CINXE.COM
Pentagon Moves Undermine Counterterrorism Strategy
<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Pentagon Moves Undermine Counterterrorism Strategy</title><link rel="profile" href="http://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https://yoast.com/wordpress/plugins/seo/ --> <link rel="canonical" href="https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Pentagon Moves Undermine Counterterrorism Strategy" /> <meta property="og:description" content="Acting Defense Secretary Chris Miller should insist upon maintaining sufficient capability to prevent the resurgence of terrorist threats." /> <meta property="og:url" content="https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/" /> <meta property="og:site_name" content="Just Security" /> <meta property="article:publisher" content="https://www.facebook.com/JSBlog/" /> <meta property="article:published_time" content="2021-01-05T14:03:46+00:00" /> <meta property="article:modified_time" content="2021-01-05T14:04:17+00:00" /> <meta property="og:image" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/miller-1.jpeg?fit=600%2C399&ssl=1" /> <meta property="og:image:width" content="600" /> <meta property="og:image:height" content="399" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="Matt Castelli, Colonel (ret.) Bob Wilson" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="Pentagon Moves Undermine Counterterrorism Strategy" /> <meta name="twitter:description" content="Acting Defense Secretary Chris Miller should insist upon maintaining sufficient capability to prevent the resurgence of terrorist threats." /> <meta name="twitter:image" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/miller-1.jpeg?fit=600%2C399&ssl=1" /> <meta name="twitter:creator" content="@just_security" /> <meta name="twitter:site" content="@just_security" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="Matt Castelli, Colonel (ret.) Bob Wilson" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="7 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#article","isPartOf":{"@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/"},"author":[{"@id":"https://www.justsecurity.org/#/schema/person/0cf2269719dc00e3648c45be7e3fc4f7"},{"@id":"https://www.justsecurity.org/#/schema/person/ff71458a6255fd11f485e67122258883"}],"headline":"Pentagon Moves Undermine Counterterrorism Strategy","datePublished":"2021-01-05T14:03:46+00:00","dateModified":"2021-01-05T14:04:17+00:00","mainEntityOfPage":{"@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/"},"wordCount":1346,"publisher":{"@id":"https://www.justsecurity.org/#organization"},"image":{"@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/miller-e1609854514948.jpeg?fit=6048%2C2494&ssl=1","keywords":["Afghanistan","combat troops","Counterterrorism","Department of Defense (DoD)","Iraq","ISIS","Pentagon","Somalia"],"articleSection":["Military","Terrorism"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/","url":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/","name":"Pentagon Moves Undermine Counterterrorism Strategy","isPartOf":{"@id":"https://www.justsecurity.org/#website"},"primaryImageOfPage":{"@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#primaryimage"},"image":{"@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#primaryimage"},"thumbnailUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/miller-e1609854514948.jpeg?fit=6048%2C2494&ssl=1","datePublished":"2021-01-05T14:03:46+00:00","dateModified":"2021-01-05T14:04:17+00:00","breadcrumb":{"@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#primaryimage","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/miller-e1609854514948.jpeg?fit=6048%2C2494&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/miller-e1609854514948.jpeg?fit=6048%2C2494&ssl=1","width":6048,"height":2494,"caption":"Acting Defense Secretary Christopher C. Miller address media at the Pentagon, Washington, D.C. Nov. 17, 2020. (DoD Photo by U.S. Air Force Staff Sgt. Jack Sanders)"},{"@type":"BreadcrumbList","@id":"https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.justsecurity.org/"},{"@type":"ListItem","position":2,"name":"Pentagon Moves Undermine Counterterrorism Strategy"}]},{"@type":"WebSite","@id":"https://www.justsecurity.org/#website","url":"https://www.justsecurity.org/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https://www.justsecurity.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.justsecurity.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.justsecurity.org/#organization","name":"Just Security","url":"https://www.justsecurity.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/logo/image/","url":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/03/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https://www.justsecurity.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/JSBlog/","https://x.com/just_security","https://www.linkedin.com/company/just-security-linkedin/","https://www.instagram.com/justsecurityforum/","https://www.youtube.com/@JustSecurityForum"]},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/0cf2269719dc00e3648c45be7e3fc4f7","name":"Matt Castelli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/3c1cc160b17d5bd61deedf146e2e1d52","url":"https://secure.gravatar.com/avatar/d7cee96686791b8369d49258cabe6fd4?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/d7cee96686791b8369d49258cabe6fd4?s=96&d=mm&r=g","caption":"Matt Castelli"},"description":"Matt Castelli (@CastelliMatt) is a former CIA officer, serving over 14 years in analytic, operational, and management assignments primarily covering counterterrorism. Castelli also served from 2016 to 2018 as Director for Counterterrorism at the National Security Council and his last assignment was as a Senior CIA representative to In-Q-Tel. Castelli is a Council on Foreign Relations Term Member and Truman National Security Project Fellow. He is an Executive MBA candidate at Northwestern University’s Kellogg School of Management and also holds a MA in Security Studies focusing on U.S. National Security Policy from Georgetown University.","url":"https://www.justsecurity.org/author/castellimatt/"},{"@type":"Person","@id":"https://www.justsecurity.org/#/schema/person/ff71458a6255fd11f485e67122258883","name":"Colonel (ret.) Bob Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.justsecurity.org/#/schema/person/image/4e7823842bd915c60c3ba48ad21adfc6","url":"https://secure.gravatar.com/avatar/5ab7bec2fcbe63d5b2cab7fd7f5399f1?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/5ab7bec2fcbe63d5b2cab7fd7f5399f1?s=96&d=mm&r=g","caption":"Colonel (ret.) Bob Wilson"},"description":"Bob Wilson is a retired Army Special Forces Colonel with over 26 years of service. Throughout his career, Bob commanded special operations troops in combat in Afghanistan, and led U.S. special operations forces in Central Asia, Africa and Latin America. Additionally, Bob served as the Military Assistant to the Secretary of the Army, the Honorable John McHugh. He also served in the White House as a Director for Counterterrorism in the National Security Council.","url":"https://www.justsecurity.org/author/wilsonbob/"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//secure.gravatar.com' /> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='dns-prefetch' href='//use.fontawesome.com' /> <link rel='dns-prefetch' href='//v0.wordpress.com' /> <link rel='dns-prefetch' href='//i0.wp.com' /> <link rel="alternate" type="application/rss+xml" title="Just Security » Feed" href="https://www.justsecurity.org/feed/" /> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.2 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-C8GWL90XNK" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript"> var mi_version = '9.2.2'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/www.justsecurity.org\/74068\/pentagon-moves-undermine-counterterrorism-strategy\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-C8GWL90XNK', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-C8GWL90XNK', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.justsecurity.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=949a533b99c553f1c91109435e76337f"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='remodal-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='remodal-default-theme-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal-default-theme.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <link rel='stylesheet' id='wpgmza-marker-library-dialog-css' href='https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/css/marker-library-dialog.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://www.justsecurity.org/wp-includes/css/dist/block-library/style.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <link rel='stylesheet' id='mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://www.justsecurity.org/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=949a533b99c553f1c91109435e76337f' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ds-google-pt-serif-font-css' href='https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&family=Roboto:ital,wght@0,300;0,400;0,500;0,700;1,300;1,400;1,700;1,900&display=swap' type='text/css' media='all' /> <link rel='stylesheet' id='ds-main-styles-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/style.css?ver=1728684854' type='text/css' media='all' /> <link rel='stylesheet' id='ds-custom-scrollbar-css-css' href='https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='searchwp-forms-css' href='https://www.justsecurity.org/wp-content/plugins/searchwp/assets/css/frontend/search-forms.css?ver=4.3.17' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-official-css' href='https://use.fontawesome.com/releases/v5.15.3/css/all.css' type='text/css' media='all' integrity="sha384-SZXxX4whJ79/gErwcOYf+zWLeJdY/qpuqC4cAa9rOGUstPomtqpuNWT9wdPEn2fk" crossorigin="anonymous" /> <link rel='stylesheet' id='font-awesome-official-v4shim-css' href='https://use.fontawesome.com/releases/v5.15.3/css/v4-shims.css' type='text/css' media='all' integrity="sha384-C2B+KlPW+WkR0Ld9loR1x3cXp7asA0iGVodhCoJ4hwrWm/d9qKS59BGisq+2Y0/D" crossorigin="anonymous" /> <style id='font-awesome-official-v4shim-inline-css' type='text/css'> @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-brands-400.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-solid-900.svg#fontawesome") format("svg"); } @font-face { font-family: "FontAwesome"; font-display: block; src: url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.eot?#iefix") format("embedded-opentype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff2") format("woff2"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.woff") format("woff"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.ttf") format("truetype"), url("https://use.fontawesome.com/releases/v5.15.3/webfonts/fa-regular-400.svg#fontawesome") format("svg"); unicode-range: U+F004-F005,U+F007,U+F017,U+F022,U+F024,U+F02E,U+F03E,U+F044,U+F057-F059,U+F06E,U+F070,U+F075,U+F07B-F07C,U+F080,U+F086,U+F089,U+F094,U+F09D,U+F0A0,U+F0A4-F0A7,U+F0C5,U+F0C7-F0C8,U+F0E0,U+F0EB,U+F0F3,U+F0F8,U+F0FE,U+F111,U+F118-F11A,U+F11C,U+F133,U+F144,U+F146,U+F14A,U+F14D-F14E,U+F150-F152,U+F15B-F15C,U+F164-F165,U+F185-F186,U+F191-F192,U+F1AD,U+F1C1-F1C9,U+F1CD,U+F1D8,U+F1E3,U+F1EA,U+F1F6,U+F1F9,U+F20A,U+F247-F249,U+F24D,U+F254-F25B,U+F25D,U+F267,U+F271-F274,U+F279,U+F28B,U+F28D,U+F2B5-F2B6,U+F2B9,U+F2BB,U+F2BD,U+F2C1-F2C2,U+F2D0,U+F2D2,U+F2DC,U+F2ED,U+F328,U+F358-F35B,U+F3A5,U+F3D1,U+F410,U+F4AD; } </style> <link rel='stylesheet' id='sharedaddy-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/modules/sharedaddy/sharing.css?ver=14.0' type='text/css' media='all' /> <link rel='stylesheet' id='social-logos-css' href='https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=14.0' type='text/css' media='all' /> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps-pro/lib/remodal.min.js?ver=949a533b99c553f1c91109435e76337f" id="remodal-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/google-analytics-for-wordpress/assets/js/frontend-gtag.min.js?ver=9.2.2" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[]","home_url":"https:\/\/www.justsecurity.org","hash_tracking":"false","v4_id":"G-C8GWL90XNK"};/* ]]> */ </script> <script type="text/javascript" id="wpgmza_data-js-extra"> /* <![CDATA[ */ var wpgmza_google_api_status = {"message":"Engine is not google-maps","code":"ENGINE_NOT_GOOGLE_MAPS"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/wp-google-maps/wpgmza_data.js?ver=949a533b99c553f1c91109435e76337f" id="wpgmza_data-js"></script> <link rel="https://api.w.org/" href="https://www.justsecurity.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.justsecurity.org/wp-json/wp/v2/posts/74068" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.justsecurity.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://wp.me/p5gGh3-jgE' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F74068%2Fpentagon-moves-undermine-counterterrorism-strategy%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.justsecurity.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.justsecurity.org%2F74068%2Fpentagon-moves-undermine-counterterrorism-strategy%2F&format=xml" /> <link type="text/css" rel="stylesheet" href="https://www.justsecurity.org/wp-content/plugins/js-pull-quote/css/simple-pull-quote.css" /> <!-- Stream WordPress user activity plugin v4.0.2 --> <style>img#wpstats{display:none}</style> <style> @media (max-width: 1180px) { #masthead .menu-wrap { display:none; } #masthead .social-wrap a.search-icon, #masthead .social-wrap a.menu-toggle { display:block; } } </style><link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=32%2C32&ssl=1" sizes="32x32" /> <link rel="icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=192%2C192&ssl=1" sizes="192x192" /> <link rel="apple-touch-icon" href="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=180%2C180&ssl=1" /> <meta name="msapplication-TileImage" content="https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/cropped-logo_dome_fav.png?fit=270%2C270&ssl=1" /> </head> <body class="post-template-default single single-post postid-74068 single-format-standard"> <a href="#primary" class="skip" role="link">Skip to content</a> <div id="page-wrap" class="clearfix"> <div class="site-name">Justsecurity.org</div><header id="masthead" class="clearfix" role="banner"><a href="https://www.justsecurity.org" id="site-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><nav class="menu-wrap clearfix" role="navigation"><div class="menu-main-menu-container"><ul id="menu-main-menu" class="sm"><li id="menu-item-76321" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-76321"><a href="https://www.justsecurity.org/about-us/">About Us</a> <ul class="sub-menu"> <li id="menu-item-104167" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104167"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li id="menu-item-104168" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104168"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li id="menu-item-49070" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-49070"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li id="menu-item-76337" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-76337"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li id="menu-item-97911" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-97911"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Work With Us</a></li> <li id="menu-item-79333" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79333"><a href="https://www.justsecurity.org/about-us/">More About Us</a></li> </ul> </li> <li id="menu-item-76322" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-76322"><a href="#">Key Topics</a> <ul class="sub-menu"> <li id="menu-item-94073" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-94073"><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li> <li id="menu-item-84707" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-84707"><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li> <li id="menu-item-76323" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76323"><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li> <li id="menu-item-76324" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76324"><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li> <li id="menu-item-84709" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84709"><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li> <li id="menu-item-82357" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82357"><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li> <li id="menu-item-76328" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76328"><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li> <li id="menu-item-84711" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84711"><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li> <li id="menu-item-76331" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76331"><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li> <li id="menu-item-76543" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76543"><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li> <li id="menu-item-76329" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76329"><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li> <li id="menu-item-91476" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-91476"><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li> <li id="menu-item-82359" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-82359"><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li> <li id="menu-item-76332" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76332"><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li> <li id="menu-item-76333" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76333"><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li> <li id="menu-item-76334" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76334"><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li> <li id="menu-item-82541" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82541"><a href="https://www.justsecurity.org/82513/just-securitys-russia-ukraine-war-archive">Russia-Ukraine War</a></li> <li id="menu-item-84713" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-84713"><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li> <li id="menu-item-76335" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76335"><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li> <li id="menu-item-76540" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76540"><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li> <li id="menu-item-76330" class="menu-item menu-item-type-taxonomy menu-item-object-post_tag menu-item-76330"><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li> </ul> </li> <li id="menu-item-50783" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-50783"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Us</a></li> <li id="menu-item-83988" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-83988"><a href="https://www.buzzsprout.com/2074610">Podcast</a></li> </ul></div><a href="#" class="search-icon"><i class="fa fa-search" aria-hidden="true"></i></a></nav><div class="social-wrap clearfix"><a href="https://www.youtube.com/@JustSecurityForum" class="social" target="_blank"> <i class="fa fa-youtube" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on YouTube</span> </a><a href="https://twitter.com/Just_Security" class="social" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a><a href="https://www.facebook.com/JSBlog/" class="social" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a><a href="https://www.linkedin.com/company/just-security-linkedin/" class="social" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a><a href="https://www.givecampus.com/campaigns/21763/donations/new?designation=justsecurity" class="button green">Donate</a><a href="#" class="search-icon"> <i class="fa fa-search" aria-hidden="true"></i> <span class="screen-reader-text">Open the search tool</span> </a><a href="#" class="menu-toggle"> <i class="fa fa-bars" aria-hidden="true"></i> <span class="screen-reader-text">Open the main navigation</span> </a></div><div id="search-drop"><div class="form-wrap"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </div></div><div id="mobile-nav-drop"><div class="inner"><a href="#" class="close"><i class="fa fa-times" aria-hidden="true"></i></a><a href="https://www.justsecurity.org" class="mobile-menu-logo"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/white-logo.png" alt="A Forum on Law, Rights, and U.S. National Security" /></a><div class="menu"><ul> <li class="page_item page-item-97906"><a href="https://www.justsecurity.org/2025-26-postgraduate-law-fellows/">Come Join <i>Just Security</i>! 2025-26 Postgraduate Legal Fellow Positions</a></li> <li class="page_item page-item-75155"><a href="https://www.justsecurity.org/records-obtained-via-goodman-v-department-of-defense/">Records obtained via Goodman v. Department of Defense </a></li> <li class="page_item page-item-47833"><a href="https://www.justsecurity.org/main-archive/">Key Topics</a></li> <li class="page_item page-item-76521"><a href="https://www.justsecurity.org/search-results/">Search Results</a></li> <li class="page_item page-item-76522"><a href="https://www.justsecurity.org/author-search/">Author Search</a></li> <li class="page_item page-item-76531"><a href="https://www.justsecurity.org/masthead/">Masthead</a></li> <li class="page_item page-item-66815"><a href="https://www.justsecurity.org/advisory-board/">Advisory Board</a></li> <li class="page_item page-item-47828"><a href="https://www.justsecurity.org/guest-authors-2/">Guest Authors</a></li> <li class="page_item page-item-47818"><a href="https://www.justsecurity.org/submissions-style-guide/">Write for Just Security</a></li> <li class="page_item page-item-61915"><a href="https://www.justsecurity.org/trump-russia-timeline/">The Trump-Russia-Ukraine Timeline</a></li> <li class="page_item page-item-47830"><a href="https://www.justsecurity.org/the-pipeline/">Upcoming Events</a></li> <li class="page_item page-item-62780"><a href="https://www.justsecurity.org/updates-trump-russia-timeline/">Updates to The Trump-Russia Timeline</a></li> <li class="page_item page-item-52075"><a href="https://www.justsecurity.org/deep-dives/">Deep Dives</a></li> <li class="page_item page-item-52444"><a href="https://www.justsecurity.org/microsoft-ireland-symposium/">Microsoft Ireland Symposium</a></li> <li class="page_item page-item-49225"><a href="https://www.justsecurity.org/acting-dod-general-counsel-william-s-castles-speech-aumfs-global-war-terrorism/">Acting DOD General Counsel William S. Castle’s Speech on AUMFs in the “Global War on Terrorism”</a></li> <li class="page_item page-item-51186"><a href="https://www.justsecurity.org/glenn-simpson-fusion-gps/">Transcript: Glenn Simpson Fusion GPS Testimony House Intelligence Committee</a></li> <li class="page_item page-item-4"><a href="https://www.justsecurity.org/privacy/">Privacy</a></li> <li class="page_item page-item-47829"><a href="https://www.justsecurity.org/home-page/">Home Page</a></li> <li class="page_item page-item-5"><a href="https://www.justsecurity.org/terms/">Terms</a></li> <li class="page_item page-item-34570"><a href="https://www.justsecurity.org/donation-confirmation/">Donation Confirmation</a></li> <li class="page_item page-item-34571"><a href="https://www.justsecurity.org/transaction-failed/">Transaction Failed</a></li> <li class="page_item page-item-34572"><a href="https://www.justsecurity.org/donation-history/">Donation History</a></li> <li class="page_item page-item-37408"><a href="https://www.justsecurity.org/modern-surveillance-trump-administration/">Modern Surveillance Under the Trump Administration</a></li> <li class="page_item page-item-36664"><a href="https://www.justsecurity.org/norms-watch-inbox/">Get Norms Watch in Your Inbox</a></li> <li class="page_item page-item-1083"><a href="https://www.justsecurity.org/contact/">Contact Us</a></li> <li class="page_item page-item-43595"><a href="https://www.justsecurity.org/federal-prosecutor-dissects-kushners-statement/">A Former Federal Prosecutor Dissects Kushner’s Statement</a></li> <li class="page_item page-item-1885"><a href="https://www.justsecurity.org/recap-guide-weeks-posts-security-oct-4-oct-11/">Recap: A Guide to the Past Week’s Posts on Just Security (Oct. 4-Oct.11)</a></li> <li class="page_item page-item-35680"><a href="https://www.justsecurity.org/httpswww-justsecurity-orgabout-us/">https://www.justsecurity.org/about-us/</a></li> <li class="page_item page-item-97"><a href="https://www.justsecurity.org/editors-pickshot-battlefield-areas-of-active-hostilities/">Editors’ Picks</a></li> <li class="page_item page-item-30826"><a href="https://www.justsecurity.org/dod-report-oct-2015-airstrike-medecins-sans-frontieres-hospital-kunduz-afghanistan/">DOD Report on the Oct. 2015 Airstrike on Médecins Sans Frontières Hospital in Kunduz, Afghanistan</a></li> <li class="page_item page-item-108"><a href="https://www.justsecurity.org/books-written/">Books We’ve Written</a></li> <li class="page_item page-item-45429"><a href="https://www.justsecurity.org/rfi-interview-hiftar/">RFI Interview on Hiftar</a></li> <li class="page_item page-item-128 page_item_has_children"><a href="https://www.justsecurity.org/books-read/">Books We’ve Read</a> <ul class='children'> <li class="page_item page-item-533"><a href="https://www.justsecurity.org/books-read/book-synopsis-knife/">Book Synopsis: The Way of the Knife</a></li> <li class="page_item page-item-555"><a href="https://www.justsecurity.org/books-read/book-synopsis-governing-lethal-behavior-autonomous-robots/">Book Synopsis: Governing Lethal Behavior in Autonomous Robots</a></li> <li class="page_item page-item-47"><a href="https://www.justsecurity.org/books-read/book-synopsis-kill-capture-war-terror-soul-obama-presidency/">Book Synopsis: Kill or Capture</a></li> <li class="page_item page-item-1598"><a href="https://www.justsecurity.org/books-read/lincolns-code/">Book Review — Lincoln’s Code: The Laws of War in American History</a></li> <li class="page_item page-item-333"><a href="https://www.justsecurity.org/books-read/books-synopsis-justice-cascade-rights-prosecutions-world-politics/">Books Synopsis: The Justice Cascade</a></li> <li class="page_item page-item-365"><a href="https://www.justsecurity.org/books-read/books-synopsis-terror-presidency-law-judgment-bush-administration/">Book Synopsis: The Terror Presidency</a></li> <li class="page_item page-item-4254"><a href="https://www.justsecurity.org/books-read/book-synopsis-cost-counterterrorism-power-politics-liberty/">Book Synopsis – The Cost of Counterterrorism: Power, Politics, and Liberty</a></li> <li class="page_item page-item-11755"><a href="https://www.justsecurity.org/books-read/book-synopsis-place-left-hide/">Book Synopsis: No Place Left to Hide</a></li> </ul> </li> <li class="page_item page-item-386 page_item_has_children"><a href="https://www.justsecurity.org/editors-picks/">Editors’ Picks: Reading Lists</a> <ul class='children'> <li class="page_item page-item-9526"><a href="https://www.justsecurity.org/editors-picks/regulation-risks-cryptocurrency/">Editors’ Picks: The Regulation and Risks of Cryptocurrency</a></li> <li class="page_item page-item-852"><a href="https://www.justsecurity.org/editors-picks/executive-power-counterterrorism-policy/">Editors’ Picks: Executive Power & Counterterrorism Policy</a></li> <li class="page_item page-item-2146"><a href="https://www.justsecurity.org/editors-picks/power-detain/">Editors’ Picks: The Power to Detain</a></li> <li class="page_item page-item-394"><a href="https://www.justsecurity.org/editors-picks/areas-active-hostilities/">Editors’ Picks: Hot Battlefields and Areas of Active Hostilities</a></li> <li class="page_item page-item-9454"><a href="https://www.justsecurity.org/editors-picks/international-human-law-privacy-and-surveillance/">Editors’ Picks: International Human Right Law on Privacy (and Surveillance)</a></li> </ul> </li> <li class="page_item page-item-5257"><a href="https://www.justsecurity.org/recaps-archive/">Recaps Archive</a></li> <li class="page_item page-item-13962"><a href="https://www.justsecurity.org/book-synopsis-terror-courts/">Book Synopsis – The Terror Courts</a></li> <li class="page_item page-item-2449"><a href="https://www.justsecurity.org/recap-mid-week-guide-posts-security-oct-19-23/">Recap: A Mid-Week Guide to Posts on Just Security (Oct. 19-23)</a></li> <li class="page_item page-item-2710"><a href="https://www.justsecurity.org/early-edition-signup/">Signups for A.M. and P.M. Emails</a></li> <li class="page_item page-item-46495"><a href="https://www.justsecurity.org/asil-live-webcast-international-law-trump-administration-force-international-law/">ASIL Live Webcast: “International Law and the Trump Administration: The Use of Force Under International Law”</a></li> <li class="page_item page-item-33442"><a href="https://www.justsecurity.org/securitys-three-year-anniversary-event-state-secrets-whistleblowers-drone-memos/">National Security and Transparency in this Administration and the Next</a></li> <li class="page_item page-item-437"><a href="https://www.justsecurity.org/about-us/">About Us</a></li> <li class="page_item page-item-37819"><a href="https://www.justsecurity.org/excerpts-stephen-miller-interviews-meet-press-fox-news-sunday/">Excerpts of Stephen Miller Interviews on Meet the Press and Fox News Sunday</a></li> <li class="page_item page-item-42944"><a href="https://www.justsecurity.org/conversation-david-cole-authoritarianism-prevent/">David Cole on Stopping Authoritarianism’s Rise in the United States</a></li> <li class="page_item page-item-37578"><a href="https://www.justsecurity.org/call-papers-revisiting-role-international-law-national-security-workshop/">Workshop and Call for Papers: Revisiting the Role of International Law in National Security</a></li> <li class="page_item page-item-16331"><a href="https://www.justsecurity.org/surveille-scoring-methodology/">SURVEILLE Scoring Methodology</a></li> <li class="page_item page-item-2771"><a href="https://www.justsecurity.org/early-edition-email-signup/">Email Signups</a></li> <li class="page_item page-item-6362"><a href="https://www.justsecurity.org/security-reader-survey/">Just Security Reader Survey</a></li> <li class="page_item page-item-37619"><a href="https://www.justsecurity.org/securitys-coverage-immigration-refugee-executive-order/">Just Security’s Coverage of Immigration and Refugee Executive Order</a></li> <li class="page_item page-item-35062"><a href="https://www.justsecurity.org/donate/">Donate</a></li> <li class="page_item page-item-47831"><a href="https://www.justsecurity.org/early-edition/">Early Edition</a></li> <li class="page_item page-item-47832"><a href="https://www.justsecurity.org/weekend-edition/">Norms Watch</a></li> <li class="page_item page-item-47827"><a href="https://www.justsecurity.org/early-edition-email-signup-2/">Email Signup</a></li> </ul></div> </div></div></header><div id="content-wrap" class="clearfix"><div id="post-hero" class="clearfix" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/01/miller-e1609854514948.jpeg?fit=6048%2C2494&ssl=1); background-position:center center;"> <div class="overlay"></div> <div class="pagewidth pw1400"> <div class="title-wrap"> <h1>Pentagon Moves Undermine Counterterrorism Strategy </h1> </div> </div> </div><div class="columns-wrap pagewidth pw1400 clearfix"><div id="secondary-left" class="secondary"><p class="authors">by <a href="https://www.justsecurity.org/author/castellimatt/" title="Profile and articles by Matt Castelli" class="author url fn" rel="author">Matt Castelli</a> and <a href="https://www.justsecurity.org/author/wilsonbob/" title="Profile and articles by Colonel (ret.) Bob Wilson" class="author url fn" rel="author">Colonel (ret.) Bob Wilson</a></p><p class="date">January 5, 2021</p><div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-twitter"><a rel="nofollow noopener noreferrer" data-shared="sharing-twitter-74068" class="share-twitter sd-button share-icon no-text" href="https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/?share=twitter" target="_blank" title="Click to share on Twitter" ><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow noopener noreferrer" data-shared="sharing-facebook-74068" class="share-facebook sd-button share-icon no-text" href="https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/?share=facebook" target="_blank" title="Click to share on Facebook" ><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow noopener noreferrer" data-shared="sharing-linkedin-74068" class="share-linkedin sd-button share-icon no-text" href="https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/?share=linkedin" target="_blank" title="Click to share on LinkedIn" ><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-reddit"><a rel="nofollow noopener noreferrer" data-shared="" class="share-reddit sd-button share-icon no-text" href="https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/?share=reddit" target="_blank" title="Click to share on Reddit" ><span></span><span class="sharing-screen-reader-text">Click to share on Reddit (Opens in new window)</span></a></li><li class="share-print"><a rel="nofollow noopener noreferrer" data-shared="" class="share-print sd-button share-icon no-text" href="https://www.justsecurity.org/74068/pentagon-moves-undermine-counterterrorism-strategy/#print" target="_blank" title="Click to print" ><span></span><span class="sharing-screen-reader-text">Click to print (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/afghanistan/" rel="tag">Afghanistan</a>, <a href="https://www.justsecurity.org/tag/combat-troops/" rel="tag">combat troops</a>, <a href="https://www.justsecurity.org/tag/counterterrorism/" rel="tag">Counterterrorism</a>, <a href="https://www.justsecurity.org/tag/department-of-defense/" rel="tag">Department of Defense (DoD)</a>, <a href="https://www.justsecurity.org/tag/iraq/" rel="tag">Iraq</a>, <a href="https://www.justsecurity.org/tag/isis/" rel="tag">ISIS</a>, <a href="https://www.justsecurity.org/tag/pentagon/" rel="tag">Pentagon</a>, <a href="https://www.justsecurity.org/tag/somalia/" rel="tag">Somalia</a></p></div></div><main id="primary" tabindex="-1" class="content-body clearfix" role="main"><article class="client-ui clearfix"><div class="print-authors"><p class="authors">by <a href="https://www.justsecurity.org/author/castellimatt/" title="Profile and articles by Matt Castelli" class="author url fn" rel="author">Matt Castelli</a> and <a href="https://www.justsecurity.org/author/wilsonbob/" title="Profile and articles by Colonel (ret.) Bob Wilson" class="author url fn" rel="author">Colonel (ret.) Bob Wilson</a></p><p class="date">January 5, 2021</p></div><p>Chris Miller should know better.</p> <p>Before serving as acting defense secretary, he was the recent head of the National Counterterrorism Center and former special assistant to the president and senior director for counterterrorism at the National Security Council (NSC). Given this, counterterrorism strategy and objectives should be strong guiding principles for Miller in his new role leading the Pentagon. But the precipitous withdrawal of U.S. troops from <a href="https://www.washingtonpost.com/national-security/trump-afghan-war-troop-cuts/2020/11/16/6cc2655c-2827-11eb-b847-66c66ace1afb_story.html">Afghanistan, Iraq</a>, and <a href="https://www.washingtonpost.com/national-security/2020/12/04/trump-somalia-pullout/">Somalia</a>, plus the <a href="https://www.cnn.com/2020/12/10/politics/pentagon-cia-counterterrorism/index.html">breach of partnership with the CIA</a> that he is now directing in the 11<sup>th</sup> hour of President Donald Trump’s administration, risk serious harm to hard-fought counterterrorism gains and American safety. With these recent moves, Miller appears to be disregarding important lessons about terrorists’ resilience and the value of partnerships when conducting counterterrorism, while embracing a politically expedient but strategically nonsensical notion of “ending forever wars” to appease the president during his final weeks in office.</p> <p>Miller’s <a href="https://media.defense.gov/2020/Nov/14/2002535407/-1/-1/0/INITIAL-MESSAGE-TO-THE-DEPARTMENT.PDF?source=GovDelivery">missive to Department of Defense (DOD) employees</a>, in which he set the stage for these moves, contained a critical contradiction as he claimed that the United States is “on the verge of defeating al-Qa’ida” and noted the need to avoid “our past strategic error of failing to see the fight through to the finish,” while also making the audacious statement that “Now, it’s time to come home.”</p> <p>Miller is now orchestrating a simultaneous retreat from <u>all three</u> of the primary hotspots of jihadist terrorism. This is particularly shocking because while at the NSC, Miller oversaw the completion of a <a href="https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjg4r-F2pjtAhUPTDABHe7vDPIQFjACegQIChAC&url=https%3A%2F%2Fwww.whitehouse.gov%2Fwp-content%2Fuploads%2F2018%2F10%2FNSCT.pdf&usg=AOvVaw0Sh7mISY9bSbewDBPzVMac">new National Counterterrorism Strategy</a> in 2018 – a strategy whose vision runs at odds with these moves.</p> <p>We both helped draft the <a href="https://www.reuters.com/article/us-usa-extremism/exclusive-trump-counterterrorism-strategy-urges-allies-to-do-more-idUSKBN1812AN">initial version</a> of that document while at NSC as career detailees from DOD and CIA, our time bridging the Obama and Trump administrations, and drew from our own counterterrorism experiences in Afghanistan as we worked on it.</p> <p>While the final version of the Trump administration’s strategy was more of a kitchen sink-approach against all terrorism rather than a focused strategy against a defined enemy, it still contained new principles to guide U.S. counterterrorism efforts that reflected key lessons learned since September 11<sup>th</sup>, 2001.</p> <p>One of the most important lessons from the past two decades is how resilient jihadist terrorist organizations are. Following the initial U.S. invasion of Afghanistan, a displaced al-Qaeda regrouped in Pakistan and launched a <a href="https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjLjpCp25jtAhW6TDABHYK3Dm0QFjADegQIBRAC&url=https%3A%2F%2Fwww.rand.org%2Fcontent%2Fdam%2Frand%2Fpubs%2Ftestimonies%2FCT400%2FCT479%2FRAND_CT479.pdf&usg=AOvVaw0_Zds-xMrcwOfDDO2eCjoz">second wave</a> of transnational plots against the U.S. homeland and Europe in the mid-2000s. <a href="https://www.washingtonpost.com/graphics/national/obama-legacy/rise-of-isis-terrorist-attacks.html">ISIS rose from the ashes of a dismantled al-Qaeda in Iraq</a> after the 2011 U.S. withdrawal, growing sectarian conflict in Iraq, and outbreak of civil war in Syria, to spread across the globe and conduct or inspire attacks in the United States and Europe.</p> <p>Jihadist terrorists have consistently displayed their ability to reconstitute their capabilities as pressure against them has diminished.</p> <p>Relatedly, a key to success in preventing catastrophic attacks has been persistent pressure that denies jihadist terrorists freedom to plot and, instead, forces them to focus on their own safety and survival. Such persistent pressure requires proximity to the enemy, not just for the application of force but also for the fidelity of intelligence collection on jihadist terrorist plans, intentions, capabilities, and locations.</p> <p>In many places – especially Afghanistan, Iraq, and Somalia – U.S. intelligence agencies and special operations forces cannot operate without the force protection and casualty evacuation (CASEVAC) support of the U.S. military — support and partnership that Miller is now threatening to cut.</p> <p>Perhaps the most crucial lesson Miller betrays is the critical importance of partnerships. Working by, with, and through international and local partner forces has been the greatest evolution in counterterrorism effectiveness and equity of effort against shared threats. But the haste of this drawdown has <a href="https://www.defensenews.com/global/europe/2020/11/17/german-defense-leaders-have-feelers-out-on-sudden-us-withdrawal-from-afghanistan/">left our most important partners and allies in the dark</a>, further eroding trust and confidence in the United States. This comes on the heels of Trump’s reckless withdrawal of U.S. forces in Syria in 2019, which <a href="https://www.washingtonpost.com/world/national-security/i-cant-even-look-at-the-atrocities-us-troops-say-trumps-syria-withdrawal-betrayed-an-ally/2019/10/15/4e79b600-eeca-11e9-b648-76bcf86eb67e_story.html">betrayed the Kurds, one of our most important partners in the fight against ISIS</a>, leaving them to be slaughtered by Turkish forces.</p> <p>Indeed, one of the top objectives of the 2018 Counterterrorism strategy is for partners to take a greater role in addressing terrorist threats, but if none of our allies and partners can trust the United States to stay in the fight with them, how can we ever expect them to join us in future conflicts or take on more responsibility against jihadist terrorists?</p> <p>A fundamental problem underlying these recent moves is Trump’s framing of current U.S. military deployments of any size as part of “forever” wars, a politically convenient red herring that allows Trump to withdraw from the world while shirking responsibility for protecting the vital U.S. national security interests outlined in his own counterterrorism strategy. To be sure, use of this framing has been bipartisan across administrations, and U.S. counterterrorism successes have often been overshadowed by broader counterinsurgency and nation-building efforts that have been flailing unsuccessfully without clear and achievable objectives. But one of the strategic errors of our past has been thinking that the choice for the United States in these regions is binary, that it is all or nothing.</p> <p>There is a middle-ground strategy that preserves counterterrorism gains while retaining a U.S. force posture large enough to snuff out emergent threats before they materialize into something capable of striking the United States and the West. A small but enduring presence of U.S. and international forces in these vital locations, with the requisite intelligence enablers and logistics support, could give the United States and its partners the wherewithal to maintain pressure on al-Qaeda, ISIS, and other jihadist groups, and quickly stopping nascent threats before they amass the capacity for transnational attacks.</p> <p>The United States has already demonstrated that this model — of a low-key, special operations and intelligence platform — is effective in Somalia for over a decade. But there too, Trump is hastily withdrawing U.S. forces.</p> <p>The risk of not maintaining proximity to terrorism hotspots is that if the embers of al-Qaeda or ISIS reconstitute into the raging blaze we’ve seen before, intervention to extinguish the fire will be more costly in U.S. blood and treasure than if we had stayed and dealt with the sparks while they were small and manageable.</p> <p>“Counterterrorism Containment” is the best strategy to effectively transition to this next, sustainable phase of counterterrorism beyond the perpetual “War on Terror” and at the same time allow for a pivot of resources to threats like China and Russia. Making this transition will require an understanding and application of the lessons we’ve learned since 9/11, including the resilient nature of the enemy and the important role our partners must play in maintaining persistent pressure with U.S. support.</p> <p>Miller has failed to articulate a clear strategy for the scant number of troops that will remain in these locations. Although the incoming Biden administration could return troops to their pre-drawdown levels, we should not assume how quickly and easily thousands of U.S. troops can be redeployed. And if forcing Biden’s hand to “increase” troop levels is the motive for these moves – then shame upon Trump and Miller for using U.S. forces as partisan political pawns while imperiling our national security.</p> <p>So, instead of acquiescing to the whims of a lame-duck president and precipitously withdrawing thousands of troops from Afghanistan, Iraq, and Somalia, Acting Secretary of Defense Miller should insist upon maintaining sufficient capability in these regions to prevent the resurgence of terrorist threats. Miller’s tenure as Pentagon chief may indeed be brief, but if he continues on the current course, he will leave behind him an enduring legacy of harm to the security of the United States.</p> <p><em>The views expressed in this post are the authors’ own and do not reflect the views of their employers.</em></p> <h6><em>Image: Acting Defense Secretary Chris Miller announces cuts to U.S. troop levels in Afghanistan and Iraq during a briefing at the Pentagon, Nov. 17, 2020. Photo: U.S. Department of Defense</em></h6> <div class="icon-end-post"></div><div class="mobile-post-tags"><div class="post-tags"><h3>Filed under:</h3><p><a href="https://www.justsecurity.org/tag/afghanistan/" rel="tag">Afghanistan</a>, <a href="https://www.justsecurity.org/tag/combat-troops/" rel="tag">combat troops</a>, <a href="https://www.justsecurity.org/tag/counterterrorism/" rel="tag">Counterterrorism</a>, <a href="https://www.justsecurity.org/tag/department-of-defense/" rel="tag">Department of Defense (DoD)</a>, <a href="https://www.justsecurity.org/tag/iraq/" rel="tag">Iraq</a>, <a href="https://www.justsecurity.org/tag/isis/" rel="tag">ISIS</a>, <a href="https://www.justsecurity.org/tag/pentagon/" rel="tag">Pentagon</a>, <a href="https://www.justsecurity.org/tag/somalia/" rel="tag">Somalia</a></p></div></div></article></main><div id="secondary-right" class="secondary" role="complementary"><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">Signups for A.M. & P.M. Emails</a><aside id="search-3" class="widget widget_search clearfix"> <form role="search" method="get" id="default-searchform" class="searchform" data-author-action="https://www.justsecurity.org/author-search/" data-default-action="https://www.justsecurity.org/search-results/" action="https://www.justsecurity.org/search-results/"> <span class="screen-reader-text"> Search for: </span> <input type="search" class="search-field" name="searchwp" placeholder="Search posts, authors, media..." value="" title="Search for:" /> <button type="submit" class="search-submit"><i class="fa fa-search" aria-hidden="true"></i></button> </form> <div class="advanced-search"> <input type="checkbox" autocomplete="off" id="author-search" /> Search authors only </div> </aside><div class="capitol-breaker"><h3 class="widget-title">Featured Articles</h3></div><aside id="js-scrolling-content-3" class="widget js-scrolling-content clearfix"><div class="flexible-content posts custom-scroll clearfix" style="height:450px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/105048/icc-arrest-warrants/">Nuts & Bolts of the International Criminal Court Arrest Warrants in the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105064/mapping-state-reactions-icc/">Mapping State Reactions to the ICC Warrants for Netanyahu and Gallant</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ingberrebecca/" title="Profile and articles by Rebecca Ingber" class="author url fn" rel="author">Rebecca Ingber</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/105019/trump-ukraine-policy-peace-talks/">To ‘End’ War in Ukraine, Trump Might Be Tougher on Putin Than Critics Think</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Nov 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104929/ukraine-biden-trump-missiles/">Biden’s Final Efforts on Ukraine — and Trump’s First Moves</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/frieddaniel/" title="Profile and articles by Ambassador Daniel Fried" class="author url fn" rel="author">Ambassador Daniel Fried</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104770/new-technology-atrocity-prevention/">Thinking Beyond Risks: A Symposium on Tech and Atrocity Prevention</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gwenadmin/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Nov 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104800/sanctions-effectiveness-models/">Do Sanctions Work? It Depends. Burma and the West Bank Might Be Models.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bradbrooksrubin/" title="Profile and articles by Brad Brooks-Rubin" class="author url fn" rel="author">Brad Brooks-Rubin</a></p> <p class="date">Nov 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104728/ukraine-constitution-conscientious-objectors/">As Ukraine Struggles for Troops, Its Constitutional Court Considers the Rights of Conscientious Objectors</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nekoliakandrii/" title="Profile and articles by Andrii Nekoliak" class="author url fn" rel="author">Andrii Nekoliak</a></p> <p class="date">Nov 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104676/american-ai-leadership-requires-support-open-source/">The United States Must Win The Global Open Source AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a> and <a href="https://www.justsecurity.org/author/woodleyballdean/" title="Profile and articles by Dean W. Ball" class="author url fn" rel="author">Dean W. Ball</a></p> <p class="date">Nov 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104622/journalist-in-exile-laments-kyrgyzstan-crackdown-now-extending-to-his-12-year-old-son/">Journalist in Exile Laments Kyrgyzstan Crackdown, Now Extending to His 12-Year-Old Son</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/temirovbolot/" title="Profile and articles by Bolot Temirov" class="author url fn" rel="author">Bolot Temirov</a></p> <p class="date">Nov 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104655/real-time-litigation-tracker-election/">Election 2024 Real-Time Litigation Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/vancejoyce/" title="Profile and articles by Joyce Vance" class="author url fn" rel="author">Joyce Vance</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a>, <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a> and <a href="https://www.justsecurity.org/author/geemadison/" title="Profile and articles by Madison Gee" class="author url fn" rel="author">Madison Gee</a></p> <p class="date">Nov 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104564/election-top-10-nov-4/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104448/older-people-human-rights-africa/">A Historic Day for Older People and Human Rights Across Africa</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mugabowishemaelie/" title="Profile and articles by Elie Mugabowishema" class="author url fn" rel="author">Elie Mugabowishema</a> and <a href="https://www.justsecurity.org/author/buchananjane/" title="Profile and articles by Jane Buchanan" class="author url fn" rel="author">Jane Buchanan</a></p> <p class="date">Nov 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104398/new-interpol-chief-abuses-reforms/">As Interpol Gets New Secretary General, What are the Risks of Abuses Over Reforms?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bromundted/" title="Profile and articles by Ted R. Bromund" class="author url fn" rel="author">Ted R. Bromund</a>, <a href="https://www.justsecurity.org/author/grossmansandra/" title="Profile and articles by Sandra Grossman" class="author url fn" rel="author">Sandra Grossman</a> and <a href="https://www.justsecurity.org/author/greenbergilan/" title="Profile and articles by Ilan Greenberg" class="author url fn" rel="author">Ilan Greenberg</a></p> <p class="date">Nov 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104416/congress-protect-americans-transnational-repression/">Congress Should Protect Americans from Transnational Repression</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ahmedrasheed/" title="Profile and articles by Rasheed Ahmed" class="author url fn" rel="author">Rasheed Ahmed</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon’s Plan to Protect Civilians Living up to its Promises?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104393/election-top-10-oct-29/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104407/authoritarianism-plutocracy-press-freedom/">Rising Authoritarianism and Plutocracy Are a Dangerous Mix for Press Freedom</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Oct 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104385/presumptive-privilege-trump-pence/">Does a “Presumptive” Privilege Protect President Trump from Prosecution for Pressuring Pence?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/alschuleralbert/" title="Profile and articles by Albert W. Alschuler" class="author url fn" rel="author">Albert W. Alschuler</a></p> <p class="date">Oct 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104255/frictionless-government-national-security-constitution/">Frictionless Government and the National Security Constitution</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/deeksashley/" title="Profile and articles by Ashley Deeks" class="author url fn" rel="author">Ashley Deeks</a> and <a href="https://www.justsecurity.org/author/eichensehrkristen/" title="Profile and articles by Kristen Eichensehr" class="author url fn" rel="author">Kristen Eichensehr</a></p> <p class="date">Oct 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104348/israel-strikes-against-iran/">Making Sense of International Law in Light of Israel and Iran’s Latest Round of “Retaliation”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lieblicheliav/" title="Profile and articles by Eliav Lieblich" class="author url fn" rel="author">Eliav Lieblich</a></p> <p class="date">Oct 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104334/washington-post-endorsement-bezos/">On Dictatorship and Self-Censorship: Lessons the Owner of a Sudanese Newspaper Could Give Jeff Bezos</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104242/memorandum-ai-national-security/">The U.S. National Security Memorandum on AI: Leading Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Oct 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104206/fair-fast-asylum-processing-switzerland/">Fair and Fast Asylum Processing: Lessons from Switzerland</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ghezelbashdaniel/" title="Profile and articles by Daniel Ghezelbash" class="author url fn" rel="author">Daniel Ghezelbash</a> and <a href="https://www.justsecurity.org/author/hruschkaconstantin/" title="Profile and articles by Constantin Hruschka" class="author url fn" rel="author">Constantin Hruschka</a></p> <p class="date">Oct 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104174/election-top-10-oct-23/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104130/rule-of-law-index-2024/">Rule of Law Index Shows Some Rays of Hope Amidst Continuing Global Recession</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andersenelizabeth/" title="Profile and articles by Elizabeth Andersen" class="author url fn" rel="author">Elizabeth Andersen</a> and <a href="https://www.justsecurity.org/author/evangelidesalicia/" title="Profile and articles by Alicia Evangelides" class="author url fn" rel="author">Alicia Evangelides</a></p> <p class="date">Oct 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/104036/heat-map-january-6th-defendants-2/">Heat Map of January 6th Defendants Across the United States</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103956/proud-boys-threat-assessment/">Proud Boys Threat Assessment: From the Planning of January 6th to Future Scenarios</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Oct 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103773/top-10-election-litigation/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103743/lifting-russia-sanctions/">Lifting Russia Sanctions – What Can a President Do Unilaterally?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/markustaisa/" title="Profile and articles by Taisa Markus" class="author url fn" rel="author">Taisa Markus</a></p> <p class="date">Oct 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103918/jack-goldsmith-jack-smith-explanation/">Refuting the Latest Baseless Attacks Against Special Counsel Jack Smith</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Oct 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103838/un-future-summit-can-teach/">What the UN’s Summit of the Future Can Teach Us – When the Dust Settles</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/streetjordan/" title="Profile and articles by Jordan Street" class="author url fn" rel="author">Jordan Street</a></p> <p class="date">Oct 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103818/scenario-planning-january-6th/">The “War Game” Documentary, and Simulating a Worse January 6th</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Oct 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103777/maintaining-the-rule-of-law-in-the-age-of-ai/">Maintaining the Rule of Law in the Age of AI</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/szilagyikatie/" title="Profile and articles by Katie Szilagyi" class="author url fn" rel="author">Katie Szilagyi</a></p> <p class="date">Oct 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103478/2024-election-litigation-top-10/">Top 10 Election Litigation Cases in 2024 Implicating the Rule of Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103317/shattering-illusions-how-cyber-threat-intelligence-augments-legal-action-against-russias-influence-operations/">Shattering Illusions: How Cyber Threat Intelligence Augments Legal Action against Russia’s Influence Operations</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kruschmasonw/" title="Profile and articles by Mason W. Krusch" class="author url fn" rel="author">Mason W. Krusch</a></p> <p class="date">Oct 8th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103464/beyond-law-reaffirming-the-centrality-of-ethics-in-war/">Beyond Law: Reaffirming the Centrality of Ethics in War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/schwarzelke/" title="Profile and articles by Elke Schwarz" class="author url fn" rel="author">Elke Schwarz</a> and <a href="https://www.justsecurity.org/author/renicneil/" title="Profile and articles by Neil Renic" class="author url fn" rel="author">Neil Renic</a></p> <p class="date">Oct 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103533/whos-who-jack-smith-immunity-brief/">Who’s Who in Jack Smith’s Immunity Brief</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103433/unlawful-private-militias-government-response/">The Threat from Unlawful Private Militias Has Evolved. The Federal Government’s Response Must Evolve Too.</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a> and <a href="https://www.justsecurity.org/author/glickjacob/" title="Profile and articles by Jacob Glick" class="author url fn" rel="author">Jacob Glick</a></p> <p class="date">Oct 4th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103406/iran-israel-escalation/">Threats and Response Options in the Escalating Israel-Iran Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103380/un-future-pact-reform/">The UN’s New Pact for the Future: A Milestone That Can Set a Path for Change</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ponziorichard/" title="Profile and articles by Richard Ponzio" class="author url fn" rel="author">Richard Ponzio</a></p> <p class="date">Oct 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103339/artificial-intelligence-at-2024-united-nations/">AI at UNGA79: Recapping Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/88039/trumps-legal-and-political-calendar-all-the-dates-you-need-to-know/">Master Calendar of Trump Court Dates: Criminal and Civil Cases</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Oct 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103200/state-department-reform-commission/">The State Department Reform Commission: A Once in A Generation Opportunity to Reform American Diplomacy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/spokojnydan/" title="Profile and articles by Dan Spokojny" class="author url fn" rel="author">Dan Spokojny</a></p> <p class="date">Sep 30th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103265/analysis-iran-2024-election-interference-indictment/">Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment </a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aarondavid/" title="Profile and articles by David Aaron" class="author url fn" rel="author">David Aaron</a></p> <p class="date">Sep 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103164/usaid-digital-policy-conflict-peacebuilding/">The Next Step for USAID’s New Digital Policy: Account for Conflict Risks and Include Peacebuilding</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/guintaclaire/" title="Profile and articles by Claire Guinta" class="author url fn" rel="author">Claire Guinta</a> and <a href="https://www.justsecurity.org/author/zuroskinick/" title="Profile and articles by Nick Zuroski" class="author url fn" rel="author">Nick Zuroski</a></p> <p class="date">Sep 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/103184/amended-protocol-booby-traps-pagers/">Article 7(2) of Amended Protocol II on Conventional Weapons and the Lebanon Pager Explosions</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100374/ukraine-us-public-support-election/">Will US Public Support for Ukraine Aid Survive the Presidential Campaign?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mironrobert/" title="Profile and articles by Robert Miron" class="author url fn" rel="author">Robert Miron</a> and <a href="https://www.justsecurity.org/author/feaver-peter/" title="Profile and articles by Peter Feaver" class="author url fn" rel="author">Peter Feaver</a></p> <p class="date">Sep 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100333/rethinking-united-nations-cybercrime-treaty/">Rethinking the United Nations Cybercrime Treaty</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pielemeierjason/" title="Profile and articles by Jason Pielemeier" class="author url fn" rel="author">Jason Pielemeier</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100172/why-criminalize-ecocide-experts/">Why Criminalize Ecocide? Experts Weigh In</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hamiltonrebecca/" title="Profile and articles by Rebecca Hamilton" class="author url fn" rel="author">Rebecca Hamilton</a></p> <p class="date">Sep 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100265/musk-trump-legal-boundaries/">Musk, X, and Trump 2024: Where are the Legal and Ethical Boundaries?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/jacksondean/" title="Profile and articles by Dean Jackson" class="author url fn" rel="author">Dean Jackson</a></p> <p class="date">Sep 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100259/u-n-general-assembly-high-level-week-2024-what-experts-are-looking-for/">U.N. General Assembly High-Level Week 2024 : What Experts Are Looking For</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100195/a-2024-election-litigation-hot-list/">A 2024 Election Litigation Hot List</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a>, <a href="https://www.justsecurity.org/author/angelsamara/" title="Profile and articles by Samara Angel" class="author url fn" rel="author">Samara Angel</a> and <a href="https://www.justsecurity.org/author/booneclare/" title="Profile and articles by Clare Boone" class="author url fn" rel="author">Clare Boone</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100193/law-war-exploding-pagers-lebanon/">Law of War Questions Raised by Exploding Pagers in Lebanon</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Sep 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100130/competition-not-control-is-key-to-winning-the-global-ai-race/">Competition, Not Control, is Key to Winning the Global AI Race</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mittelsteadtmatthew/" title="Profile and articles by Matthew Mittelsteadt" class="author url fn" rel="author">Matthew Mittelsteadt</a> and <a href="https://www.justsecurity.org/author/mcbridekeegan/" title="Profile and articles by Keegan McBride" class="author url fn" rel="author">Keegan McBride</a></p> <p class="date">Sep 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97864/political-violence-us-enough/">Political Violence in the United States Is Rising – and It Might Be Up to Americans to Say “Enough!”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kleinfeldrachel/" title="Profile and articles by Rachel Kleinfeld" class="author url fn" rel="author">Rachel Kleinfeld</a></p> <p class="date">Sep 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99994/americas-national-security-threat/">America’s Overlooked National Security Threat</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kohharold/" title="Profile and articles by Harold Hongju Koh" class="author url fn" rel="author">Harold Hongju Koh</a></p> <p class="date">Sep 11th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99964/challenging-state-capture/">To Challenge State Capture, the US Needs a Strategy of State Retrieval</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/prendergastjohn/" title="Profile and articles by John Prendergast" class="author url fn" rel="author">John Prendergast</a> and <a href="https://www.justsecurity.org/author/wilsondamon/" title="Profile and articles by Damon Wilson" class="author url fn" rel="author">Damon Wilson</a></p> <p class="date">Sep 10th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99869/telegrams-security-sham/">Telegram’s Security Sham</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vanlandinghammichael/" title="Profile and articles by Michael Van Landingham" class="author url fn" rel="author">Michael Van Landingham</a> and <a href="https://www.justsecurity.org/author/wildeg/" title="Profile and articles by Gavin Wilde" class="author url fn" rel="author">Gavin Wilde</a></p> <p class="date">Sep 9th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99841/public-safety-reform-targeted-violence/">Public-Safety Reform and Preventing Targeted Violence: Two Sides of the Same Public-Health Coin</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosanderic/" title="Profile and articles by Eric Rosand" class="author url fn" rel="author">Eric Rosand</a>, <a href="https://www.justsecurity.org/author/weinestevan/" title="Profile and articles by Stevan Weine" class="author url fn" rel="author">Stevan Weine</a> and <a href="https://www.justsecurity.org/author/gimenezalejandrosantana/" title="Profile and articles by Alejandro Giménez Santana" class="author url fn" rel="author">Alejandro Giménez Santana</a></p> <p class="date">Sep 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99831/reaim-second-summit-context/">Putting the Second REAIM Summit into Context</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/vestnertobias/" title="Profile and articles by Tobias Vestner" class="author url fn" rel="author">Tobias Vestner</a> and <a href="https://www.justsecurity.org/author/cleoburysimon/" title="Profile and articles by Simon Cleobury" class="author url fn" rel="author">Simon Cleobury</a></p> <p class="date">Sep 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99113/north-korea-growing-threat/">The Growing Threat from North Korea</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kirbymichael/" title="Profile and articles by The Hon. Michael Kirby" class="author url fn" rel="author">The Hon. Michael Kirby</a></p> <p class="date">Aug 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98855/good-moral-character-trump-immigrants/">‘Good Moral Character?’ Holding Trump to the Same Standards as the Immigrants He Vilifies</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/chenedgar/" title="Profile and articles by Edgar Chen" class="author url fn" rel="author">Edgar Chen</a> and <a href="https://www.justsecurity.org/author/rossdan/" title="Profile and articles by Dan Ross" class="author url fn" rel="author">Dan Ross</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/99069/artificial-intelligence-democracy-effects/">Don’t Downplay Risks of AI for Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nosselsuzanne/" title="Profile and articles by Suzanne Nossel" class="author url fn" rel="author">Suzanne Nossel</a></p> <p class="date">Aug 28th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98844/dont-sanction-icc/">Don’t Sanction the ICC for Doing its Job</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mayamichael/" title="Profile and articles by Michael Maya" class="author url fn" rel="author">Michael Maya</a></p> <p class="date">Aug 27th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia’s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98895/presidential-immunity-congressional-contempt/">Presidential Immunity Decision May Have Implications for Congressional-Executive Divide on Criminal Contempt</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/wrightandy/" title="Profile and articles by Andy Wright" class="author url fn" rel="author">Andy Wright</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98847/kursk-incursion-international-law/">Ukraine’s Incursion into Kursk Oblast: A Lawful Case of Defensive Invasion?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/omearachris/" title="Profile and articles by Chris O'Meara" class="author url fn" rel="author">Chris O'Meara</a></p> <p class="date">Aug 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98812/icc-amicus-brief-israel-palestine/">Expert Explainer: The US for the first time submits a formal brief to the International Criminal Court on the ‘Situation in Palestine’</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/buchwaldtodd/" title="Profile and articles by Todd Buchwald" class="author url fn" rel="author">Todd Buchwald</a></p> <p class="date">Aug 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98787/icc-disability-slave-trade/">Time for the International Criminal Court to Recognize Persons with Disabilities and the Slave Trade</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/lordjanet/" title="Profile and articles by Janet Lord" class="author url fn" rel="author">Janet Lord</a>, <a href="https://www.justsecurity.org/author/schwarzpace/" title="Profile and articles by Pace Schwarz" class="author url fn" rel="author">Pace Schwarz</a>, <a href="https://www.justsecurity.org/author/smithmatthew/" title="Profile and articles by Matthew "Hezzy" Smith" class="author url fn" rel="author">Matthew "Hezzy" Smith</a>, <a href="https://www.justsecurity.org/author/steinmichael/" title="Profile and articles by Michael Ashley Stein" class="author url fn" rel="author">Michael Ashley Stein</a>, <a href="https://www.justsecurity.org/author/greenalex/" title="Profile and articles by Alex Green" class="author url fn" rel="author">Alex Green</a> and <a href="https://www.justsecurity.org/author/kayessrosemary/" title="Profile and articles by Rosemary Kayess" class="author url fn" rel="author">Rosemary Kayess</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98801/podcast-international-law-israel-palestine/">The Just Security Podcast: Assessing the Recent Response of International Law and Institutions in Palestine and Israel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/imseisardi/" title="Profile and articles by Ardi Imseis" class="author url fn" rel="author">Ardi Imseis</a>, <a href="https://www.justsecurity.org/author/hammourishahd/" title="Profile and articles by Shahd Hammouri" class="author url fn" rel="author">Shahd Hammouri</a>, <a href="https://www.justsecurity.org/author/kattanvictor/" title="Profile and articles by Victor Kattan" class="author url fn" rel="author">Victor Kattan</a>, <a href="https://www.justsecurity.org/author/sirleafmatiangai/" title="Profile and articles by Matiangai Sirleaf" class="author url fn" rel="author">Matiangai Sirleaf</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 21st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98754/biden-end-iraq-war/">A Presidential Proclamation to End the Iraq War: Unilateral Executive Action to Defang a Zombie AUMF</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98733/ukraine-icc-ratification/">Unforced Error: Article 124 and the Regrettable Caveat to Ukraine’s Proposed Ratification of the ICC Statute</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/dannenbaumtom/" title="Profile and articles by Tom Dannenbaum" class="author url fn" rel="author">Tom Dannenbaum</a></p> <p class="date">Aug 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98674/911-plea-deals-revoked/">Revoking the 9/11 Plea Deals: Human Rights Consequences</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a></p> <p class="date">Aug 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98652/afghanistan-taliban-third-anniversary/">Collecting Just Security’s Afghanistan Coverage on Third Anniversary of Taliban Takeover</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a></p> <p class="date">Aug 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98592/sudan-talks-deadlock/">Breaking the Deadlock: New Talks Needed to Help End Sudan’s Violence and Offer a Glimmer of Hope</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/abdulshafiquscondy/" title="Profile and articles by Quscondy Abdulshafi" class="author url fn" rel="author">Quscondy Abdulshafi</a></p> <p class="date">Aug 13th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98543/fara-sue-mi-terry/">The Perils of Expertise: How the DOJ Indictment of Sue Mi Terry Can Chill the Think Tank World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/craiggregory/" title="Profile and articles by Gregory B. Craig" class="author url fn" rel="author">Gregory B. Craig</a></p> <p class="date">Aug 12th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98501/israel-trans-border-torture/">Justice for Trans-border Torture Requires Rethinking the International Criminal Court’s Jurisdiction in the Israel-Palestine Conflict</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ben-natansmadar/" title="Profile and articles by Smadar Ben-Natan" class="author url fn" rel="author">Smadar Ben-Natan</a> and <a href="https://www.justsecurity.org/author/mannitamar/" title="Profile and articles by Itamar Mann" class="author url fn" rel="author">Itamar Mann</a></p> <p class="date">Aug 7th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98445/our-lives-depend-on-cloud/">Our Lives Depend on the Cloud. Now What?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/pendletonjohn/" title="Profile and articles by John Pendleton" class="author url fn" rel="author">John Pendleton</a> and <a href="https://www.justsecurity.org/author/leviteariel/" title="Profile and articles by Ariel Levite" class="author url fn" rel="author">Ariel Levite</a></p> <p class="date">Aug 6th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98429/security-council-report-isis-qaeda/">Wake Up Call: UN Security Council’s Report on ISIS and al-Qaeda</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/joscelyntom/" title="Profile and articles by Tom Joscelyn" class="author url fn" rel="author">Tom Joscelyn</a></p> <p class="date">Aug 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98378/podcast-assessing-laws-of-war/">The Just Security Podcast: Assessing the Laws of War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/droegecordula/" title="Profile and articles by Cordula Droege" class="author url fn" rel="author">Cordula Droege</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 2nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98313/podcast-hostage-policy/">The Just Security Podcast: The Evolution of U.S. Hostage Policy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/foleydiane/" title="Profile and articles by Diane Foley" class="author url fn" rel="author">Diane Foley</a>, <a href="https://www.justsecurity.org/author/hartigluke/" title="Profile and articles by Luke Hartig" class="author url fn" rel="author">Luke Hartig</a>, <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a>, <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a> and <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a></p> <p class="date">Aug 1st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98273/the-aftermath-of-the-haniyeh-killing-how-to-avoid-a-new-middle-east-war/">The Aftermath of the Haniyeh Killing: How to Avoid a New Middle East War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98261/disability-think-differently-trump/">Donald Trump’s Dangerous Views on Disability and the Power to Think Differently</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/shahparas/" title="Profile and articles by Paras Shah" class="author url fn" rel="author">Paras Shah</a></p> <p class="date">Jul 31st, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97738/just-security-analysis-supreme-court/">Collecting Just Security’s Analysis of the Supreme Court’s Term</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blankharrison/" title="Profile and articles by Harrison Blank" class="author url fn" rel="author">Harrison Blank</a> and <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98205/prudential-trump-v-united-states/">A Prudential Way Forward in <i>Trump v. United States</i></a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bobbittphilip/" title="Profile and articles by Philip Bobbitt" class="author url fn" rel="author">Philip Bobbitt</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98091/negotiations-with-iran-now/">Space May be Opening for Negotiations with Iran</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brewgregory/" title="Profile and articles by Gregory Brew" class="author url fn" rel="author">Gregory Brew</a></p> <p class="date">Jul 29th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98128/united-nations-pact-for-future/">What the Draft UN “Pact for the Future” Tells Us About International Insecurity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/gowanrichard/" title="Profile and articles by Richard Gowan" class="author url fn" rel="author">Richard Gowan</a></p> <p class="date">Jul 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98082/international-court-of-justices-call-on-all-states-to-end-israels-occupation-and-find-a-path-to-peace/">International Court of Justice’s Call on All States to End Israel’s Occupation and Find a Path to Peace</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/nowrojeebinaifer/" title="Profile and articles by Binaifer Nowrojee" class="author url fn" rel="author">Binaifer Nowrojee</a></p> <p class="date">Jul 25th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/98037/doj-special-counsel/"><i> United States v. Nixon </i> at Fifty: Why Judge Cannon Is Wrong About the Attorney General’s Authority to Select a Special Counsel</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/ledermanmarty/" title="Profile and articles by Marty Lederman" class="author url fn" rel="author">Marty Lederman</a></p> <p class="date">Jul 24th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97937/azerbaijan-arbitrary-detentions-host-cop29/">Azerbaijan’s Aliyev Extends Arbitrary Detentions Even as He Prepares to Host Global Climate Conference COP29</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bayramovazhala/" title="Profile and articles by Zhala Bayramova" class="author url fn" rel="author">Zhala Bayramova</a>, <a href="https://www.justsecurity.org/author/bayramovibad/" title="Profile and articles by Ibad Bayramov" class="author url fn" rel="author">Ibad Bayramov</a> and <a href="https://www.justsecurity.org/author/bayramliemin/" title="Profile and articles by Emin Bayramli" class="author url fn" rel="author">Emin Bayramli</a></p> <p class="date">Jul 23rd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92714/american-autocracy-threat-tracker/">American Autocracy Threat Tracker</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a>, <a href="https://www.justsecurity.org/author/ben-ghiatruth/" title="Profile and articles by Ruth Ben-Ghiat" class="author url fn" rel="author">Ruth Ben-Ghiat</a>, <a href="https://www.justsecurity.org/author/wattsiven/" title="Profile and articles by Siven Watt" class="author url fn" rel="author">Siven Watt</a>, <a href="https://www.justsecurity.org/author/kolbjoshua/" title="Profile and articles by Joshua Kolb" class="author url fn" rel="author">Joshua Kolb</a>, <a href="https://www.justsecurity.org/author/warrenandrew/" title="Profile and articles by Andrew Warren" class="author url fn" rel="author">Andrew Warren</a>, <a href="https://www.justsecurity.org/author/kovacs-goodmanjacob/" title="Profile and articles by Jacob Kovacs-Goodman" class="author url fn" rel="author">Jacob Kovacs-Goodman</a> and <a href="https://www.justsecurity.org/author/barrilleauxfrancois/" title="Profile and articles by Francois Barrilleaux" class="author url fn" rel="author">Francois Barrilleaux</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97922/non-state-civilian-political-institutions/">Assessing the Civilian and Political Institutions of Armed Non-State Actors under International Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/fortinkatharine/" title="Profile and articles by Katharine Fortin" class="author url fn" rel="author">Katharine Fortin</a></p> <p class="date">Jul 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97826/state-departments-civilian-harm-incident-response/">The State Department’s Civilian Harm Incident Response Guidance: How to Make a Good Thing Better</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/blahacharles/" title="Profile and articles by Charles O. (Cob) Blaha" class="author url fn" rel="author">Charles O. (Cob) Blaha</a></p> <p class="date">Jul 18th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97781/three-flaws-supreme-court-immunity/">Three Flaws in the Supreme Court’s Decision on Presidential Criminal Immunity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/weissmannandrew/" title="Profile and articles by Andrew Weissmann" class="author url fn" rel="author">Andrew Weissmann</a></p> <p class="date">Jul 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97760/economic-security-presidential-power/">How ‘Economic Security’ is Re-shaping Presidential Power</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/claussenkathleen/" title="Profile and articles by Kathleen Claussen" class="author url fn" rel="author">Kathleen Claussen</a> and <a href="https://www.justsecurity.org/author/meyertimothy/" title="Profile and articles by Timothy Meyer" class="author url fn" rel="author">Timothy Meyer</a></p> <p class="date">Jul 16th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97747/trump-docs-case-dismissed/">Judge Cannon Finds Special Counsel Unconstitutional in Trump Classified Documents Case: What’s Next for Jack Smith?</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/klasfeldadam/" title="Profile and articles by Adam Klasfeld" class="author url fn" rel="author">Adam Klasfeld</a></p> <p class="date">Jul 15th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/97718/nato-summit-ukraine-russia-china/">After the NATO Summit, Allies Need to Step Up Their Game on Ukraine, Russia, and China</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/kramerdavidj/" title="Profile and articles by David J. Kramer" class="author url fn" rel="author">David J. Kramer</a> and <a href="https://www.justsecurity.org/author/kellyian/" title="Profile and articles by Ambassador (ret) Ian Kelly" class="author url fn" rel="author">Ambassador (ret) Ian Kelly</a></p> <p class="date">Jul 15th, 2024</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Resources</h3></div><aside id="js-scrolling-content-4" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Trackers</h3><div class="flexible-content posts clearfix" style="height:auto;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/81789/russias-eliminationist-rhetoric-against-ukraine-a-collection/">Russia’s Eliminationist Rhetoric Against Ukraine: A Collection</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a></p> <p class="date">Aug 26th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/100235/unga-79-expert-analysis-resources/">UNGA 79: Expert Analysis & Resources</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a>, <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a> and <a href="https://www.justsecurity.org/author/violagienger/" title="Profile and articles by Viola Gienger" class="author url fn" rel="author">Viola Gienger</a></p> <p class="date">Sep 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/77022/january-6-clearinghouse/">January 6 Clearinghouse</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a>, <a href="https://www.justsecurity.org/author/hendrixjustin/" title="Profile and articles by Justin Hendrix" class="author url fn" rel="author">Justin Hendrix</a> and <a href="https://www.justsecurity.org/author/eisennorman/" title="Profile and articles by Norman L. Eisen" class="author url fn" rel="author">Norman L. Eisen</a></p> <p class="date">Mar 14th, 2024</p> </li></ul></div></aside><aside id="js-scrolling-content-6" class="widget js-scrolling-content clearfix"><h3 class="flexible-content-title">Series</h3><div class="flexible-content posts custom-scroll clearfix" style="height:350px;"><ul class="posts-list-min"><li> <h4><a href="https://www.justsecurity.org/96975/icc-prosecutor-policy-complementarity-cooperation/">Symposium: ICC Prosecutor Launches Policy on Complementarity and Cooperation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/uruenarene/" title="Profile and articles by René Urueña" class="author url fn" rel="author">René Urueña</a></p> <p class="date">Jun 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/96881/symposium-on-ai-and-human-rights/">Introducing the Symposium on AI and Human Rights</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/peakejessica/" title="Profile and articles by Jessica Peake" class="author url fn" rel="author">Jessica Peake</a></p> <p class="date">Jun 17th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/94368/symposium-view-from-lviv/">Symposium: International Law in Ukraine – The View from Lviv</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Apr 5th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/95879/symposium-international-criminal-court-gaza/">A Symposium on the International Criminal Court and the Israel-Hamas War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Nov 22nd, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/90411/2024-and-beyond-just-securitys-us-election-protection-coverage/">2024 and Beyond: Just Security’s US Election Protection Coverage</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mollenkampallison2/" title="Profile and articles by Allison Mollenkamp" class="author url fn" rel="author">Allison Mollenkamp</a></p> <p class="date">Dec 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/92429/introducing-just-securitys-series-on-reparations-in-russias-war-against-ukraine/">Introducing Just Security’s Series on Reparations in Russia’s War Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 20th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/92446/establish-syria-victims-fund/">It’s Time to Establish a Syria Victims Fund</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/seifjoumana/" title="Profile and articles by Joumana Seif" class="author url fn" rel="author">Joumana Seif</a></p> <p class="date">Feb 19th, 2024</p> </li><li> <h4><a href="https://www.justsecurity.org/89838/the-future-of-atrocity-prevention-a-joint-symposium/">The Future of Atrocity Prevention: A Joint Symposium</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiddengwendolyn/" title="Profile and articles by Gwendolyn Whidden" class="author url fn" rel="author">Gwendolyn Whidden</a></p> <p class="date">Oct 31st, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/89583/introduction-to-symposium-governing-artificial-intelligence-power-justice-and-the-limits-of-the-law/">Introducing the Symposium on AI Governance: Power, Justice, and the Limits of the Law</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 18th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/88143/introduction-to-symposium-ending-perpetual-war/">Introduction to Symposium: Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Sep 11th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/87280/joint-symposium-on-u-s-cooperation-with-the-international-criminal-courts-ukraine-investigation/">Joint Symposium on U.S. Cooperation with the International Criminal Court’s Ukraine Investigation</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 17th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/86748/u-n-general-assembly-and-international-criminal-tribunal-for-the-crime-of-aggression-against-ukraine/">U.N. General Assembly and International Criminal Tribunal for the Crime of Aggression Against Ukraine</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">May 9th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/85110/introducing-the-symposium-on-u-s-support-for-the-iccs-trust-fund-for-victims/">Introducing the Symposium on U.S. Support for the ICC’s Trust Fund for Victims</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/williamspaul/" title="Profile and articles by Paul R. Williams" class="author url fn" rel="author">Paul R. Williams</a>, <a href="https://www.justsecurity.org/author/steriomilena/" title="Profile and articles by Milena Sterio" class="author url fn" rel="author">Milena Sterio</a>, <a href="https://www.justsecurity.org/author/duttonyvonne/" title="Profile and articles by Yvonne Dutton" class="author url fn" rel="author">Yvonne Dutton</a>, <a href="https://www.justsecurity.org/author/kochalexandra/" title="Profile and articles by Alexandra Koch" class="author url fn" rel="author">Alexandra Koch</a>, <a href="https://www.justsecurity.org/author/waldocklilian/" title="Profile and articles by Lilian Waldock" class="author url fn" rel="author">Lilian Waldock</a>, <a href="https://www.justsecurity.org/author/lavaudfloriane/" title="Profile and articles by Floriane Lavaud" class="author url fn" rel="author">Floriane Lavaud</a>, <a href="https://www.justsecurity.org/author/singhashika/" title="Profile and articles by Ashika Singh" class="author url fn" rel="author">Ashika Singh</a> and <a href="https://www.justsecurity.org/author/glimcherisabelle/" title="Profile and articles by Isabelle Glimcher" class="author url fn" rel="author">Isabelle Glimcher</a></p> <p class="date">Feb 13th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84901/antisemitism-and-threats-to-american-democracy/">Antisemitism and Threats to American Democracy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hershenoveileen/" title="Profile and articles by Eileen B. Hershenov" class="author url fn" rel="author">Eileen B. Hershenov</a> and <a href="https://www.justsecurity.org/author/greerryan/" title="Profile and articles by Ryan B. Greer" class="author url fn" rel="author">Ryan B. Greer</a></p> <p class="date">Jan 26th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/84636/toward-a-values-based-foreign-policy-developing-an-ethical-checklist/">Toward a Values-Based Foreign Policy: Developing an Ethical Checklist</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mulreanpeter/" title="Profile and articles by Ambassador Peter Mulrean (ret.)" class="author url fn" rel="author">Ambassador Peter Mulrean (ret.)</a> and <a href="https://www.justsecurity.org/author/hawkwilliamj/" title="Profile and articles by William J. Hawk" class="author url fn" rel="author">William J. Hawk</a></p> <p class="date">Jan 4th, 2023</p> </li><li> <h4><a href="https://www.justsecurity.org/83994/tracking-cop27-notable-moments-and-key-themes/">Tracking COP27: Notable Moments and Key Themes</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/aptclara/" title="Profile and articles by Clara Apt" class="author url fn" rel="author">Clara Apt</a> and <a href="https://www.justsecurity.org/author/fangkatherine/" title="Profile and articles by Katherine Fang" class="author url fn" rel="author">Katherine Fang</a></p> <p class="date">Nov 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83460/on-indigenous-peoples-day-reflections-on-tribal-sovereignty-in-haaland-v-brackeen/">On Indigenous Peoples’ Day, Reflections on Tribal Sovereignty in Haaland v. Brackeen</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/whiteeagleamanda/" title="Profile and articles by Amanda L. White Eagle" class="author url fn" rel="author">Amanda L. White Eagle</a></p> <p class="date">Oct 10th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83749/ending-perpetual-war/">Ending Perpetual War</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Oct 25th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/83117/the-case-for-creating-an-international-tribunal-to-prosecute-the-crime-of-aggression-against-ukraine/">The Case for Creating an International Tribunal to Prosecute the Crime of Aggression Against Ukraine (Part I)</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/hathawayoona/" title="Profile and articles by Oona A. Hathaway" class="author url fn" rel="author">Oona A. Hathaway</a></p> <p class="date">Sep 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80800/introduction-to-symposium-still-at-war-where-and-why-the-united-states-is-fighting-the-war-on-terror/">Introduction to Symposium: Still at War – Where and Why the United States is Fighting the “War on Terror”</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a> and <a href="https://www.justsecurity.org/author/rosenbrianna/" title="Profile and articles by Brianna Rosen" class="author url fn" rel="author">Brianna Rosen</a></p> <p class="date">Mar 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/82665/after-a-year-of-privation-with-the-talibans-return-the-people-of-afghanistan-deserve-better-from-the-us-and-the-world/">After a Year of Privation With the Taliban’s Return, the People of Afghanistan Deserve Better from the US and the World</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/andishanasir/" title="Profile and articles by Ambassador Nasir A. Andisha" class="author url fn" rel="author">Ambassador Nasir A. Andisha</a> and <a href="https://www.justsecurity.org/author/marastonimarzia/" title="Profile and articles by Marzia Marastoni" class="author url fn" rel="author">Marzia Marastoni</a></p> <p class="date">Aug 15th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/80290/introduction-to-just-securitys-series-on-executive-order-9066-80-years-after-signing/">Introduction to Just Security’s Series on Executive Order 9066, 80 Years After Signing</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a></p> <p class="date">Feb 18th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79951/congress-can-and-should-address-the-threat-from-unauthorized-paramilitary-activity/">Congress Can and Should Address the Threat from Unauthorized Paramilitary Activity</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/mccordmary/" title="Profile and articles by Mary B. McCord" class="author url fn" rel="author">Mary B. McCord</a></p> <p class="date">Jan 24th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/79900/the-good-governance-papers-a-january-2022-report-card-update/">The Good Governance Papers: A January 2022 “Report Card” Update</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bermanemily/" title="Profile and articles by Emily Berman" class="author url fn" rel="author">Emily Berman</a>, <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/corrarinomegan/" title="Profile and articles by Megan Corrarino" class="author url fn" rel="author">Megan Corrarino</a>, <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a> and <a href="https://www.justsecurity.org/author/rudesilldakota/" title="Profile and articles by Dakota S. Rudesill" class="author url fn" rel="author">Dakota S. Rudesill</a></p> <p class="date">Jan 20th, 2022</p> </li><li> <h4><a href="https://www.justsecurity.org/78797/symposium-recap-security-privacy-and-innovation-reshaping-law-for-the-ai-era/">Symposium Recap: Security, Privacy and Innovation – Reshaping Law for the AI Era</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brawleylaura/" title="Profile and articles by Laura Brawley" class="author url fn" rel="author">Laura Brawley</a>, <a href="https://www.justsecurity.org/author/joardarantara/" title="Profile and articles by Antara Joardar" class="author url fn" rel="author">Antara Joardar</a> and <a href="https://www.justsecurity.org/author/narasimhanmadhu/" title="Profile and articles by Madhu Narasimhan" class="author url fn" rel="author">Madhu Narasimhan</a></p> <p class="date">Oct 29th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78063/towards-a-new-treaty-on-crimes-against-humanity-next-steps/">Towards a New Treaty on Crimes Against Humanity: Next Steps</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/sadatleila/" title="Profile and articles by Leila Nadya Sadat" class="author url fn" rel="author">Leila Nadya Sadat</a></p> <p class="date">Sep 13th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/78118/introduction-to-a-symposium-how-perpetual-war-has-changed-us-reflections-on-the-anniversary-of-9-11/">Introduction to Symposium: How Perpetual War Has Changed Us — Reflections on the Anniversary of 9/11</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bridgemantess/" title="Profile and articles by Tess Bridgeman" class="author url fn" rel="author">Tess Bridgeman</a>, <a href="https://www.justsecurity.org/author/goldbrennerrachel/" title="Profile and articles by Rachel Goldbrenner" class="author url fn" rel="author">Rachel Goldbrenner</a> and <a href="https://www.justsecurity.org/author/goodmanryan/" title="Profile and articles by Ryan Goodman" class="author url fn" rel="author">Ryan Goodman</a></p> <p class="date">Sep 7th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77536/new-just-security-series-beyond-the-myanmar-coup/">New Just Security Series: Beyond the Myanmar Coup</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/just-security-admin/" title="Profile and articles by Just Security" class="author url fn" rel="author">Just Security</a></p> <p class="date">Jul 19th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/77262/new-just-security-series-reflections-on-afghanistan-on-the-eve-of-withdrawal/">New Just Security Series: Reflections on Afghanistan on the Eve of Withdrawal</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 30th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76906/introducing-a-symposium-on-the-un-global-counterterrorism-strategy/">Introducing a Symposium on the UN Global Counterterrorism Strategy</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a> and <a href="https://www.justsecurity.org/author/brannenkate/" title="Profile and articles by Kate Brannen" class="author url fn" rel="author">Kate Brannen</a></p> <p class="date">Jun 14th, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76709/the-mendez-principles-leadership-to-transform-interrogation-via-science-law-and-ethics/">The Méndez Principles: Leadership to Transform Interrogation via Science, Law, and Ethics</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/barelasteven/" title="Profile and articles by Steven J. Barela" class="author url fn" rel="author">Steven J. Barela</a> and <a href="https://www.justsecurity.org/author/fallonmark/" title="Profile and articles by Mark Fallon" class="author url fn" rel="author">Mark Fallon</a></p> <p class="date">Jun 1st, 2021</p> </li><li> <h4><a href="https://www.justsecurity.org/76692/introduction-to-just-securitys-series-on-tulsa-race-massacre-of-1921/">Introduction to Just Security’s Series on Tulsa Race Massacre of 1921</a></h4> <p class="author">by <a href="https://www.justsecurity.org/author/bergerchristine/" title="Profile and articles by Christine Berger" class="author url fn" rel="author">Christine Berger</a></p> <p class="date">May 29th, 2021</p> </li></ul></div></aside><div class="capitol-breaker"><h3 class="widget-title">Key Topics</h3><div class="sub-title">Scroll within to view all topics.</div></div><aside id="js-scrolling-content-2" class="widget js-scrolling-content clearfix"><div class="flexible-content links custom-scroll clearfix" style="height:255px;"><ul class="link-list"><li><a href="https://www.justsecurity.org/tag/artificial-intelligence/">Artificial Intelligence (AI)</a></li><li><a href="https://www.justsecurity.org/84303/just-securitys-climate-archive/">Climate Change</a></li><li><a href="https://www.justsecurity.org/tag/congressional-oversight/">Congressional Oversight</a></li><li><a href="https://www.justsecurity.org/tag/counterterrorism/">Counterterrorism</a></li><li><a href="https://www.justsecurity.org/tag/cybersecurity/">Cybersecurity</a></li><li><a href="https://www.justsecurity.org/tag/democracy/">Democracy</a></li><li><a href="https://www.justsecurity.org/tag/diplomacy/">Diplomacy</a></li><li><a href="https://www.justsecurity.org/tag/disinformation/">Disinformation</a></li><li><a href="https://www.justsecurity.org/tag/human-rights/">Human Rights</a></li><li><a href="https://www.justsecurity.org/tag/immigration/">Immigration</a></li><li><a href="https://www.justsecurity.org/tag/intelligence/">Intelligence activities</a></li><li><a href="https://www.justsecurity.org/tag/international-criminal-law/">International Criminal Law</a></li><li><a href="https://www.justsecurity.org/category/israel-hamas-war/">Israel-Hamas War</a></li><li><a href="https://www.justsecurity.org/tag/january-6th-attack-on-us-capitol/">January 6th Attack on US Capitol</a></li><li><a href="https://www.justsecurity.org/tag/law-of-armed-conflict/">Law of Armed Conflict</a></li><li><a href="https://www.justsecurity.org/tag/local-voices/">Local Voices</a></li><li><a href="https://www.justsecurity.org/tag/racial-justice/">Racial Justice</a></li><li><a href="https://www.justsecurity.org/tag/social-media-platforms/">Social Media Platforms</a></li><li><a href="https://www.justsecurity.org/tag/united-nations/">United Nations</a></li><li><a href="https://www.justsecurity.org/tag/use-of-force/">Use of Force</a></li></ul></div></aside></div></div><div id="post-meta-after" class="pagewidth pw1400 clearfix"><div class="post-bottom-row about-authors clearfix"><div class="secondary-left"><h3>About the Author(s)</h3></div><div class="primary"><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/castellimatt/">Matt <span>Castelli</span></a></h4><p>Former CIA officer, serving over 14 years in analytic, operational, and management assignments primarily covering counterterrorism; also served from 2016 to 2018 as Director for Counterterrorism at the National Security Council. Follow him on Twitter (<a href="https://twitter.com/castellimatt?lang=en">@CastelliMatt</a>).</p> </div><div class="post-author-bio"><h4 title="Read bio and view posts by this author"><a href="https://www.justsecurity.org/author/wilsonbob/">Colonel (ret.) Bob <span>Wilson</span></a></h4><p>Bob Wilson is a retired Army Special Forces Colonel with over 26 years of service. Throughout his career, Bob commanded special operations troops in combat in Afghanistan, and led U.S. special operations forces in Central Asia, Africa and Latin America. He also served as the Military Assistant to the Secretary of the Army, the Honorable John McHugh, and served in the White House as a Director for Counterterrorism in the National Security Council. </p> </div><p class="clearfix"> <a href="mailto:lte@justsecurity.org" class="button has-icon icon-fa"> <i class="fa fa-envelope-o" aria-hidden="true"></i> Send A Letter To The Editor </a> </p></div></div><div class="post-bottom-row related-posts clearfix"><div class="secondary-left"><h3>Read these related stories next:</h3></div><div class="primary archive-wrap"><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104948/social-media-for-atrocity-prevention/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/social-media-myanmar-scaled-e1732144866293.jpg?fit=768%2C299&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104948/social-media-for-atrocity-prevention/">How Social Media Interventions Can Aid Atrocity Prevention</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rajsinghshannon/" title="Profile and articles by Shannon Raj Singh" class="author url fn" rel="author">Shannon Raj Singh</a></p> <p class="date">Nov 22nd, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104893/guantanamo-plea-deal-appeal/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/Guantanamo-Office-of-Military-Commissions-scaled-e1731906002660.jpg?fit=768%2C296&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104893/guantanamo-plea-deal-appeal/">How Much (or How Little) Does the Biden Administration Want Justice in the 9/11 Case?</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/roehmscott/" title="Profile and articles by Scott Roehm" class="author url fn" rel="author">Scott Roehm</a> and <a href="https://www.justsecurity.org/author/mossian/" title="Profile and articles by Ian Moss" class="author url fn" rel="author">Ian Moss</a></p> <p class="date">Nov 18th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104707/northeast-syria-reassimilation/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/GettyImages-1233232793-scaled.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104707/northeast-syria-reassimilation/">Assessing Amnesties and Re-assimilation in Northeast Syria</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/phillipsroger/" title="Profile and articles by Roger Lu Phillips" class="author url fn" rel="author">Roger Lu Phillips</a>, <a href="https://www.justsecurity.org/author/hajialan/" title="Profile and articles by Alan Haji" class="author url fn" rel="author">Alan Haji</a> and <a href="https://www.justsecurity.org/author/aldalatijudi/" title="Profile and articles by Judi Aldalati" class="author url fn" rel="author">Judi Aldalati</a></p> <p class="date">Nov 7th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104588/fix-defense-production-act-committee/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/11/Dpa_Cropped-scaled.jpg?fit=768%2C332&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104588/fix-defense-production-act-committee/">How to Fix the Defense Production Act Committee</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/dodgejoel/" title="Profile and articles by Joel Dodge" class="author url fn" rel="author">Joel Dodge</a></p> <p class="date">Nov 5th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/10/Lloyd-Austin-Cropped-scaled.jpg?fit=768%2C440&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104451/pentagon-plan-protect-civilians-promises/">Is The Pentagon’s Plan to Protect Civilians Living up to its Promises?</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/hunkemadison/" title="Profile and articles by Madison Hunke" class="author url fn" rel="author">Madison Hunke</a></p> <p class="date">Oct 31st, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/104328/dod-directive-changes/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2019/04/GettyImages-136117825-copy.jpg?fit=768%2C475&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/104328/dod-directive-changes/">Much Ado About Nothing: Recent Changes to Department of Defense Directive 5240.01</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/nunnjoseph/" title="Profile and articles by Joseph Nunn" class="author url fn" rel="author">Joseph Nunn</a> and <a href="https://www.justsecurity.org/author/goiteinelizabeth/" title="Profile and articles by Elizabeth Goitein" class="author url fn" rel="author">Elizabeth Goitein</a></p> <p class="date">Oct 25th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2174204276-scaled-e1727728819422.jpg?fit=768%2C381&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/103348/afghanistan-protect-allies/">US Should Learn from Afghanistan and Vietnam Withdrawals to Better Protect Vulnerable Allies</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/rscottadams12/" title="Profile and articles by R. Scott Adams" class="author url fn" rel="author">R. Scott Adams</a></p> <p class="date">Oct 3rd, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/99787/state-domestic-terrorism-laws/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/09/GettyImages-2149572556-scaled-e1725416885741.jpg?fit=768%2C384&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/99787/state-domestic-terrorism-laws/">The Growing Threat of State Domestic Terrorism Laws to the First Amendment</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/robinsonnick/" title="Profile and articles by Nick Robinson" class="author url fn" rel="author">Nick Robinson</a></p> <p class="date">Sep 5th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/98754/biden-end-iraq-war/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2022/08/GettyImages-1242253473-1-e1659999224987.jpg?fit=768%2C392&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/98754/biden-end-iraq-war/">A Presidential Proclamation to End the Iraq War: Unilateral Executive Action to Defang a Zombie AUMF</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/finucanebrian/" title="Profile and articles by Brian Finucane" class="author url fn" rel="author">Brian Finucane</a></p> <p class="date">Aug 20th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/98694/us-aiding-afghan-allies/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/08/Afghan-Evacuee_Cropped-scaled.jpg?fit=768%2C301&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/98694/us-aiding-afghan-allies/">US Is Finally Aiding Stranded Afghan Allies, But Congress Needs to Step Up</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/purdychris/" title="Profile and articles by Chris Purdy" class="author url fn" rel="author">Chris Purdy</a></p> <p class="date">Aug 16th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/98674/911-plea-deals-revoked/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2024/01/GettyImages-1235102590-scaled.jpg?fit=768%2C512&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/98674/911-plea-deals-revoked/">Revoking the 9/11 Plea Deals: Human Rights Consequences</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/niaolainfionnuala/" title="Profile and articles by Fionnuala Ní Aoláin" class="author url fn" rel="author">Fionnuala Ní Aoláin</a></p> <p class="date">Aug 16th, 2024</p> </div><div class="result-entry type-post"> <a href="https://www.justsecurity.org/98652/afghanistan-taliban-third-anniversary/" class="thumb" style="background-image:url(https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2021/07/GettyImages-1232619790-scaled.jpg?fit=768%2C513&ssl=1);"></a> <h3><a href="https://www.justsecurity.org/98652/afghanistan-taliban-third-anniversary/">Collecting Just Security’s Afghanistan Coverage on Third Anniversary of Taliban Takeover</a></h3> <p class="author">by <a href="https://www.justsecurity.org/author/nirmaya/" title="Profile and articles by Maya Nir" class="author url fn" rel="author">Maya Nir</a></p> <p class="date">Aug 15th, 2024</p> </div></div></div></div> <script> jQuery(document).ready(function($) { // make a copy so that the authors and related can come after the post story // when on mobile (under 768px) var $postAuthors = $('.post-bottom-row.about-authors'); var $postRelated = $('.post-bottom-row.related-posts'); $postAuthors.clone().addClass('mobile-authors').appendTo('#primary'); $postRelated.clone().addClass('mobile-related').appendTo('#primary'); }); </script> </div><!-- #content-wrap --> <footer id="footer" class="clearfix" role="contentinfo"> <div class="pagewidth pw1000"> <div class="col-1"><a href="https://www.justsecurity.org"><img src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/images/footer-logo.png" alt="Just Security logo" /></a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-am">A.M. Early Edition</a><a href="https://www.justsecurity.org/early-edition-signup/" class="button has-icon icon-pm">P.M. Today at Just Security</a></div><div class="col-2"><div class="about"><aside id="text-3" class="widget widget_text clearfix"> <div class="textwidget"><h3 class="widget-title"><a href="https://www.justsecurity.org/about-us/">About Us</a></h3> <p>Just Security is based at the Reiss Center on Law and Security at New York University School of Law.</p> </div> </aside></div><div class="contact-row"> <a href="https://www.justsecurity.org/contact/" class="contact">Contact Us</a> <a href="https://www.justsecurity.org/contact/" class="icon"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a href="https://twitter.com/Just_Security" class="icon" target="_blank"> <i class="fa fa-twitter" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Twitter</span> </a> <a href="https://www.facebook.com/JSBlog/" class="icon" target="_blank"> <i class="fa fa-facebook" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Facebook</span> </a> <a href="https://www.linkedin.com/company/just-security-linkedin/" class="icon" target="_blank"> <i class="fa fa-linkedin" aria-hidden="true"></i> <span class="screen-reader-text">Follow us on Linkedin</span> </a> </div></div><div class="col-3"> <div class="links"> <a href="https://www.nyu.edu/footer/accessibility.html" target="_blank"><i class="fa fa-universal-access" aria-hidden="true"></i> Accessibility</a> <div class="copyright">© 2024 Just Security</div> </div> </div> </div> </footer> </div><!-- #pagewrap --> <script type="text/javascript"> window.WPCOM_sharing_counts = {"https:\/\/www.justsecurity.org\/74068\/pentagon-moves-undermine-counterterrorism-strategy\/":74068}; </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/accordions-pro/assets/frontend/js/scripts.js?ver=1732378595" id="accordions_pro_js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/site.js?ver=1727362368" id="ds-site-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.min.js?ver=1.0" id="ds-smartmenus-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/smart-menus/jquery.smartmenus.keyboard.min.js?ver=1.0" id="ds-smartmenus-keyboard-nav-js-js"></script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/themes/justsecurity21/assets/js/custom-scrollbar/jquery.mCustomScrollbar.min.js?ver=1.0" id="ds-custom-scrollbar-js-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202447.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"77857433\",\"post\":\"74068\",\"tz\":\"-5\",\"srv\":\"www.justsecurity.org\",\"j\":\"1:14.0\"}") ]); _stq.push([ "clickTrackerInit", "77857433", "74068" ]); /* ]]> */ </script> <script type="text/javascript" id="sharing-js-js-extra"> /* <![CDATA[ */ var sharing_js_options = {"lang":"en","counts":"1","is_stats_active":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.justsecurity.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=14.0" id="sharing-js-js"></script> <script type="text/javascript" id="sharing-js-js-after"> /* <![CDATA[ */ var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-twitter' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-twitter' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-facebook' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-facebook' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' ); return false; } } ); } )(); var windowOpen; ( function () { function matches( el, sel ) { return !! ( el.matches && el.matches( sel ) || el.msMatchesSelector && el.msMatchesSelector( sel ) ); } document.body.addEventListener( 'click', function ( event ) { if ( ! event.target ) { return; } var el; if ( matches( event.target, 'a.share-linkedin' ) ) { el = event.target; } else if ( event.target.parentNode && matches( event.target.parentNode, 'a.share-linkedin' ) ) { el = event.target.parentNode; } if ( el ) { event.preventDefault(); // If there's another sharing window open, close it. if ( typeof windowOpen !== 'undefined' ) { windowOpen.close(); } windowOpen = window.open( el.getAttribute( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' ); return false; } } ); } )(); /* ]]> */ </script> <script type="text/javascript"> (function($){ $(window).on('load', function() { $('.custom-scroll').mCustomScrollbar(); }); })(jQuery); </script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>