Democracies Debate Counterterrorism
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chronology of Public Information Relating to the Cases of Messrs. Almalki, El Maati and Nureddin April 11, 2007
Chronology of public information relating to the cases of Messrs. Almalki, El Maati and Nureddin April 11, 2007 Researched and written by Kerry Pither for organizations with Intervenor Status at the Internal Inquiry into the Actions of Canadian Officials in Relation to Abdullah Almalki, Ahmad Abou El Maati and Muayyed Nureddin1 1 Amnesty International, British Columbia Civil Liberties Association, Canadian Arab Federation, Canadian Council on American Islamic Relations, Canadian Muslim Civil Liberties Association, International Civil Liberties Monitoring Group. Chronology of public information relating to the cases of Messrs. Almalki, El Maati and Nureddin The following timeline draws on information in the public domain: the Arar Commission Report released on September 18, 2006; public evidence presented at the Arar Commission; the Report of Professor Stephen J. Toope, Fact Finder, October 14, 2005; publicly accessible court documents; information in the media; and the public chronologies, biographies and other documents filed by Messrs. Arar, El Maati, Almalki and Nureddin as exhibits at the Arar Commission. Care has been taken to accurately record this information and it has been verified and corroborated where possible, however much of the information has not been entered as sworn testimony, or subjected to cross-examination. Please note that while care has been taken to consult and include a fulsome range of significant sources of information, this chronology is not intended to be an exhaustive survey of all information relevant to these cases. Because of privacy issues, some of those referred to in this chronology are described, but not named. Early summer 1998 Abdullah Almalki says his first encounter with any security agency was when CSIS agent Theresa Sullivan telephoned and asked if they could meet. -
Charkaoui and Bill C-3 Craig Forcese
The Supreme Court Law Review: Osgoode’s Annual Constitutional Cases Conference Volume 42 (2008) Article 12 A Bismarckian Moment: Charkaoui and Bill C-3 Craig Forcese Lorne Waldman Follow this and additional works at: http://digitalcommons.osgoode.yorku.ca/sclr This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. Citation Information Forcese, Craig and Waldman, Lorne. "A Bismarckian Moment: Charkaoui and Bill C-3." The Supreme Court Law Review: Osgoode’s Annual Constitutional Cases Conference 42. (2008). http://digitalcommons.osgoode.yorku.ca/sclr/vol42/iss1/12 This Article is brought to you for free and open access by the Journals at Osgoode Digital Commons. It has been accepted for inclusion in The uS preme Court Law Review: Osgoode’s Annual Constitutional Cases Conference by an authorized editor of Osgoode Digital Commons. A Bismarckian Moment: Charkaoui and Bill C-3 Craig Forcese and Lorne Waldman* I. INTRODUCTION The German statesman Otto von Bismarck once said that “[i]f you like laws and sausages, you should never watch either one being made.”1 The recent enactment of Bill C-32 — the government’s response to the Supreme Court’s February 2007 decision in Charkaoui v. Canada (Citizenship and Immigration)3 — can best be described as a “Bismarckian moment”. An effort to remedy the core defects of the prior immigration security certificate regime, the new law cobbles together a potentially half-hearted “special advocate” regime and converts immigration law into a de facto system of indefinite limits on liberty for foreigners. The new system will generate an inevitable series of new constitutional challenges, some of which may succeed at the Supreme Court unless the deficiencies of Bill C-3 are cured by careful innovation at the Federal Court level. -
Balancing Security and Liberty in Germany
Balancing Security and Liberty in Germany Russell A. Miller* INTRODUCTION Scholarly discourse over America’s national security policy frequently invites comparison with Germany’s policy.1 Interest in Germany’s national security jurisprudence arises because, like the United States, Germany is a constitutional democracy. Yet, in contrast to the United States, modern Germany’s historical encounters with violent authoritarian, anti-democratic, and terrorist movements have endowed it with a wealth of constitutional experience in balancing security and liberty. The first of these historical encounters – with National Socialism – provided the legacy against which Germany’s post-World War II constitutional order is fundamentally defined.2 The second encounter – with leftist domestic radicalism in the 1970s and 1980s – required the maturing German democracy to react to domestic terrorism.3 The third encounter – the security threat posed in the * Associate Professor of Law, Washington & Lee University School of Law ([email protected]); co-Editor-in-Chief, German Law Journal (http://www.germanlaw journal.com). This essay draws on material prepared for a forthcoming publication. See DONALD P. KOMMERS & RUSSELL A. MILLER, THE CONSTITUTIONAL JURISPRUDENCE OF THE FEDERAL REPUBLIC OF GERMANY (3rd ed., forthcoming 2011). It also draws on a previously published piece. See Russell A. Miller, Comparative Law and Germany’s Militant Democracy, in US NATIONAL SECURITY, INTELLIGENCE AND DEMOCRACY 229 (Russell A. Miller ed., 2008). The essay was written during my term as a Senior Fulbright Scholar at the Max Planck Institute for Comparative Public Law and Public International Law in Heidelberg, Germany. 1. See, e.g., Jacqueline E. Ross, The Place of Covert Surveillance in Democratic Societies: A Comparative Study of the United States and Germany, 55 AM. -
0714685003.Pdf
CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics. -
Origination, Organization, and Prevention: Saudi Arabia, Terrorist Financing and the War on Terror”
Testimony of Steven Emerson with Jonathan Levin Before the United States Senate Committee on Governmental Affairs “Terrorism Financing: Origination, Organization, and Prevention: Saudi Arabia, Terrorist Financing and the War on Terror” July 31, 2003 Steven Emerson Executive Director The Investigative Project 5505 Conn. Ave NW #341 Washington DC 20015 Email: [email protected] phone 202-363-8602 fax 202 966 5191 Introduction Terrorism depends upon the presence of three primary ingredients: Indoctrination, recruitment and financing. Take away any one of those three ingredients and the chances for success are geometrically reduced. In the nearly two years since the horrific attacks of 9/11, the war on terrorism has been assiduously fought by the US military, intelligence and law enforcement. Besides destroying the base that Al Qaeda used in Afghanistan, the United States has conducted a comprehensive campaign in the United States to arrest, prosecute, deport or jail those suspected of being connected to terrorist cells. The successful prosecution of terrorist cells in Detroit and Buffalo and the announcement of indictments against suspected terrorist cells in Portland, Seattle, northern Virginia, Chicago, Tampa, Brooklyn, and elsewhere have demonstrated the resolve of those on the front line in the battle against terrorism. Dozens of groups, financial conduits and financiers have seen their assets frozen or have been classified as terrorist by the US Government. One of the most sensitive areas of investigation remains the role played by financial entities and non-governmental organizations (ngo’s) connected to or operating under the aegis of the Kingdom of Saudi Arabia. Since the July 24 release of the “Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001,” the question of what role Saudi Arabia has played in supporting terrorism, particularly Al Qaeda and the 9/11 attacks, has come under increasing scrutiny. -
Considering the Creation of a Domestic Intelligence Agency in the United States
HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. -
Bessemer School Officials Delighted with Bond Approval by P.J
Call (906) 932-4449 Ironwood, MI Basketball Michigan high school districts Redsautosales.com look toward seeding teams SPORTS • 9 DAILY GLOBE Thursday, May 9, 2019 Rain likely yourdailyglobe.com | High: 38 | Low: 30 | Details, page 2 Bessemer school officials delighted with bond approval By P.J. GLISSON mills, which will make possible measure next to 88 who did “We need to get our roofs He expects members to be in a [email protected] $1.3 million in funds that the not. fixed at Washington School,” said more definitive position by then BESSEMER – Officials of the board expects to share fairly Bessemer City Hall collected Berg regarding the first priority to share initial plans with the Bessemer Area School District are evenly between Washington Ele- 327 votes to approve versus 221 of board members. public. thrilled that voters passed a con- mentary School and A.D. John- votes against the bond. According to Berg, the board Prior to the vote, superinten- tinuing millage rate for the city’s ston Junior and Senior High Berg said he wished more peo- will meet in a 4:30 p.m. work- dent Dave Wineburner had said two schools in a dedicated elec- School, both in Bessemer. ple had voted, but added that shop today, wherein members that he hoped all work funded by tion Tuesday. “It was pretty exciting last “the right people voted.” may discuss various priorities the bond would be complete by In the words of Bob Berg, pres- night at 8:30 p.m.,” Berg told the The board promoted the bond in relation to millage funds. -
Entire Issue (PDF)
E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 113 CONGRESS, FIRST SESSION Vol. 159 WASHINGTON, THURSDAY, AUGUST 1, 2013 No. 113 House of Representatives The House met at 10 a.m. and was of your politics: ensuring sustainable, disease needlessly. Hours spent getting called to order by the Speaker pro tem- equitable access to clean water for water are hours not working or in pore (Mr. HUIZENGA of Michigan). nearly 800 million women, children, school. f and men who don’t have it and the 2.5 A lack of clean drinking water has a billion without even the most basic disproportionate effect on women, who, DESIGNATION OF SPEAKER PRO sanitation services. TED POE and I in developing countries, walk an aver- TEMPORE think that politics should stop with age of 3.7 miles a day to get water. The The SPEAKER pro tempore laid be- water. That’s why, today, we are intro- estimates are that 40 billion working fore the House the following commu- ducing the Paul Simon Water for the hours are lost each year in Africa nication from the Speaker: World Act of 2013 (H.R. 2901). alone—200 million hours today. WASHINGTON, DC, Since Congress passed the Paul Having water means girls can go to August 1, 2013. Simon Water for the Poor Act in 2005, school and build a better future. It also I hereby appoint the Honorable BILL the United States has become a global reduces the risk of violence and sexual HUIZENGA to act as Speaker pro tempore on leader in efforts to increase access to assault. -
Inhaltsverzeichnis
Inhaltsverzeichnis Einleitung – 7 1 Anfänge – 31 1968 und die Anfänge des linken Terrorismus – 33 Terrorismus und Avantgarde – 52 Faszinosum Militanz – 71 2 Stationen – 101 Sympathie und »Verrat« – 103 Sartre in Stammheim – 118 3 Faktoren – 147 Die RAF und die Frauen – 149 Die RAF und ihre Anwälte – 175 Die Mission mit der Waffe – 221 4 Vergangenheit – 233 Zivilisationsbruch und Gesellschaftskontinuität – 235 Die antisemitische Selektion eines bundesdeutschen Terroristen – 250 Horst Mahler und das Kontinuum der Schuldabwehr – 299 5 Beendigung – 327 Die RAF und ihre Opfer – 329 Das Ende der RAF – 345 Zur zeitgeschichtlichen Bedeutung der Justizvollzugsanstalt Stammheim (Bau 1) – 355 Anmerkungen – 379 Drucknachweise – 423 SB_98140_0002_Kraushaar_RAF.indd 5 06.11.2017 10:24:18 SB_98140_0002_Kraushaar_RAF.indd 6 06.11.2017 10:24:18 Einleitung Wer vierzig Jahre nach dem »Deutschen Herbst« des Jahres 1977 und damit nach der Geschichte der RAF fragt, nach ihrer Herausforderung wie ihrer Bewältigung, der muss sich auch umgekehrt die Frage gefal- len lassen, welche Bedeutung der damalige und 1998 nach fast dreißig Jahren beendete linke Terrorismus für die Gegenwart überhaupt noch haben soll. Worum geht es, wenn nach so langer Zeit noch einmal Verbrechen unter die Lupe genommen werden, die in manchen Fällen zwar immer noch ihrer strafrechtlichen Aufklärung harren, politisch aber längst bedeutungslos geworden sind? Oder zugespitzter gefragt: Was macht eigentlich die vom Kapitel RAF noch immer anhaltende Irritationskraft aus? Und worin sollte die Aufgabe bestehen, dieses besser als bisher zu begreifen? Spätestens seit den Terroranschlägen vom 11. September 2001 ist der Terror ja zu einer furchterregenden Konstante des politischen Le- bens geworden. Was an Schreckensmeldungen früher eher punktuell auftrat, das ist seither zu einem regelrechten Kontinuum geworden. -
Cases Involving Diplomatic Assurances Against Torture
January 2007 Number 1 Cases Involving Diplomatic Assurances against Torture Developments since May 2005 Introduction .................................................................................................................. 1 Austria ......................................................................................................................... 1 Mohamed Bilasi-Ashri (Update) ..................................................................... 1 Canada ........................................................................................................................ 3 Lai Cheong Sing (Update).............................................................................. 3 Security Certificate Cases (Update) ............................................................. 5 Mohammad Zeki Mahjoub: Torture Risk Assessment (Update) ................ 7 Germany .................................................................................................................... 10 Metin Kaplan (Update) ................................................................................. 10 Netherlands ................................................................................................................ 11 Nuriye Kesbir (Update) .................................................................................. 11 Russian Federation ...................................................................................................... 12 Ivanovo Refugees’ Case ............................................................................. -
The FCC, Indecency, and Regulatory Transformations in the Shadows, 65 Admin
University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2013 "Smut and Nothing But": The CF C, Indecency, and Regulatory Transformations in the Shadows Lili Levi University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Entertainment, Arts, and Sports Law Commons, and the First Amendment Commons Recommended Citation Lili Levi, "Smut and Nothing But": The FCC, Indecency, and Regulatory Transformations in the Shadows, 65 Admin. L. Rev. 509 (2013). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. ARTICLES "SMUT AND NOTHING BUT"*: THE FCC, INDECENCY, AND REGULATORY TRANSFORMATIONS IN THE SHADOWS LILI LEVI" TABLE OF CONTENTS Introduction .......................................... 511 I. The FCC's Indecency Regime ................................519 A. History of Indecency Regulation .............. ...... 520 B. The Indecency Policy in the Courts ................... 530 II. Beyond Fleeting Expletives-The Full Range of Changes to the FCC's Indecency Policy ................ ................... 536 A. Changes Regarding Remedies............. ................. 537 1. Fines..................... ............... -
3372 ISS Building Bridges and Overcoming the Gaps.Indd
Understanding Terrorism in Africa Building Bridges and Overcoming the Gaps Edited by Wafula Okumu and Anneli Botha 19 and 20 May 2007 The vision of the Institute for Security Studies (ISS) is one of a stable and peaceful Africa characterised by sustainable develop- ment, human rights, the rule of law, democracy and collaborative security. As an applied policy research institute with a mission to conceptualise, inform and enhance the debate on human security in Africa the organisation supports policy formulation and decision making at every level towards the enhancement of human security for all in Africa. The Institute supports this vision and mission by undertaking applied research, training and capacity building; working collaboratively with others; facilitating and supporting policy formulation; monitoring trends and policy implementation; and collecting, interpreting and disseminating information. It should be noted that any opinions expressed in this report are the responsibility of the participants in the workshop and not of the ISS, its Advisory Council, the Trustees or any funder or sponsor of the ISS. © Institute for Security Studies, 2008 Copyright in the volume as a whole is vested in the Institute for Security Studies, and no part may be reproduced in whole or in part without the express permission, in writing, of the ISS. ISBN: 978-1-920114-26-8 Published by the Institute for Security Studies Institute for Security Studies PO Box 1787, Brooklyn Square Tshwane (Pretoria) 0075 SOUTH AFRICA Tel: +27 12 346 9500/2 Fax: +27 12 460 0998 email: [email protected] www.issafrica.org Typesetting by Marketing Support Services +27 12 346 2168 Printed by Business Print Centre Cover Photo by Caption: Contents About the authors .