ARTICLE National Security Crime
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Intelligence Community in Counterinsurgency
The Intelligence Community in Counterinsurgency: Historical Lessons and Best Practices A Report of the Bush School of Government & Public Service for the RAND Corporation’s Intelligence Policy Center (IPC) The Intelligence Community in Andrew C. Albers Samuel G. Binkley Counterinsurgency: Mariam F. Chaudhry Historical Lessons and Kimberly Craswell Jordan S. Freeman Best Practices Carrie E. Lytle Tristan L. Myers Rami Naser Peter T. Sloan The recently updated counterinsurgency (COIN) doctrine for the U.S. Army (FM 3-24) includes a lengthy discussion of the role of intelligence in COIN, but does not give the U.S. intelligence community useful guidelines for operations.1 Instead, the field manual provides an all-inclusive laundry list of information to be collected without any useful guidance on priorities and methods. The manual acknowledges the crucial role of the intelligence community in COIN, but leaves out an actionable set of standards to guide its operations. To lay the groundwork for an intelligence doctrine, or a set of best practices, for COIN, this report reviews the literature on both the role of intelligence and how counterinsurgency operations are fought and won. We use this literature to create a framework outlining how For helpful comments on this project the authors would like to thank William Rosenau, Kathi Webb, Michael Spirtas, Michael Hix, Roger Molander, and the other RAND researchers who engaged the research team, as well as the faculty and students of the Bush School of Government and Public Service at Texas A&M University. The authors would also like to thank John Parachini for his helpful suggestions, comments, and, especially, his generous support and sponsorship of this project. -
Congressional Record—House H4644
H4644 CONGRESSIONAL RECORD — HOUSE June 21, 2004 GREENWOOD) came running up to me months he had in power before 9/11, Saudis or the Pakistanis or anyone else when he saw me and said, ‘‘How did you was, along with a few others, in a high to provide the leadership. It is up to know? How did you know?’’ Well, the level position to argue against, if not the people of the United States and our question is why did any of us not to change, the grotesquely mistaken leaders here to lead the way, and I have know? Why did we not know? Why did policies of the eighties and nineties, every confidence that our President those whom we have hired to protect but he failed to do so. In fact, we know will do and is doing just that. us not know? a few of the things that he did were ex- f It is time for those who made pos- actly in the wrong direction. sible the rise of the Taliban, the rise of If another 9/11 is to be avoided, we LEAVE OF ABSENCE bin Laden, and, yes, the tragedy of 9–11 need accountability. We do not need By unanimous consent, leave of ab- to be held personally accountable and the rearranging of a bureaucratic orga- sence was granted to: for us to understand the policies and nizational chart. There is nothing Mr. BECERRA (at the request of Ms. the people that caused 9–11. It was not wrong with our system that brought on PELOSI) for today on account of per- something that was ordained by God to 9/11, and there is nothing wrong with sonal reasons. -
Management Challenges at the Centre of Government: Coalition Situations and Government Transitions
SIGMA Papers No. 22 Management Challenges at the Centre of Government: OECD Coalition Situations and Government Transitions https://dx.doi.org/10.1787/5kml614vl4wh-en Unclassified CCET/SIGMA/PUMA(98)1 Organisation de Coopération et de Développement Economiques OLIS : 10-Feb-1998 Organisation for Economic Co-operation and Development Dist. : 11-Feb-1998 __________________________________________________________________________________________ Or. Eng. SUPPORT FOR IMPROVEMENT IN GOVERNANCE AND MANAGEMENT IN CENTRAL AND EASTERN EUROPEAN COUNTRIES (SIGMA) A JOINT INITIATIVE OF THE OECD/CCET AND EC/PHARE Unclassified CCET/SIGMA/PUMA Cancels & replaces the same document: distributed 26-Jan-1998 ( 98 ) 1 MANAGEMENT CHALLENGES AT THE CENTRE OF GOVERNMENT: COALITION SITUATIONS AND GOVERNMENT TRANSITIONS SIGMA PAPERS: No. 22 Or. En 61747 g . Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format CCET/SIGMA/PUMA(98)1 THE SIGMA PROGRAMME SIGMA — Support for Improvement in Governance and Management in Central and Eastern European Countries — is a joint initiative of the OECD Centre for Co-operation with the Economies in Transition and the European Union’s Phare Programme. The initiative supports public administration reform efforts in thirteen countries in transition, and is financed mostly by Phare. The Organisation for Economic Co-operation and Development is an intergovernmental organisation of 29 democracies with advanced market economies. The Centre channels the Organisation’s advice and assistance over a wide range of economic issues to reforming countries in Central and Eastern Europe and the former Soviet Union. Phare provides grant financing to support its partner countries in Central and Eastern Europe to the stage where they are ready to assume the obligations of membership of the European Union. -
General Statutes Minnesota 1913
GENERAL STATUTES OF MINNESOTA 1913 PUBLISHED UNDER THE AUTHORITY OF THE LEGISLATURE BY VIRTUE OF AN ACT APPROVED APRIL 20, 1911 (LAWS 19,11, CH.299) COMPILED AND EDITED BY FRANCIS B. TIFFANY ST. PAUL WEST PUBLISHING CO. 0 1913 MINNESOTA STATUTES 1913 1890 EIGHTS OF ACCUSED § 8515 8515. Acquittal on part of charge—Whenever any person indicted for fel ony is acquitted by verdict of part of the offence charged and convicted pn the residue, such verdict may be received and recorded by the court, and thereupon he shall be adjudged guilty of the offence, if any, which appears to be substantially charged by the residue of the indictment, and sentenced ac cordingly. (4791)- 8516. Acquittal—When a bar—Whenever a defendant shall be acquitted or convicted upon an indictment for a crime consisting of different degrees, he cannot thereafter be indicted or tried for the same crime in any other de gree, nor for an attempt to commit the crime so charged, or any degree there of. (4792) See note to Const, art. 1 § 7. CHAPTER 95 CRIMES AGAINST THE SOVEREIGNTY OF THE STATE 8517. Treason—Every person who shall commit treason against the state shall be punished by imprisonment in the state prison for life. (4793) Petit treason does not exist in this state (3-246, 169). 8518. Misprision of treason—Every person having knowledge of the com mission of treason, who conceals the same, and does not, as soon as may be, disclose.such treason to the governor or a judge of the supreme or a district court, shall be guilty of misprision of treason, and punished by a fine not ex ceeding one thousand dollars, or by imprisonment in the state prison not ex ceeding five years, or in a common jail not exceeding two years. -
Mandatory Minimum Penalties and Statutory Relief Mechanisms
Chapter 2 HISTORY OF MANDATORY MINIMUM PENALTIES AND STATUTORY RELIEF MECHANISMS A. INTRODUCTION This chapter provides a detailed historical account of the development and evolution of federal mandatory minimum penalties. It then describes the development of the two statutory mechanisms for obtaining relief from mandatory minimum penalties. B. MANDATORY MINIMUM PENALTIES IN THE EARLY REPUBLIC Congress has used mandatory minimum penalties since it enacted the first federal penal laws in the late 18th century. Mandatory minimum penalties have always been prescribed for a core set of serious offenses, such as murder and treason, and also have been enacted to address immediate problems and exigencies. The Constitution authorizes Congress to establish criminal offenses and to set the punishments for those offenses,17 but there were no federal crimes when the First Congress convened in New York in March 1789.18 Congress created the first comprehensive series of federal offenses with the passage of the 1790 Crimes Act, which specified 23 federal crimes.19 Seven of the offenses in the 1790 Crimes Act carried a mandatory death penalty: treason, murder, three offenses relating to piracy, forgery of a public security of the United States, and the rescue of a person convicted of a capital crime.20 One of the piracy offenses specified four different forms of criminal conduct, arguably increasing to 10 the number of offenses carrying a mandatory minimum penalty.21 Treason, 17 See U.S. Const. art. I, §8 (enumerating powers to “provide for the Punishment of counterfeiting the Securities and current Coin of the United States” and to “define and punish Piracies and Felonies committed on the high Seas, and Offences against the Law of Nations”); U.S. -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
Federal Mandatory Minimum Sentencing Statutes
Federal Mandatory Minimum Sentencing Statutes Charles Doyle Senior Specialist in American Public Law September 9, 2013 Congressional Research Service 7-5700 www.crs.gov RL32040 Federal Mandatory Minimum Sentencing Statutes Summary Federal mandatory minimum sentencing statutes limit the discretion of a sentencing court to impose a sentence that does not include a term of imprisonment or the death penalty. They have a long history and come in several varieties: the not-less-than, the flat sentence, and piggyback versions. Federal courts may refrain from imposing an otherwise required statutory mandatory minimum sentence when requested by the prosecution on the basis of substantial assistance toward the prosecution of others. First-time, low-level, non-violent offenders may be able to avoid the mandatory minimums under the Controlled Substances Acts, if they are completely forthcoming. The most common imposed federal mandatory minimum sentences arise under the Controlled Substance and Controlled Substance Import and Export Acts, the provisions punishing the presence of a firearm in connection with a crime of violence or drug trafficking offense, the Armed Career Criminal Act, various sex crimes include child pornography, and aggravated identity theft. Critics argue that mandatory minimums undermine the rationale and operation of the federal sentencing guidelines which are designed to eliminate unwarranted sentencing disparity. Counter arguments suggest that the guidelines themselves operate to undermine individual sentencing discretion and that the ills attributed to other mandatory minimums are more appropriately assigned to prosecutorial discretion or other sources. State and federal mandatory minimums have come under constitutional attack on several grounds over the years, and have generally survived. -
The Virtues and Vices of Advocacy Strategies in the War on Terror
Roger Williams University DOCS@RWU Law Faculty Scholarship Law Faculty Scholarship 4-2009 The etD ainees' Dilemma: The irV tues and Vices of Advocacy Strategies in the War on Terror Peter Margulies Roger Williams University School of Law Follow this and additional works at: http://docs.rwu.edu/law_fac_fs Part of the Criminal Law Commons, Human Rights Law Commons, International Law Commons, Law and Politics Commons, and the Legal Profession Commons Recommended Citation Peter Margulies, The eD tainees' Dilemma: The irV tues and Vices of Advocacy Strategies in the War on Terror, 57 Buff. L. Rev. 347, 432 (2009) This Article is brought to you for free and open access by the Law Faculty Scholarship at DOCS@RWU. It has been accepted for inclusion in Law Faculty Scholarship by an authorized administrator of DOCS@RWU. For more information, please contact [email protected]. +(,121/,1( Citation: 57 Buff. L. Rev. 347 2009 Provided by: Roger Williams University School of Law Library Content downloaded/printed from HeinOnline Thu Nov 17 10:09:44 2016 -- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and Conditions of the license agreement available at http://heinonline.org/HOL/License -- The search text of this PDF is generated from uncorrected OCR text. -- To obtain permission to use this article beyond the scope of your HeinOnline license, please use: Copyright Information BUFFALO LAW REVIEW VOLUME 57 APRIL 2009 NUMBER 2 The Detainees' Dilemma: The Virtues and Vices of Advocacy Strategies in the War on Terror PETER MARGULIESt INTRODUCTION For detainees in the war on terror, advocacy outside of court is often the main event.' Analysis of advocacy through the prism of Supreme Court decisions 2 resembles surveying t Professor of Law, Roger Williams University School of Law; e-mail: [email protected]. -
Nordic Security and Defence Cooperation: Differentiated Integration in Uncertain Times
Politics and Governance (ISSN: 2183–2463) 2020, Volume 8, Issue 4, Pages 100–109 DOI: 10.17645/pag.v8i4.3338 Article Nordic Security and Defence Cooperation: Differentiated Integration in Uncertain Times Rikard Bengtsson Department of Political Science, Lund University, 221 00 Lund, Sweden; E-Mail: [email protected] Submitted: 12 June 2020 | Accepted: 28 August 2020 | Published: 3 November 2020 Abstract A decade ago, Nordic cooperation on security and defence matters gained momentum, having been largely absent from the map of Nordic cooperation during the Cold War and its aftermath. This article analyses developments along three di- mensions of Nordic cooperation: military defence (focusing on the Nordic Defence Cooperation), civil security (in the form of the ‘Haga’ process), and political cooperation (through the implementation of the Stoltenberg report). Three observa- tions stand out as a result: First, that the three dimensions are intimately related against the background of a common Nordic conceptualization of security; second, that there is simultaneously variation in significant respects (such as driving forces, scope, and degree of institutionalization); and third, that Nordic security and defence cooperation has developed in the context of European and transatlantic security dynamics and cooperation. The second part of the analysis seeks to interpret this picture from the analytical perspective of differentiated integration. The article ends with a set of reflections on the future of Nordic security and defence cooperation in light of the Coronavirus pandemic. Keywords civil security; cooperation; defence; differentiated integration; Haga process; NORDEFCO; Nordic; security; Stoltenberg Issue This article is part of the issue “Rediscovering Nordic Cooperation” edited by Anne Elizabeth Stie (University of Agder, Norway) and Jarle Trondal (University of Agder, Norway/ARENA University of Oslo, Norway). -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
La Terrible Impostura
Thierry Meyssan 11 de septiembre de 2001 LA TERRIBLE IMPOSTURA Ningún avión se estrelló en el pentágono (A) Editorial El Ateneo 303.6 Meyssan,Thierry MEY La terrible impostura - la. ed., - Buenos Aires El Ateneo, 2002 256 p.; 15,Sx22,Scm. © de la traducción, Ariadna Martin Sirarols ISBN: 950-02-8684-X 1. Título - 1. Historia Diseño de interiores: Lucila Schonfeld Foto de tapa:Tom Horan, AP © 2002,Thierry Meyssan © 2002, Carnot Derechos exclusivos de edición en castellano reservados para América Latina. Queda hecho el depósito que establece la ley 11.723 Primera edición de Editorial El Ateneo © 2002, LIBRERÍASYENNY S.A. Patagones 2463 - (C1282ACA) Buenos Aires -Argentina Tel.: (54 11) 4942 9002 / 4943 8200 - Fax: (54 11) 4308 4199 E-mail: [email protected] Impreso en la Argentina índice PRIMERA PARTE Introducción 11 Una escenificación sangrienta Capítulo 1. El avión fantasma del Pentágono .............. 15 Capítulo 2. Cómplices en tierra .................................... 33 Capítulo 3.Topos en la Casa Blanca ............................. 45 Capítulo 4. El FBI hace aspavientos ............................... 55 SEGUNDA PARTE Muerte de la democracia en Norteamérica Capítulo 5. ¿Respuesta o ganga?.................................... 69 Capítulo 6. ¿De la oración fúnebre a la guerra santa? ..................................................... 81 Capítulo 7. Plenos poderes ........................................... 91 TERCERA PARTE El imperio ataca Capítulo 8. ¡La culpa es de Bin Laden! ......................... 109 Capítulo 9. Los -
Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia