Terrorist Watch: 23 Plots Foiled Since 9/11 Jena Baker Mcneill and James Jay Carafano, Ph.D

Total Page:16

File Type:pdf, Size:1020Kb

Terrorist Watch: 23 Plots Foiled Since 9/11 Jena Baker Mcneill and James Jay Carafano, Ph.D No. 2294 July 2, 2009 Terrorist Watch: 23 Plots Foiled Since 9/11 Jena Baker McNeill and James Jay Carafano, Ph.D. Since the 9/11 terrorist attacks, 23 terrorist plots ficult target for terrorists. Those who claim that the against the United States have been foiled. This U.S. has not made progress since 2001 need only report updates a November 2007 report from the look at these 23 foiled plots for evidence to the con- Heritage Foundation that described 19 plots that trary. Nevertheless, these successes demonstrate had been foiled to date since 9/11. Less than two that individuals and terrorist groups are still seeking years later, the U.S. has foiled four more plots aimed to do Americans harm and that the U.S. needs to at Americans. While some trials have ended in mis- continue fighting terrorism. Continuing the fight trial and charges against some suspects were will require an ongoing commitment from the dropped, significantly more individuals have been White House, Congress, and American citizens. convicted and sentenced for their crimes. The Executive Branch. President Barack Obama These victories make the case for continued U.S. pledged that his Administration would continue to vigilance against terrorism around the globe. While build U.S. capacity and international partnerships these particular attacks have been disrupted, the to track down, capture, and kill terrorists around threat remains. The Department of Homeland Secu- the world. The Administration also needs to con- rity (DHS) and Congress should not construe the tinue to make combating terrorism an international successes over the past eight years as a signal to effort. The U.S. cannot afford to leave our allies reduce U.S. counterterrorism efforts. behind because America will not be safe without America is truly in a long war against terrorism. their cooperation. Specifically, the Administration To win this war, the U.S. must constantly adapt to and the DHS should: ever-changing terrorist threats. Congress and the DHS will need to work together to provide contin- • Expand the Visa Waiver Program. The White ued support for terrorism-fighting tools, to increase House should continue to bring new countries information sharing and collective security efforts around the globe, and to expand vital law enforce- ment partnerships with local and state law enforce- This paper, in its entirety, can be found at: ment and cooperation with the governments of www.heritage.org/Research/HomelandSecurity/bg2294.cfm other countries. These relationships have enabled Produced by the Douglas and Sarah Allison Center for Foreign Policy Studies the U.S. to disrupt the flow of money and resources of the to terrorist groups. Kathryn and Shelby Cullom Davis Institute for International Studies Going Forward. As a result of America’s coun- Published by The Heritage Foundation terterrorism efforts, the U.S. has become a more dif- 214 Massachusetts Avenue, NE Washington, DC 20002–4999 (202) 546-4400 • heritage.org Nothing written here is to be construed as necessarily reflecting the views of The Heritage Foundation or as an attempt to aid or hinder the passage of any bill before Congress. No. 2294 July 2, 2009 into the VWP that meet the requirements and Americans against attack, and simultaneously pre- desire to work with the U.S. on security matters. pared to carry on if an attack occurs. • Continue to develop relationships among foreign, The private sector is often the source of innova- federal, state, and local law enforcement. While tions in homeland security technologies, which information fusion centers have helped increase helped law enforcement to foil the 23 attacks. To the flow of information among the federal gov- better facilitate this research and development, the ernment and state and local law enforcement, private sector should: more needs to be done to continue and expand • Take advantage of the SAFETY Act. The Support the free flow of information at all levels. Cooper- Anti-terrorism by Fostering Effective Technolo- ation with foreign law enforcement agencies is gies (SAFETY) Act of 2002 offers liability protec- also essential. tion to companies if their technology is deployed Congress. Congress plays a substantial role in in the event of an act of terrorism. The DHS developing and sustaining America’s counterterror- should continue to look for better ways to inform ism abilities. Congress should: companies about these protections and encour- • Promptly reauthorize key sections of the age them to take full advantage. Bringing the pri- PATRIOT Act and FISA. Allowing either law to vate sector under this protection will facilitate the lapse would impede efforts to track terrorists and development and deployment of new and better to prevent terrorist attacks, such as those that technologies that will keep Americans safer. have been disrupted over the past eight years. Staying Diligent. The 23 plots foiled are a credit • Repeal the 100 percent scanning mandates. Push- to the hard-working and dedicated federal, state, ing forward with 100 percent screening of mari- and local law enforcement professionals in the time or air cargo would waste precious resources United States and law enforcement agencies in other for very little gain. A better approach would be to countries. As Americans go about their lives, they repeal these mandates and look for a risk-based still need to remain diligent in fighting terrorism to approach to security that does not undermine protect their freedom, safety, security, and prosperity. U.S. diplomatic relationships or unhinge the supply These reforms, together with diligence, an aware- chain. Such measures could include expanding ness of the threat, and application of the multiple the Customs Trade Partnership against Terrorism lessons learned since 9/11 will make America safer. (C-TPAT), a voluntary network of shippers that submit security information in exchange for —Jena Baker McNeill is Policy Analyst for Home- expedited shipping, and the Proliferation Secu- land Security in the Douglas and Sarah Allison Center rity Initiative (PSI), a voluntary multilateral effort for Foreign Policy Studies, a division of the Kathryn and of 90 nations to interdict shipments of weapons Shelby Cullom Davis Institute for International Studies, of mass destruction and related materials. at The Heritage Foundation. James Jay Carafano, Ph.D., is Assistant Director of the Davis Institute and The American People. Americans need to remain Senior Research Fellow for National Security and energized and engaged in efforts to improve the Homeland Security in the Allison Center at The Heritage safety of their families and communities. Americans Foundation. Pamela Siegel, an independent researcher, need to be resilient, recognizing the need to protect contributed to the writing of this paper. No. 2294 July 2, 2009 Terrorist Watch: 23 Plots Foiled Since 9/11 Jena Baker McNeill and James Jay Carafano, Ph.D. Since the 9/11 terrorist attacks, 23 terrorist plots against the United States have been foiled. This report updates a November 2007 report from the Heritage Talking Points Foundation that described 19 plots that had been • Since 9/11, 23 terrorist plots against the U.S. foiled to date since 9/11. Less than two years later, the have been foiled, including plots to collapse U.S. has foiled four more plots aimed at Americans. the Brooklyn Bridge and to blow up the Sears While some trials have ended in mistrial and charges Tower. Many of the individuals involved in against some suspects were dropped, significantly these plots have been convicted and sen- more individuals have been convicted and sentenced tenced to time in prison for their participation. for their crimes. • The 23 foiled plots demonstrate why Amer- These victories make the case for continued U.S. ica needs to stay vigilant in its efforts to stop vigilance against terrorism around the globe. While terrorism around the globe. America has these particular attacks have been disrupted, the become a more difficult target for terrorists, threat remains. The Department of Homeland Secu- but the threat has not diminished. rity (DHS) and Congress should not construe the suc- • Adjusting and strengthening U.S. security cesses over the past eight years as a signal to reduce efforts to conquer these changing threats will U.S. counterterrorism efforts. require Congress and the Department of Homeland Security to work together to pro- America is truly in a long war against terrorism. To vide continued terror-fighting legal and win this war, the U.S. must constantly adapt to ever- investigatory tools, increase information changing terrorist threats. Congress and the DHS will sharing and collective security efforts around need to work together to provide continued support the globe, and expand vital law enforcement for terrorism-fighting tools, to increase information partnerships from the local to the interna- sharing and collective security efforts around the tional level. globe, and to expand vital law enforcement partner- ships with local and state law enforcement and coop- eration with the governments of other countries. This paper, in its entirety, can be found at: These relationships have enabled the U.S. to disrupt www.heritage.org/Research/HomelandSecurity/bg2294.cfm Produced by the Douglas and Sarah Allison the flow of money and resources to terrorist groups. Center for Foreign Policy Studies of the Kathryn and Shelby Cullom Davis Foiled Plots Since 9/11 Institute for International Studies In the days after 9/11, America immediately went to Published by The Heritage Foundation 214 Massachusetts Avenue, NE work to prevent another act of terrorism by reassessing Washington, DC 20002–4999 (202) 546-4400 • heritage.org Nothing written here is to be construed as necessarily reflect- ing the views of The Heritage Foundation or as an attempt to aid or hinder the passage of any bill before Congress. No. 2294 July 2, 2009 U.S.
Recommended publications
  • (2008): Perspectives on Terrorism
    Table of Contents: Accounting For the Waves of International Terrorism ………….…...3 By Dipak K. Gupta Interpreting the PKK’s Signals in Europe…………………………...10 By Vera Eccarius-Kelly Review Essay: Top 50 Books on Terrorism and Counterterrorism…15 By Joshua Sinai PERSPECTIVES ON TERRORISM Volume II, Issue 11 Accounting For the Waves of International Terrorism By Dipak K. Gupta “Without the pen of Pain, the swords of Washington would have been wielded in vain.” - John Adams dvancements in sciences come through painstaking observations. Scientists’ astute observations of the seemingly chaotic world pave the way for what is known as “knowledge creep.” Terrorism research is certainly no exception to this rule. One of David Rapoport’s singular contributions to A our advancement of knowledge has been his articulation of the four waves of international terror- ism. Rapoport (2006:10) defines waves with three characteristics: a) a cycle of activities characterized by ex- pansion and contraction phases, b) covering multiple nations, and c) “driven by a common predominant energy that shapes the participating groups’ characteristics and mutual relationships.” By studying the history of ter- rorism since the 1880s, Professor Rapoport identifies four distinct waves fueled by common ideological fervor emanating from anarchism, anti-colonialism, socialism, and religious fundamentalism, respectively, with the first three waves lasting roughly 40 years each. Although the “wave” theory has gained a firm footing in the extant literature on terrorism (Sageman 2008a), to my knowledge, not much effort has gone into the examination of the causes of, and the process by which mega ideas saturate nearly every corner of the earth.
    [Show full text]
  • 65 Question History Test. See If You Can Get 100%
    65 QUESTION HISTORY TEST. SEE IF YOU CAN GET 100%. HERE’S THE TEST: 1. 1968 Bobby Kennedy was shot and killed by: a. Superman b. Jay Leno c. Long-haired pot head d. A Muslim male extremist between the ages of 17 and 40 suffering from pre-traumatic stress disorder. This murderer was a twenty-four year old Palestinian immigrant named Sirhan Sirhan. 2. In 1972 at the Munich Olympics, Israeli athletes were kidnapped and massacred by : a. Olga Corbett b. Sitting Bull c. Arnold Schwarzenegger d. Muslim male extremists between the ages of 17 and 40 unable to cope with the strain of competition between nation states in which they saw medals as signs of warlike domination 3. In November 1979, the US embassy in Tehran Iran was seized and taken over and 66 hostages are taken. This seizure was an outright attack on American Soil. The hostages were held for 444 days and were released on the day of President Reagan’s inauguration. The embassy was taken over by: a. Lost Norwegians interviewing candidates for kinetic Nobel Prizes, for potential future acts of valor they might commit b. Elvis c. A tour bus full of 80-year-old women d. Muslim male extremists between the ages of 17 and 40 strained by the invasion of infidels on their soil and unable to attend US universities on scholarship. One of the participants in the seizure of the embassy may have been Mahmoud Ahmadinejad, the current President of Iran who holds a Ph.D. in traffic and transport engineering from Tehran University of Science and Technology and was a 23-year old student at the time.
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Obstructing Justice: the Rise and Fall of the AEDPA*
    AGARWAL.DOC 9/17/2019 11:04 AM Obstructing Justice: The Rise and Fall of the AEDPA* TABLE OF CONTENTS I. INTRODUCTION .................................................................................................. 840 II. THE CURRENT POLITICAL LANDSCAPE: PUSHING FORWARD DESPITE PUBLIC DISSENT ................................................... 843 III. THE AEDPA OF 1996 ........................................................................................ 850 A. At Issue: Prohibiting Material Support to Designated Foreign Terrorist Organizations .......................................... 850 B. Major Constitutional Victories: The Rise of the AEDPA ........................................................................................... 857 1. Under the First Amendment: Guilt by Association ........................... 858 2. Under the First Amendment: Political Advocacy and the Question of Scrutiny ............................................................. 863 3. Under the First Amendment: Vagueness ........................................... 866 IV. HITTING A BRICK WALL: THE FALL OF THE AEDPA .......................................... 871 A. National Security: Abridging Procedural Due Process to Foreign Terrorist Organizations .................................... 878 B. Crisis Legislation: The Age-Old Conflict Between Civil Liberties and National Security ....................................................... 882 1. Distinguishing the Alien and Sedition Acts ....................................... 886 2. Distinguishing Japanese
    [Show full text]
  • JIHAD Pag 1-10 Revazut.Qxd
    JIHADUL ISLAMIC DE LA "|NFRÂNGEREA TERORII" {I "R+ZBOIUL SFÂNT" LA "SPERAN}A LIBERT+}II" JIHADUL ISLAMIC 1 Foto coperta I • SHEIKH MAWLANA MUHAMMAD HISHAM COD CNCSIS 270 ANDREESCU, ANGHEL Jihadul Islamic de la ''|nfrângerea terorii'' [i ''R=zboiul Sfânt''ANDREESCU, la ''speran]a ANGHEL libert=]ii'' / Anghel Andreescu, NicolaeJihadul Radu. Islamic - Bucure[ti: de la ''|nfrângerea Editura Ministerului terorii'' [i ''R=zboiulInternelor [iSfânt'' Reformei la Administrative,''speran]a libert=]ii'' 2008 / Anghel Andreescu, Bibliogr.Nicolae Radu. - Bucure[ti: Editura Ministerului Internelor ISBN[i Reformei 978-973-745-011-1 Administrative, 2008 Bibliogr. I.ISBN Radu, 978-973-745-011-1 Nicolae 329.7(¡411.21)I. Radu, Nicolae Jihad 329.7(¡411.21) Jihad Opera]ii editoriale: colectiv Editura MIRA Tip=rit: Tipografia Codex Anghel ANDREESCU, Nicolae RADU 2 Chestor general de poli]ie Comisar [ef prof. univ. dr. Anghel ANDREESCU conf. univ. dr. Nicolae RADU JIHADULJIHADUL ISLAMICISLAMIC DE LA "|NFRÂNGEREA TERORII" {I "R+ZBOIUL SFÂNT" LA "SPERAN}A LIBERT+}II" BUCURE{TI – 2008 – JIHADUL ISLAMIC 3 Cuprins Gând pentru toleran]= . 9 Prefa]= . 11 Introducere . 15 Introduction . 29 Introduction . 43 Lista abrevieri . 59 Capitolul 1 De la Islam la cunoa[terea Jihadului . 65 Cât de bine cunoa[tem Islamul? . 65 Unicitatea lui Allah . 79 |n numele credin]ei . 96 Calea spre Mecca . 98 Ebraismul confirmat . 103 Moartea Profetului . .104 Urma[ii lui Mahomed . 106 Dinastia Abbasida [i civiliza]ia islamic= . 109 |n=l]are [i dec=dere . 110 {ii]i [i suni]i . 111 Religia \ntre [ii]i [i suni]i . 113 Cartea Sfânt= a Islamului . 115 Nemurirea sufletului .
    [Show full text]
  • 30 Terrorist Plots Foiled: How the System Worked Jena Baker Mcneill, James Jay Carafano, Ph.D., and Jessica Zuckerman
    No. 2405 April 29, 2010 30 Terrorist Plots Foiled: How the System Worked Jena Baker McNeill, James Jay Carafano, Ph.D., and Jessica Zuckerman Abstract: In 2009 alone, U.S. authorities foiled at least six terrorist plots against the United States. Since Septem- ber 11, 2001, at least 30 planned terrorist attacks have Talking Points been foiled, all but two of them prevented by law enforce- • At least 30 terrorist plots against the United ment. The two notable exceptions are the passengers and States have been foiled since 9/11. It is clear flight attendants who subdued the “shoe bomber” in 2001 that terrorists continue to wage war against and the “underwear bomber” on Christmas Day in 2009. America. Bottom line: The system has generally worked well. But • President Obama spent his first year and a half many tools necessary for ferreting out conspiracies and in office dismantling many of the counterter- catching terrorists are under attack. Chief among them are rorism tools that have kept Americans safer, key provisions of the PATRIOT Act that are set to expire at including his decision to prosecute foreign ter- the end of this year. It is time for President Obama to dem- rorists in U.S. civilian courts, dismantlement of onstrate his commitment to keeping the country safe. Her- the CIA’s interrogation abilities, lackadaisical itage Foundation national security experts provide a road support for the PATRIOT Act, and an attempt map for a successful counterterrorism strategy. to shut down Guantanamo Bay. • The counterterrorism system that has worked successfully in the past must be pre- served in order for the nation to be successful In 2009, at least six planned terrorist plots against in fighting terrorists in the future.
    [Show full text]
  • Ohio Terrorism N=30
    Terry Oroszi, MS, EdD Advanced Technical Intelligence Center ABC Boonshoft School of Medicine, WSU Henry Jackson Foundation, WPAFB The Dayton Think Tank, Dayton, OH Definitions of Terrorism International Terrorism Domestic Terrorism Terrorism “use or threatened use of “violent acts that are “the intent to instill fear, and violence to intimidate a dangerous to human life the goals of the terrorists population or government and and violate federal or state are political, religious, or thereby effect political, laws” ideological” religious, or ideological change” “Political, Religious, or Ideological Goals” The Research… #520 Charged (2001-2018) • Betim Kaziu • Abid Naseer • Ali Mohamed Bagegni • Bilal Abood • Adam Raishani (Saddam Mohamed Raishani) • Ali Muhammad Brown • Bilal Mazloum • Adam Dandach • Ali Saleh • Bonnell (Buster) Hughes • Adam Gadahn (Azzam al-Amriki) • Ali Shukri Amin • Brandon L. Baxter • Adam Lynn Cunningham • Allen Walter lyon (Hammad Abdur- • Brian Neal Vinas • Adam Nauveed Hayat Raheem) • Brother of Mohammed Hamzah Khan • Adam Shafi • Alton Nolen (Jah'Keem Yisrael) • Bruce Edwards Ivins • Adel Daoud • Alwar Pouryan • Burhan Hassan • Adis Medunjanin • Aman Hassan Yemer • Burson Augustin • Adnan Abdihamid Farah • Amer Sinan Alhaggagi • Byron Williams • Ahmad Abousamra • Amera Akl • Cabdulaahi Ahmed Faarax • Ahmad Hussam Al Din Fayeq Abdul Aziz (Abu Bakr • Amiir Farouk Ibrahim • Carlos Eduardo Almonte Alsinawi) • Amina Farah Ali • Carlos Leon Bledsoe • Ahmad Khan Rahami • Amr I. Elgindy (Anthony Elgindy) • Cary Lee Ogborn • Ahmed Abdel Sattar • Andrew Joseph III Stack • Casey Charles Spain • Ahmed Abdullah Minni • Anes Subasic • Castelli Marie • Ahmed Ali Omar • Anthony M. Hayne • Cedric Carpenter • Ahmed Hassan Al-Uqaily • Antonio Martinez (Muhammad Hussain) • Charles Bishop • Ahmed Hussein Mahamud • Anwar Awlaki • Christopher Lee Cornell • Ahmed Ibrahim Bilal • Arafat M.
    [Show full text]
  • Countering Radicalization of Diaspora Communities in Canada
    ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for L’information dont il est indiqué qu’elle est archivée reference, research or recordkeeping purposes. It est fournie à des fins de référence, de recherche is not subject to the Government of Canada Web ou de tenue de documents. Elle n’est pas Standards and has not been altered or updated assujettie aux normes Web du gouvernement du since it was archived. Please contact us to request Canada et elle n’a pas été modifiée ou mise à jour a format other than those available. depuis son archivage. Pour obtenir cette information dans un autre format, veuillez communiquer avec nous. This document is archival in nature and is intended Le présent document a une valeur archivistique et for those who wish to consult archival documents fait partie des documents d’archives rendus made available from the collection of Public Safety disponibles par Sécurité publique Canada à ceux Canada. qui souhaitent consulter ces documents issus de sa collection. Some of these documents are available in only one official language. Translation, to be provided Certains de ces documents ne sont disponibles by Public Safety Canada, is available upon que dans une langue officielle. Sécurité publique request. Canada fournira une traduction sur demande. Working Paper Series No. 11-12 September 2011 Countering Radicalization of Diaspora Communities in Canada Richard B. Parent and James O Ellis III Series editor: Linda Sheldon, SFU; Krishna
    [Show full text]
  • By Any Means Necessary: the Quandary the CIA Now Faces in Light of Employing Enhanced Interrogation Methods to Combat the War on Terror Joshua Laufer
    Duquesne University Duquesne Scholarship Collection Electronic Theses and Dissertations Spring 2011 By Any Means Necessary: The Quandary the CIA Now Faces In Light of Employing Enhanced Interrogation Methods to Combat the War on Terror Joshua Laufer Follow this and additional works at: https://dsc.duq.edu/etd Recommended Citation Laufer, J. (2011). By Any Means Necessary: The Quandary the CIA Now Faces In Light of Employing Enhanced Interrogation Methods to Combat the War on Terror (Master's thesis, Duquesne University). Retrieved from https://dsc.duq.edu/etd/802 This Immediate Access is brought to you for free and open access by Duquesne Scholarship Collection. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Duquesne Scholarship Collection. For more information, please contact [email protected]. BY ANY MEANS NECESSARY: THE QUANDARY THE CIA NOW FACES IN LIGHT OF EMPLOYING ENHANCED INTERROGATION METHODS TO COMBAT THE WAR ON TERROR A Thesis Submitted to the McAnulty College and Graduate School of Liberal Arts Duquesne University In partial fulfillment of the requirements for the degree of Master of Arts By Joshua Laufer May 2011 BY ANY MEANS NECESSARY: THE QUANDARY THE CIA NOW FACES IN LIGHT OF EMPLOYING ENHANCED INTERROGATION METHODS TO COMBAT THE WAR ON TERROR By Joshua Laufer Approved March 14, 2011 ________________________________ ________________________________ Kent Moors, Ph.D. John Sawicki, Ph.D., C.S.Sp. First Reader, Professor of Political Second Reader, Assistant Professor
    [Show full text]
  • A Legal War on Terrorism: Extending New York V. Quarles and the Departure from Enemy Combatant Designations
    DePaul Law Review Volume 53 Issue 2 Winter 2003: Symposium - After Disaster: The September 11th Compensation Article 20 Fund and the Future of Civil Justice A Legal War on Terrorism: Extending New York v. Quarles and the Departure from Enemy Combatant Designations Jeffrey S. Becker Follow this and additional works at: https://via.library.depaul.edu/law-review Recommended Citation Jeffrey S. Becker, A Legal War on Terrorism: Extending New York v. Quarles and the Departure from Enemy Combatant Designations, 53 DePaul L. Rev. 831 (2013) Available at: https://via.library.depaul.edu/law-review/vol53/iss2/20 This Comments is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Law Review by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. A LEGAL WAR ON TERRORISM: EXTENDING NEW YORK V. QUARLES AND THE DEPARTURE FROM ENEMY COMBATANT DESIGNATIONS INTRODUCTION During turbulent times, the United States government has difficulty balancing rights fundamental to all Americans-the rights to life, lib- erty, and the pursuit of happiness.' This Comment examines our gov- ernment's inveterate struggle to preserve its citizens' right to "liberty" while simultaneously protecting their right to "life." Adequately bal- ancing these considerations has proved difficult time and time again. "When conditions are especially turbulent and the general populace perceives a threat to its way of life, the chances of a miscarriage of justice are substantially increased."'2 The storybook of American history is blotched with several in- stances of governmental overreaction during uncertain times.
    [Show full text]
  • Securing Human Mobility in the Age of Risk: New Challenges for Travel
    SECURING HUMAN MOBILITY IN T H E AGE OF RI S K : NEW CH ALLENGE S FOR T RAVEL , MIGRATION , AND BORDER S By Susan Ginsburg April 2010 Migration Policy Institute Washington, DC © 2010, Migration Policy Institute All rights reserved. No part of this publication may be produced or transmitted in any form by any means, electronic or mechanical, including photocopy; or included in any information storage and retrieval system without prior permission in writing from the Migration Policy Institute. Permission for reproducing excerpts from this book should be directed to: Permissions Department, Migration Policy Institute, 1400 16th Street, NW, Suite 300, Washington, DC, 20036, or by contacting [email protected]. Library of Congress Cataloging-in-Publication Data Ginsburg, Susan, 1953- Securing human mobility in the age of risk : new challenges for travel, migration, and borders / by Susan Ginsburg. p. cm. Includes bibliographical references. ISBN 978-0-9742819-6-4 (pbk.) 1. Migration, Internal. 2. Emigration and immigration. 3. Travel. 4. Terrorism. I. Title. HB1952.G57 2010 363.325’991--dc22 2010005791 Cover photo: Daniel Clayton Greer Cover design: April Siruno Interior typesetting: James Decker Printed in the United States of America. TABLE OF CONTENTS Preface ............................................................................................................. V INTRODUCTION: THE LIMITS OF BORDER SECURITY I. MOBILITY SECURITY FACTS AND PRINCIPLES Introduction .......................................................................................31
    [Show full text]
  • National Security Division (NSD) Requests a Total of 363 Permanent Positions (Including 247 Attorneys), 355 FTE, and $99,537,000
    FY 2011 Performance Budget Congressional Submission NATIONAL SECURITY DIVISION U.S. Department of Justice Table of Contents I. Overview.............................................................................................................. 1 II Summary of Program Changes ..........................................................……….. 8 III. Appropriations Language and Analysis of Appropriations Language...........9 IV. Decision Unit Justification................................................................................ 10 National Security Division....................................................................................10 1. Program Description ..................................................................................10 2. Performance Tables ...................................................................................12 3. Performance, Resources, and Strategies ....................................................15 V. Program Increases by Item ................................................................................29 A. Intelligence Oversight and Litigation ..............................................................29 B. Counterterrorism and Investigation Prosecution .............................................34 C. Foreign Investment Review ............................................................................38 D. Continuity of Operations Relocation Site........................................................45 VI. Program Offsets by Item ..................................................................................49
    [Show full text]