DEFENSE of SECRET AGREEMENTS Ashley S. Deeks

Total Page:16

File Type:pdf, Size:1020Kb

DEFENSE of SECRET AGREEMENTS Ashley S. Deeks A (QUALIFIED) DEFENSE OF SECRET AGREEMENTS Ashley S. Deeks INTRODUCTION............................................................................................ 714 I. THE SECRET COMMITMENT LANDSCAPE ............................................... 720 A. U.S. Treaties and Executive Agreements ....................................... 721 B. U.S. Political Arrangements ........................................................... 725 1. Secret Political Arrangements in U.S. Law ............................. 725 2. Potency of Political Arrangements........................................... 728 C. Secret Agreements in the Pre-Charter Era ..................................... 730 1. Key Historical Agreements and Their Critiques ...................... 730 a. Seminal Secret Treaties ....................................... 730 b. Critiques of the Treaties ...................................... 732 c. Treaty Registration Requirements....................... 735 2. Covenant of the League of Nations .......................................... 736 3. U.N. Charter ............................................................................. 737 4. Seeds of Non-compliance ........................................................ 737 a. Textual Challenges .............................................. 738 b. Practical Challenges ............................................ 739 II. DEFENDING SECRET COMMITMENTS IN THE CHARTER ERA .................. 740 A. Categories of Commitments ........................................................... 741 1. Intelligence Cooperation .......................................................... 741 2. Military Cooperation ................................................................ 744 3. Nuclear-Related Agreements ................................................... 746 4. Weapons-Related Commitments .............................................. 749 5. Economic Commitments .......................................................... 750 Associate Professor, University of Virginia Law School. Thanks to Gabriella Blum, Jack Goldsmith, Duncan Hollis, John Quigley, Alan Rozenshtein, Rich Schragger, Steve Slick, Paul Stephan, Robert Taylor, Pierre Verdier, and participants in presentations at Harvard Law School and at the Forefront of International Law conference at Arizona State University Law School, for which this paper was written. Thanks also to Kevin Crenny, Christopher Mirasola, Adrianna ScheerCook, and the UVA Law librarians for excellent research assistance. Although I previously served in the State Department, I have drawn only from publicly available information in writing this article. The opinions and characterizations in this piece are those of the author, and do not necessarily represent official positions of the U.S. Government. 714 ARIZONA STATE LAW JOURNAL [Ariz. St. L.J. B. Reasons for Secrecy ....................................................................... 751 1. Publicity Would Defeat Commitment’s Legitimate Purpose ..................................................................................... 751 2. Enhanced Transparency Behind the Veil ................................. 753 3. Deference to Sovereignty ......................................................... 755 4. Lack of Public Support............................................................. 756 5. Facilitating Illegality ................................................................ 758 C. Substantive Consistency with the U.N. Charter ............................. 759 1. Enhancing Self-defense ............................................................ 761 2. Avoiding Conflict .................................................................... 762 3. Furthering International Law ................................................... 765 4. Exceptions ................................................................................ 766 D. Internalizing the Charter ................................................................ 769 III. CHECKING SECRET COMMITMENTS ....................................................... 773 A. Legislative Checks ......................................................................... 774 B. Inter-agency Checks ....................................................................... 776 C. Intra-agency Checks ....................................................................... 778 D. Foreign Checks .............................................................................. 781 E. Enhancing Oversight of Secret Commitments ............................... 782 1. Expanding Congressional Oversight of Secret Arrangements ........................................................................... 782 2. Enhancing Inter-agency Checks ............................................... 784 3. Diversifying Intra-agency Checks............................................ 784 IV. INFORMING THE LITERATURE ................................................................ 786 A. Executive Power............................................................................. 786 B. Secrecy ........................................................................................... 788 C. Treaty-Making and Compliance .................................................... 790 1. Reputation-Driven Compliance ............................................... 791 2. Power of Political Commitments ............................................. 792 V. CONCLUSION ......................................................................................... 793 INTRODUCTION Secret international agreements have a bad reputation. Ever since states misused secret agreements during World War I, commentators have been quick to condemn these agreements as pernicious and destabilizing to international peace and security. As that war wound down, the prevailing view—crystallized most prominently by President Woodrow Wilson in his 49:0713] SECRET AGREEMENTS 715 Fourteen Points—was that the use of secret agreements exacerbated the war’s violence and should be abandoned. Many of the secret agreements of that era also undercut notions of self-determination and revealed hypocritical policies by democratic governments. The concerns triggered by secret agreements were so salient that states crafting the League of Nations Covenant and then the United Nations Charter included provisions intended to eliminate the use of these agreements. Conventional wisdom holds that the Charter has largely achieved this goal. As a descriptive matter, commentators today commonly assert that the use of secret agreements is rare, due in part to the norms in the Charter that favor the publication of international agreements and disfavor secrecy.1 Many international legal scholars seem implicitly to accept this descriptive claim, and focus their work almost entirely on the public products of state-to-state interactions (such as international agreements and resolutions produced by international organizations).2 Those who study foreign relations and the Executive’s powers within the U.S. legal system likewise tend to focus on the Executive’s public behavior and outputs; they spend much less time exploring how the Executive conducts international relations behind the curtain. It is almost enough to make one believe that secret agreements have disappeared from the international stage. Many would celebrate this disappearance. Various scholars argue that secret agreements inhibit peaceful relations among states and that their use signals that states are pursuing substantive goals that violate international law.3 This normative perspective on secret agreements finds its genesis in the 1. See, e.g., VIENNA CONVENTION ON THE LAW OF TREATIES: A COMMENTARY 1341 (Oliver Dorr & Kirsten Schmalenbach eds., 2012) [hereinafter VIENNA CONVENTION COMMENTARY] (stating that secret treaties no longer play an essential role in international relations); Charles Lipson, Why Are Some International Agreements Informal?, in INTERNATIONAL LAW AND INTERNATIONAL RELATIONS 293, 328 (Beth A. Simmons & Richard H. Steinberg eds., 2007); Kal Raustiala, Form and Substance in International Agreements, 99 AM. J. INT’L L. 581, 583 (2005) (describing secret agreements as “[l]ess in favor today”). For a general discussion of transparency norms in international law, see TRANSPARENCY IN INTERNATIONAL LAW (Andrea Bianchi & Anne Peters eds., 2013). 2. See generally, e.g., ANTHONY AUST, MODERN TREATY LAW AND PRACTICE (2d ed. 2007) (containing extensive discussion of treaty practice but virtually no discussion of secret agreements); SECRECY AND FOREIGN POLICY (Thomas Franck & Edward Weisband eds., 1974) (discussing various aspects of secrecy in foreign relations but mentioning “secret treaty commitments” in a single paragraph). Some scholars may recognize that secret commitments exist and that states find them useful, but choose not to write about the issue because of the methodological challenges described herein. 3. See generally, e.g., Richard Caddell, Secret Treaties, in MAX PLANCK ENCYCLOPEDIA OF PUBLIC INTERNATIONAL LAW (Rudiger Wolfrum ed., 2006) (“In the current era, secret treaty- making carries negative connotations . .”). 716 ARIZONA STATE LAW JOURNAL [Ariz. St. L.J. specific historical context of World War I, but a range of secrecy scholars today have limned more contemporary critiques of secret law.4 There the story has stood: secret agreements are rare, and that is something to celebrate. But the story is wrong, descriptively and normatively. Secret international commitments, it turns out, are
Recommended publications
  • 177 Mental Toughness Secrets of the World Class
    177 MENTAL TOUGHNESS SECRETS OF THE WORLD CLASS 177 MENTAL TOUGHNESS SECRETS OF THE WORLD CLASS The Thought Processes, Habits And Philosophies Of The Great Ones Steve Siebold 177 MENTAL TOUGHNESS SECRETS OF THE WORLD CLASS 177 MENTAL TOUGHNESS SECRETS OF THE WORLD CLASS The Thought Processes, Habits And Philosophies Of The Great Ones Steve Siebold Published by London House www.londonhousepress.com © 2005 by Steve Siebold All Rights Reserved. Printed in Hong Kong. No part of this book may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the copyright owner. Ordering Information To order additional copies please visit www.mentaltoughnesssecrets.com or visit the Gove Siebold Group, Inc. at www.govesiebold.com. ISBN: 0-9755003-0-9 Credits Editor: Gina Carroll www.inkwithimpact.com Jacket and Book design by Sheila Laughlin 177 MENTAL TOUGHNESS SECRETS OF THE WORLD CLASS DEDICATION This book is dedicated to the three most important people in my life, for their never-ending love, support and encouragement in the realization of my goals and dreams. Dawn Andrews Siebold, my beautiful, loving wife of almost 20 years. You are my soul mate and best friend. I feel best about me when I’m with you. We’ve come a long way since sub-man. I love you. Walter and Dolores Siebold, my parents, for being the most loving and supporting parents any kid could ask for. Thanks for everything you’ve done for me.
    [Show full text]
  • New Bookmobile in Town This Summer
    JUNE-JULY2014 | Your place. Stories you want. Information you need. Connections you seek. Sherlock Holmes Discovers New Bookmobile Holmes and Watson flee from Professor Moriarty at the Kansas Museum of History. New Bookmobile in Town This Summer t’s no mystery that The Library Foundation’s work with the Capitol Federal® “We realize how important it is to provide an extension of the library to Foundation has created a literacy partnership that will be enjoyed all over the citizens of Topeka, especially those who are not able to visit the library Shawnee County. The Capitol Federal gift enabled the library to purchase a on a regular basis,” John B. Dicus, Capitol Federal® Chairman said. “The new bookmobile to replace a 21-year-old vehicle. In early June, it will arrive bookmobile also is a great opportunity for introducing the adventure of sporting a new distinctive design and a never-been-used collection. reading to children, for them to discover the fun III of reading for a lifetime.” The new bookmobile depicts scenes from a classic series, the Adventures of Sherlock Holmes. Library CEO Gina Millsap points out that there is a twist in The “story” was performed by actors from the the mystery because the “story” is set in Topeka, making it truly unique to our Topeka Civic Theatre & Academy. “Through our community. Images of Holmes, Dr. Watson and their arch nemesis Professor Academy we have brought many books to life on Moriarty stand almost 8-feet tall. The wrap was designed by the library and our stage as part of our cooperative Read the Book, Capitol Federal staff, and captured by award–winning Alistair Tutton, Alistair See the Play program,” said Vicki Brokke, President Photography, Kansas City, Kan.
    [Show full text]
  • Reciu'rernents F°R ZMIU) Th ' D^ “ JWVV
    THE VIOLENCE ALMANAC A written work submitted to the faculty of ^ ^ San Francisco State University - 7 ' In partial fulfillment of 7o l£ RecIu'rernents f°r ZMIU) Th ' D^ “ JWVV Master of Arts In English: Creative Writing By Miah Joseph Jeffra San Francisco, California May 2018 Copyright by Miah Joseph Jeffra 2018 CERTIFICATION OF APPROVAL I certify that I have read The Violence Almanac by Miah Joseph Jeffra, and that in my opinion this work meets the criteria for approving a written creative work submitted in partial fulfillment of the requirements for the degree: Master of Arts in English: Creative Writing at San Francisco State University. Professor of Creative Writing THE VIOLENCE ALMANAC Miah Joseph Jeffra San Francisco, California 2018 The Violence Almanac addresses the relationships between natural phenomena, particularly in geology and biology, and the varied types of violence experienced in American society. Violence is at the core of the collection—how it is caused, how it effects the body and the body politic, and how it might be mitigated. Violence is also defined in myriad ways, from assault to insult to disease to oppression. Many issues of social justice are explored through this lens of violence, and ultimately the book suggests that all oppressive forces function similarly, and that to understand our nature is to understand our culture, and its predilection for oppression. I certify that the Annotation is a correct representation of the content of this written creative work. ' Chair, Written Creative Work Committee Date ACKNO WLEDG EMENT Thank you to Lambda Literary, Ragdale and the Hub City Writers Project, for allowing me the space to write these stories.
    [Show full text]
  • FORMAL ALLIANCES, 1815&Mdash;1939
    FORMAL ALLIANCES, 1815—1939 A Quantitative Description By J. DAVID SINGER and MELVI N SMALL University of Michigan 1. Introduction selves. Finally, we will describe as com- Although there are many types of rela- pletely as is possible and necessary the tionship and interaction between and coding and classifying procedures, such among nations, very few of them leave the that others might either replicate the data- sort of ’trace’ which makes them vulner- making operation, or, at least, know ex- able to systematic observation. To ’get at’ plicitly wherein their understanding and indicators of interdependence, interpene- our results differ. tration, hostility, cooperation, threats, or political distance phenomena, for example, 2. The basic sources of information, is a costly and time-consuming enterprise Since our need was for a classified cata- whose results might turn out to be either log of formal alliances that did not, to methodologically unreliable or theoreti- our knowledge, exist, the problem was to cally uninteresting. But one type of inter- identify the sources from which such in- nation relationship which leaves a rela- formation could be compiled for the 125- tively reliable trace and which is full of year period under investigation. Basically, theoretical implications is the formal alli- two types of sources are available. The ance. It is, therefore, surprising that we preferable one, because there is more rele- have seldom gone beyond the anecdotal vant information in a single volume, is treatment of a very few such relationships,
    [Show full text]
  • Mapping the Jihadist Threat: the War on Terror Since 9/11
    Campbell • Darsie Mapping the Jihadist Threat A Report of the Aspen Strategy Group 06-016 imeless ideas and values,imeless ideas contemporary dialogue on and open-minded issues. t per understanding in a nonpartisanper understanding and non-ideological setting. f e o e he mission ofhe mission enlightened leadership, foster is to Institute Aspen the d n T io ciat e r p Through seminars, policy programs, initiatives, development and leadership conferences the Institute and its international partners seek to promote the pursuit of the pursuit partners and its international promote seek to the Institute and ground common the ap Mapping the Jihadist Threat: The War on Terror Since 9/11 A Report of the Aspen Strategy Group Kurt M. Campbell, Editor Willow Darsie, Editor u Co-Chairmen Joseph S. Nye, Jr. Brent Scowcroft To obtain additional copies of this report, please contact: The Aspen Institute Fulfillment Office P.O. Box 222 109 Houghton Lab Lane Queenstown, Maryland 21658 Phone: (410) 820-5338 Fax: (410) 827-9174 E-mail: [email protected] For all other inquiries, please contact: The Aspen Institute Aspen Strategy Group Suite 700 One Dupont Circle, NW Washington, DC 20036 Phone: (202) 736-5800 Fax: (202) 467-0790 Copyright © 2006 The Aspen Institute Published in the United States of America 2006 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-456-4 Inv No.: 06-016 CONTENTS DISCUSSANTS AND GUEST EXPERTS . 1 AGENDA . 5 WORKSHOP SCENE SETTER AND DISCUSSION GUIDE Kurt M. Campbell Aspen Strategy Group Workshop August 5-10, 2005 .
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • The Commandant's Introduction
    The Commandants Introduction By Michael H. Clemmesen his issue of the Baltic Defence Re- It seems now to have been generally members seem to have realised this fact. view marks a change in the editorial recognized that the Alliance has to be To succeed, the transformation must line that is symbolised by the changed reformed thoroughly to remain relevant take the alliance forward and change it cover. The adjustment is not only caused to the leading member state. The U.S.A., from being a reactive self-defensive alli- by the fact that the three Baltic states have involved as she is in the drawn-out War ance. The outlined new NATO is a po- succeeded in being invited to NATO as Against Terror that was forced upon her litically much more demanding, divisive, well as to the EU and now have to adapt by the 11 September 2001 attacks, is not and risky framework for military co-op- to the new situation. It is also based on impressed by the contribution from most eration. Its missions will include opera- the realisation that the two organisations of the European allies. Only a small tions of coercion like the one against will change their character when the inte- progress has been made in the Yugoslavia with regard to Kosovo as well gration of the new members takes place. enhancement of the force structures of as pre-emptive Out-of-NATO area crisis The implementation of the new editorial the European members since the 1999 response operations military activism line will only come gradually.
    [Show full text]
  • Extraordinary Rendition in U.S. Counterterrorism Policy: the Impact on Transatlantic Relations
    EXTRAORDINARY RENDITION IN U.S. COUNTERTERRORISM POLICY: THE IMPACT ON TRANSATLANTIC RELATIONS JOINT HEARING BEFORE THE SUBCOMMITTEE ON INTERNATIONAL ORGANIZATIONS, HUMAN RIGHTS, AND OVERSIGHT AND THE SUBCOMMITTEE ON EUROPE OF THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION APRIL 17, 2007 Serial No. 110–28 Printed for the use of the Committee on Foreign Affairs ( Available via the World Wide Web: http://www.foreignaffairs.house.gov/ U.S. GOVERNMENT PRINTING OFFICE 34–712PDF WASHINGTON : 2007 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON FOREIGN AFFAIRS TOM LANTOS, California, Chairman HOWARD L. BERMAN, California ILEANA ROS-LEHTINEN, Florida GARY L. ACKERMAN, New York CHRISTOPHER H. SMITH, New Jersey ENI F.H. FALEOMAVAEGA, American DAN BURTON, Indiana Samoa ELTON GALLEGLY, California DONALD M. PAYNE, New Jersey DANA ROHRABACHER, California BRAD SHERMAN, California DONALD A. MANZULLO, Illinois ROBERT WEXLER, Florida EDWARD R. ROYCE, California ELIOT L. ENGEL, New York STEVE CHABOT, Ohio BILL DELAHUNT, Massachusetts THOMAS G. TANCREDO, Colorado GREGORY W. MEEKS, New York RON PAUL, Texas DIANE E. WATSON, California JEFF FLAKE, Arizona ADAM SMITH, Washington JO ANN DAVIS, Virginia RUSS CARNAHAN, Missouri MIKE PENCE, Indiana JOHN S. TANNER, Tennessee THADDEUS G. MCCOTTER, Michigan LYNN C. WOOLSEY, California JOE WILSON, South Carolina SHEILA JACKSON LEE, Texas JOHN BOOZMAN, Arkansas RUBE´ N HINOJOSA, Texas J. GRESHAM BARRETT, South Carolina DAVID WU, Oregon CONNIE MACK, Florida BRAD MILLER, North Carolina JEFF FORTENBERRY, Nebraska LINDA T.
    [Show full text]
  • Retroactively Classified Documents, the First Amendment, and the Power to Make Secrets out of the Public Record
    ARTICLE DO YOU HAVE TO KEEP THE GOVERNMENT’S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD JONATHAN ABEL† INTRODUCTION ............................................................................ 1038 I. RETROACTIVE CLASSIFICATION IN PRACTICE AND THEORY ... 1042 A. Examples of Retroactive Classification .......................................... 1043 B. The History of Retroactive Classification ....................................... 1048 C. The Rules Governing Retroactive Classification ............................. 1052 1. Retroactive Reclassification ............................................... 1053 2. Retroactive “Original” Classification ................................. 1056 3. Retroactive Classification of Inadvertently Declassified Documents .................................................... 1058 II. CAN I BE PROSECUTED FOR DISOBEYING RETROACTIVE CLASSIFICATION? ............................................ 1059 A. Classified Documents ................................................................. 1059 1. Why an Espionage Act Prosecution Would Fail ................. 1061 2. Why an Espionage Act Prosecution Would Succeed ........... 1063 3. What to Make of the Debate ............................................. 1066 B. Retroactively Classified Documents ...............................................1067 1. Are the Threats of Prosecution Real? ................................. 1067 2. Source/Distributor Divide ...............................................
    [Show full text]
  • Download Article
    tHe ABU oMAr CAse And “eXtrAordinAry rendition” Caterina Mazza Abstract: In 2003 Hassan Mustafa Osama Nasr (known as Abu Omar), an Egyptian national with a recognised refugee status in Italy, was been illegally arrested by CIA agents operating on Italian territory. After the abduction he was been transferred to Egypt where he was in- terrogated and tortured for more than one year. The story of the Milan Imam is one of the several cases of “extraordinary renditions” imple- mented by the CIA in cooperation with both European and Middle- Eastern states in order to overwhelm the al-Qaeda organisation. This article analyses the particular vicissitude of Abu Omar, considered as a case study, and to face different issues linked to the more general phe- nomenon of extra-legal renditions thought as a fundamental element of US counter-terrorism strategies. Keywords: extra-legal detention, covert action, torture, counter- terrorism, CIA Introduction The story of Abu Omar is one of many cases which the Com- mission of Inquiry – headed by Dick Marty (a senator within the Parliamentary Assembly of the Council of Europe) – has investi- gated in relation to the “extraordinary rendition” programme im- plemented by the CIA as a counter-measure against the al-Qaeda organisation. The programme consists of secret and illegal arrests made by the police or by intelligence agents of both European and Middle-Eastern countries that cooperate with the US handing over individuals suspected of being involved in terrorist activities to the CIA. After their “arrest,” suspects are sent to states in which the use of torture is common such as Egypt, Morocco, Syria, Jor- dan, Uzbekistan, Somalia, Ethiopia.1 The practice of rendition, in- tensified over the course of just a few years, is one of the decisive and determining elements of the counter-terrorism strategy planned 134 and approved by the Bush Administration in the aftermath of the 11 September 2001 attacks.
    [Show full text]
  • Defense of Secret Agreements, 49 Ariz
    +(,1 2 1/,1( Citation: Ashley S. Deeks, A (Qualified) Defense of Secret Agreements, 49 Ariz. St. L.J. 713 (2017) Provided by: University of Virginia Law Library Content downloaded/printed from HeinOnline Fri Sep 7 12:26:15 2018 -- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and Conditions of the license agreement available at https://heinonline.org/HOL/License -- The search text of this PDF is generated from uncorrected OCR text. -- To obtain permission to use this article beyond the scope of your HeinOnline license, please use: Copyright Information Use QR Code reader to send PDF to your smartphone or tablet device A (QUALIFIED) DEFENSE OF SECRET AGREEMENTS Ashley S. Deeks* IN TRO DU CTION ............................................................................................ 7 14 I. THE SECRET COMMITMENT LANDSCAPE ............................................... 720 A. U.S. Treaties and Executive Agreements ....................................... 721 B. U .S. Political Arrangem ents ........................................................... 725 1. Secret Political Arrangements in U.S. Law ............................. 725 2. Potency of Political Arrangements ........................................... 728 C. Secret Agreements in the Pre-Charter Era ..................................... 730 1. Key Historical Agreements and Their Critiques ...................... 730 a. Sem inal Secret Treaties ....................................... 730 b. Critiques of the Treaties .....................................
    [Show full text]
  • OPEN SOURCE INFORMATION the Missing Dimension of Intelligence CSIS Repo
    T R OPEN SOURCE INFORMATION The Missing Dimension of Intelligence CSIS REPO A Report of the CSIS Transnational Threats Project Authors Arnaud de Borchgrave Thomas Sanderson John MacGaffin ISBN-13: 978-0-89206-483-0 ISBN-10: 0-89206-483-8 THE CENTER FOR STRATEGIC & INTERNATIONAL STUDIES 1800 K Street, NW • Washington, DC 20006 Telephone: (202) 887-0200 • Fax: (202) 775-3199 E-mail: books©csis.org • Web site: http://www.csis.org/ Ë|xHSKITCy064830zv*:+:!:+:! March 2006 OPEN SOURCE INFORMATION The Missing Dimension of Intelligence A Report of the CSIS Transnational Threats Project Authors Arnaud de Borchgrave Thomas Sanderson John MacGaffin March 2006 About CSIS The Center for Strategic and International Studies (CSIS) seeks to advance global security and prosperity in an era of economic and political transformation by providing strategic insights and practical policy solutions to decisionmakers. CSIS serves as a strategic planning partner for the government by conducting research and analysis and developing policy initiatives that look into the future and anticipate change. Our more than 25 programs are organized around three themes: Defense and Security Policy—With one of the most comprehensive programs on U.S. defense policy and international security, CSIS proposes reforms to U.S. defense organization, defense policy, and the defense industrial and technology base. Other CSIS programs offer solutions to the challenges of proliferation, transnational terrorism, homeland security, and post-conflict reconstruction. Global Challenges—With programs on demographics and population, energy security, global health, technology, and the international financial and economic system, CSIS addresses the new drivers of risk and opportunity on the world stage.
    [Show full text]