National Security Law: Up Close and Personal, An Introduction

Similar documents
National Security Agency

P.Sc. 366 NATIONAL SECURITY AND THE CONSTITUTION. Prof. David Barnum Winter West Fullerton/Rm TTh 1:00-2:30

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

FERPA, CHALLENGES FACING SCHOOL NURSES & DISCIPLINARY ACTIONS FERPA. MELANIE BALESTRA, MN, NP, JD JD August May 4, 22, 2012

[1] Executive Order Ensuring Lawful Interrogations

Introduction. The Terrorist Financing Operations Section (TFOS)

I nspec tor Ge ne ral

Understanding & Challenging Location Tracking

Draft Revised: 4/19/2011 4:10:25 PM RESOLUTION NO.

Department of Defense INSTRUCTION

The President. Part V. Tuesday, January 27, 2009

The FISA Amendments Act: Q&A

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW

DDTC Issues Overly Expansive Interpretation of the ITAR for Defense Services (and Presumably Technical Data)

Rights of Military Members

Department of Defense INSTRUCTION

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE

Preserving Investigative and Operational Viability in Insider Threat

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 22, 2009 EXECUTIVE ORDER

Correcting the Record on Section 702: A Prerequisite for Meaningful Surveillance Reform (Part 2) By Jennifer Granick and Jadzia Butler

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

always legally required to follow the privacy practices described in this Notice.

SEC UNIFORM STANDARDS FOR THE INTERROGATION OF PERSONS UNDER THE DETENTION OF THE DEPARTMENT OF DEFENSE.

Updates on the Special Victims Counsel/Victims Legal Counsel Program 10:30 a.m. 12:00 p.m.

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501

Part I: Basic Issues of Constitutional and International Law 1

A Better You Counseling Services, LLC 1225 Johnson Ferry Road, Ste 170 Marietta GA

USE AND DISCLOSURE OF PROTECTED HEALTH INFORMATION WITHOUT AUTHORIZATION

For Payment. We will use and disclose your personal health information to obtain payment for health care services we have provided to you.

THE LEGAL FRAMEWORK IN U.S. LAW FOR SHARING LAW ENFORCEMENT AND INTELLIGENCE INFORMATION

Class #6: Electronic Surveillance: The Demise of The Wall. Professor Emily Berman Thursday, September 11, 2014

PATIENT NOTICE OF PRIVACY PRACTICES Effective Date: June 1, 2012 Updated: May 9, 2017

ADVANCED PLASTIC SURGERY, PLLC. NOTICE OF PRIVACY PRACTICES

Schaghticoke Tribal Nation v. Kent School Corporation Inc.

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

Syllabus Law 654 Counterterrorism Law Seminar. George Mason University Antonin Scalia Law School Spring 2018

NG-J2 CNGBI A CH 1 DISTRIBUTION: A 07 November 2013

The Law of Terrorism

Report of. The Staff Judge Advocate. to the. Commandant. of the Marine Corps. Presented to The. American Bar Association. Annual Meeting.

HIPAA Notice of Privacy Practices DFD Russell Medical Center Effective April 14, 2003 Updated April 10, 2013

RESUME OF RONALD J. SIEVERT

MSK Group, PC NOTICE O F PRIVACY PRACTICES Effective Date: December 30, 2015

Revision of Executive Order Privacy and Civil Liberties Information Paper 1

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the DEPARTMENT OF HOMELAND SECURITY

President Obama and National Security

NOTICE OF PRIVACY PRACTICE UNIVERSITY OF CALIFORNIA SAN FRANCISCO DENTAL CENTER

NUCLEAR REGULATORY COMMISSION [NRC ] Nuclear Regulatory Commission Insider Threat Program Policy Statement

Reporting Period: June 1, 2013 November 30, October 2014 TOP SECRET//SI//NOFORN

Planning Terrorism Counteraction ANTITERRORISM

Case M:06-cv VRW Document 254 Filed 04/20/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

Daigle Law Group, LLC. Contemporary Legal Issues for Law Enforcement Executives. 1 hour to 4 hours (can be modified and added with other subjects)

Statement for the Record Matthew G. Olsen Nominee for Director, National Counterterrorism Center Senate Select Committee on Intelligence July 26, 2011

In the Supreme Court of the United States

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

Attorney General's Guidelines for Domestic FBI Operations V2.0

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

NOTICE OF PRIVACY PRACTICES Occupations, Inc. 15 Fortune Road West Middletown, NY 10941

BASSIN CENTER FOR PLASTIC SURGERY. Dr. Roger Bassin NOTICE OF PRIVACY PRACTICES

Orthopedic Specialty Clinic, Ltd. Updated 05/2014

AGENCY: Transportation Security Administration (TSA), Department of Homeland

DALLAS CYBER TASK FORCE. Standard Memorandum of Understanding. Between THE FEDERAL BUREAU OF INVESTIGATION. and

United States Army. Criminal Investigation Command. Hunting The Hackers CCIU Detectives Deliver Digital Justice

IN THE COURT OF APPEALS OF THE STATE OF MISSISSIPPI NO CA COA

Department of Defense DIRECTIVE

Kerry L. Myers, JD, CFE Clinical Professor of Forensic Accounting and Law

CHIEF PROSECUTOR MARK MARTINS REMARKS AT GUANTANAMO BAY 16 MAY 2016

NOTICE OF PRIVACY PRACTICES

S.E. Wisconsin Hearing Center Inc.

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

Federal Law Enforcement

Department of Defense INSTRUCTION

No IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, MICHAEL ALLAN DREYER,

Case 1:17-cv APM Document 29 Filed 11/13/17 Page 1 of 8 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES UNIVERSITY OF CALIFORNIA RIVERSIDE CAMPUS HEALTH CENTER

Blood Alcohol Testing, HIPAA Privacy and More

NOTICE OF PRIVACY PRACTICES

If you have any questions about this notice, please contact our privacy officer Dr. Jev Sikes at

SAYING WHAT THE LAW SHOULD BE: JUDICIAL USURPATION IN Al-Marri v. Wright, 487 F.3d 160 (4th Cir. 2007)

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002

SUMMARY OF THE CIRCUMSTANCES AND PURPOSES FOR WHICH YOUR HEALTH INFORMATION MAY BE USED AND DISCLOSED

NOTICE OF PRIVACY PRACTICES

4th Annual HEALTH LAW REGULATORY & COMPLIANCE COMPETITION. University of Maryland Francis King Carey School of Law. February 21, 2015 OFFICIAL RULES

National Guard Intelligence Support to Domestic Operations

TOP SECRET//COMINT//NOFORN// EXHIBIT A

PARAGOULD DOCTORS CLINIC PRIVACY NOTICE

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

NOTICE OF PRIVACY PRACTICES MOUNT CARMEL HEALTH SYSTEM

Renaissance Charitable Foundation Inc. Grantmaking Due Diligence Policy

HIPAA PRIVACY NOTICE

DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, DC

Case 1:17-cv CM Document 20 Filed 08/25/17 Page 1 of 17

New Patient Information

NOTICE OF PRIVACY PRACTICES

TOP SECRET//COMINT//NOFORN//MR

Notice of Health Information Privacy Practices Acknowledgement

Case 1:17-cv JEB Document 41 Filed 12/21/17 Page 1 of 6 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

A Very Big Branch. We ve Got a Job to Do. Help From Many. Carrying Out Laws: Enforcement. Name: The Executive Branch

Department of Defense DIRECTIVE

Transcription:

Valparaiso University Law Review Volume 50 Number 2 pp.415-417 Winter 2016 National Security Law: Up Close and Personal, An Introduction Robert Knowles Valparaiso University Law School Recommended Citation Robert Knowles, National Security Law: Up Close and Personal, An Introduction, 50 Val. U. L. Rev. 415 (2016). Available at: http://scholar.valpo.edu/vulr/vol50/iss2/2 This Article is brought to you for free and open access by the Valparaiso University Law School at ValpoScholar. It has been accepted for inclusion in Valparaiso University Law Review by an authorized administrator of ValpoScholar. For more information, please contact a ValpoScholar staff member at scholar@valpo.edu.

Knowles: National Security Law: Up Close and Personal, An Introduction Symposium NATIONAL SECURITY LAW: UP CLOSE AND PERSONAL AN INTRODUCTION Robert Knowles * In its 2014 Annual Symposium, entitled National Security: Up Close and Personal, the Valparaiso Law Review gathered scholars and practitioners to discuss the ways in which the United States government s exercise of national security powers intersects with the private lives of American citizens and people around the world. The panels comprised speakers with diverse roles and diverse perspectives, including former prosecutors, former government officials, and counsel for defendants accused of terrorism. The symposium participants grappled with one of the most difficult legal questions of our time: when advances in communication and globalization have so blurred the lines between what is foreign and what is domestic, can the special deference traditionally given to executive branch authority in the realm of national security still be justified? To be sure, the boundaries of U.S. national security law have never been limited strictly to operations abroad or the conduct of members of the armed forces. 1 But what is different now than in the past is how regularly the government s national security activities implicate the daily lives of American citizens. 2 In the years after 9/11, a series of leaks and disclosures gradually revealed the massive extent to which the National Security Agency ( NSA ) conducts surveillance of Americans private, domestic, electronic information in the course of gathering foreign intelligence. 3 If the surveillance happened to uncover evidence of domestic criminal activity (such as drug distribution), the NSA policy was * Professor of Law, Valparaiso University Law School 1 See, e.g., Youngstown Sheet & Tube Co. v. Sawyer, 543 U.S. 579 (1952); Amy Warwick, 67 U.S. (2 Black) 635 (1862) (The Prize Cases). 2 See Robert Knowles, National Security Rulemaking, 41 FLA. ST. U. L. REV. 883, 891 (2014). 3 See, e.g., Privacy and Civil Liberties Oversight Board, Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court, 9 (Jan. 23, 2014). 415 Produced by The Berkeley Electronic Press, 2016

Valparaiso University Law Review, Vol. 50, No. 2 [2016], Art. 2 416 VALPARAISO UNIVERSITY LAW REVIEW [Vol. 50 to hand over the evidence to domestic law enforcement agencies, such as the FBI or DEA, for further action. 4 The NSA operates as part of the Department of Defense, and its activities are the most prominent example of the many ways in which national security and domestic law enforcement have become entangled. In 2015, for example, the Ninth Circuit held that the Naval Criminal Investigative Service ( NCIS ) had violated the Posse Comitatus Act when, during an investigation of possession of child pornography by servicemembers, it conducted dragnet surveillance of all the civilian computers in Washington state. 5 Like the NSA, the NCIS would hand over evidence of civilian criminal activity to local law enforcement and the FBI. 6 Indeed, Attorney Thomas Durkin, in his insightful Article for this symposium issue, described his own observation that the secrecy and procedural irregularities that characterized the military prosecutions at Guantanamo Bay Naval Base have spread to the growing number of terrorism cases in U.S. federal courts. What is troubling about this line-blurring and entanglement is not that criminal activity is being uncovered and prosecuted, of course, but that the traditional limits on domestic law enforcement authority are being circumvented. These limits exist to prevent abuses of authority. Special deference to the executive branch in the national security realm has always rested on the presumption that national security is concerned with narrow or exceptional circumstances that it rarely intersects with Americans daily lives. The more national security regulation and ordinary regulation become indistinguishable, the less tenable such special deference becomes. In fact, the more matters of national security intrude on domestic affairs, the more national security law should conform to principles of ordinary law, rather than the opposite. Professor Jimmy Gurulé s Article in this symposium issue discusses a key example of the ways in which traditional law enforcement tools can be better utilized in the national security realm. Professor Gurulé proposes that the U.S. government can weaken terrorist organizations like ISIS by more aggressively pursuing criminal prosecution of entities that enable them to obtain financing. More generally, the federal courts should 4 See John Shiffman & Kristina Cooke, Exclusive: U.S. Directs Agents to Cover up Program Used to Investigate Americans, REUTERS (Aug. 5, 2013), http://www.reuters.com/article/ 2013/08/05/us-dea-sod-idUSBRE97409R20130805 [https://perma.cc/hvt9-8tt2]. 5 United States v. Dreyer, 804 F.3d 1266 (9th Cir. 2015). 6 Id. http://scholar.valpo.edu/vulr/vol50/iss2/2

Knowles: National Security Law: Up Close and Personal, An Introduction 2016] Up Close and Personal 417 re-think and reverse the recent trend toward avoiding entanglement with foreign law and activities in foreign countries. 7 In a globalized world where the most serious threats to U.S. national security operate across borders and lurk in the shadows online, it is logical that the government would respond by more closely monitoring individuals lives. Yet this is exactly why the government s national security activities should be more open to judicial oversight and public scrutiny than they have been in the past. Transparency and accountability will help ensure that privacy is protected. Moreover, in an interconnected world, the collateral consequences for the United States from surveillance abuses such as wiretapping allied leaders cell phones, for example are much greater than they would have been in the past. Greater transparency and scrutiny can also help protect the intelligence community from itself by preventing the type of failures that result from too much insularity and secrecy. 7 See, e.g., Pamela K. Bookman, Litigation Isolationism, 67 STAN. L. REV. 1081, 1084 85 (2015); Robert Knowles, A Realist Defense of the Alien Tort Statute, 88 WASH. U.L. REV. 1117, 1123 (2011). Produced by The Berkeley Electronic Press, 2016

http://scholar.valpo.edu/vulr/vol50/iss2/2 Valparaiso University Law Review, Vol. 50, No. 2 [2016], Art. 2