Part I: Basic Issues of Constitutional and International Law 1

Similar documents
Syllabus Law 384: National Security Law. Antonin Scalia Law School Fall Profs. Darren M. Dick & Arthur Rizer

Chapter 17: Foreign Policy and National Defense Section 2

Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction

SECRETARY OF DEFENSE 1000 DEFENSE PENTAGON WASHINGTON, DC

Article 140a (New Provision) Case Management; Data Collection and Accessibility

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW

Federal Law Enforcement

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

Department of Defense INSTRUCTION

Primer for Litigating Classified Information Cases

Attorney General's Guidelines for Domestic FBI Operations V2.0

The Law of Terrorism

ANALYSIS FOR THE HOMELAND SECURITY ACT OF 2002

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

The President. Part V. Tuesday, January 27, 2009

Department of Defense DIRECTIVE

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002

9/11/2015. Navigation in the Meeting Room. Counter-Proliferation Investigations & National Security

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

DSMA NOTICE 01. Military Operations, Plans & Capabilities

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC

National Security Law: Up Close and Personal, An Introduction

Planning Terrorism Counteraction ANTITERRORISM

MEMORANDUM OF UNDERSTANDING (MOU) INTERGOVERNMENTAL AGREEMENT

CONSOLIDATED NATIONAL NUCLEAR SECURITY REPORT

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline

DoD R, December 1982

DOD INSTRUCTION INVESTIGATIONS BY DOD COMPONENTS

The President of the Security Council presents his. compliments to the members of the Council and has the

Department of Defense INSTRUCTION

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 22, 2009 EXECUTIVE ORDER

City of Torrance Police Department

Preserving Investigative and Operational Viability in Insider Threat

National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex

AGENCY: Transportation Security Administration (TSA), Department of Homeland

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

Syllabus Law 654 Counterterrorism Law Seminar. George Mason University Antonin Scalia Law School Spring 2018

August Initial Security Briefing Job Aid

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC

Department of Defense DIRECTIVE

Department of Defense

TECHNICAL SUPPORT WORKING GROUP. Perry Pederson Infrastructure Protection Subgroup

Department of Defense INSTRUCTION

SPM D-3595 Page 2 of 9 SEVENSEAS SHIPHIPHANDLERS Modification P00222

Department of Defense DIRECTIVE

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

SIA PROPRIETARY NOTE: All speaker comments are off-therecord and not for public release

DALLAS CYBER TASK FORCE. Standard Memorandum of Understanding. Between THE FEDERAL BUREAU OF INVESTIGATION. and

Teacher Assessment Blueprint

I. PURPOSE SHERIFF S OFFICE COMMAND CORRECTIONS DIVISION. Page 1 of 7

SUMMARY: The Department of Homeland Security (DHS) is revising its procedures

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 5.26

Department of Defense DIRECTIVE

CRS Report for Congress Received through the CRS Web

Department of Defense INSTRUCTION

Export Enforcement. - Attacking the Network. Rick Shimon Special Agent In Charge Washington Field Office

Posse Comitatus Has the Posse outlived its purpose? Craig T. Trebilcock

The White House. National Security Presidential Memorandum on Strengthening the Policy of the United States Toward Cuba

Guidelines on SPECIAL BRANCH WORK in the United Kingdom

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

Case 1:08-cv JR Document 9-6 Filed 08/11/2008 Page 1 of 76. James Madison Project v. CIA, Civil Action No (D.D.C.

COMBATING TERRORISM TECHNOLOGY SUPPORT OFFICE. Leveraging the Interagency and International to Support SOF

Employ Florida Marketplace Terms and Conditions Governing your access and use of the Employ Florida Marketplace (EFM)

NO JURISDICTIONAL BOUNDARIES THE TERRORISM PAPERS

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

[1] Executive Order Ensuring Lawful Interrogations

The 911 Implementation Act runs 280 pages over nine titles. Following is an outline that explains the most important provisions of each title.

Homeland Security. Chapter e57 1. STATUTORY AUTHORITIES. The USA PATRIOT Act of 2001 (PL )

SEC UNIFORM STANDARDS FOR THE INTERROGATION OF PERSONS UNDER THE DETENTION OF THE DEPARTMENT OF DEFENSE.

NG-J2 CNGBI A CH 1 DISTRIBUTION: A 07 November 2013

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

UNDER SECRETARY OF DEFENSE 4000 DEFENSE PENTAGON WASHINGTON, D.C

Overview of the Military Justice

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

The International Association of Chiefs of Police. Presentation on United States Law Enforcement March 23, 2015

CHAPTER 246. C.App.A:9-64 Short title. 1. This act shall be known and may be cited as the "New Jersey Domestic Security Preparedness Act.

Department of Defense INSTRUCTION. Defense Support of Civilian Law Enforcement Agencies

FOLLOW-UP AUDIT OF THE FEDERAL BUREAU OF INVESTIGATION S EFFORTS TO HIRE, TRAIN, AND RETAIN INTELLIGENCE ANALYSTS

Federal Bureau of Investigation (FBI)

Draft Revised: 4/19/2011 4:10:25 PM RESOLUTION NO.

Chapter 13 Section 1

Student Guide: Controlled Unclassified Information

Name of Instructor(s): Byron Boston Days/Hours of Course Proposed: 3 Days/24 Training Hours

An Introduction to Strategic Studies

DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, DC

RESUME OF RONALD J. SIEVERT

Craig A. Miles, Adjunct Faculty. Office: Enterprise Hall 3 rd Floor, Suite #354 Fairfax Campus. Office hours: By appointment.

Student Guide Course: Original Classification

No February Criminal Justice Information Reporting

Bureau of Industry and Security U.S. Department of Commerce

Introduction. The Terrorist Financing Operations Section (TFOS)

CTTSO Overview. NDIA 9 Sept 2009

Department of Defense DIRECTIVE. Inspector General of the Department of Defense (IG DoD)

Department of Defense INSTRUCTION. International Transfers of Technology, Articles, and Services

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

Transcription:

Contents Introduction xi Part I: Basic Issues of Constitutional and International Law 1 1 Separation of Powers and National Security 3 By Vijay M. Padmanabhan The Reality 4 Experts 11 Resources 12 2 The First Amendment and National Security 13 By Julia Atcherley and Lee Levine Setting the Stage: The Sedition Act and the Pentagon Papers 14 Criminal Prosecution of Journalists 16 Sources and Subpoenas: The Reporter s Privilege 18 Conclusion 21 Experts 21 Resources 22 3 U.S. Government Secrecy and Classification 25 By John R. Tunheim and Andrew M. Borene Classification in U.S. History 25 Executive Orders 27 The Current Executive Order Governing Classification 27 Modern Classification Categories 28 Sensitive Compartmented Information 29 Special Access Programs 30 v

CONTENTS Ban on Use of Classification to Hide Embarrassing Information 31 Access to Classified Information 33 Unclassified but Protected For Official Use Only 34 Sanctions: Legal Consequences for Violating Classification Rules 35 Experts 36 Resources 36 Appendix to Chapter 3 39 4 The Role of International Law in Domestic Courts 67 By Deborah Pearlstein What Is International Law? 68 Treaties 68 Customary International Law 69 When Questions of International Law Arise before U.S. Courts 71 Conclusion 75 Experts 75 Resources 76 5 Defining Terrorism under International Law 79 By David Scharia Introduction 79 Defining Terrorism at the United Nations 80 Resolutions Requiring Member States to Take Measures against Terrorism 86 Terrorism as an International Crime 88 Terrorism as a Crime under International Customary Law 90 Conclusion 91 Experts 92 Resources 92 Part II: The Laws of War and Military Operations 95 6 The Laws of War: Regulating the Use of Force 97 By Geoffrey S. Corn and Laurie R. Blank The Jus ad Bellum: The International Legal Basis for the Use of Force 98 The Jus in Bello: Regulating the Conduct of Hostilities 105 Conclusion 118 Experts 119 Resources 120 7 Secret Operations: Covert Action and Military Activities 123 By Benjamin Powell Military Activities under Title 10 of the U.S. Code 125 Covert Action under Title 50 of the U.S. Code 126 Traditional Military Activities and Covert Action 129 vi

Contents Experts 132 Resources 133 8 Piracy 135 By Eugene Kontorovich Background 135 Causes of Somali Piracy 137 Private Military Contractors and Rules of Engagement 138 Difficulties in Prosecution 140 Transfers for Trial 141 Experts 142 Resources 143 9 The United Nations Convention on the Law of the Sea 145 By Glenn M. Sulmasy and Chris Tribolet Introduction 145 Early Development of the Law of the Sea 146 Jurisdiction Creep Begins 147 The 1958 Conventions on the Law of the Sea 148 The Push for a Comprehensive Law of the Sea Treaty 148 The United Nations Convention on the Law of the Sea (UNCLOS III) 149 The Status of UNCLOS III in U.S. Law 158 Experts 159 Resources 159 10 Targeted Killings and the Law 161 By Amos N. Guiora Historical Background of Self-Defense 163 Differentiating Extrajudicial Killing from Targeted Killing 166 The Decision-Making Process 166 Conclusion 170 Experts 170 Resources 171 11 Military Commissions 173 By David W. Glazier Military Commission History 174 Bush Administration Military Commissions 177 Guantanamo Trials under the Military Commissions Act of 2009 178 Guantanamo Military Commission Issues 179 Conclusion 181 Experts 182 Resources 182 vii

CONTENTS 12 Courts-Martial and Other Military Legal Proceedings 183 By Jim McPherson Administrative Personnel Proceedings 183 Court-Martial Proceedings 186 Posttrial Proceedings 192 Experts 193 Resources 193 Part III: Domestic Law Enforcement and Counterterrorism 195 13 U.S.-Based Intelligence: The Law and Organizational Structure 197 By W. Renn Gade and Harvey Rishikof U.S.-Based Intelligence Defined 200 Post-9/11 Changes and the Structure of the U.S.-Based Intelligence Enterprise 201 Department of Homeland Security 202 Director of National Intelligence 203 Department of Justice and the FBI 204 Department of Defense 207 Future Challenges with U.S.-Based Intelligence 208 Experts 210 Resources 210 14 National Security Investigations 215 By Todd Hinnen The Historical Foundations of Modern National Security Investigations 216 The Emergence of a Legal Framework 218 Oversight of National Security Investigations 224 Conclusion 225 Experts 226 Resources 226 15 Electronic Surveillance and Cybersecurity 227 By James X. Dempsey Constitutional Origins 227 Statutes Regulating Electronic Surveillance and Related Activities 231 Cybersecurity 241 Experts 242 Resources 242 16 Material Support of Terrorism: Tool for Public Safety or Recipe for Overreaching? 243 By Peter Margulies A (Very) Short History of Conspiracy 245 History of the Material Support Laws 246 Prosecutions for Aiding Terrorist Activity under Section 2339A 247 Use of Informants 250 viii

Contents Material Support of Designated Organizations 250 Criticisms of the Material Support Law 256 Material Support beyond Criminal Law 257 Military Commissions 258 Immigration Impact 260 Experts 261 Resources 261 17 Extraterritorial Issues: Investigation and Prosecution of National Security Cases 263 By Jennifer C. Daskal Introduction 263 Jurisdiction for Extraterritorial Offenses 264 Investigations Abroad 268 Obtaining the Defendant 272 Posttrial 274 Conclusion 275 Experts 275 Resources 275 18 Data Mining: A Primer 279 By Adam Isles What Is Data Mining? 281 Historical Context 285 Understanding the Relationship of Technology to Policy 290 In the News 293 Experts 297 Resources 297 19 Exports of Surveillance Technology to Repressive Regimes 299 By Michael T. Gershberg Substantive Law A Patchwork of Rules 301 Procedure Vastly Differing Time Horizons between News and Investigation Cycles 306 Conclusion 308 Experts 308 Resources 309 Part IV: Homeland Security Issues 311 20 The Use of the Military in the Homeland 313 By Kurt Johnson Military Roles in the Homeland 314 Civilian Control of the Military 315 Federal versus State Powers and the Tenth Amendment to the U.S. Constitution 315 ix

CONTENTS The Military 316 Unity of Command versus Unity of Effort and the Dual Status Commander 317 Who Is in Charge? The Civil Support/Homeland Defense Continuum 318 The Posse Comitatus Act and the Insurrection Act 320 Immediate Response Authority 323 Intelligence Oversight 323 Conclusion 325 Experts 326 Resources 326 21 Border Security and the Law 329 By Susan Ginsburg Background 330 Border Security Intelligence Authorities 331 Use of Immigration Law in Counterterrorism 334 Traveler Screening and the Visa Process 340 Illegal Immigration and Border Security 342 Allocation of Federal, State, and Local Immigration Authority 345 Military Homeland Defense 347 Conclusion 348 Experts 349 Resources 350 22 Airport Screening and Scanning 351 By J. Bennet Waters and Paul Rosenzweig Introduction 351 The Legal Environment 352 Advanced Imaging Technology: Understanding the Technology 354 Limitations and Concerns 355 Necessity and Justification: The Administrative Procedures Act 357 Experts 358 Resources 359 23 Responding to Biological Attacks 361 By Barry Kellman Detection and Diagnosis 362 Medical Countermeasures 365 Response and Restoration of Order 368 Conclusion 371 Experts 371 Resources 372 About the Editors 375 About the Contributors 379 Index 389 x