CQR Government Surveillance

Total Page:16

File Type:pdf, Size:1020Kb

CQR Government Surveillance Published by CQ Press, an Imprint of SAGE Publications, Inc. www.cqresearcher.com Government Surveillance Is government spying on Americans excessive? ow tightly the government should keep tabs on citizens has long been fiercely debated. But con - cern about surveillance intensified in June after H National Security Agency computer specialist Edward Snowden revealed classified details of agency electronic snooping programs. Civil liberties advocates, lawmakers and others Demonstrators in Berlin, Germany, protest on July 27 also have cited growing unease with other surveillance measures, against the sweeping U.S. electronic surveillance operations revealed in June by National Security including the use of unmanned “drone” aircraft and tiny video Agency computer specialist Edward Snowden (shown on placard). Many Germans were outraged at reports that the super-secret spy agency had collected data cameras. Congress, along with state and local governments, is ex - on German citizens, including emails. pected to take up a variety of bills this fall to protect privacy and increase transparency about government activities. But the Obama I THIS REPORT N administration maintains that internal safeguards — including a THE ISSUES ....................719 S federal civil liberties oversight board created in 2004 — have pre - BACKGROUND ................725 I vented the federal government from becoming “Big Brother.” CHRONOLOGY ................727 D CURRENT SITUATION ........730 E CQ Researcher • Aug. 30, 2013 • www.cqresearcher.com AT ISSUE ........................733 Volume 23, Number 30 • Pages 717-740 OUTLOOK ......................734 RECIPIENT OF SOCIETY OF PROFESSIONAL JOURNALISTS AWARD FOR BIBLIOGRAPHY ................738 EXCELLENCE N AMERICAN BAR ASSOCIATION SILVER GAVEL AWARD THE NEXT STEP ..............739 GOVERNMENT SURVEILLANCE Aug. 30, 2013 THE ISSUES OUTLOOK Volume 23, Number 30 • Is government surveil - More Cameras MANAGING EDITOR: Thomas J. Billitteri 719 lance making the country 734 Surveillance is expected to [email protected] safer? become more widespread ASSISTANT MANAGING EDITORS: Lyn Garrity, • Does government surveil - and less intrusive. lyn.garrity@ sagepub.com, Kathy Koch , lance violate civil rights? [email protected] • Does surveillance under - SIDEBARS AND GRAPHICS SENIOR CONTRIBUTING EDITOR: mine Americans’ trust in Thomas J. Colin [email protected] government? FISA Court Rejects Few 720 Surveillance Requests CONTRIBUTING WRITERS: Sarah Glazer, BACKGROUND The secret panel has rejected Peter Katel , Reed Karaim, Robert Kiener, only 11 applications since 1979. Barbara Mantel, Tom Price, Jennifer Weeks ‘Unreasonable Searches’ SENIOR PROJECT EDITOR: Olu B. Davis 725 British agents had broad Government Surveillance authority to search colonists’ 721 Seen as Too Broad FACT CHECKER: Michelle Harris homes. Seventy percent believe the data are used for purposes 726 Court-Imposed Limits other than fighting terrorism. The Supreme Court began Many Major Companies limiting surveillance in the 724 Lack Privacy Protection 1960s. Apple, AT&T and Verizon do An Imprint of SAGE Publications, Inc. little to protect consumers’ VICE PRESIDENT AND EDITORIAL DIRECTOR, ‘Vacuum-Cleaner’ Spying privacy. HIGHER EDUCATION GROUP: 726 After 9/11 the National Michele Sordi Security Agency (NSA) Chronology 727 Key events since 1895. EXECUTIVE DIRECTOR, ONLINE LIBRARY AND developed close ties with REFERENCE PUBLISHING: telecommunications com - Todd Baldwin panies. Surveillance Technology 728 Goes Mainstream “We should pause to consider Copyright © 2013 CQ Press, an Imprint of SAGE Pub - PRISM Program 728 the implications.” lications, Inc. SAGE reserves all copyright and other The NSA has collected rights herein, unless pre vi ous ly spec i fied in writing. phone records of tens of U.S. Muslims Seek to End No part of this publication may be reproduced millions of Americans. 730 Police Surveillance electronically or otherwise, without prior written NYPD’s Kelly: “We will not permission. Un au tho rized re pro duc tion or trans mis - change our methods.” sion of SAGE copy right ed material is a violation of CURRENT SITUATION federal law car ry ing civil fines of up to $100,000. At Issue: Forthcoming Debate 733 Is domestic government surveil - CQ Press is a registered trademark of Congressional 730 Lawmakers want to curb lance keeping the U.S. safer? Quarterly Inc. domestic spying. CQ Researcher (ISSN 1056-2036) is printed on acid- OR URTHER ESEARCH free paper. Pub lished weekly, except: (March wk. 5) Obama Administration F F R (May wk. 4) (July wk. 1) (Aug. wks. 3, 4) (Nov. wk. 732 The president seeks greater 4) and (Dec. wks. 3, 4). Published by SAGE Publica - For More Information tions, Inc., 2455 Teller Rd., Thousand Oaks, CA 91320. oversight over the court 737 Organizations to contact. that approves surveillance. Annual full-service subscriptions start at $1,054. For pricing, call 1-800-818-7243. To purchase a CQ Re - Bibliography Court Action 738 Selected sources used. searcher report in print or electronic format (PDF), 734 visit www.cqpress.com or call 866-427-7737. Single Courts have taken different reports start at $15. Bulk purchase discounts and positions on whether police The Next Step 739 Additional articles . electronic-rights licensing are also available. Periodicals need warrants to track peo - postage paid at Thousand Oaks, California, and at ple via their cell phones. Citing CQ Researcher additional mailing offices . POST MAST ER: Send ad dress 739 Sample bibliography formats. chang es to CQ Re search er , 2300 N St., N.W., Suite 800, Wash ing ton, DC 20037. Cover: Getty Images/Sean Gallup 718 CQ Researcher Government Surveillance BY CHUCK MCCUTCHEON reported that the NSA’s sur - THE ISSUES veillance net work can reach about 75 percent of U.S. In - hen New York in - ternet communication . 5 vestment banker • Remote-controlled drone W Gabriel Silverstein aircraft, which increasingly are landed his private plane at deployed for domestic sur - an Oklahoma airport in May, veillance. In June, FBI Di - he was startled to be met by rector Robert Mueller said the a group of law enforcement agency has used drones in - officials. He was even more side the United States. Sen - taken aback when, four days ate Intelligence Committee later at an airport in Iowa, Chairman Dianne Feinstein, the same thing occurred. D-Calif., called drones “the Although the officials greatest threat to the privacy wouldn’t comment to the news of Americans.” 6 media, a pilots’ website says • Video cameras, high - they apparently relied on a lighted as a surveillance tool federal database called the Air after the Boston Marathon e e and Marine Operations Sur - m bombings in April, have become a veillance System to suspect N ubiquitous in crime-ravaged c M that Silverstein was trafficking Detroit and other cities. n i drugs. In both instances, he W • Cell phone global posi - / s was let go after no drugs e tioning system (GPS) data, g were found. a which provide the locations m I “I find it hard to believe y of cell users. t t that two inspections in four e • National security letters, G days was completely coinci - Gen. Keith Alexander, director of the National Security which allow the FBI to com - dental,” he said. 1 Agency (NSA), tells the House Intelligence Committee pel banks, telephone compa - To commentators across on June 18 that NSA spying prevents terror attacks on nies, Internet service providers the political spectrum, such U.S. soil. He said the surveillance programs disclosed and others to disclose customer by NSA computer specialist Edward Snowden have incidents are prime examples prevented 54 terrorism plots against the United States records. of what they say the United and its allies. Many congressional leaders support • Undercover officers, who States has become — an in - Alexander’s assertions, but critics remain skeptical, saying have monitored church groups, trusive surveillance state that too many details of the NSA’s operations are secret. anti-war organizations, environ - they compare to Big Brother mental activists and others. in George Orwell’s ominous novel 1984. are unprecedented in human history,” • Facial-recognition programs, How tightly the U.S. government said Neil Richards, a law professor at which are part of a new generation should keep tabs on its citizens has Washington University in St. Louis. “This of biometric tools that have been long been fiercely debated. 2 But the fact alone should give us pause.” 3 widely deployed to find criminals and controversy has grown more pro - Among the types of surveillance and potential terrorists. 7 nounced as technology has become an technologies being used: • “Stingrays,” devices that essen - integral part of Americans’ everyday • Supercomputers that amass and tially simulate cell phone towers and lives, as well as an essential tool for analyze massive amounts of what has enable law enforcement officials to law enforcement and national security become known as “big data” — phone collect serial numbers of individual cell officials. And Edward Snowden’s recent calls, tweets, and social media posts — phones and then track their users. disclosures of National Security Agency to spot potential terrorist activity. The • Fusion centers, a network of (NSA) data-collection programs have NSA said it touches about 1.6 percent more than 70 state and local govern - furiously stoked the controversy. of all Internet traffic in a day but an - ment offices serving as clearinghouses “The scope
Recommended publications
  • Table of Contents Acknowledgements
    The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray, B.A. H.Dip in Ed. LL.B. LL.M Ph.D. (NUI) Submitted for the Degree of Doctor in Philosophy at Trinity College, Dublin School of Law August 2017 Declaration and Online Access I declare that this thesis has not been submitted as an exercise for a degree at this or any other university and it is entirely my own work. I agree to deposit this thesis in the University’s open access institutional repository or allow the library to do so on my behalf, subject to Irish Copyright Legislation and Trinity College Library conditions of use and acknowledgement. Paul Raphael Murray Acknowledgements I would like to record my thanks to my Supervisor, Professor Neville Cox, School of Law, and Dean of Graduate Studies, Trinity College, Dublin, for his help and guidance. i ii Abstract The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray The overall research question addressed in this thesis is the data privacy/national security balancing paradigm, and the contrasting ways in which this operates in Europe and the U.S. Within this framework, the influences causing the balance to shift in one direction or another are examined: for example, the terrorist attacks on two U.S. cities in 2001 and in various countries in Europe in the opening decade of the new millennium, and the revelations by Edward Snowden in 2013 of the details of U.S.
    [Show full text]
  • The Civilian Impact of Drone Strikes
    THE CIVILIAN IMPACT OF DRONES: UNEXAMINED COSTS, UNANSWERED QUESTIONS Acknowledgements This report is the product of a collaboration between the Human Rights Clinic at Columbia Law School and the Center for Civilians in Conflict. At the Columbia Human Rights Clinic, research and authorship includes: Naureen Shah, Acting Director of the Human Rights Clinic and Associate Director of the Counterterrorism and Human Rights Project, Human Rights Institute at Columbia Law School, Rashmi Chopra, J.D. ‘13, Janine Morna, J.D. ‘12, Chantal Grut, L.L.M. ‘12, Emily Howie, L.L.M. ‘12, Daniel Mule, J.D. ‘13, Zoe Hutchinson, L.L.M. ‘12, Max Abbott, J.D. ‘12. Sarah Holewinski, Executive Director of Center for Civilians in Conflict, led staff from the Center in conceptualization of the report, and additional research and writing, including with Golzar Kheiltash, Erin Osterhaus and Lara Berlin. The report was designed by Marla Keenan of Center for Civilians in Conflict. Liz Lucas of Center for Civilians in Conflict led media outreach with Greta Moseson, pro- gram coordinator at the Human Rights Institute at Columbia Law School. The Columbia Human Rights Clinic and the Columbia Human Rights Institute are grateful to the Open Society Foundations and Bullitt Foundation for their financial support of the Institute’s Counterterrorism and Human Rights Project, and to Columbia Law School for its ongoing support. Copyright © 2012 Center for Civilians in Conflict (formerly CIVIC) and Human Rights Clinic at Columbia Law School All rights reserved Printed in the United States of America. Copies of this report are available for download at: www.civiliansinconflict.org Cover: Shakeel Khan lost his home and members of his family to a drone missile in 2010.
    [Show full text]
  • Cyber-Terrorism
    Cyber-Terrorism: Finding a Common Starting Point By Jeffrey Thomas Biller B.A., March 1998, University of Washington M.H.R., June 2004, University of Oklahoma J.D., May 2007, University of Kansas A Thesis submitted to The Faculty of The George Washington University Law School in partial satisfaction of the requirements for the degree of Master of Laws May 20, 2012 Thesis directed by Gregory E. Maggs Professor of Law, Co-director, National Security and U.S. Foreign Relations Law Program UMI Number: 1515265 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent on the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI 1515265 Copyright 2012 by ProQuest LLC. All rights reserved. This edition of the work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 Acknowledgements The author appreciates the generous support of the United States Air Force Jag Corps, for the opportunity to study; Professor Gregory Maggs, for the excellent feedback and guidance; and the author’s family, for the time and occasional solitude to complete this paper. ii Disclaimer Major Jeffrey T. Biller serves in the U.S. Air Force Judge Advocate General’s Corps. This paper was submitted in partial satisfaction of the requirements for the degree of Master of Laws in National Security and Foreign Relations at The George Washington University Law School.
    [Show full text]
  • The NSA Domestic Surveillance Program: an Analysis of Congressional Oversight During an Era of One-Party Rule
    University of Michigan Journal of Law Reform Volume 40 2006 The NSA Domestic Surveillance Program: An Analysis of Congressional Oversight During an Era of One-Party Rule Tara M. Sugiyama University of Michigan Law School Marisa Perry University of Michigan Law School Follow this and additional works at: https://repository.law.umich.edu/mjlr Part of the Constitutional Law Commons, Law and Politics Commons, and the National Security Law Commons Recommended Citation Tara M. Sugiyama & Marisa Perry, The NSA Domestic Surveillance Program: An Analysis of Congressional Oversight During an Era of One-Party Rule, 40 U. MICH. J. L. REFORM 149 (2006). Available at: https://repository.law.umich.edu/mjlr/vol40/iss1/5 This Note is brought to you for free and open access by the University of Michigan Journal of Law Reform at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in University of Michigan Journal of Law Reform by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. THE NSA DOMESTIC SURVEILLANCE PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONE-PARTY RULE Tara M. Sugiyama* Marisa Perry** On December 16, 2005, the New York Times sounded a fire alarm when it re- vealed that, in response to the September I1, 2001 attacks, President George W Bush had issued a secret executive order permitting the National Security Agency (NSA) to conduct warrantlesssurveillance on individuals to unearth nascent ter- rorist activity. Congress responded to the disclosure of the NSA domestic surveillance program largely by shirking its oversight duties.
    [Show full text]
  • The NSA Is on the Line -- All of Them
    The NSA is on the line -- all of them An intelligence expert predicts we'll soon learn that cellphone and Internet companies also cooperated with the National Security Agency to eavesdrop on us. By Kim Zetter, Salon.com May. 15, 2006 | When intelligence historian those safeguards had little effect in preventing Matthew Aid read the USA Today story last at least three telecommunications companies Thursday about how the National Security from repeating history. Agency was collecting millions of phone call records from AT&T, Bell South and Verizon for Aid, who co-edited a book in 2001 on signals a widespread domestic surveillance program intelligence during the Cold War, spent a designed to root out possible terrorist activity in decade conducting more than 300 interviews the United States, he had to wonder whether with former and current NSA employees for his the date on the newspaper wasn't 1976 instead new history of the agency, the first volume of of 2006. which will be published next year. Jeffrey Richelson, a senior fellow at the National Aid, a visiting fellow at George Washington Security Archive, calls Aid the top authority on University's National Security Archive, who has the NSA, alongside author James Bamford. just completed the first book of a three-volume history of the NSA, knew the nation's Aid spoke with Salon about how the NSA has bicentennial marked the year when secrets learned to maneuver around Congress and the surrounding another NSA domestic Department of Justice to get what it wants. He surveillance program, code-named Project compared the agency's current data mining to Shamrock, were exposed.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • The Politics of Appointments to the US Foreign Intelligence Surveillance
    Justice System Journal ISSN: 0098-261X (Print) 2327-7556 (Online) Journal homepage: http://www.tandfonline.com/loi/ujsj20 Secret Law: The Politics of Appointments to the U.S. Foreign Intelligence Surveillance Court Nicholas R. Seabrook & Nicholas C. Cole To cite this article: Nicholas R. Seabrook & Nicholas C. Cole (2016) Secret Law: The Politics of Appointments to the U.S. Foreign Intelligence Surveillance Court, Justice System Journal, 37:3, 259-271, DOI: 10.1080/0098261X.2015.1110468 To link to this article: http://dx.doi.org/10.1080/0098261X.2015.1110468 Published online: 16 Nov 2015. Submit your article to this journal Article views: 41 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=ujsj20 Download by: [University of North Florida] Date: 20 July 2016, At: 08:51 JUSTICE SYSTEM JOURNAL 2016, VOL. 37, NO. 3, 259–271 http://dx.doi.org/10.1080/0098261X.2015.1110468 Secret Law: The Politics of Appointments to the U.S. Foreign Intelligence Surveillance Court Nicholas R. Seabrook and Nicholas C. Cole Department of Political Science and Public Administration, University of North Florida, Jacksonville, Florida ABSTRACT KEYWORDS This study investigates the politics of appointments to the United States FISC; judicial ideology; chief Foreign Intelligence Surveillance Court, the court established under the 1978 justice appointments; Foreign Intelligence Surveillance Act (FISA) to review secret federal surveillance government requests for warrants related to national security investigations. Since the FISA Court’s creation, its members have been appointed entirely at the discretion of the Chief Justice of the United States, who selects FISA Court judges from among the pool of existing U.S.
    [Show full text]
  • An Inadequate Limitation?
    GOVERNMENT DISCRETION IN THE AGE OF BULK DATA COLLECTION: AN INADEQUATE LIMITATION? JULIAN SANCHEZ* There are about 3,500 wiretap orders issued every year, at the federal and state levels combined for all criminal investigations.1 When one company, such as Facebook, has on the order of tens of thousands of accounts flagged for content interception under foreign intelligence orders,2 the appropriate benchmark is not “millions,” but what we do in other contexts. Even that number is incomplete because much of the gov- ernment’s collection of Internet content is not happening through PRISM.3 There is also the other component of section 7024—the “upstream” collection off the Internet backbone,5 as well as overseas collection under the authority of Executive Order 12,333.6 This is not part of FISA, which only covers col- * Senior Fellow, Cato Institute. This essay was adapted from remarks given at the 2014 Federalist Society Annual Student Symposium at the University of Florida in Gainesville, Florida. 1. ADMIN. OFFICE OF THE U.S. COURTS, WIRETAP REPORT 2013 (2014), available at http://www.uscourts.gov/Statistics/WiretapReports/wiretap-report-2013.aspx [http://perma.cc/ASG5-7T6G]. 2. See Global Government Requests Reports, FACEBOOK, https://www.facebook.com /about/government_requests [http://perma.cc/595L-XTV6] (last visited July 28, 2014) (reporting government data requests by country from the first six months of 2013, ending on June 30). 3. Stephen Braun et. al, PRISM Is Just Part of a Much Larger, Scarier Government Surveillance Program, BUSINESS INSIDER (Jun. 15, 2013, 9:54 AM), http:// www.businessinsider.com/prism-is-just-the-start-of-nsa-spying-2013-6 [http://perma.cc/5BH8-AE82] (noting that PRISM is “a relatively small part of a much more expansive and intrusive eavesdropping effort”).
    [Show full text]
  • Total Terror Plots*
    NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING EFFECTIVENESS Item Type text; Electronic Thesis Authors DEIBEL, CHARLES LOUIS, II Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 28/09/2021 10:48:12 Item License http://rightsstatements.org/vocab/InC/1.0/ Link to Item http://hdl.handle.net/10150/613829 NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING EFFECTIVENESS By CHARLES LOUIS DEIBEL II ____________________ A Thesis Submitted to The Honors College In Partial Fulfillment of the Bachelors degree With Honors in Political Science THE UNIVERSITY OF ARIZONA M A Y 2 0 1 6 Approved by: ____________________________ Dr. John Tidd School of Government and Public Policy Abstract The National Security Agency (NSA) has played a key role in the United States Government’s counterterror program since September 11. Over the last 15 years, the NSA has faced considerable controversy regarding its counterterrorism data collection program and the legal authority behind it. This paper, however, is concerned with whether or not that program has been effective in preventing Islamist related or inspired terror attacks inside the United States. As NSA capabilities and authorities have expanded since 9/11, has it been effective in helping to prevent attacks in the U.S.? Definitively answering this question is extremely difficult, given significant challenges regarding the amount and quality of public information concerning NSA’s involvement in prevented terror attacks.
    [Show full text]
  • UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No
    UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05767821 Date: 08/31/2015 RELEASE IN FULL From: Mills, Cheryl D <[email protected]> Sent: Tuesday, January 12, 2010 8:16 PM To: Subject Politico - Reid FYI: Jan 12, 2010 » Mobile Home » Top Stories Inside the Reid eruption By Mike Allen & Glenn Thrush I 1/12/10 @ 12:19 AM EST Harry Reid isn't talkative. But the Senate majority leader chatted freely with the two disarmingly charming book authors who came to his office at the Capitol shortly after the 2008 election. They — and their tape recorder — were soaking in his reminiscences about the wild campaign that had turned a backbencher in his caucus into president of the United States. Reid wasn't on guard — perhaps because he'd been told by his staff that the meeting would be "off the record," according to a person with knowledge of the exchange. Although Reid is a master of the Senate's mysterious inside game, he's often botched the outside game because of what one colleague calls a "penchant for saying things without a filter." But Jim Manley, Reid's senior communications adviser, wasn't too worried as he and his boss sat down with John Heilemann of New York Magazine and Mark Halperin of Time magazine — two veteran reporters who were working on what their publisher had billed as "a sweeping, novelistic, and ultimately definitive portrait" of the 2008 race. Like virtually every Washington political insider, Manley had a long and warm relationship with Halperin, the longtime political director for ABC News who once set conventional wisdom in Washington with "The Note." Maybe Reid and Manley — thinking back to their many candid exchanges over the years — simply assumed that Halperin wouldn't burn him or his boss.
    [Show full text]
  • Quo Vadis, Habeas Corpus?*
    QUO VADIS, HABEAS CORPUS?∗ © James Robertson# [Forthcoming 55 Buff. L. Rev. ___ (2008)] The poster that advertised this lecture emphasized two decisions of mine that brought down upon me my allotted fifteen minutes of fame, but Professor Steinfeld1 was quite discreet when he extended the University’s invitation last March: he did not ask me to discuss either my opinion in the Guantánamo Bay case2 or my resignation from the Foreign Intelligence Surveillance Court.3 What he did, instead, was advise me that the very first Mitchell Lecture, given here 56 years ago by Justice Robert H. Jackson, was entitled “Wartime Security and Liberty Under Law,”4 and suggest that I might wish to speak on a similar subject. I have never said anything to anybody about my resignation from the FISA court, however, at least not publicly, and I don’t plan to ∗ 2007 Mitchell Lecture, delivered March 21, 2007, at the University at Buffalo . # United States District Judge for the District of Columbia. The helpful comments of Judge Louis F. Oberdorfer and the invaluable assistance of Emily Coward, Jonathan Olin and Joel Meyer are gratefully acknowledged. 1 Robert J. Steinfeld, Robert and Karen Jones Faculty Scholar and Professor and Chair, Mitchell Lecture Committee, University at Buffalo Law School. 2 Hamdan v. Rumsfeld, 344 F.Supp.2d 152 (D.D.C. 2004). 3 Cf. Spy Court Judge Quits in Protest, WASHINGTON POST, December 21, 2005, at A1. 4 1 BUFF. L.REV. 103 (1951). - 1 - start now. And it would be improper for me to discuss or comment upon the Hamdan case, which is still pending, or, should I say, pending again.
    [Show full text]
  • Press Galleries* Rules Governing Press
    PRESS GALLERIES * SENATE PRESS GALLERY The Capitol, Room S–316, phone 224–0241 Director.—S. Joseph Keenan Deputy Director.—Joan McKinney Senior Media Coordinators: Amy H. Gross Kristyn K. Socknat Media Coordinators: James D. Saris Wendy A. Oscarson-Kirchner Elizabeth B. Crowley HOUSE PRESS GALLERY The Capitol, Room H–315, phone 225–3945 Superintendent.—Jerry L. Gallegos Deputy Superintendent.—Justin J. Supon Assistant Superintendents: Ric Anderson Laura Reed Drew Cannon Molly Cain STANDING COMMITTEE OF CORRESPONDENTS Thomas Burr, The Salt Lake Tribune, Chair Joseph Morton, Omaha World-Herald, Secretary Jim Rowley, Bloomberg News Laurie Kellman, Associated Press Brian Friel, Bloomberg News RULES GOVERNING PRESS GALLERIES 1. Administration of the press galleries shall be vested in a Standing Committee of Cor- respondents elected by accredited members of the galleries. The Committee shall consist of five persons elected to serve for terms of two years. Provided, however, that at the election in January 1951, the three candidates receiving the highest number of votes shall serve for two years and the remaining two for one year. Thereafter, three members shall be elected in odd-numbered years and two in even-numbered years. Elections shall be held in January. The Committee shall elect its own chairman and secretary. Vacancies on the Committee shall be filled by special election to be called by the Standing Committee. 2. Persons desiring admission to the press galleries of Congress shall make application in accordance with Rule VI of the House of Representatives, subject to the direction and control of the Speaker and Rule 33 of the Senate, which rules shall be interpreted and administered by the Standing Committee of Correspondents, subject to the review and an approval by the Senate Committee on Rules and Administration.
    [Show full text]