a href="https://www.justsecurity.org/search-results/">Search Results</a></li> <li class="page_item page-item-76522"><a href="https://www.justsecurity.org/author-search/">Author Search</a></li> <li class="page_item page-item-76531"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li class="page_item page-item-66815"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li class="page_item page-item-47828"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li class="page_item page-item-47818"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li class="page_item page-item-61915"><a href="https://www.justsecurity.org/trump-russia-timeline/">The Trump-Russia-Ukraine Timeline</a></li> <li class="page_item page-item-47830"><a href="https://www.justsecurity.org/the-pipeline/">Upcoming Events</a></li> <li class="page_item page-item-62780"><a href="https://www.justsecurity.org/updates-trump-russia-timeline/">Updates to The Trump-Russia Timeline</a></li> <li class="page_item page-item-52075"><a href="https://www.justsecurity.org/deep-dives/">Deep Dives</a></li> <li class="page_item page-item-52444"><a href="https://www.justsecurity.org/microsoft-ireland-symposium/">Microsoft Ireland Symposium</a></li> <li class="page_item page-item-49225"><a href="https://www.justsecurity.org/acting-dod-general-counsel-william-s-castles-speech-aumfs-global-war-terrorism/">Acting DOD General Counsel William S. Castle’s Speech on AUMFs in the “Global War on Terrorism”</a></li> <li class="page_item page-item-51186"><a href="https://www.justsecurity.org/glenn-simpson-fusion-gps/">Transcript: Glenn Simpson Fusion GPS Testimony House Intelligence Committee</a></li> <li class="page_item page-item-4"><a href="https://www.justsecurity.org/privacy/">Privacy</a></li> <li class="page_item page-item-47829"><a href="https://www.justsecurity.org/home-page/">Home Page</a></li> <li class="page_item page-item-5"><a href="https://www.justsecurity.org/terms/">Terms</a></li> <li class="page_item page-item-34570"><a href="https://www.justsecurity.org/donation-confirmation/">Donation Confirmation</a></li> <li class="page_item page-item-34571"><a href="https://www.justsecurity.org/transaction-failed/">Transaction Failed</a></li> <li class="page_item page-item-34572"><a href="https://www.justsecurity.org/donation-history/">Donation History</a></li> <li class="page_item page-item-37408"><a href="https://www.justsecurity.org/modern-surveillance-trump-administration/">Modern Surveillance Under the Trump Administration</a></li> <li class="page_item page-item-36664"><a href="https://www.justsecurity.org/norms-watch-inbox/">Get Norms Watch in Your Inbox</a></li> <li class="page_item page-item-1083"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li class="page_item page-item-43595"><a href="https://www.justsecurity.org/federal-prosecutor-dissects-kushners-statement/">A Former Federal Prosecutor Dissects Kushner’s Statement</a></li> <li class="page_item page-item-1885"><a href="https://www.justsecurity.org/recap-guide-weeks-posts-security-oct-4-oct-11/">Recap: A Guide to the Past Week’s Posts on Just Security (Oct. 4-Oct.11)</a></li> <li class="page_item page-item-35680"><a href="https://www.justsecurity.org/httpswww-justsecurity-orgabout-us/">https://www.justsecurity.org/about-us/</a></li> <li class="page_item page-item-97"><a href="https://www.justsecurity.org/editors-pickshot-battlefield-areas-of-active-hostilities/">Editors’ Picks</a></li> <li class="page_item page-item-30826"><a href="https://www.justsecurity.org/dod-report-oct-2015-airstrike-medecins-sans-frontieres-hospital-kunduz-afghanistan/">DOD Report on the Oct. 2015 Airstrike on Médecins Sans Frontières Hospital in Kunduz, Afghanistan</a></li> <li class="page_item page-item-108"><a href="https://www.justsecurity.org/books-written/">Books We’ve Written</a></li> <li class="page_item page-item-45429"><a href="https://www.justsecurity.org/rfi-interview-hiftar/">RFI Interview on Hiftar</a></li> <li class="page_item page-item-128 page_item_has_children"><a href="https://www.justsecurity.org/books-read/">Books We’ve Read</a> <ul class='children'> <li class="page_item page-item-533"><a href="https://www.justsecurity.org/books-read/book-synopsis-knife/">Book Synopsis: The Way of the Knife</a></li> <li class="page_item page-item-555"><a href="https://www.justsecurity.org/books-read/book-synopsis-governing-lethal-behavior-autonomous-robots/">Book Synopsis: Governing Lethal Behavior in Autonomous Robots</a></li> <li class="page_item page-item-47"><a href="https://www.justsecurity.org/books-read/book-synopsis-kill-capture-war-terror-soul-obama-presidency/">Book Synopsis: Kill or Capture</a></li> <li class="page_item page-item-1598"><a href="https://www.justsecurity.org/books-read/lincolns-code/">Book Review — Lincoln’s Code: The Laws of War in American History</a></li> <li class="page_item page-item-333"><a href="https://www.justsecurity.org/books-read/books-synopsis-justice-cascade-rights-prosecutions-world-politics/">Books Synopsis: The Justice Cascade</a></li> <li class="page_item page-item-365"><a href="https://www.justsecurity.org/books-read/books-synopsis-terror-presidency-law-judgment-bush-administration/">Book Synopsis: The Terror Presidency</a></li> <li class="page_item page-item-4254"><a href="https://www.justsecurity.org/books-read/book-synopsis-cost-counterterrorism-power-politics-liberty/">Book Synopsis – The Cost of Counterterrorism: Power, Politics, and Liberty</a></li> <li class="page_item page-item-11755"><a href="https://www.justsecurity.org/books-read/book-synopsis-place-left-hide/">Book Synopsis: No Place Left to Hide</a></li> </ul> </li> <li class="page_item page-item-386 page_item_has_children"><a href="https://www.justsecurity.org/editors-picks/">Editors’ Picks: Reading Lists</a> <ul class='children'> <li class="page_item page-item-9526"><a href="https://www.justsecurity.org/editors-picks/regulation-risks-cryptocurrency/">Editors’ Picks: The Regulation and Risks of Cryptocurrency</a></li> <li class="page_item page-item-852"><a href="https://www.justsecurity.org/editors-picks/executive-power-counterterrorism-policy/">Editors’ Picks: Executive Power & Counterterrorism Policy</a></li> <li class="page_item page-item-2146"><a href="https://www.justsecurity.org/editors-picks/power-detain/">Editors’ Picks: The Power to Detain</a></li> <li class="page_item page-item-394"><a href="https://www.justsecurity.org/editors-picks/areas-active-hostilities/">Editors’ Picks: Hot Battlefields and Areas of Active Hostilities</a></li> <li class="page_item page-item-9454"><a href="https://www.justsecurity.org/editors-picks/international-human-law-privacy-and-surveillance/">Editors’ Picks: International Human Right Law on Privacy (and Surveillance)</a></li> </ul> </li> <li class="page_item page-item-5257"><a href="https://www.justsecurity.org/recaps-archive/">Recaps Archive</a></li> <li class="page_item page-item-13962"><a href="https://www.justsecurity.org/book-synopsis-terror-courts/">Book Synopsis – The Terror Courts</a></li> <li class="page_item page-item-2449"><a href="https://www.justsecurity.org/recap-mid-week-guide-posts-security-oct-19-23/">Recap: A Mid-Week Guide to Posts on Just Security (Oct. 19-23)</a></li> <li class="page_item page-item-2710"><a href="https://www.justsecurity.org/early-edition-signup/">Signups for A.M. and P.M. Emails</a></li> <li class="page_item page-item-46495"><a href="https://www.justsecurity.org/asil-live-webcast-international-law-trump-administration-force-international-law/">ASIL Live Webcast: “International Law and the Trump Administration: The Use of Force Under International Law”</a></li> <li class="page_item page-item-33442"><a href="https://www.justsecurity.org/securitys-three-year-anniversary-event-state-secrets-whistleblowers-drone-memos/">National Security and Transparency in this Administration and the Next</a></li> <li class="page_item page-item-437"><a href="https://www.justsecurity.org/about-us/">About Us</a></li> <li class="page_item page-item-37819"><a href="https://www.justsecurity.org/excerpts-stephen-miller-interviews-meet-press-fox-news-sunday/">Excerpts of Stephen Miller Interviews on Meet the Press and Fox News Sunday</a></li> <li class="page_item page-item-42944"><a href="https://www.justsecurity.org/conversation-david-cole-authoritarianism-prevent/">David Cole on Stopping Authoritarianism’s Rise in the United States</a></li> <li class="page_item page-item-37578"><a href="https://www.justsecurity.org/call-papers-revisiting-role-international-law-national-security-workshop/">Workshop and Call for Papers: Revisiting the Role of International Law in National Security</a></li> <li class="page_item page-item-16331"><a href="https://www.justsecurity.org/surveille-scoring-methodology/">SURVEILLE Scoring Methodology</a></li> <li class="page_item page-item-2771"><a href="https://www.justsecurity.org/early-edition-email-signup/">Email Signups</a></li> <li class="page_item page-item-6362"><a href="https://www.justsecurity.org/security-reader-survey/">Just Security Reader Survey</a></li> <li class="page_item page-item-37619"><a href="https://www.justsecurity.org/securitys-coverage-immigration-refugee-executive-order/">Just Security’s Coverage of Immigration and Refugee Executive Order</a></li> <li class="page_item page-item-35062"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li class="page_item page-item-47831"><a href="https://www.justsecurity.org/early-edition/">Early Edition</a></li> <li class="page_item page-item-47832"><a href="https://www.justsecurity.org/weekend-edition/">Norms Watch</a></li> <li class="page_item page-item-47827"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Email Signup</a></li> </ul></div> </div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/07/GettyImages-1233910333-scaled.jpg?fit=2560%2C1707&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1>The Biden Administration’s Options for Responding to Abbott’s Unconstitutional Border Enforcement Executive Order </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/ebrightkatherineyon/" title="Profile and articles by Katherine Yon Ebright" class="author url fn" rel="author">Katherine Yon Ebright</a> and <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a></p><p class="date">July 13, 2022</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-82298" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-82298" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-82298" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/82298/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/article-i/" rel="tag">Article I</a>, <a href="https://www.justsecurity.org/tag/asylum/" rel="tag">asylum</a>, <a href="https://www.justsecurity.org/tag/borders/" rel="tag">Borders</a>, <a href="https://www.justsecurity.org/tag/constitution/" rel="tag">Constitution</a>, <a href="https://www.justsecurity.org/tag/constitutional-law/" rel="tag">constitutional law</a>, <a href="https://www.justsecurity.org/tag/emergency-powers/" rel="tag">Emergency Powers</a>, <a href="https://www.justsecurity.org/tag/executive-orders/" rel="tag">Executive Orders</a>, <a href="https://www.justsecurity.org/tag/immigration/" rel="tag">Immigration</a>, <a href="https://www.justsecurity.org/tag/migration/" rel="tag">migration</a>, <a href="https://www.justsecurity.org/tag/national-guard/" rel="tag">National Guard</a>, <a href="https://www.justsecurity.org/tag/u-s-customs-and-border-protection/" rel="tag">U.S. Customs and Border Protection</a>, <a href="https://www.justsecurity.org/tag/undocumented-immigrants/" rel="tag">undocumented immigrants</a>, <a href="https://www.justsecurity.org/tag/war-powers/" rel="tag">War Powers</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/ebrightkatherineyon/" title="Profile and articles by Katherine Yon Ebright" class="author url fn" rel="author">Katherine Yon Ebright</a> and <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a></p><p class="date">July 13, 2022</p></div><p>Last week, Texas Governor Greg Abbott issued an <a href="https://www.texastribune.org/2022/07/07/texas-greg-abbott-state-police-border/">executive order</a> that directs the Texas National Guard and state police officers to apprehend undocumented individuals and return them to ports of entry along the border. In other words, the order stops just short of authorizing Texas Guardsmen and police to carry out deportations. This is not the first time that Abbott has sought to take border security and immigration enforcement—both exclusively federal prerogatives—into his own hands. But this is the most brazen and expansive attempt yet. Moreover, by <a href="https://gov.texas.gov/uploads/files/press/EO-GA-41.pdf#page=3">referencing</a> an obscure constitutional provision applicable in times of “<a href="https://www.archives.gov/founding-docs/constitution-transcript#toc-section-10-">invasion</a>,” Abbott’s order appears to be invoking <em>war powers</em> as the basis for rounding up migrants and asylum-seekers. This approach is flagrantly unlawful, and the Biden administration can and should shut it down.</p> <p>Some background: Since the start of the Biden administration, a <a href="https://www.nytimes.com/2022/04/09/us/politics/biden-border-immigration.html">record number</a> of migrants and asylum-seekers have sought to enter the United States through its southern border. In May alone, U.S. Customs and Border Protection <a href="https://www.washingtonpost.com/immigration/2022/06/16/united-states-border-immigration-arrests/">made nearly 240,000 arrests</a> of undocumented individuals between ports of entry. (The 240,000 figure includes repeat encounters with individuals who had previously attempted to cross the border and been turned away as a COVID safety precaution under the government’s “<a href="https://www.justsecurity.org/82182/the-absurdity-and-destruction-of-the-push-to-force-title-42-continuation/">Title 42 Order</a>.” Government officials acknowledge that the Title 42 Order “<a href="https://www.hsgac.senate.gov/imo/media/doc/Testimony-Nunez-Neto-2022-05-05.pdf">has led to extraordinarily high recidivism rates</a>” and “<a href="https://www.washingtonpost.com/national-security/2022/05/05/border-title42-biden/">actually inflated [] numbers at the border</a>.”) As the Department of Homeland Security has responded to this migration and tried to avoid a <a href="https://www.nytimes.com/2020/11/25/us/border-migrant-children-cages-ursula-warehouse.html">humanitarian crisis</a>, Texas officials have pursued their own remedies.</p> <p>In March 2021, shortly after President Biden took office, Abbott announced <a href="https://www.texastribune.org/2022/03/30/operation-lone-star-texas-explained/">Operation Lone Star</a>. That initiative has resulted in more than 10,000 Texas National Guardsmen and roughly 1,000 Texas state police officers being sent to the border. Relying on <a href="https://gov.texas.gov/uploads/files/press/DISASTER_border_security_IMAGE_05-31-2021.pdf">state emergency powers</a>, Abbott initially directed part of these forces to arrest undocumented individuals for “trespassing” on private properties adjoining the border, and to deliver them to local Texas courts for prosecution.</p> <p>By January 2022, a Texas court had <a href="https://www.statesman.com/story/news/2022/01/13/greg-abbott-texas-mexico-border-unconstitutional-judge-district/6510864001/">ruled</a> that trespass arrests under Operation Lone Star, an obvious pretext for conducting immigration enforcement, violate established law. The Supreme Court has <a href="https://supreme.justia.com/cases/federal/us/424/351/">long held</a> that creating and enforcing immigration policy is “unquestionably” and “exclusively” a federal power. And Congress has prohibited states from performing immigration enforcement except at the direction of the <a href="https://www.law.cornell.edu/uscode/text/8/1357">U.S. Attorney General</a> or with the consent of the <a href="https://www.law.cornell.edu/uscode/text/8/1252c">Immigration and Naturalization Service</a>.</p> <p>Facing pushback from the courts, Abbott went back to the drawing board. In April 2022, he and Texas Attorney General Ken Paxton began <a href="https://www.nytimes.com/2022/04/30/us/texas-border-abbott.html">floating</a> the idea of invoking a little-known clause in <a href="https://www.archives.gov/founding-docs/constitution-transcript">Article I, Section 10</a>, of the U.S. Constitution that allows states to “engage in War” when they are “actually invaded, or in such imminent Danger as will not admit of delay.” Under this provision, a state can access war powers to act in self-defense, notwithstanding the federal government’s <a href="https://constitution.congress.gov/browse/essay/artI_S8_C11_1/">otherwise exclusive</a> prerogative to conduct military operations against foreign entities.</p> <p>Abbott’s new executive order follows through on this scheme. The order <a href="https://gov.texas.gov/uploads/files/press/EO-GA-41.pdf">accuses</a> the Biden administration of failing to “protect each State in this Union against Invasion,” as required by Article IV, Section 4 of the Constitution. It then contends that Texas has been “forced” to “deploy state military forces . . . as described in Article I, § 10 . . . to secure the State of Texas.”</p> <p>Abbott’s invocation of Article I, Section 10, to treat undocumented individuals as though they were enemy combatants on a battlefield is not only wrongheaded and dangerous but also illegal. Only armed invasions that are “<a href="https://tinyurl.com/2p847xey">too formidable for the civil power to overcome</a>” can trigger states’ right of self-defense. The Founders contemplated such invasions occurring at the behest of “<a href="https://avalon.law.yale.edu/18th_century/fed43.asp">ambitious or vindictive</a>” foreign powers and groups, not unarmed migrants and asylum-seekers. This meaning is confirmed by a <a href="https://casetext.com/case/padavan-v-us">series</a> of <a href="https://casetext.com/case/state-of-nj-v-us">court</a> <a href="https://casetext.com/case/state-of-california-v-united-states-8">cases</a> from the 1990s, each of which rejected the argument that an influx of undocumented individuals could constitute an “invasion.”</p> <p>Moreover, even if an actual “invasion” were occurring, that would not transfer authority from the United States to Texas on an ongoing or irrevocable basis. While states may have an initial authority to respond to an invasion, their war powers are clearly <a href="https://supreme.justia.com/cases/federal/us/299/304/">subordinate</a> to those of the federal government, which retains ultimate responsibility for addressing invasions. The federal government <a href="https://www.archives.gov/founding-docs/constitution-transcript">possesses</a> the responsibility to “protect each [state] against Invasion”; the authority to suspend habeas corpus “when in Cases of . . . Invasion the public Safety may require it”; and a repository of war powers, which include providing for calling forth “the Militia to . . . repel Invasions.” It follows that the federal government can disagree with – and foreclose – a state’s exercise of war powers under Article I, Section 10. Were it otherwise, a single state could drag the whole country into a protracted conflict. No one would argue that New York could have unilaterally decided to prosecute a war against al-Qaeda in the wake of September 11, 2001, particularly if the president or Congress had explicitly chosen a different approach.</p> <p>In addition to exceeding the authority provided by Article I, Section 10, Abbott’s order is yet another thinly veiled effort to take the reins on U.S. immigration policy. To be sure, the Supreme Court has <a href="https://supreme.justia.com/cases/federal/us/287/378/">acknowledged</a> that, “[b]y virtue of [their] duty to ‘cause the laws to be faithfully executed,’” the president and state governors have “the discretion to determine whether an exigency requiring military aid for that purpose has arisen.” But Abbott’s assessment that Texas has been “actually invaded” falls outside what the Court described as the “permitted range of honest judgment as to the measures to be taken in meeting force with force, in suppressing violence and restoring order.” The Court indicated that state governors cannot hide behind pretextual justifications for using war or emergency powers to evade the Supremacy Clause—on the contrary, it made clear both that “[t]here is no such avenue of escape from the paramount authority of the Federal Constitution” and that “[w]hat are the allowable limits of military discretion, and whether or not they have been overstepped in a particular case, are judicial questions.” In this instance, the Court’s precedents would guide a reviewing court to look beyond Abbott’s assertions and construe Texas’s actions as they are: not efforts to remove enemy combatants from the battlefield but instead immigration enforcement, plain and simple. As discussed, this kind of unilateral, state-led immigration enforcement is <a href="https://casetext.com/case/arizona-v-united-states-7">preempted by federal law</a>. For these reasons, the Biden administration would likely succeed if it challenged the enforcement of Abbott’s executive order in court.</p> <p>And if all else failed, the president could federalize the Texas National Guard and order it to stand down, taking away the bulk of the personnel and other resources needed to carry out Abbott’s envisioned immigration enforcement efforts. Under <a href="https://www.law.cornell.edu/uscode/text/10/12406">10 U.S.C. § 12406</a>, the president can call the National Guard of any state into federal service “in such numbers as he considers necessary” in three circumstances: when there is an invasion; when there is a rebellion or danger of rebellion against the authority of the federal government; or when “the President is unable with the regular forces to execute the laws of the United States.” An argument could be made that Texas’s actions, insofar as they represent an attempt to usurp the federal government’s immigration enforcement powers, constitute a rebellion against the authority of the federal government. But there is also a strong—and less politically fraught—argument that Texas is interfering with the execution of federal law by civilian authorities. Abbott’s order has the potential to impede the federal government’s ability to conduct a host of activities required by law, such as determining whether those migrants are, in fact, removable; providing a hearing before an immigration judge to those who are entitled to one; and processing the asylum claims of those who are refugees.</p> <p>To be clear, the president would not need to invoke the Insurrection Act to call Texas’s National Guard forces into federal service and order them to stand down. That’s a crucial point, as there could be significant political blowback from such an invocation. However, if there were any question as to the sufficiency of 10 U.S.C. § 12406, the Insurrection Act would be an available alternative. There is little question that Abbott’s order could constitute a <a href="https://www.law.cornell.edu/uscode/text/10/253">“conspiracy” that “opposes or obstructs the execution of the laws of the United States.”</a> Any such action should be a last resort. Regardless of the legal authority used, federalization of a state’s National Guard against the wishes of the state’s governor is an extreme step—one that would likely be unnecessary given the strength of the arguments that the Biden administration can bring to court.</p> <p>At bottom, Abbott’s executive order is not a serious effort to engage with constitutional war powers or immigration policy. It is a shameless attempt to contort the law in service of scoring political points and demonizing undocumented individuals, many of whom are <a href="https://www.southernborder.org/border_lens_asylum_seekers_at_the_border">fleeing violence and persecution</a> in their home countries. The Biden administration has ample legal and policy options at hand to end this abuse and should exercise them before Abbott escalates the situation even further.</p> <h6><em>Image: AUSTIN, TX – JULY 10: Texas Gov. Greg Abbott speaks during a border security briefing with sheriffs from border communities at the Texas State Capitol on July 10, 2021 in Austin, Texas. (Photo by Tamir Kalifa/Getty Images)</em></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/article-i/" rel="tag">Article I</a>, <a href="https://www.justsecurity.org/tag/asylum/" rel="tag">asylum</a>, <a href="https://www.justsecurity.org/tag/borders/" rel="tag">Borders</a>, <a href="https://www.justsecurity.org/tag/constitution/" rel="tag">Constitution</a>, <a href="https://www.justsecurity.org/tag/constitutional-law/" rel="tag">constitutional law</a>, <a href="https://www.justsecurity.org/tag/emergency-powers/" rel="tag">Emergency Powers</a>, <a href="https://www.justsecurity.org/tag/executive-orders/" rel="tag">Executive Orders</a>, <a href="https://www.justsecurity.org/tag/immigration/" rel="tag">Immigration</a>, <a href="https://www.justsecurity.org/tag/migration/" rel="tag">migration</a>, <a href="https://www.justsecurity.org/tag/national-guard/" rel="tag">National Guard</a>, <a href="https://www.justsecurity.org/tag/u-s-customs-and-border-protection/" rel="tag">U.S. Customs and Border Protection</a>, <a href="https://www.justsecurity.org/tag/undocumented-immigrants/" rel="tag">undocumented immigrants</a>, <a href="https://www.justsecurity.org/tag/war-powers/" rel="tag">War Powers</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts & Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To ‘End’ War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine — and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gwenadmin/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon’s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who’s Who in Jack Smith’s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN’s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103164/usaid-digital-policy-conflict-peacebuilding/">The Next Step for USAID’s New Digital Policy: Account for Conflict Risks and Include Peacebuilding</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/guintaclaire/" title="Profile and articles by Claire Guinta" class="author url fn" rel="author">Claire Guinta</a> and <a href="https://www.justsecurity.org/author/zuroskinick/" title="Profile and articles by Nick Zuroski" class="author url fn" rel="author">Nick Zuroski</a></p> <p class="date">Sep 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103184/amended-protocol-booby-traps-pagers/">Article 7(2) of Amended Protocol II on Conventional Weapons and the Lebanon Pager Explosions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100374/ukraine-us-public-support-election/">Will US Public Support for Ukraine Aid Survive the Presidential Campaign?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mironrobert/" title="Profile and articles by Robert Miron" class="author url fn" rel="author">Robert Miron</a> and <a href="https://www.justsecurity.org/author/feaver-peter/" title="Profile and articles by Peter Feaver" class="author url fn" rel="author">Peter Feaver</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100333/rethinking-united-nations-cybercrime-treaty/">Rethinking the United Nations Cybercrime Treaty</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pielemeierjason/" title="Profile and articles by Jason Pielemeier" class="author url fn" rel="author">Jason Pielemeier</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100172/why-criminalize-ecocide-experts/">Why Criminalize Ecocide? Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100265/musk-trump-legal-boundaries/">Musk, X, and Trump 2024: Where are the Legal and Ethical Boundaries?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/jacksondean/" title="Profile and articles by Dean Jackson" class="author url fn" rel="author">Dean Jackson</a></p> <p class="date">Sep 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100259/u-n-general-assembly-high-level-week-2024-what-experts-are-looking-for/">U.N. General Assembly High-Level Week 2024 : What Experts Are Looking For</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100195/a-2024-election-litigation-hot-list/">A 2024 Election Litigation Hot List</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100193/law-war-exploding-pagers-lebanon/">Law of War Questions Raised by Exploding Pagers in Lebanon</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100130/competition-not-control-is-key-to-winning-the-global-ai-race/">Competition, Not Control, is Key to Winning the Global AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mittelsteadtmatthew/" title="Profile and articles by Matthew Mittelsteadt" class="author url fn" rel="author">Matthew Mittelsteadt</a> and <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a></p> <p class="date">Sep 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97864/political-violence-us-enough/">Political Violence in the United States Is Rising – and It Might Be Up to Americans to Say “Enough!”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Sep 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99994/americas-national-security-threat/">America’s Overlooked National Security Threat</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Sep 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99964/challenging-state-capture/">To Challenge State Capture, the US Needs a Strategy of State Retrieval</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/prendergastjohn/" title="Profile and articles by John Prendergast" class="author url fn" rel="author">John Prendergast</a> and <a href="https://www.justsecurity.org/author/wilsondamon/" title="Profile and articles by Damon Wilson" class="author url fn" rel="author">Damon Wilson</a></p> <p class="date">Sep 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99869/telegrams-security-sham/">Telegram’s Security Sham</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vanlandinghammichael/" title="Profile and articles by Michael Van Landingham" class="author url fn" rel="author">Michael Van Landingham</a> and <a href="https://www.justsecurity.org/author/wildeg/" title="Profile and articles by Gavin Wilde" class="author url fn" rel="author">Gavin Wilde</a></p> <p class="date">Sep 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99841/public-safety-reform-targeted-violence/">Public-Safety Reform and Preventing Targeted Violence: Two Sides of the Same Public-Health Coin</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosanderic/" title="Profile and articles by Eric Rosand" class="author url fn" rel="author">Eric Rosand</a>, <a href="https://www.justsecurity.org/author/weinestevan/" title="Profile and articles by Stevan Weine" class="author url fn" rel="author">Stevan Weine</a> and <a href="https://www.justsecurity.org/author/gimenezalejandrosantana/" title="Profile and articles by Alejandro Giménez Santana" class="author url fn" rel="author">Alejandro Giménez Santana</a></p> <p class="date">Sep 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99831/reaim-second-summit-context/">Putting the Second REAIM Summit into Context</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vestnertobias/" title="Profile and articles by Tobias Vestner" class="author url fn" rel="author">Tobias Vestner</a> and <a href="https://www.justsecurity.org/author/cleoburysimon/" title="Profile and articles by Simon Cleobury" class="author url fn" rel="author">Simon Cleobury</a></p> <p class="date">Sep 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99113/north-korea-growing-threat/">The Growing Threat from North Korea</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kirbymichael/" title="Profile and articles by The Hon. Michael Kirby" class="author url fn" rel="author">The Hon. Michael Kirby</a></p> <p class="date">Aug 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98855/good-moral-character-trump-immigrants/">‘Good Moral Character?’ Holding Trump to the Same Standards as the Immigrants He Vilifies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/chenedgar/" title="Profile and articles by Edgar Chen" class="author url fn" rel="author">Edgar Chen</a> and <a href="https://www.justsecurity.org/author/rossdan/" title="Profile and articles by Dan Ross" class="author url fn" rel="author">Dan Ross</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99069/artificial-intelligence-democracy-effects/">Don’t Downplay Risks of AI for Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nosselsuzanne/" title="Profile and articles by Suzanne Nossel" class="author url fn" rel="author">Suzanne Nossel</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98844/dont-sanction-icc/">Don’t Sanction the ICC for Doing its Job</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mayamichael/" title="Profile and articles by Michael Maya" class="author url fn" rel="author">Michael Maya</a></p> <p class="date">Aug 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia’s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98895/presidential-immunity-congressional-contempt/">Presidential Immunity Decision May Have Implications for Congressional-Executive Divide on Criminal Contempt</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/wrightandy/" title="Profile and articles by Andy Wright" class="author url fn" rel="author">Andy Wright</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98847/kursk-incursion-international-law/">Ukraine’s Incursion into Kursk Oblast: A Lawful Case of Defensive Invasion?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/omearachris/" title="Profile and articles by Chris O'Meara" class="author url fn" rel="author">Chris O'Meara</a></p> <p class="date">Aug 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98812/icc-amicus-brief-israel-palestine/">Expert Explainer: The US for the first time submits a formal brief to the International Criminal Court on the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a></p> <p class="date">Aug 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98787/icc-disability-slave-trade/">Time for the International Criminal Court to Recognize Persons with Disabilities and the Slave Trade</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lordjanet/" title="Profile and articles by Janet Lord" class="author url fn" rel="author">Janet Lord</a>, <a href="https://www.justsecurity.org/author/schwarzpace/" title="Profile and articles by Pace Schwarz" class="author url fn" rel="author">Pace Schwarz</a>, <a href="https://www.justsecurity.org/author/smithmatthew/" title="Profile and articles by Matthew "Hezzy" Smith" class="author url fn" rel="author">Matthew "Hezzy" Smith</a>, <a href="https://www.justsecurity.org/author/steinmichael/" title="Profile and articles by Michael Ashley Stein" class="author url fn" rel="author">Michael Ashley Stein</a>, <a href="https://www.justsecurity.org/author/greenalex/" title="Profile and articles by Alex Green" class="author url fn" rel="author">Alex Green</a> and <a href="https://www.justsecurity.org/author/kayessrosemary/" title="Profile and articles by Rosemary Kayess" class="author url fn" rel="author">Rosemary Kayess</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98801/podcast-international-law-israel-palestine/">The Just Security Podcast: Assessing the Recent Response of International Law and Institutions in Palestine and Israel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/imseisardi/" title="Profile and articles by Ardi Imseis" class="author url fn" rel="author">Ardi Imseis</a>, <a href="https://www.justsecurity.org/author/hammourishahd/" title="Profile and articles by Shahd Hammouri" class="author url fn" rel="author">Shahd Hammouri</a>, <a href="https://www.justsecurity.org/author/kattanvictor/" title="Profile and articles by Victor Kattan" class="author url fn" rel="author">Victor Kattan</a>, <a href="https://www.justsecurity.org/author/sirleafmatiangai/" title="Profile and articles by Matiangai Sirleaf" class="author url fn" rel="author">Matiangai Sirleaf</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98754/biden-end-iraq-war/">A Presidential Proclamation to End the Iraq War: Unilateral Executive Action to Defang a Zombie AUMF</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98733/ukraine-icc-ratification/">Unforced Error: Article 124 and the Regrettable Caveat to Ukraine’s Proposed Ratification of the ICC Statute</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98674/911-plea-deals-revoked/">Revoking the 9/11 Plea Deals: Human Rights Consequences</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a></p> <p class="date">Aug 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98652/afghanistan-taliban-third-anniversary/">Collecting Just Security’s Afghanistan Coverage on Third Anniversary of Taliban Takeover</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a></p> <p class="date">Aug 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98592/sudan-talks-deadlock/">Breaking the Deadlock: New Talks Needed to Help End Sudan’s Violence and Offer a Glimmer of Hope</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/abdulshafiquscondy/" title="Profile and articles by Quscondy Abdulshafi" class="author url fn" rel="author">Quscondy Abdulshafi</a></p> <p class="date">Aug 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98543/fara-sue-mi-terry/">The Perils of Expertise: How the DOJ Indictment of Sue Mi Terry Can Chill the Think Tank World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/craiggregory/" title="Profile and articles by Gregory B. Craig" class="author url fn" rel="author">Gregory B. Craig</a></p> <p class="date">Aug 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98501/israel-trans-border-torture/">Justice for Trans-border Torture Requires Rethinking the International Criminal Court’s Jurisdiction in the Israel-Palestine Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ben-natansmadar/" title="Profile and articles by Smadar Ben-Natan" class="author url fn" rel="author">Smadar Ben-Natan</a> and <a href="https://www.justsecurity.org/author/mannitamar/" title="Profile and articles by Itamar Mann" class="author url fn" rel="author">Itamar Mann</a></p> <p class="date">Aug 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98445/our-lives-depend-on-cloud/">Our Lives Depend on the Cloud. Now What?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pendletonjohn/" title="Profile and articles by John Pendleton" class="author url fn" rel="author">John Pendleton</a> and <a href="https://www.justsecurity.org/author/leviteariel/" title="Profile and articles by Ariel Levite" class="author url fn" rel="author">Ariel Levite</a></p> <p class="date">Aug 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98429/security-council-report-isis-qaeda/">Wake Up Call: UN Security Council’s Report on ISIS and al-Qaeda</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Aug 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98378/podcast-assessing-laws-of-war/">The Just Security Podcast: Assessing the Laws of War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/droegecordula/" title="Profile and articles by Cordula Droege" class="author url fn" rel="author">Cordula Droege</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98313/podcast-hostage-policy/">The Just Security Podcast: The Evolution of U.S. Hostage Policy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/foleydiane/" title="Profile and articles by Diane Foley" class="author url fn" rel="author">Diane Foley</a>, <a href="https://www.justsecurity.org/author/hartigluke/" title="Profile and articles by Luke Hartig" class="author url fn" rel="author">Luke Hartig</a>, <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98273/the-aftermath-of-the-haniyeh-killing-how-to-avoid-a-new-middle-east-war/">The Aftermath of the Haniyeh Killing: How to Avoid a New Middle East War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98261/disability-think-differently-trump/">Donald Trump’s Dangerous Views on Disability and the Power to Think Differently</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97738/just-security-analysis-supreme-court/">Collecting Just Security’s Analysis of the Supreme Court’s Term</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a> and <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98205/prudential-trump-v-united-states/">A Prudential Way Forward in <i>Trump v. United States</i></a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bobbittphilip/" title="Profile and articles by Philip Bobbitt" class="author url fn" rel="author">Philip Bobbitt</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98091/negotiations-with-iran-now/">Space May be Opening for Negotiations with Iran</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brewgregory/" title="Profile and articles by Gregory Brew" class="author url fn" rel="author">Gregory Brew</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98128/united-nations-pact-for-future/">What the Draft UN “Pact for the Future” Tells Us About International Insecurity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gowanrichard/" title="Profile and articles by Richard Gowan" class="author url fn" rel="author">Richard Gowan</a></p> <p class="date">Jul 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98082/international-court-of-justices-call-on-all-states-to-end-israels-occupation-and-find-a-path-to-peace/">International Court of Justice’s Call on All States to End Israel’s Occupation and Find a Path to Peace</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nowrojeebinaifer/" title="Profile and articles by Binaifer Nowrojee" class="author url fn" rel="author">Binaifer Nowrojee</a></p> <p class="date">Jul 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98037/doj-special-counsel/"><i> United States v. Nixon </i> at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ledermanmarty/" title="Profile and articles by Marty Lederman" class="author url fn" rel="author">Marty Lederman</a></p> <p class="date">Jul 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97937/azerbaijan-arbitrary-detentions-host-cop29/">Azerbaijan’s Aliyev Extends Arbitrary Detentions Even as He Prepares to Host Global Climate Conference COP29</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bayramovazhala/" title="Profile and articles by Zhala Bayramova" class="author url fn" rel="author">Zhala Bayramova</a>, <a href="https://www.justsecurity.org/author/bayramovibad/" title="Profile and articles by Ibad Bayramov" class="author url fn" rel="author">Ibad Bayramov</a> and <a href="https://www.justsecurity.org/author/bayramliemin/" title="Profile and articles by Emin Bayramli" class="author url fn" rel="author">Emin Bayramli</a></p> <p class="date">Jul 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92714/american-autocracy-threat-tracker/">American Autocracy Threat Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/ben-ghiatruth/" title="Profile and articles by Ruth Ben-Ghiat" class="author url fn" rel="author">Ruth Ben-Ghiat</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a>, <a href="https://www.justsecurity.org/author/kolbjoshua/" title="Profile and articles by Joshua Kolb" class="author url fn" rel="author">Joshua Kolb</a>, <a href="https://www.justsecurity.org/author/warrenandrew/" title="Profile and articles by Andrew Warren" class="author url fn" rel="author">Andrew Warren</a>, <a href="https://www.justsecurity.org/author/kovacs-goodmanjacob/" title="Profile and articles by Jacob Kovacs-Goodman" class="author url fn" rel="author">Jacob Kovacs-Goodman</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97922/non-state-civilian-political-institutions/">Assessing the Civilian and Political Institutions of Armed Non-State Actors under International Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/fortinkatharine/" title="Profile and articles by Katharine Fortin" class="author url fn" rel="author">Katharine Fortin</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97826/state-departments-civilian-harm-incident-response/">The State Department’s Civilian Harm Incident Response Guidance: How to Make a Good Thing Better</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blahacharles/" title="Profile and articles by Charles O. (Cob) Blaha" class="author url fn" rel="author">Charles O. (Cob) Blaha</a></p> <p class="date">Jul 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/">Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jul 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97760/economic-security-presidential-power/">How ‘Economic Security’ is Re-shaping Presidential Power</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/claussenkathleen/" title="Profile and articles by Kathleen Claussen" class="author url fn" rel="author">Kathleen Claussen</a> and <a href="https://www.justsecurity.org/author/meyertimothy/" title="Profile and articles by Timothy Meyer" class="author url fn" rel="author">Timothy Meyer</a></p> <p class="date">Jul 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97747/trump-docs-case-dismissed/">Judge Cannon Finds Special Counsel Unconstitutional in Trump Classified Documents Case: What’s Next for Jack Smith?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Jul 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97718/nato-summit-ukraine-russia-china/">After the NATO Summit, Allies Need to Step Up Their Game on Ukraine, Russia, and China</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Jul 15th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia’s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis & Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/77022/january-6-clearinghouse/">January 6 Clearinghouse</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a></p> <p class="date">Mar 14th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine – The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security’s Series on Reparations in Russia’s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the “War on Terror”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 “Report Card” Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76692/introduction-to-just-securitys-series-on-tulsa-race-massacre-of-1921/">Introduction to Just Security’s Series on Tulsa Race Massacre of 1921</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bergerchristine/" title="Profile and articles by Christine Berger" class="author url fn" rel="author">Christine Berger</a></p> <p class="date">May 29th, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/ebrightkatherineyon/">Katherine Yon <span>Ebright</span></a></h4><p>Katherine Yon Ebright (<a href="https://twitter.com/EbrightYon">@EbrightYon</a>) serves as counsel with the Brennan Center’s Liberty & National Security Program, where she focuses on war powers and the constitutional separation of powers.</p> </div><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/nunnjoseph/">Joseph <span>Nunn</span></a></h4><p>Counsel at the Brennan Center for Justice’s Liberty and National Security Program, where his research focuses on federal and state emergency powers and the domestic role of the U.S. military. Follow him on Twitter (<a href="https://twitter.com/josephanunn">@josephanunn</a>).</p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/12/Climate-collage-scaled.jpg?fit=768%2C308&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Just Security’s Climate Archive</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Nov 19th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/Myanmar-sanctions-scaled-e1731508799414.jpg?fit=768%2C306&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104496/withdrawal-international-agreements-tailored-out/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2017/06/UN-Secretary-General-Major-Signatories-Hold-Press-Conference-on-Paris-Agreement-GettyImages-523215460.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104496/withdrawal-international-agreements-tailored-out/">Withdrawal from International Agreements: Toward a “Tailored Out”</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/amirfarcatherine/" title="Profile and articles by Catherine Amirfar" class="author url fn" rel="author">Catherine Amirfar</a> and <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a></p> <p class="date">Nov 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104211/military-overseas-voters-voter-suppression/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-2149130921-scaled.jpg?fit=768%2C405&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104211/military-overseas-voters-voter-suppression/">Don’t Let Military and Overseas Voters Become the Next Targets for Voter Suppression</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/gephardtrichard/" title="Profile and articles by Richard Gephardt" class="author url fn" rel="author">Richard Gephardt</a> and <a href="https://www.justsecurity.org/author/mccarthydeboraha/" title="Profile and articles by Deborah A. McCarthy" class="author url fn" rel="author">Deborah A. McCarthy</a></p> <p class="date">Oct 25th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1239451813-1-scaled-e1729743958928.jpg?fit=768%2C467&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104015/european-court-human-rights-bosnia/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/Bosnia-High-Rep-Schmidt-scaled-e1729053730521.jpg?fit=768%2C308&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104015/european-court-human-rights-bosnia/">European Court Intervention by Bosnia’s International High Representative Risks Limiting the Country’s Potential</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/bassuenerkurt/" title="Profile and articles by Kurt Bassuener" class="author url fn" rel="author">Kurt Bassuener</a></p> <p class="date">Oct 16th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1007863078-scaled-e1728564234416.jpg?fit=768%2C307&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/GettyImages-1237612228-1-scaled.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103295/civic-space-electoral-integrity-africa/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2150144192-scaled-e1727757200886.jpg?fit=768%2C317&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103295/civic-space-electoral-integrity-africa/">The Essential Role of ‘Civic Space’ in Safeguarding Electoral Integrity: How a Decision in Africa Can Reverberate</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/jaramillosofia/" title="Profile and articles by Sofía Jaramillo" class="author url fn" rel="author">Sofía Jaramillo</a> and <a href="https://www.justsecurity.org/author/morsheimersarah/" title="Profile and articles by Sarah Morsheimer" class="author url fn" rel="author">Sarah Morsheimer</a></p> <p class="date">Oct 1st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/98780/el-mayo-surrender-cartels/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/08/GettyImages-2162895099-scaled.jpg?fit=768%2C458&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/98780/el-mayo-surrender-cartels/">A Modern <em>Narcos</em>? A Guide to the “El Mayo” Sinaloa Cartel Surrender</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/kohstevenarrigg/" title="Profile and articles by Steven Arrigg Koh" class="author url fn" rel="author">Steven Arrigg Koh</a></p> <p class="date">Sep 17th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/99994/americas-national-security-threat/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/05/GettyImages-1300175191-scaled-e1717001792398.jpg?fit=768%2C452&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/99994/americas-national-security-threat/">America’s Overlooked National Security Threat</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Sep 11th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/99802/military-leaders-democracy/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-1245141571-scaled-e1725452331967.jpg?fit=768%2C419&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/99802/military-leaders-democracy/">The Anonymous Military Leaders with the Weight of the Election on Their Shoulders</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rasmussenpaul/" title="Profile and articles by Paul Rasmussen" class="author url fn" rel="author">Paul Rasmussen</a></p> <p class="date">Sep 4th, 2024</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">© 2024 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/82298\/the-biden-administrations-options-for-responding-to-abbotts-unconstitutional-border-enforcement-executive-order\/":82298}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1732369468" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202447.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"82298\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.0\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "82298" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.0" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>