Administrative National Security

Total Page:16

File Type:pdf, Size:1020Kb

Administrative National Security ARTICLES Administrative National Security ELENA CHACHKO* In the past two decades, the United States has applied a growing num- ber of foreign and security measures directly targeting individualsÐ natural or legal persons. These individualized measures have been designed and carried out by administrative agencies. Widespread appli- cation of individual economic sanctions, security watchlists and no-¯y lists, detentions, targeted killings, and action against hackers responsible for cyberattacks have all become signi®cant currencies of U.S. foreign and security policy. Although the application of each of these measures in discrete contexts has been studied, they have yet to attract an inte- grated analysis. This Article examines this phenomenon with two main aims. First, it documents what I call ªadministrative national securityº: the growing individualization of U.S. foreign and security policy, the administrative mechanisms that have facilitated it, and the judicial response to these mechanisms. Administrative national security encompasses several types of individualized measures that agencies now apply on a routine, inde®- nite basis through the exercise of considerable discretion within a broad framework established by Congress or the President. It is therefore best understood as an emerging practice of administrative adjudication in the foreign and security space. Second, this Article considers how administrative national security integrates with the presidency and the courts. Accounting for administra- tive national security illuminates the President's constitutional role as chief executive and commander-in-chief and his control of key aspects of * Lecturer on Law, Harvard Law School (Fall 2019); Post-doctoral Fellow, Perry World House, University of Pennsylvania; S.J.D. Candidate, Harvard Law School; LL.B., Hebrew University of Jerusalem (2014). © 2020, Elena Chachko. This Article bene®ted from the generous support of the Belfer Center for Science and International Affairs at the Harvard Kennedy School, where I was a 2018± 19 International Security Program Fellow. I am grateful to Julian Arato, Michael Asimow, Jack Beermann, Gabby Blum, Pam Bookman, Adam Chilton, Kathleen Claussen, Jean Galbraith, Maggie Gardner, Jack Goldsmith, Yehuda Goor, Rebecca Hamilton, Monica Hakimi, Ben Heath, Rebecca Ingber, Julian Mortenson, Kathryn Kovacs, Omer Netzer, Daphna Renan, Shalev Roisman, Alan Rozenshtein, Dakota Rudesill, Matthew Stephenson, Chris Walker, and Stephen Walt, as well as the participants of the 2019 Administrative Law New Scholarship Roundtable at the University of Wisconsin Law School, the 2019 JILSA Workshop at Brooklyn Law School, the GSA Workshop at the Harvard Weatherhead Center for International Affairs, the International Law in Domestic Courts Workshop at the 2019 ASIL Annual Meeting, the 2019 Junior Scholars Conference at the University of Michigan Law School, and the Belfer Center International Security Program Seminar for helpful comments and conversations. I thank The Georgetown Law Journal team for superb editorial work. 1063 1064 THE GEORGETOWN LAW JOURNAL [Vol. 108:1063 administrative foreign and security action. It also challenges deeply rooted doctrines underlying foreign relations and national security law, including the portrayal of the President as the ªsole organº in interna- tional relations. Administrative national security further informs our understanding of the role of courts in this context. It renders more for- eign and security action reviewable in principle under the Administrative Procedure Act (APA) and provides a justi®cation for the exercise of ro- bust judicial power in this category. TABLE OF CONTENTS INTRODUCTION ..................................................... 1065 I. THE ORIGINS OF FOREIGN AND SECURITY INDIVIDUALIZATION. 1070 A. HISTORICAL PRECURSORS .................................. 1070 B. THE CAUSES OF INDIVIDUALIZATION .......................... 1073 1. The War on Terror.............................. 1074 2. Technology ................................... 1075 3. From Embargoes to ªTargetedº or ªSmartº Sanctions . 1076 II. THE EMERGENCE OF ADMINISTRATIVE NATIONAL SECURITY ......... 1079 A. TARGETED KILLINGS ...................................... 1079 1. Targeted Killings and the Role of Administrative Agencies ..................................... 1082 2. Targeted Killings and the Courts . 1085 B. DETENTIONS ............................................. 1089 1. Detentions and Administrative Agencies . 1091 2. Detentions and the Courts ........................ 1092 C. INDIVIDUAL ECONOMIC SANCTIONS........................... 1093 1. Individual Economic Sanctions and Administrative Agencies ..................................... 1098 2. Individual Economic Sanctions and the Courts . 1099 D. SECURITY WATCHLISTS, NO-FLY LISTS, AND OTHER TRAVEL RESTRICTIONS ........................................... 1102 1. The Watchlisting Process and Administrative Agencies . 1105 2020] ADMINISTRATIVE NATIONAL SECURITY 1065 2. Watchlisting and the Courts....................... 1106 E. INDIVIDUALIZED CYBER COUNTERMEASURES . 1109 F. SUMMARY: ADMINISTRATIVE NATIONAL SECURITY AS ADMINISTRATIVE ADJUDICATION ............................. 1112 III. ADMINISTRATIVE NATIONAL SECURITY AND THE PRESIDENT . 1114 A. THE STRUCTURAL DIMENSION ............................... 1115 1. Presidential Control............................. 1115 a. Control Over the Legal and Policy Framework. 1115 b. Control of Administrative National Security Adjudication............................... 1122 2. Power or Constraint? ............................ 1125 B. THE DOCTRINAL DIMENSION ................................ 1127 IV. ADMINISTRATIVE NATIONAL SECURITY AND THE COURTS . 1130 A. EXPLANATION ........................................... 1131 B. JUSTIFICATION ........................................... 1136 CONCLUSION ...................................................... 1137 INTRODUCTION In the past two decades, the United States has applied a growing number of foreign policy and national security measures directly targeting individualsÐ natural or legal persons. Administrative agencies have taken the lead in design- ing and implementing these measures. The measures include the widespread application of individualized economic sanctions, ranging from sanctions against suspected proliferators and terrorists to sanctions against Russians for election meddling and Iranians for a range of nefarious activities. They further include security watchlists and other travel restrictions, detentions, targeted killings, and actions against individual hackers responsible for cyberattacks on U.S. targets. The inexorable development of technology that allows for preci- sion targeting and algorithmic decisionmaking in international diplomatic, economic, and military efforts is likely to accelerate this individualization trend. Although the individualization of foreign and security policy in discrete con- texts has generated legal commentary, it has not yet attracted an integrated 1066 THE GEORGETOWN LAW JOURNAL [Vol. 108:1063 assessment.1 There has been little discussion about the growing individualization of U.S. foreign and security policy as an overarching trend that cuts across differ- ent types of measures and policy areas. This phenomenon merits attention in light of the now-central role of individualized measures in the general scheme of U.S. foreign and security policy, and because it challenges standard assumptions about the role of the President and the courts in those areas.2 This Article argues that foreign and security policy individualization has, in underappreciated ways, bolstered the role of administrative agencies in shaping and implementing key foreign policy and national security measures. The result- ing form of administrative action, which I call ªadministrative national security,º involves the exercise of considerable discretion by administrative agencies on a routine, chronic, and inde®nite basis within a broad legal framework established by Congress or the President. Because applying general standards and rules to individuals is at the core of administrative national security, it is best understood as an emerging practice of administrative adjudication in the foreign affairs and national security space.3 1. As Part I shows, there is an extensive literature on targeted killings, detentions, and sanctions, but it typically considers each type of measure separately. There are some exceptions. For example, scholars have considered the individualization of war. See, e.g., Gabriella Blum, The Individualization of War: From War to Policing in the Regulation of Armed Con¯ict, in LAW AND WAR 48 passim (Austin Sarat, Lawrence Douglas & Martha Merrill Umphrey eds., 2014) (providing an international law perspective); Samuel Issacharoff & Richard H. Pildes, Targeted Warfare: Individuating Enemy Responsibility, 88 N.Y.U. L. REV. 1521 (2013) (analyzing the individualization of U.S. detention and targeting policy). Andrew Kent has considered the role of individuals in precipitating the disappearance of ªlegal black holesº in the foreign and security domain. See Andrew Kent, Disappearing Legal Black Holes and Converging Domains: Changing Individual Rights Protection in National Security and Foreign Affairs, 115 COLUM. L. REV. 1029 (2015); cf. Ganesh Sitaraman & Ingrid Wuerth, The Normalization of Foreign Relations Law, 128 HARV. L. REV. 1897 (2015). In addition, an extensive literature has explored the role of individuals within
Recommended publications
  • A Legacy of Advocacy Is Born As AAI Confronts Mccarthyism
    AAI LOOKS BACK A Legacy of Advocacy Is Born as AAI Confronts McCarthyism by Bryan Peery and John Emrich Today, across-the-board cuts in federal funding for scientific research threaten to drive leading scientists overseas and deter the next generation from entering scientific professions. Sixty years ago, scientists had similar concerns for their own funding, albeit for very different reasons. lthough federal spending forf the business meeting late Awas on the rise in the ini the afternoon on Tuesday, decades immediately following AprilA 13. Rumors that the U.S. the Second World War, it was also PublicP Health Service (USPHS), the height of the Second Red whichw administered National Scare associated with Senator InstitutesI of Health (NIH) grants, Joseph McCarthy (R-WI), and wasw blacklisting scientists on scientists faced the possibility of politicalp grounds had circulated having their individual funding amonga attendees during the withheld on the basis of mere firstfi two days of the Federation rumor or innuendo about their ofo American Societies for past political associations. ExperimentalE Biology (FASEB) In this political climate, meeting.m Disturbed by these scientists increasingly turned rumors,r Michael Heidelberger Members off the HouseHouse Un-AmericanUn American ActivitiesActivities to their professional societies (AAI( ’35, president 1946–47, Committee outside of Chaiman J. Parnell Thomas’s 1948–49) brought the matter to defend their interests before home (l-r): Rep. Richard B. Vail, Rep. Thomas, Rep. John policy makers. The leadership McDowell, Robert Stripling (chief counsel), and Rep. to the floor of the business of the American Association of Richard M. Nixon meeting.
    [Show full text]
  • J. Edgar Hoover, "Speech Before the House Committee on Un‐American Activities" (26 March 1947)
    Voices of Democracy 3 (2008): 139‐161 Underhill 139 J. EDGAR HOOVER, "SPEECH BEFORE THE HOUSE COMMITTEE ON UN‐AMERICAN ACTIVITIES" (26 MARCH 1947) Stephen Underhill University of Maryland Abstract: J. Edgar Hoover fought domestic communism in the 1940s with illegal investigative methods and by recommending a procedure of guilt by association to HUAC. The debate over illegal surveillance in the 1940s to protect national security reflects the on‐going tensions between national security and civil liberties. This essay explores how in times of national security crises, concerns often exist about civil liberties violations in the United States. Key Words: J. Edgar Hoover, Communism, Liberalism, National Security, Civil Liberties, Partisanship From Woodrow Wilson's use of the Bureau of Investigation (BI) to spy on radicals after World War I to Richard Nixon's use of the renamed Federal Bureau of Investigation (FBI) to spy on U.S. "subversives" during Vietnam, the balance between civil liberties and national security has often been a contentious issue during times of national crisis.1 George W. Bush's use of the National Security Agency (NSA) to monitor the communications of suspected terrorists in the United States is but the latest manifestation of a tension that spans the existence of official intelligence agencies.2 The tumult between national security and civil liberties was also visible during the early years of the Cold War as Republicans and Democrats battled over the U.S. government's appropriate response to the surge of communism internationally. Entering the presidency in 1945, Harry S Truman became privy to the unstable dynamic between Western leaders and Josef Stalin over the post‐war division of Eastern Europe.3 Although only high level officials within the executive branch intimately understood this breakdown, the U.S.
    [Show full text]
  • Legal Minds Debate Whether Obama Executive Order on Abortion Will Stick
    Legal minds debate whether Obama executive order on abortion will stick WASHINGTON – One of the biggest questions remaining as implementation of the Patient Protection and Affordable Care Act begins is whether the executive order on abortion funding signed by President Barack Obama will be effective in stopping any expanded use of taxpayer funds for abortion. Legal experts and members of Congress disagree about the impact of the president’s March 24 Executive Order 13535, “Ensuring Enforcement and Implementation of Abortion Restrictions in the Patient Protection and Affordable Care Act.” Anthony Picarello, general counsel for the U.S. Conference of Catholic Bishops, and Michael Moses, associate general counsel, said in a nine-page legal analysis that the executive order is likely to face court challenges and does not resolve problems on abortion funding and conscience protection in the health reform law. “Where the order purports to fix a shortcoming of the act in these areas, it is highly likely to be legally invalid; and where the order is highly likely to be legally valid, it does nothing to fix those shortcomings,” they said. Rep. Bart Stupak, D-Mich., a key player in the health reform debate, said executive orders “have been important means of implementing public policy” throughout history, noting that President George W. Bush used Executive Order 13435 in 2007 to limit the use of federal funds for embryonic stem-cell research. “This executive order followed the principle of the sanctity of life, and was applauded and welcomed by the pro-life community,” said Stupak, a nine-term House member who recently announced that he would not run for re-election.
    [Show full text]
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • Change and Structure in the Law of Armed Conflict After September 11 Peter Margulies
    Marquette Law Review Volume 95 Article 13 Issue 4 Summer 2012 The ogF of War Reform: Change and Structure in the Law of Armed Conflict After September 11 Peter Margulies Follow this and additional works at: http://scholarship.law.marquette.edu/mulr Part of the Law Commons Repository Citation Peter Margulies, The Fog of War Reform: Change and Structure in the Law of Armed Conflict After September 11, 95 Marq. L. Rev. 1417 (2012). Available at: http://scholarship.law.marquette.edu/mulr/vol95/iss4/13 This Article is brought to you for free and open access by the Journals at Marquette Law Scholarly Commons. It has been accepted for inclusion in Marquette Law Review by an authorized administrator of Marquette Law Scholarly Commons. For more information, please contact [email protected]. 18 - MARGULIES (DO NOT DELETE) 7/9/2012 10:27 PM THE FOG OF WAR REFORM: CHANGE AND STRUCTURE IN THE LAW OF ARMED CONFLICT AFTER SEPTEMBER 11 * PETER MARGULIES Salim Hamdan’s conviction in a military commission for material support of Al Qaeda separates utilitarians, who generally defer to state power, from protective theorists, who seek to shield civilians by curbing official discretion. Utilitarians view military commissions as efficient means for trying suspected terrorists. Protective theorists criticize the amorphous nature of material support charges. The clash between utilitarians and protective theorists colors other issues, including “enhanced” interrogation and limits on targeting. Protective theorists merit praise for their scrutiny of interrogation. In contrast, utilitarians have trivialized interrogation abuses. However, protective theorists’ scrutiny of states is burdened by hindsight bias.
    [Show full text]
  • Letter from Senator Joseph Mccarthy to the President of the United States
    Letter from Senator Joseph McCarthy to the President of the United States This letter from Senator Joseph McCarthy, Republican representative of Wisconsin, to President Harry Truman was written three days after McCarthy’s famous Wheeling Speech. This speech signaled McCarthy’s rise to influence, as he gained national attention by producing a piece of paper on which he claimed he had listed the names of 205 members of the Communist Party working secretly in the U.S. State Department. McCarthy was, at the time of this letter, beginning to exploit national concerns about Communist infiltration during the Cold War. This fear of infiltration was intensified by the Soviet Union’s recent development of the atomic bomb and the coming Communist takeover of China. “McCarthyism” however was not yet at its peak. Senator McCarthy here at first encourages President Truman to commit more resources to the war of containment being fought in South Korea, and secondly questioned the legitimacy and effectiveness of Truman’s loyalty program, signed into effect by Executive Order 9835 in 1947. This program required the FBI to run checks on almost anyone involved in the U.S. government and subsequently to launch investigations into any government employee with what could be presumed as questionable political associations. The Loyalty Program was not enough to satisfy Senator McCarthy, who suspected that a number of subversives had slipped through the investigation and remained in the State Department. President Truman made it clear that he would not take McCarthy’s accusations seriously and that the Senator was “the best asset the Kremlin has.”109 July 12, 1950 The President The White House Washington, D.
    [Show full text]
  • Tracing Terrorists: the EU-Canada Agreement in PNR Matters
    Tracing Terrorists: The EU-Canada Agreement in PNR Matters CEPS Special Report/September 2008 Revised version 17.11.2008 Peter Hobbing Abstract Enhancing border security in support of the global ‘war against terrorism’ is very much in vogue these days, in particular as regards the control of air passengers. Seven years after 9/11, this trend is yet unbroken. While the build-up of defences occurs in most cases at the one-sided expense of civil liberties, the EU-Canada Agreement of 2005 is different: quite justly, it holds the reputation of a well-balanced instrument respecting the interests of citizens. Still, instead of serving as a model for future instruments, the Agreement rather runs the risk of being scrapped at the next possible occasion. A close look at the passenger name record (PNR) ‘mainstream’, as embodied by the EU-US branch of transatlantic relations with four Agreements rapidly succeeding between 2004 and 2008, reveals the opposite tendency away from data protection and towards an unconditional tightening of controls. This report undertakes to examine the doubtful benefits of such an approach by assessing the price to pay inter alia for ‘false positive’ mismatches and other collateral damages, while the actual achievement of a higher degree of public security remains very much in the dark, mostly owing to the impossibility of making all borders 100% secure. As a result, no critical reason emerges for taking leave of the good practices established by the EU-Canada instrument. This work was prepared as part of the EU–Canada project – The Changing Landscape of Justice and Home Affairs Cooperation in the European Union and EU–Canada Relations – funded by the European Commission, Directorate-General for External Relations, Relations with the US and Canada.
    [Show full text]
  • Loyalty Among Government Employees
    THE YALE LAW JOURNAL VOLUME 58 DECE-MBER, 1948 Nu-.mnB 1 LOYALTY AMONG GOVERNMENT EMPLOYEES THOMAS I. EMERSON* DAVID M. HELFELD t I. BACKGROUNM MOUNTING tensions in our society have brought us to a critical point in the matter of political and civil rights. The stresses are in large measure internal. They grow out of the accelerating movement to effect far-reaching changes in our economic and social structure, a movement which evokes ever-increasing resistance. As the conflicts sharpen, there is rising pressure to discard or undermine the basic principles embodied in the democratic concept of freedom for political opposition. Maintenance of free institutions in a period of deepening crisis would be difficult enough if the struggle were confined to our shores. But the domestic problem is only an element of the world problem. Large areas of the world have abandoned the system of capitalism in favor of socialism. Other areas are far advanced in economic and social change. Everywhere there is struggle, uncertainty, fear and confusion. Pro- tagonists of the more militant economic and social philosophies are organized into political parties which have their offshoots and counter- parts in other countries, including our owm. As a result, the preserva- tion of political freedom, the right to hold and express opinions di- verging from the opinion of the majority, is often made to appear incompatible with the overriding requirements of "loyalty," "patri- otism," "national security" and the like. The danger of "foreign id- eologies," "infiltration," "subversion" and "espionage" are invoked to justify the suspension of traditional rights and freedoms.
    [Show full text]
  • Bruce Ackerman
    BOOK REVIEW CONSTITUTIONAL ALARMISM THE DECLINE AND FALL OF THE AMERICAN REPUBLIC. By Bruce Ackerman. Cambridge, Mass.: The Belknap Press of Harvard University Press. 2010. Pp. 270. $25.95. Reviewed by Trevor W. Morrison∗ INTRODUCTION The Decline and Fall of the American Republic is a call to action. Professor Bruce Ackerman opens the book with the claim that “some- thing is seriously wrong — very seriously wrong — with the tradition of government that we have inherited” (p. 3). The problem, he says, is the modern American presidency, which he portrays as recently trans- formed into “an especially dangerous office” (p. 189 n.1) posing “a se- rious threat to our constitutional tradition” (p. 4). Ackerman urges us to confront this “potential for catastrophic decline — and act before it is too late” (p. 11). Concerns of this kind are not new. Indeed, in some respects De- cline and Fall reads as a sequel to Professor Arthur Schlesinger’s 1973 classic, The Imperial Presidency.1 Ackerman writes consciously in that tradition, but with a sense of renewed urgency driven by a convic- tion that “the presidency has become far more dangerous today” than in Schlesinger’s time (p. 188). The sources and mechanisms of that purported danger are numerous; Decline and Fall sweeps across jour- nalism, national opinion polls, the Electoral College, civilian-military relations, presidential control of the bureaucracy, and executive branch lawyering to contend that “the foundations of our own republic are eroding before our very eyes” (p. 188). ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– ∗ Professor of Law, Columbia University. For helpful comments on earlier drafts, I thank Akhil Amar, David Barron, Ariela Dubler, Jack Goldsmith, Marty Lederman, Peter Margulies, Gillian Metzger, Henry Monaghan, Rick Pildes, Jeff Powell, John Witt, and participants in faculty workshops at Vanderbilt University and the University of Washington.
    [Show full text]
  • Fortress of Liberty: the Rise and Fall of the Draft and the Remaking of American Law
    Fortress of Liberty: The Rise and Fall of the Draft and the Remaking of American Law Jeremy K. Kessler∗ Introduction: Civil Liberty in a Conscripted Age Between 1917 and 1973, the United States fought its wars with drafted soldiers. These conscript wars were also, however, civil libertarian wars. Waged against the “militaristic” or “totalitarian” enemies of civil liberty, each war embodied expanding notions of individual freedom in its execution. At the moment of their country’s rise to global dominance, American citizens accepted conscription as a fact of life. But they also embraced civil liberties law – the protections of freedom of speech, religion, press, assembly, and procedural due process – as the distinguishing feature of American society, and the ultimate justification for American military power. Fortress of Liberty tries to make sense of this puzzling synthesis of mass coercion and individual freedom that once defined American law and politics. It also argues that the collapse of that synthesis during the Cold War continues to haunt our contemporary legal order. Chapter 1: The World War I Draft Chapter One identifies the WWI draft as a civil libertarian institution – a legal and political apparatus that not only constrained but created new forms of expressive freedom. Several progressive War Department officials were also early civil libertarian innovators, and they built a system of conscientious objection that allowed for the expression of individual difference and dissent within the draft. These officials, including future Supreme Court Justices Felix Frankfurter and Harlan Fiske Stone, believed that a powerful, centralized government was essential to the creation of a civil libertarian nation – a nation shaped and strengthened by its diverse, engaged citizenry.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • The Protean Take Care Clause
    ARTICLE THE PROTEAN TAKE CARE CLAUSE JACK GOLDSMITH† & JOHN F. MANNING†† INTRODUCTION ............................................................................ 1835 I. THE CASE LAW ........................................................................ 1839 A. The Removal Power ................................................................... 1839 B. Standing Doctrine ...................................................................... 1844 C. Prosecutorial Discretion ............................................................... 1847 D. Legislative Supremacy and the Antidispensation Principle ................ 1848 E. Presidential “Completion Power” ................................................... 1851 II. “TAKE CARE” QUESTIONS FOR THE COURT ............................ 1853 A. (Non)interpretation of the Take Care Clause .................................. 1853 1. Text and Structure .............................................................. 1854 2. Interpretive Canons ............................................................ 1859 3. History and Constitutional Meaning ................................... 1861 B. Consistency and Line Drawing ..................................................... 1863 CONCLUSION ................................................................................ 1867 INTRODUCTION Most of Article II, Section 3 of the Constitution sets forth mundane presidential responsibilities or powers. Section 3 prescribes the President’s duty “from time to time” to report to Congress on “the State of the Union”
    [Show full text]