Democracies Debate Counterterrorism

Total Page:16

File Type:pdf, Size:1020Kb

Democracies Debate Counterterrorism National Insecurity and Human Rights: Democracies Debate Counterterrorism Edited by Alison Brysk and Gershon Shafir Published in association with University of California Press Description: All too often, the first casualty of national insecurity is human rights. How can democracies cope with the threat of terror while protecting human rights? This timely volume compares the lessons of the United States and Israel with the “best-case scenarios” of the United Kingdom, Canada, Spain, and Germany. It demonstrates that threatened democracies have important options, and democratic governance, the rule of law, and international cooperation are crucial foundations for counterterror policy. Editors: Alison Brysk is Professor of Political Science and International Studies at the University of California, Irvine. Gershon Shafir is Professor of Sociology and Director of the Institute for International, Comparative, and Area Studies at the University of California, San Diego. Review: “One of the most acute and lucid analyses of the moral and institutional challenges posed for liberal democratic societies by mega-terrorism. Alison Brysk, Gershon Shafir, and a group of eminent scholars address, with practical understanding and moral insight, the question of how to prevent our reasonable fears for our safety from turning into a moral panic that is incompatible with the effective defense of human rights.” —Tom Farer, University of Denver, former President of the Inter-American Commission on Human Rights National Insecurity and Human Rights National Insecurity and Human Rights Democracies Debate Counterterrorism Edited by Alison Brysk and Gershon Shafir Global, Area, and International Archive University of California Press Berkeley Los Angeles London The Global, Area, and International Archive (GAIA) is an initiative of International and Area Studies, University of California, Berkeley, in partnership with the University of California Press, the California Digital Library, and international research programs across the UC system. GAIA volumes, which are published in both print and open- access digital editions, represent the best traditions of regional studies, reconfigured through fresh global, transnational, and thematic perspectives. University of California Press, one of the most distinguished university presses in the United States, enriches lives around the world by advancing scholarship in the humanities, social sciences, and natural sciences. Its activities are supported by the UC Press Foundation and by philanthropic contributions from individuals and institutions. For more information, visit www.ucpress.edu. University of California Press Berkeley and Los Angeles, California University of California Press, Ltd. London, England © 2007 by The Regents of the University of California Library of Congress Cataloging-in-Publication Data National insecurity and human rights : democracies debate counterterrorism / edited by Alison Brysk and Gershon Shafir. p. cm. — (Global, area, and international archive) Includes bibliographical references and index. isbn-13: 978-0-520-09860-2 (pbk. : alk. paper) 1. Civil rights—Case studies. 2. Human rights—Case studies. 3. Terrorism—Prevention. 4. International law—Case studies. I. Brysk, Alison, 1960– II. Shafir, Gershon. JC585.N37 2007 363.325'17—dc22 2007018438 Manufactured in the United States of America 16 15 14 13 12 11 10 09 08 07 10987654321 The paper used in this publication meets the minimum requirements of ansi/niso z39.48–1992 (r 1997) (Permanence of Paper). Contents Acknowledgments ix 1. Human Rights and National Insecurity 1 Alison Brysk 2. Encroaching on the Rule of Law: Post-9/11 Policies within the United States 14 Richard Falk 3. The United States: Protecting Human Dignity in an Era of Insecurity 37 David P. Forsythe 4. Northern Ireland: Violent Conflict and the Resilience of International Law 56 Colm Campbell 5. The United Kingdom: The Continuity of Terror and Counterterror 75 Todd Landman 6. Torturing Democracies: The Curious Debate over the “Israeli Model” 92 Gershon Shafir 7. Democracy, Civil Liberties, and Counterterrorist Measures in Spain 118 Salvador Martí, Pilar Domingo, and Pedro Ibarra 8. Canada’s Balancing Act: Protecting Human Rights and Countering Terrorist Threats 137 Howard Adelman 9. Germany: State Responses to Terrorist Challenges and Human Rights 157 Wolfgang S. Heinz 10. Conclusion: Human Rights in Hard Times 177 Gershon Shafir, Alison Brysk, and Daniel Wehrenfennig Notes 189 Bibliography 213 Contributors 237 Index 239 To those who stand for rights in the face of fear— especially Miriam and Vivienne. Acknowledgments We undertook this project as concerned scholars and citizens who saw the international abuses and logic of conflict we had each studied for decades in other regions suddenly echoed in our own society.We were also inspired by responses to these legal abuses from global civil society, in this case the per- spectives of our academic colleagues from various democracies who cast a critical eye on the decline of U.S. behavior and norms, challenging us to explain what went wrong. As American civil society finally begins to ques- tion the conduct of the post–September 11 “war on terror,” and concerned publics in other democracies debate counterterror measures inspired or encouraged by the United States, we hope to contribute a comparative analysis that shows that (state) crime does not pay—and reminds us that human rights is the basis for a just and effective foreign policy. A key intellectual catalyst for this project came from Alison Brysk’s par- ticipation in the Transatlantic Dialogue on Human Rights (2004–5), orga- nized by the University of Minnesota’s David Weissbrodt, the University of Essex’s Kevin Boyle, Morten Kjaerum of the Danish Human Rights Insti- tute, and J. Paul Martin of Columbia University, and supported by Marco Stoffel of the Third Millennium Foundation. All of the participants in these Copenhagen and New York sessions helped to shape the agenda for this pro- ject, and contributed greatly to our knowledge of the issues. This volume grows directly from a conference held in February 2006 at UC San Diego and UC Irvine. That conference was attended by all of the contributors, as well as Frank Buijs (University of Amsterdam, Nether- lands). Their willingness to travel long distances on short notice, draft inci- sive analyses of emerging issues on tight deadlines, and engage in days of ix x/Acknowledgments thoughtful, constructive dialogue give this volume whatever virtues it may possess. We are extremely grateful to a collection of institutions that sponsored the conference, whose flexibility recognized the policy relevance of the topic. They include UCSD’s Dean of Social Sciences Paul Drake and Sociology Department, and UCI’s Citizen Peace-building Program, Center for Unconventional Security, Center for Global Peace and Conflict Studies, Dean of Research William Parker, Center for the Scientific Study of Ethics, and Political Science Department. We were also blessed with the enthusiastic and multifaceted support of an extraordinary team of graduate assistants: Helia Jazayeri, Daniel Wehrenfennig, and Joseph Klett. Helia’s identification of literature and par- ticipants, Daniel’s logistical wizardry and contribution to Chapter 10, and Joseph’s work on a comprehensive timeline of events were essential and much appreciated. Finally, a special note of thanks to Nathan MacBrien and UC Press, who showed unusually early and consistent support for the project. Nathan’s vision and encouragement, as well as GAIA as a home for wide diffusion of new work in international studies, transformed a reverie into a reality. 1 Human Rights and National Insecurity Alison Brysk Human rights is the first casualty of unconventional war. Even in liberal democracies, perceptions of national insecurity can rapidly destroy citizen support for international law and democratic values, such as the rule of law and tolerance. Political leaders and defense establishments arrogate the right to determine national interest and security threat, undermining democratic checks and balances and creating a politics of fear.When terrorist violence is framed as a war—an uncontrollable, external, absolute threat to existence and identity—it disrupts the democratic functioning and global ties of tar- get societies. Terrorism has succeeded in destroying democracy when a national security state, without the knowledge or consent of its citizens, tortures and kills detainees, runs secret prisons, kidnaps foreign nationals and deports them to third countries to be abused, imprisons asylum seekers, spies on its citizens, and impedes freedoms of movement, association, and expression on the basis of religion and national origin. But some democracies do better than others, even in the face of over- whelming threats. How can liberal democracies cope liberally? We can learn from comparing experiences and exploring alternatives from the United States, United Kingdom, Israel, Spain, Canada, and Germany. We find that counterterror policies reflect a state’s history of threat and consequent insti- tutional toolkit, the construction of its national interest, and the public’s per- ception of the threat to that interest. Since similarly situated target states advance different counterterror policies, to safeguard rights in the face of threat we must analyze the influence of differing rights values, legal regimes, incorporation of international norms, and legitimacy base for the exercise of authority.
Recommended publications
  • Chronology of Public Information Relating to the Cases of Messrs. Almalki, El Maati and Nureddin April 11, 2007
    Chronology of public information relating to the cases of Messrs. Almalki, El Maati and Nureddin April 11, 2007 Researched and written by Kerry Pither for organizations with Intervenor Status at the Internal Inquiry into the Actions of Canadian Officials in Relation to Abdullah Almalki, Ahmad Abou El Maati and Muayyed Nureddin1 1 Amnesty International, British Columbia Civil Liberties Association, Canadian Arab Federation, Canadian Council on American Islamic Relations, Canadian Muslim Civil Liberties Association, International Civil Liberties Monitoring Group. Chronology of public information relating to the cases of Messrs. Almalki, El Maati and Nureddin The following timeline draws on information in the public domain: the Arar Commission Report released on September 18, 2006; public evidence presented at the Arar Commission; the Report of Professor Stephen J. Toope, Fact Finder, October 14, 2005; publicly accessible court documents; information in the media; and the public chronologies, biographies and other documents filed by Messrs. Arar, El Maati, Almalki and Nureddin as exhibits at the Arar Commission. Care has been taken to accurately record this information and it has been verified and corroborated where possible, however much of the information has not been entered as sworn testimony, or subjected to cross-examination. Please note that while care has been taken to consult and include a fulsome range of significant sources of information, this chronology is not intended to be an exhaustive survey of all information relevant to these cases. Because of privacy issues, some of those referred to in this chronology are described, but not named. Early summer 1998 Abdullah Almalki says his first encounter with any security agency was when CSIS agent Theresa Sullivan telephoned and asked if they could meet.
    [Show full text]
  • Charkaoui and Bill C-3 Craig Forcese
    The Supreme Court Law Review: Osgoode’s Annual Constitutional Cases Conference Volume 42 (2008) Article 12 A Bismarckian Moment: Charkaoui and Bill C-3 Craig Forcese Lorne Waldman Follow this and additional works at: http://digitalcommons.osgoode.yorku.ca/sclr This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. Citation Information Forcese, Craig and Waldman, Lorne. "A Bismarckian Moment: Charkaoui and Bill C-3." The Supreme Court Law Review: Osgoode’s Annual Constitutional Cases Conference 42. (2008). http://digitalcommons.osgoode.yorku.ca/sclr/vol42/iss1/12 This Article is brought to you for free and open access by the Journals at Osgoode Digital Commons. It has been accepted for inclusion in The uS preme Court Law Review: Osgoode’s Annual Constitutional Cases Conference by an authorized editor of Osgoode Digital Commons. A Bismarckian Moment: Charkaoui and Bill C-3 Craig Forcese and Lorne Waldman* I. INTRODUCTION The German statesman Otto von Bismarck once said that “[i]f you like laws and sausages, you should never watch either one being made.”1 The recent enactment of Bill C-32 — the government’s response to the Supreme Court’s February 2007 decision in Charkaoui v. Canada (Citizenship and Immigration)3 — can best be described as a “Bismarckian moment”. An effort to remedy the core defects of the prior immigration security certificate regime, the new law cobbles together a potentially half-hearted “special advocate” regime and converts immigration law into a de facto system of indefinite limits on liberty for foreigners. The new system will generate an inevitable series of new constitutional challenges, some of which may succeed at the Supreme Court unless the deficiencies of Bill C-3 are cured by careful innovation at the Federal Court level.
    [Show full text]
  • Balancing Security and Liberty in Germany
    Balancing Security and Liberty in Germany Russell A. Miller* INTRODUCTION Scholarly discourse over America’s national security policy frequently invites comparison with Germany’s policy.1 Interest in Germany’s national security jurisprudence arises because, like the United States, Germany is a constitutional democracy. Yet, in contrast to the United States, modern Germany’s historical encounters with violent authoritarian, anti-democratic, and terrorist movements have endowed it with a wealth of constitutional experience in balancing security and liberty. The first of these historical encounters – with National Socialism – provided the legacy against which Germany’s post-World War II constitutional order is fundamentally defined.2 The second encounter – with leftist domestic radicalism in the 1970s and 1980s – required the maturing German democracy to react to domestic terrorism.3 The third encounter – the security threat posed in the * Associate Professor of Law, Washington & Lee University School of Law ([email protected]); co-Editor-in-Chief, German Law Journal (http://www.germanlaw journal.com). This essay draws on material prepared for a forthcoming publication. See DONALD P. KOMMERS & RUSSELL A. MILLER, THE CONSTITUTIONAL JURISPRUDENCE OF THE FEDERAL REPUBLIC OF GERMANY (3rd ed., forthcoming 2011). It also draws on a previously published piece. See Russell A. Miller, Comparative Law and Germany’s Militant Democracy, in US NATIONAL SECURITY, INTELLIGENCE AND DEMOCRACY 229 (Russell A. Miller ed., 2008). The essay was written during my term as a Senior Fulbright Scholar at the Max Planck Institute for Comparative Public Law and Public International Law in Heidelberg, Germany. 1. See, e.g., Jacqueline E. Ross, The Place of Covert Surveillance in Democratic Societies: A Comparative Study of the United States and Germany, 55 AM.
    [Show full text]
  • 0714685003.Pdf
    CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics.
    [Show full text]
  • Origination, Organization, and Prevention: Saudi Arabia, Terrorist Financing and the War on Terror”
    Testimony of Steven Emerson with Jonathan Levin Before the United States Senate Committee on Governmental Affairs “Terrorism Financing: Origination, Organization, and Prevention: Saudi Arabia, Terrorist Financing and the War on Terror” July 31, 2003 Steven Emerson Executive Director The Investigative Project 5505 Conn. Ave NW #341 Washington DC 20015 Email: [email protected] phone 202-363-8602 fax 202 966 5191 Introduction Terrorism depends upon the presence of three primary ingredients: Indoctrination, recruitment and financing. Take away any one of those three ingredients and the chances for success are geometrically reduced. In the nearly two years since the horrific attacks of 9/11, the war on terrorism has been assiduously fought by the US military, intelligence and law enforcement. Besides destroying the base that Al Qaeda used in Afghanistan, the United States has conducted a comprehensive campaign in the United States to arrest, prosecute, deport or jail those suspected of being connected to terrorist cells. The successful prosecution of terrorist cells in Detroit and Buffalo and the announcement of indictments against suspected terrorist cells in Portland, Seattle, northern Virginia, Chicago, Tampa, Brooklyn, and elsewhere have demonstrated the resolve of those on the front line in the battle against terrorism. Dozens of groups, financial conduits and financiers have seen their assets frozen or have been classified as terrorist by the US Government. One of the most sensitive areas of investigation remains the role played by financial entities and non-governmental organizations (ngo’s) connected to or operating under the aegis of the Kingdom of Saudi Arabia. Since the July 24 release of the “Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001,” the question of what role Saudi Arabia has played in supporting terrorism, particularly Al Qaeda and the 9/11 attacks, has come under increasing scrutiny.
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Bessemer School Officials Delighted with Bond Approval by P.J
    Call (906) 932-4449 Ironwood, MI Basketball Michigan high school districts Redsautosales.com look toward seeding teams SPORTS • 9 DAILY GLOBE Thursday, May 9, 2019 Rain likely yourdailyglobe.com | High: 38 | Low: 30 | Details, page 2 Bessemer school officials delighted with bond approval By P.J. GLISSON mills, which will make possible measure next to 88 who did “We need to get our roofs He expects members to be in a [email protected] $1.3 million in funds that the not. fixed at Washington School,” said more definitive position by then BESSEMER – Officials of the board expects to share fairly Bessemer City Hall collected Berg regarding the first priority to share initial plans with the Bessemer Area School District are evenly between Washington Ele- 327 votes to approve versus 221 of board members. public. thrilled that voters passed a con- mentary School and A.D. John- votes against the bond. According to Berg, the board Prior to the vote, superinten- tinuing millage rate for the city’s ston Junior and Senior High Berg said he wished more peo- will meet in a 4:30 p.m. work- dent Dave Wineburner had said two schools in a dedicated elec- School, both in Bessemer. ple had voted, but added that shop today, wherein members that he hoped all work funded by tion Tuesday. “It was pretty exciting last “the right people voted.” may discuss various priorities the bond would be complete by In the words of Bob Berg, pres- night at 8:30 p.m.,” Berg told the The board promoted the bond in relation to millage funds.
    [Show full text]
  • Entire Issue (PDF)
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 113 CONGRESS, FIRST SESSION Vol. 159 WASHINGTON, THURSDAY, AUGUST 1, 2013 No. 113 House of Representatives The House met at 10 a.m. and was of your politics: ensuring sustainable, disease needlessly. Hours spent getting called to order by the Speaker pro tem- equitable access to clean water for water are hours not working or in pore (Mr. HUIZENGA of Michigan). nearly 800 million women, children, school. f and men who don’t have it and the 2.5 A lack of clean drinking water has a billion without even the most basic disproportionate effect on women, who, DESIGNATION OF SPEAKER PRO sanitation services. TED POE and I in developing countries, walk an aver- TEMPORE think that politics should stop with age of 3.7 miles a day to get water. The The SPEAKER pro tempore laid be- water. That’s why, today, we are intro- estimates are that 40 billion working fore the House the following commu- ducing the Paul Simon Water for the hours are lost each year in Africa nication from the Speaker: World Act of 2013 (H.R. 2901). alone—200 million hours today. WASHINGTON, DC, Since Congress passed the Paul Having water means girls can go to August 1, 2013. Simon Water for the Poor Act in 2005, school and build a better future. It also I hereby appoint the Honorable BILL the United States has become a global reduces the risk of violence and sexual HUIZENGA to act as Speaker pro tempore on leader in efforts to increase access to assault.
    [Show full text]
  • Inhaltsverzeichnis
    Inhaltsverzeichnis Einleitung – 7 1 Anfänge – 31 1968 und die Anfänge des linken Terrorismus – 33 Terrorismus und Avantgarde – 52 Faszinosum Militanz – 71 2 Stationen – 101 Sympathie und »Verrat« – 103 Sartre in Stammheim – 118 3 Faktoren – 147 Die RAF und die Frauen – 149 Die RAF und ihre Anwälte – 175 Die Mission mit der Waffe – 221 4 Vergangenheit – 233 Zivilisationsbruch und Gesellschaftskontinuität – 235 Die antisemitische Selektion eines bundesdeutschen Terroristen – 250 Horst Mahler und das Kontinuum der Schuldabwehr – 299 5 Beendigung – 327 Die RAF und ihre Opfer – 329 Das Ende der RAF – 345 Zur zeitgeschichtlichen Bedeutung der Justizvollzugsanstalt Stammheim (Bau 1) – 355 Anmerkungen – 379 Drucknachweise – 423 SB_98140_0002_Kraushaar_RAF.indd 5 06.11.2017 10:24:18 SB_98140_0002_Kraushaar_RAF.indd 6 06.11.2017 10:24:18 Einleitung Wer vierzig Jahre nach dem »Deutschen Herbst« des Jahres 1977 und damit nach der Geschichte der RAF fragt, nach ihrer Herausforderung wie ihrer Bewältigung, der muss sich auch umgekehrt die Frage gefal- len lassen, welche Bedeutung der damalige und 1998 nach fast dreißig Jahren beendete linke Terrorismus für die Gegenwart überhaupt noch haben soll. Worum geht es, wenn nach so langer Zeit noch einmal Verbrechen unter die Lupe genommen werden, die in manchen Fällen zwar immer noch ihrer strafrechtlichen Aufklärung harren, politisch aber längst bedeutungslos geworden sind? Oder zugespitzter gefragt: Was macht eigentlich die vom Kapitel RAF noch immer anhaltende Irritationskraft aus? Und worin sollte die Aufgabe bestehen, dieses besser als bisher zu begreifen? Spätestens seit den Terroranschlägen vom 11. September 2001 ist der Terror ja zu einer furchterregenden Konstante des politischen Le- bens geworden. Was an Schreckensmeldungen früher eher punktuell auftrat, das ist seither zu einem regelrechten Kontinuum geworden.
    [Show full text]
  • Cases Involving Diplomatic Assurances Against Torture
    January 2007 Number 1 Cases Involving Diplomatic Assurances against Torture Developments since May 2005 Introduction .................................................................................................................. 1 Austria ......................................................................................................................... 1 Mohamed Bilasi-Ashri (Update) ..................................................................... 1 Canada ........................................................................................................................ 3 Lai Cheong Sing (Update).............................................................................. 3 Security Certificate Cases (Update) ............................................................. 5 Mohammad Zeki Mahjoub: Torture Risk Assessment (Update) ................ 7 Germany .................................................................................................................... 10 Metin Kaplan (Update) ................................................................................. 10 Netherlands ................................................................................................................ 11 Nuriye Kesbir (Update) .................................................................................. 11 Russian Federation ...................................................................................................... 12 Ivanovo Refugees’ Case .............................................................................
    [Show full text]
  • The FCC, Indecency, and Regulatory Transformations in the Shadows, 65 Admin
    University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2013 "Smut and Nothing But": The CF C, Indecency, and Regulatory Transformations in the Shadows Lili Levi University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Entertainment, Arts, and Sports Law Commons, and the First Amendment Commons Recommended Citation Lili Levi, "Smut and Nothing But": The FCC, Indecency, and Regulatory Transformations in the Shadows, 65 Admin. L. Rev. 509 (2013). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. ARTICLES "SMUT AND NOTHING BUT"*: THE FCC, INDECENCY, AND REGULATORY TRANSFORMATIONS IN THE SHADOWS LILI LEVI" TABLE OF CONTENTS Introduction .......................................... 511 I. The FCC's Indecency Regime ................................519 A. History of Indecency Regulation .............. ...... 520 B. The Indecency Policy in the Courts ................... 530 II. Beyond Fleeting Expletives-The Full Range of Changes to the FCC's Indecency Policy ................ ................... 536 A. Changes Regarding Remedies............. ................. 537 1. Fines..................... ...............
    [Show full text]
  • 3372 ISS Building Bridges and Overcoming the Gaps.Indd
    Understanding Terrorism in Africa Building Bridges and Overcoming the Gaps Edited by Wafula Okumu and Anneli Botha 19 and 20 May 2007 The vision of the Institute for Security Studies (ISS) is one of a stable and peaceful Africa characterised by sustainable develop- ment, human rights, the rule of law, democracy and collaborative security. As an applied policy research institute with a mission to conceptualise, inform and enhance the debate on human security in Africa the organisation supports policy formulation and decision making at every level towards the enhancement of human security for all in Africa. The Institute supports this vision and mission by undertaking applied research, training and capacity building; working collaboratively with others; facilitating and supporting policy formulation; monitoring trends and policy implementation; and collecting, interpreting and disseminating information. It should be noted that any opinions expressed in this report are the responsibility of the participants in the workshop and not of the ISS, its Advisory Council, the Trustees or any funder or sponsor of the ISS. © Institute for Security Studies, 2008 Copyright in the volume as a whole is vested in the Institute for Security Studies, and no part may be reproduced in whole or in part without the express permission, in writing, of the ISS. ISBN: 978-1-920114-26-8 Published by the Institute for Security Studies Institute for Security Studies PO Box 1787, Brooklyn Square Tshwane (Pretoria) 0075 SOUTH AFRICA Tel: +27 12 346 9500/2 Fax: +27 12 460 0998 email: [email protected] www.issafrica.org Typesetting by Marketing Support Services +27 12 346 2168 Printed by Business Print Centre Cover Photo by Caption: Contents About the authors .
    [Show full text]