Looking at the Law

Total Page:16

File Type:pdf, Size:1020Kb

Looking at the Law Looking at the Law Michelle Parrini and Charles F. Williams The recent London subway “There is always a possibility that at preventing the exercise of bombings drew renewed attention a secret police may become a First Amendment rights of to the difficulties facing government menace to free government and speech and association, on attempts to uncover and intercept ter- free institutions because it carries the theory that preventing the ror plots; though there may now be with it the possibility of abuses of growth of dangerous groups more awareness of the issue, nations power which are not always quick- and the propagation of dan- have been trying to learn their enemy’s ly apprehended or understood.” gerous ideas would protect the secrets since the beginning of recorded national security and deter vio- history. Spies appear in Homer’s Greek — The Church Committee lence…Many of the techniques epic, the Iliad. Ancient Roman writ- Report, 1976.1 used would be intolerable ings are filled with accounts of intrigue in a democratic society even and assassination plots. Caesar’s secret gence on other countries increased 39 if all of the targets had been agents looked out for his interests in percent between 1998-2002.2 Public involved in violent activity, Rome. Sun Tzu’s The Art of War (500 and congressional opinion about the but COINTELPRO went far BC) describes espionage and the use appropriate scope of covert govern- beyond that. The unexpressed of human intelligence as key to suc- ment activities, and perceptions that major premise of the programs cessful warfare. An extensive political intelligence practices have at times was that a law enforcement intelligence system served Elizabeth I. been excessive, have also influenced agency has the duty to do what- And both British and American forces voters’ support for intelligence meth- ever is necessary to combat per- employed secret agents, ciphers, and ods. For instance, in the mid-seventies, ceived threats to the existing codes, during the Revolutionary War. congressional inquiries uncovered the social and political order.3 George Washington’s coordination of FBI’s COINTELPRO (an acronym for spies and evaluation of their intelli- “COunter INTELligence PROgram”) Congressional investigations also gence information is credited with giv- and the CIA’s “Operation CHAOS” revealed CIA covert operations to help ing the Americans the strategic advan- domestic intelligence practices, mar- overthrow elected left-wing governments tage to overcome the superior military ring the reputation of both agencies. in Guatemala (1954) and Chile (1973). power of the British. According to the congressional report U.S. intelligence agencies were allegedly However, it wasn’t until the twen- known as the Church Report: involved in attempts to assassinate for- tieth century that the United States eign leaders, including Patrice Lumumba established a single independent gov- COINTELPRO began in 1956, (Congo), Fidel Castro (Cuba), Rafael ernment agency devoted to gathering in part because of frustration Trujillo (Dominican Republic), and Ngo human intelligence. American support with Supreme Court rulings Dinh Diem (Vietnam). According to the for both intelligence and counterintel- limiting the Government’s Church Report: ligence efforts has waxed and waned, power to proceed overtly depending on the perceived national- against dissident groups; it • The CIA illegally opened and security threats. A poll by the Chicago ended in 1971 with the threat photographed mail to or from Council on Foreign Relations and the of public exposure. In the inter- American citizens for 20 years German Marshall Fund of the United vening 15 years, the Bureau (1953–1973), generating a com- States found that public support for conducted a sophisticated vigi- puter database of 1.5 million increased spending to gather intelli- lante operation aimed squarely names. S OCIAL E DUCATION 250 • The National Security Agency (NSA) received copies of all pri- This is a rare photograph of Allen W. (AP Photo) vate cables sent or received from Dulles, then-director of the U.S. Central abroad by Americans between IntelligenceIntelligence Agency,Agency, inin hishis Washington,Washington, 1947 and 1975. D.C., office on July 28, 1954. Here in this office, a setting where few photogra-- • For more than 30 years, U.S. phers had access, Dulles directed the intelligence agencies wiretapped super-secret CIA organization whose and bugged U.S. citizens without lineslines ofof espionageespionage andand informationinformation warrants. spread around the world and pen-- etrated behind the Iron Curtain. Behind • Army intelligence investigated him is a map which he often consulted, 100,000 U.S. citizens during the showing North America and the Soviet Vietnam War.4 Union at top. Some commentators maintain that public support for intelligence in gen- eral and human intelligence in particular diminished after these revelations, and that this public distrust of covert govern- ment activities grew stronger still after Watergate and the Iran-Contra affair of the 1980s.5 Critics also say the govern- ment sought to avoid controversy by neglecting the recruitment of covert agents and increasingly relying on spy satellites and electronic intercepts—valuable tools for spying on governments and traditional militaries, but less useful in divining the plans of small terrorist cells. The Age of Terror On February 26, 1993, a huge truck bomb was detonated in the garage directly beneath the World Trade Navy destroyer while it was refueling United States Regarding Weapons of Center in New York City. The explo- in Yemen. Then came the coordinated Mass Destruction. Acting on the recom- sion failed to topple the twin towers but attacks of September 11, 2001, that mendations contained in the latter com- succeeded in injuring more than 1,000 killed nearly 3,000 Americans. That mission’s March 2005 report, President people and killing six. Three years later, atrocity—like each of the attacks that Bush established an office to manage all on June 25, 1996, another truck bomb preceded it over an eight-year span— “human intelligence collection overseas” killed 19 Americans and wounded hun- achieved complete tactical surprise. for all government agencies, including dreds more near a U.S. military base in As in the wake of Pearl Harbor a gen- the CIA, the Army and the FBI. The new Saudi Arabia; in August of that year, eration ago, the government launched a office was established partly because the Al Qaeda leader Osama bin Laden slew of investigations and commissions to new National Counterterrorism Center issued the first in a series of public find out why we were caught unawares. The (established by Executive Order on fatwas—religious rulings—against the National Commission on Terrorist Attacks August 27, 2004) had already been found United States. Other attacks followed: upon the United States was formed in late lacking in its coordination of CIA, FBI, simultaneous explosions killed 264 2002 to investigate the circumstances Pentagon, Homeland Security, and other people at the U.S. embassies in Nairobi, surrounding the attacks and to provide agency efforts. Under the plan, the CIA Kenya, and Dar es Salaam, Tanzania, in recommendations for guarding against will coordinate all spying overseas for all 1998; seventeen American sailors were future surprise attacks. Another probe was agencies.6 Spurred by these new anti-ter- killed aboard the USS Cole in 2000 launched by the president’s Commission rorism efforts, intelligence gathering and when a bomb detonated next to the on the Intelligence Capabilities of the spying in other countries has increased. S E PT E MB E R 2 0 0 5 251 Keeping Secrets transport these suspects to other coun- Mustafa Osama Nasr, also known as The new spy era has brought fresh tries.8 Subsequently, a series of Op Eds Abu Omar, from Italy. Omar, who is pur- challenges as well. Recent news sto- appeared in the Times denouncing the ported to have been a former CIA infor- ries have recounted a practice known paper for deliberately “blowing the mant, was supposedly taken to Egypt. as “extraordinary renditions.” These cover” of the CIA’s covert air opera- Italian prosecutors issued 13 warrants renditions are part of a CIA program tion and contending that publishing for 13 of the 19 CIA officials involved in that involves capturing suspected the information will hamper the war the rendition, marking the first known terrorists and transporting them for on terror. One writer countered with, instance of one government charging a interrogation to other countries, often “I remember when we were proud of foreign government with committing a countries that have been known to Seymour M. Hersh’s stories disclosing crime as a part of its covert intelligence use torture as an interrogation tool.7 CIA plots to assassinate people.”9 operation. One of the 19 individuals is One New York Times account revealed In addition, in recent weeks, news- reportedly a CIA operative and report- the CIA’s use of certain shell com- papers have extensively covered the ing indicates that other CIA officials panies (companies that exist in name story of an alleged February 2003 CIA were allegedly involved.10 only) and private charter companies to rendition of an Egyptian cleric, Hassan Early U.S. Intelligence Activities Selective Service, and Sabotage acts, and for seeking out enemy aliens. Aided by double agent William Sebold, the For much of the nineteenth century, the U.S. did not allocate FBI prosecuted the German spy ring headed by Frederick many resources to intelligence gathering. Many Americans Duquesne (1942). And from 1940 to 1946, it headed up were wary of espionage, partly because of the disrepu- the Special Intelligence Service, a special division of covert table association of espionage with the Pinkerton National agents stationed in Central and South America. Similarly, Detective Agency, the nation’s first private detective and the Military Department’s G-2, or Intelligence Division, and police agency.
Recommended publications
  • Selected Chronology of Political Protests and Events in Lawrence
    SELECTED CHRONOLOGY OF POLITICAL PROTESTS AND EVENTS IN LAWRENCE 1960-1973 By Clark H. Coan January 1, 2001 LAV1tRE ~\JCE~ ~')lJ~3lj(~ ~~JGR§~~Frlt 707 Vf~ f·1~J1()NT .STFie~:T LA1JVi~f:NCE! i(At.. lSAG GG044 INTRODUCTION Civil Rights & Black Power Movements. Lawrence, the Free State or anti-slavery capital of Kansas during Bleeding Kansas, was dubbed the "Cradle of Liberty" by Abraham Lincoln. Partly due to this reputation, a vibrant Black community developed in the town in the years following the Civil War. White Lawrencians were fairly tolerant of Black people during this period, though three Black men were lynched from the Kaw River Bridge in 1882 during an economic depression in Lawrence. When the U.S. Supreme Court ruled in 1894 that "separate but equal" was constitutional, racial attitudes hardened. Gradually Jim Crow segregation was instituted in the former bastion of freedom with many facilities becoming segregated around the time Black Poet Laureate Langston Hughes lived in the dty-asa child. Then in the 1920s a Ku Klux Klan rally with a burning cross was attended by 2,000 hooded participants near Centennial Park. Racial discrimination subsequently became rampant and segregation solidified. Change was in the air after World "vV ar II. The Lawrence League for the Practice of Democracy (LLPD) formed in 1945 and was in the vanguard of Post-war efforts to end racial segregation and discrimination. This was a bi-racial group composed of many KU faculty and Lawrence residents. A chapter of Congress on Racial Equality (CORE) formed in Lawrence in 1947 and on April 15 of the following year, 25 members held a sit-in at Brick's Cafe to force it to serve everyone equally.
    [Show full text]
  • CIA Intelligence Collection About Americans: CHAOS and the Office
    CIA INTELLIGENCE COLLECTION ABOUT AMERICANS : CHAOS AND THE OFFICE OF SECURITY CONTENTS I. Introduction Page A. CHAOS___________________________________------------ 681 B. MERRIMAC and RESISTANCE _ _ __ _______ ___- _______ 681 C. Special security investigations _____ _ _ - _ _ _ _ - _ -_ _ _ _ _ _ _- __ __ _ 682 D. The investigation ____________ -- _____ -- __________________ 683 E. Summary of the issues-- _____ ________________ ___________ 683 1. Statutor authority_-_______--------------------- 684 a. CTounterintelligence-- _ _ _ _ _-_ __ __ __ _-_-_ __ __ b. Protecting sources and methods of intelligence- :E 2. Statutory prohibitions--- _-_ __ _ __ __ _ _ _ _ _ __ _-__ _ _ __ 686 3. Questions raised by CHAOS----- - _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 686 4. Questions raised by the Office of Security Programs-- 688 11. History and Operation of CHAOS _ - _ _-_ __ _ ___ ___ _ _ _ _ __ _-_-__ _ __ 688 A. Background----____________-_______-_______________-__ 688 B. Authorization of CHAOS _____ __ __ __ __ __ __ _ __ __ __ _ _ --_-_ _ C. The November 1967 peace movement study- ______________ % D. Operation of the CHAOS program and related CIA projects- 693 1. Gathering information ______ __ __ __ _ __ __ __ __ ____ -_- 693 2. Processing, storage and control of CHAOS informa- tion--_________________-_____-__________--~--- 695 3. Reporting by CIA- _ _ - _ _ _ __ _ _ _ _ _ __-__ _ _ _ _ _ __ ____ _ a.
    [Show full text]
  • Extraordinary Rendition: a One-Way Ticket to the U.S
    Catholic University Law Review Volume 41 Issue 1 Fall 1991 Article 9 1991 Extraordinary Rendition: A One-Way Ticket to the U.S.... Or Is It? Jacqueline A. Weisman Follow this and additional works at: https://scholarship.law.edu/lawreview Recommended Citation Jacqueline A. Weisman, Extraordinary Rendition: A One-Way Ticket to the U.S.... Or Is It?, 41 Cath. U. L. Rev. 149 (1992). Available at: https://scholarship.law.edu/lawreview/vol41/iss1/9 This Comments is brought to you for free and open access by CUA Law Scholarship Repository. It has been accepted for inclusion in Catholic University Law Review by an authorized editor of CUA Law Scholarship Repository. For more information, please contact [email protected]. COMMENT EXTRAORDINARY RENDITION: A ONE-WAY TICKET TO THE U.S.... OR IS IT? A treaty is an agreement or contract between two or more sovereigns or nations,1 signed and ratified by the states' lawmaking authorities.2 In the United States, the President has the power "by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur."3 The United States Constitution declares that a treaty is the law of the land,4 and a treaty is regarded by the courts as equivalent to a statute. 5 If a treaty and a statute are inconsistent, the last in time will pre- vail.6 Treaties are also a source of international law and bind the signatory parties to carry out their obligations.7 Extradition is a formal process through which a person is surrendered by one state to another by virtue of a treaty.' The person surrendered is usually a fugitive from justice wanted for prosecution or sentencing in the requesting country for a crime committed there.
    [Show full text]
  • Extraordinary Rendition in U.S. Counterterrorism Policy: the Impact on Transatlantic Relations
    EXTRAORDINARY RENDITION IN U.S. COUNTERTERRORISM POLICY: THE IMPACT ON TRANSATLANTIC RELATIONS JOINT HEARING BEFORE THE SUBCOMMITTEE ON INTERNATIONAL ORGANIZATIONS, HUMAN RIGHTS, AND OVERSIGHT AND THE SUBCOMMITTEE ON EUROPE OF THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION APRIL 17, 2007 Serial No. 110–28 Printed for the use of the Committee on Foreign Affairs ( Available via the World Wide Web: http://www.foreignaffairs.house.gov/ U.S. GOVERNMENT PRINTING OFFICE 34–712PDF WASHINGTON : 2007 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON FOREIGN AFFAIRS TOM LANTOS, California, Chairman HOWARD L. BERMAN, California ILEANA ROS-LEHTINEN, Florida GARY L. ACKERMAN, New York CHRISTOPHER H. SMITH, New Jersey ENI F.H. FALEOMAVAEGA, American DAN BURTON, Indiana Samoa ELTON GALLEGLY, California DONALD M. PAYNE, New Jersey DANA ROHRABACHER, California BRAD SHERMAN, California DONALD A. MANZULLO, Illinois ROBERT WEXLER, Florida EDWARD R. ROYCE, California ELIOT L. ENGEL, New York STEVE CHABOT, Ohio BILL DELAHUNT, Massachusetts THOMAS G. TANCREDO, Colorado GREGORY W. MEEKS, New York RON PAUL, Texas DIANE E. WATSON, California JEFF FLAKE, Arizona ADAM SMITH, Washington JO ANN DAVIS, Virginia RUSS CARNAHAN, Missouri MIKE PENCE, Indiana JOHN S. TANNER, Tennessee THADDEUS G. MCCOTTER, Michigan LYNN C. WOOLSEY, California JOE WILSON, South Carolina SHEILA JACKSON LEE, Texas JOHN BOOZMAN, Arkansas RUBE´ N HINOJOSA, Texas J. GRESHAM BARRETT, South Carolina DAVID WU, Oregon CONNIE MACK, Florida BRAD MILLER, North Carolina JEFF FORTENBERRY, Nebraska LINDA T.
    [Show full text]
  • Torture by Proxy: International and Domestic Law Applicable to “Extraordinary Renditions”
    TORTURE BY PROXY: INTERNATIONAL AND DOMESTIC LAW APPLICABLE TO “EXTRAORDINARY RENDITIONS” The Committee on International Human Rights of the Association of the Bar of the City of New York and The Center for Human Rights and Global Justice, New York University School of Law © 2004 ABCNY & CHRGJ, NYU School of Law New York, NY Association of the Bar of the City of New York The Association of the Bar of the City of New York (www.abcny.org) was founded in 1870, and since then has been dedicated to maintaining the high ethical standards of the profession, promoting reform of the law, and providing service to the profession and the public. The Association continues to work for political, legal and social reform, while implementing innovating means to help the disadvantaged. Protecting the public’s welfare remains one of the Association’s highest priorities. Center for Human Rights and Global Justice The Center for Human Rights and Global Justice (CHRGJ) at NYU School of Law (http://www.nyuhr.org) focuses on issues related to “global justice,” and aims to advance human rights and respect for the rule of law through cutting-edge advocacy and scholarship. The CHRGJ promotes human rights research, education and training, and encourages interdisciplinary research on emerging issues in international human rights and humanitarian law. This report should be cited as: Association of the Bar of the City of New York & Center for Human Rights and Global Justice, Torture by Proxy: International and Domestic Law Applicable to “Extraordinary Renditions” (New York: ABCNY & NYU School of Law, 2004). - This report was modified in June 2006 - The Association of the Bar of the City of New York Committee on International Human Rights Martin S.
    [Show full text]
  • Extraordinary Rendition and Torture What the Narratives of Victims Reveal and Require
    Extraordinary Rendition and Torture What the Narratives of Victims Reveal and Require UNC School of Law Joshua R. Bennett Isabelle Chammas Siya Hegde Hillary Li Jeffrey S. Nooney Matt Norchi Seth Proctor Tyler J. Walters Deborah M. Weissman Reef C. Ivey II Distinguished Professor of Law Faculty Advisor http://www.law.unc.edu/documents/academics/humanrights/narrativethemes.pdf November 2017 Extraordinary Rendition and Torture What the Narratives of Victims Reveal and Require Table of Contents I. History of the Extraordinary Rendition Program 1 II. Torture and its Long-Term Effects 7 III. The Role of Islamophobia in the Extraordinary Rendition and Torture Program 15 IV. The Cost of Torture 23 V. The Link Between Domestic Criminal Justice Reform and International Human Rights 28 VI. Government Contractor Liability 37 VII. The United States’ Legal and Moral Obligations to Provide Fair and Adequate Compensation for Released Detainee 43 VIII. Relief for Torture Victims and its Barriers 52 I. History of the Extraordinary Rendition Program Extraordinary rendition, as it was practiced post-September 11, 2001, and as it is described in the pages that follow, connotes the latest iteration of a program that has a much longer history. Before briefly surveying the program’s history, it is helpful to consider its definition. According to the Open Society Justice Initiative, no official U.S. government definition of the program exists,1 despite the fact that it is the U.S. government that was responsible for designing and implementing it. The Open Society formulated its own definition as “the transfer—without legal process—of a detainee to the custody of a foreign government for purposes of detention and interrogation.”2 1 OPEN SOCIETY JUSTICE INITIATIVE, GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION 13 (2013), https://www.opensocietyfoundations.org/sites/default/files/globalizing-torture-20120205.pdf.
    [Show full text]
  • Privacy, Wiretapping and the Citizen Congress’ Battle to Set Legal Boundaries on Government Wiretapping in the 1970S Olsen, E.A
    UvA-DARE (Digital Academic Repository) Privacy, wiretapping and the citizen Congress’ battle to set legal boundaries on government wiretapping in the 1970s Olsen, E.A. Publication date 2020 Document Version Other version License Other Link to publication Citation for published version (APA): Olsen, E. A. (2020). Privacy, wiretapping and the citizen: Congress’ battle to set legal boundaries on government wiretapping in the 1970s. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:29 Sep 2021 Privacy, Wiretapping and the Citizen: Congress’ Battle to Set Legal Boundaries on Government Wiretapping in the 1970s ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof. dr. ir. K.I.J.
    [Show full text]
  • The Vietnam War, 1965-1975
    How I will compress four lectures into one because I’ve run out of time. A last‐minute addition to my bibliography: • B.G. Burkett (Vanderbilt, 66) and Glenna Whitley, Stolen Valor: How the Vietnam Generation was robbed of its Heroes and its History (Dallas, 1998). • Burkett makes many claims in this book, but the most fascinating aspect of it is his exposure of the “phony Vietnam veteran,” a phenomenon that still amazes me. “Many Flags” campaign ‐ Allied support 1.) South Korea –largest contingent – 48,000(would lose 4407 men)‐US financial support 2.) Australia – 8000, lost 469 3.)New Zealand, 1000, lost 37 4.) Thailand – 12,000 troops, 351 lost 5.) Philippines – medical and small number of forces in pacification 6.) Nationalist China –covert operations American Force levels/casualties in Vietnam(K=killed W=wounded) 1964 23,200 K 147 W 522 1965 190,000 K 1369 W 3308 1966 390,000 5008 16,526 1967 500,000 9377 32,370 1968 535,000 14,589 46,797 1969 475,000 9414 32,940 1970 334,000 4221 15,211 1971 140,000 1381 4767 1972 50,000 300 587 Soviet and Chinese Support for North Vietnam • 1.) Despite Sino‐Soviet dispute and outbreak of Cultural Revolution in China, support continues • 2.) Soviet supply of anti‐aircraft technology and supplies to the North –along with medical supplies, arms, tanks, planes, helicopters, artillery, and other military equipment. Soviet ships provided intelligence on B‐52 raids – 3000 soldiers in North Vietnam (Soviet govt. concealed extent of support) • 3.) Chinese supply of anti‐aircraft units and engineering
    [Show full text]
  • Bail Bondsmen, Bounty Hunters, and the Uniform Criminal Extradition Act
    University of Miami Law Review Volume 62 Number 1 Volume 62 Number 1 (October 2007) Article 3 10-1-2007 Midnight Run Re-Run: Bail Bondsmen, Bounty Hunters, and the Uniform Criminal Extradition Act Milton Hirsch Follow this and additional works at: https://repository.law.miami.edu/umlr Part of the Law Commons Recommended Citation Milton Hirsch, Midnight Run Re-Run: Bail Bondsmen, Bounty Hunters, and the Uniform Criminal Extradition Act, 62 U. Miami L. Rev. 59 (2007) Available at: https://repository.law.miami.edu/umlr/vol62/iss1/3 This Article is brought to you for free and open access by the Journals at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in University of Miami Law Review by an authorized editor of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. Midnight Run Re-Run: Bail Bondsmen, Bounty Hunters, and the Uniform Criminal Extradition Act MILTON HIRSCH* I. INTRODUCTION "Your mother ever teach you how to react to strangers? Not shoot at 'em. Huh?"' Nobody taught Texas bail bondsmen Alberto Lopez and Thomas K. Colson, or bounty hunter George Sandoval, how to react to strangers, and not shoot at them. In November of 1984, Rudy Ojinaga was arrested in El Paso, Texas, for drunk driving and possession of marijuana.2 He posted bond in the amount of $9,500 and was released.' Lopez was his bail bondsman.4 Ojinaga returned to the home in which he resided with his parents in Central, New Mexico.5 In spring of the following
    [Show full text]
  • Extraordinary Rendition and the Law of War
    NORTH CAROLINA JOURNAL OF INTERNATIONAL LAW Volume 33 Number 4 Article 3 Summer 2008 Extraordinary Rendition and the Law of War Ingrid Detter Frankopan Follow this and additional works at: https://scholarship.law.unc.edu/ncilj Recommended Citation Ingrid D. Frankopan, Extraordinary Rendition and the Law of War, 33 N.C. J. INT'L L. 657 (2007). Available at: https://scholarship.law.unc.edu/ncilj/vol33/iss4/3 This Article is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of International Law by an authorized editor of Carolina Law Scholarship Repository. For more information, please contact [email protected]. Extraordinary Rendition and the Law of War Cover Page Footnote International Law; Commercial Law; Law This article is available in North Carolina Journal of International Law: https://scholarship.law.unc.edu/ncilj/vol33/ iss4/3 Extraordinary Rendition and the Law of War Ingrid Detter Frankopant I. Introduction ....................................................................... 657 II. O rdinary R endition ............................................................ 658 III. Deportation, Extradition and Extraordinary Rendition ..... 659 IV. Essential Features of Extraordinary Rendition .................. 661 V. Extraordinary Rendition and Rfoulement ........................ 666 VI. Relevance of Legal Prohibitions of Torture ...................... 667 VII. Torture Flights, Ghost Detainees and Black Sites ............. 674 VIII. Legality
    [Show full text]
  • Renditions: Constraints Imposed by Laws on Torture
    Renditions: Constraints Imposed by Laws on Torture Michael John Garcia Legislative Attorney September 8, 2009 Congressional Research Service 7-5700 www.crs.gov RL32890 CRS Report for Congress Prepared for Members and Committees of Congress Renditions: Constraints Imposed by Laws on Torture Summary Persons suspected of criminal or terrorist activity may be transferred from one State (i.e., country) to another for arrest, detention, and/or interrogation. Commonly, this is done through extradition, by which one State surrenders a person within its jurisdiction to a requesting State via a formal legal process, typically established by treaty. Far less often, such transfers are effectuated through a process known as “extraordinary rendition” or “irregular rendition.” These terms have often been used to refer to the extrajudicial transfer of a person from one State to another. In this report, “rendition” refers to extraordinary or irregular renditions unless otherwise specified. Although the particularities regarding the usage of extraordinary renditions and the legal authority behind such renditions are not publicly available, various U.S. officials have acknowledged the practice’s existence. During the Bush Administration, there was controversy over the use of renditions by the United States, particularly with regard to the alleged transfer of suspected terrorists to countries known to employ harsh interrogation techniques that may rise to the level of torture, purportedly with the knowledge or acquiescence of the United States. In January 2009, President Obama issued an Executive Order creating a special task force to review U.S. transfer policies, including the practice of rendition, to ensure compliance with applicable legal requirements.
    [Show full text]
  • 'Lose in Vietnam, Bring Our Boys Home'
    Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2004 ‘Lose in Vietnam, Bring Our Boys Home’ Robert N. Strassfeld Case Western Reserve University - School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Law Commons Repository Citation Strassfeld, Robert N., "‘Lose in Vietnam, Bring Our Boys Home’" (2004). Faculty Publications. 267. https://scholarlycommons.law.case.edu/faculty_publications/267 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. "LOSE IN VIETNAM, BRING THE BOYS HOME" ROBERTN. STRASSFELD. This Article examines the contest over dissent and loyalty during the Vietnam War. The Johnson and Nixon Administrations used an array of weapons to discourage or silence antiwar opposition. These included crinLinal prosecutions for "disloyal speech," a tool that they used with less frequency than s01ne other administrations in times of war; prosecutions for other "crimes" that served as pretext for prosecuting disloyal speech; infiltration and harassment; and an attempt to characterize their critics as disloyal. The antiwar movement, in turn, responded to allegations that dissent equaled disloyalty by offering an alternative vision of loyalty and patriotism. In so doing, they recast notions of allegiance, betrayal, support of the troops, and our obligations in the face of conflicting loyalties. INTRODUCTION ..................................................................................... 1892 I. THE USES OF LOYALTY IN THE VIETNAM WAR ERA ........... 1894 A. The Model of Legal Repression: The World War I Experience ...........................................................................
    [Show full text]