National Security Division FOIA Request Log, FY 2013

Total Page:16

File Type:pdf, Size:1020Kb

National Security Division FOIA Request Log, FY 2013 Department of Justice: National Security Division FOIA request log, FY 2013 Brought to you by AltGov2 www.altgov2.org/FOIALand Assigned RRequest Date Subject Action Date completed Request Rec Date (b) (6), (b) (7)(C) 13-274 FOIA log from Jan. 1, 2013 through the date this request letter is answered 13-273 9/25/2013 9/26/2013 CONSULT Request of (b) (6), (b) (7)(C) for records pertaining to Brian Regan: OIP No. AG/13-04738 (F) (b) (6), (b) (7)(C) ) 13-272 8/21/2013 Full Denial 9/5/2013 8/27/2013 an electronic copy (e.g. pdfs on a CD-ROM or via email) of agency memos, communications to Congress, and reports on the impact of sequestration in FY 2013 and anticipated impacts of sequestration in FY 2014 and/or of other deeper potential cuts; FY 2013 operating plans that detail sequestration’s impact across the agency’s program areas and subsequent use of reprogramming authority to mitigate impacts 13-271 9/24/2013 9/24/2013 copies of all Special Crime Reports or routine disseminations of crimes information made pursuant to the Memorandum of Understanding on Reporting of Information Concerning Federal Crimes which meet the following criteria: 1. Received by DOJ, NSD or OIPR in 2003, 2004, 2007, 2008, 2011 or 2012; 2. Sent from an agency in the US Intelligence Community; and 3. Contains information ontained during a security-related polygraph examination of an agency employee, contractor, potential employee, or potential contrator 13-270 9/24/2013 9/24/2013 Request of (b) (6), (b) (7)(C) for records pertaining to Kenneth C. 13-269 7/29/2012 Durant; OIP No. AG/13-01783 (F) Full Release 9/24/2013 9/23/2013 13-268 9/18/2013 GITJANI GUTIERREZ Full Release 9/26/2013 9/19/2013 ALL DOCUMENTS FROM 1999-2000 FROM DOJ OIPR CONCERNING NATIONAL SECURITY AGENCY PROPOSAL AND/OR PROCEDURES TO PERFORM "CONTACT CHAINING" AND OTHER ANALYSES ON TELEPHONY AND/OR INTERNET METADATA. 13-267 9/13/2013 13-266 2/9/2010 **CONSULT**FILE # 66-HQ-19016 Full Release 9/13/2013 9/13/2013 13-265 3/3/2012 Hank Greenspun Partial Grant 9/13/2013 9/10/2013 13-264 9/9/2013 **CONSULT** JAMIE ZAPATA Partial Grant 9/10/2013 9/9/2013 13-263 (b) (6), (b) (7)(C) Any and all communications sent and/or received by AAG David Kris on November 5 &/or 6, 2009 regarding Maj. Nidal Hasan; all doj media "talking points" memos and/or press brief notes drafted on November 5 &/or 6, 2009 related to the Fort Hood shooting; all doj emails and/or cables sent and/or received on November 5 &/or 6, 2009 discussing news media and the foot hood shooting 13-262 8/21/2013 9/4/2013 13-261 (b) (6), (b) (7)(C) A copy of correspondence from United States Senator Mitch McConnell (R-KY) – both from his personal Senate office or from any leadership offices – and the response to the correspondence. I am not seeking information related to casework conducted by the Senator on behalf of individual constituents. 13-260 9/3/2013 9/3/2013 ANY REFERENCE TO BOLIVIAN PRESIDENT EVO MORALES FROM AND PLANE FROM JUNE 2013 UNTIL THE DATE OF THIS REQUEST 13-259 8/13/2013 9/3/2013 ANY REFERENCE TO "FAB-001" FROM JUNE 2013 UNTIL THE DATE OF 13-258 8/14/2013 THIS REQUEST 9/3/2013 ALL DOCUMENTS ON DONALD SHEA, THE NATIONAL GENTILE LEAGUE AND THE AMERICAN PRISONERS OF WAR LEAGUE: 13-257 3/6/2013 RELATIVES AND FRIENDS ASSOCIATION Full Release 9/9/2013 9/3/2013 **CONSULT**DISCLOSURE OF THE DAILY CALENDARS OF FORMER DEPUTY ATTORNEY GENERAL DAVID OGDEN AND FORMER CHIEF OF 13-256 8/28/2013 STAFF FOR THE AG KEVIN OHLSON Partial Grant 8/29/2013 8/28/2013 (b) (6), (b) (7)(C) 13-255 seeking agency records of the Foreign Intelligence Surveillance Court (individual application data to the court from the years of (1978 - 2013), for all requests by the government for business records; electronic surveillance; physical searches; physical and electronic searches; Pen register/Trap and Trace use: FISC Docket Number; date the application was made by the government; name of the government agency making the request; date of decision; decision (modify, deny, grant, withdrawn); name of judge 13-254 8/16/2013 Not a proper FOIA request for some other reason 9/11/2013 8/27/2013 13-253 (b) (6), (b) (7)(C) (b) (6), (b) (7)(C) 13-252 CONSULT Request of (b) (6), (b) (7)(C) for records pertaining to Brian Regan: OIP No. AG/13-04738 (F) ((b) (6), (b) (7)(C) 13-252 (13 8/21/2013 Duplicate request 9/5/2013 8/27/2013 1. Submissions, transcripts of FISC hearings, and FISC Orders, including the following: June 1, 2011 submission titled “Government’s Response to the Court’s Briefing Order of May 9, 2011;² June 28, 2011 submission titled “Government’s Response to the Court’s Follow-Up Questions of June 17, 2011;³ August 16, 2011 supplement to the June 1 and June 28 submissions;4 August 30, 2011 further filing following a meeting between the Court staff and representatives of the Department of Justice on August 22, 2011;5 Transcript of September 7, 2011 hearing at the FISC to ask additional questions of NSA and Department of Justice regarding the government’s statistical analysis and the implications of that analysis;6 September 9, 2011 further filing following the September 7, 2011 hearing at the FISC referenced above;7 September 13, 2011 further filing following the September 7, 2011 hearing;8 October 31, 2011 submissions;9 November 15, 2011 submission titled “Government’s Responses to FISC Questions Re: aMmended 2011 Section 702 Certifications;”10 November 22, 2011 submission titled “Government’s Responses to the Court’s Briefing Order of October 13, 2011;”11 November 29, 2011 Notice to the FISC;12 August 24, 2012 submission titled “Government’s Ex Parte Submission of Reauthorization Certification and Related Procedures, Ex Parte Submission of Amended Certifications, and Request for an Order Approving Such Certification and Amended Certifications;”13 September 12, 2012 submission titled “Supplement to the Government’s Ex Parte Submission of Reauthorization Certifications;”14 Any other government submissions referenced by 13-251 8/23/2013 the FISC in its September 25, 2012 Order; September 4, 2008 8/26/2013 1. The “separate order” or orders, as described in footnote 15 of the October 3 Opinion quoted above, in which the Foreign Intelligence Surveillance Court “address[ed] Section 1809(a) and related issues”; and, 2. The case, order, or opinion whose citation was redacted in footnote 15 of the October 3 Opinion and described as “concluding that Section 1809(a)(2) precluded the Court from approving the government’s proposed use of, among other things, certain data acquired by NSA without statutory authority through its ‘upstream collection 13-250 8/23/2013 8/26/2013 1. The FISC order regarding 50 USC Section 1809(a), as referenced in Footnote 15; 2. The March, 2009 FISC as referenced in Footnote 14 13-249 8/23/2013 8/26/2013 All records, documentation, materials, and information relating to each time the United States has sought the arrest (and/or prepared materials to seek the arrest) of a material witness pursuant to 18 U.S.C. § 3144; 2. All records, documentation, materials, and information relating to any individual who has been detained as a material witness pursuant to 18 U.S.C. § 3144 (and the corresponding provisions of 18 U.S.C. § 3142); Such requested materials include, but are not limited to: the names of any individual whose arrest as a material witness was contemplated, sought or effected (pursuant to 18 U.S.C. § 3144), the names of their attorneys, the dates of any arrest and release, the locations of any arrest and/or detention, the reasons for any arrest or detention, all drafts of arrest warrants, affidavits, transcripts, legal briefs, and court rulings related to the government’s exercise (or contemplated exercise) of its authority under 18 U.S.C. § 3144; copy of documents containing the following information: 3. All records, documentation, materials, and information pertaining to policies or guidance, whether formal or informal, setting forth, regulating, or governing the arrest and/or detention of material witnesses; 4. All records, documentation, materials, and information containing an interpretation of the provisions of 18 U.S.C. § 3144; 5. All records, documentation, materials, and information containing an interpretation of the provisions of 18 U.S.C. § 3142 as they apply to material witnesses, documents and information created or generated from January 1, 2008 to present 13-248 8/13/2013 8/22/2013 copies of each report in the DOJ Crimmal Division concerning the operation and effectiveness of the Classified Information Procedure 13-247 4/7/2012 Act, all years Full Release 8/21/2013 8/21/2013 FOIA Request of Robert Lavezzi regarding Internment of Persons 13-246 3/1/2010 During World War II; OIP No. AG/10-01233 (F) Full Release 8/21/2013 8/20/2013 **Consult** FBI Files as referenced in the 1947 multi-volume SIS 13-245 8/19/2013 Hisory Full Release 8/19/2013 8/19/2013 **Consult** Request of Devlin Barrett, of The Associated Press for copies of the Daily Calendars of Former Deputy Attorney General David Ogden and Former Chief of Staff for the Office of the Attorney General Kevin Ohlson; OIP Nos.: AG/10-00902(F); DAG/10-00902(F) 13-244 8/12/2013 Partial Grant 8/13/2013 8/13/2013 Information pertaining to recovering a vehicle and license seized by a 13-243 Solicitor General's office in Georgia Not an agency record 8/14/2013 8/8/2013 (b) (6), (b) (7)(C) 13-242 13-241 (b) (6), (b) (7)(C) 13-240 Alonzo Manuel De Moya Full Release 8/15/2013 8/8/2013 Seeking the administrative case file and processing notes, including search slips, related to
Recommended publications
  • Counter-Terrorism 1 Counter-Terrorism
    Counter-terrorism 1 Counter-terrorism WARNING: Article could not be rendered - ouputting plain text. Potential causes of the problem are: (a) a bug in the pdf-writer software (b) problematic Mediawiki markup (c) table is too wide United States Coast GuardCoast Guard on counter-terrorism patrol in Upper New York Bay. Verrazano-Narrows Bridge in distance spanning The Narrows between Brooklyn (left) and Staten Island (right).TerrorismDefinitions of terrorismDefinitionsHistory of terrorismHistoryList of terrorist incidentsIncidents Counter-terrorism (also spelled counterterrorism) incorporates the practices, Military tacticstactics, techniques, and strategies that governments, militarymilitaries, police departments and corporations adopt to attack terrorist threats and/or acts, both real and imputed.The tactic of terrorism is available to insurgencyinsurgents and governments. Not all insurgents use Fearterror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. PlanningUnited States Customs and Border Protection officers, fully armed and armored for a counter-terrorism operationMost counter-terrorism strategies involve an increase in standard police and domestic intelligence.
    [Show full text]
  • 1 Ethics of Nuclear Weapons and National Security Intelligence
    1 Ethics of Nuclear Weapons and National Security Intelligence Michael Andregg, University of St. Thomas in St. Paul, MN, USA, [email protected] for Presentation to the International Ethics Section of the ISA, San Francisco, April 6, 2013 Introduction From the beginning of the nuclear age there have been fears that we may have invented a weapon that will destroy us all. J. Robert Oppenheimer, who helped build the first fission bombs, commented often on this (1). Albert Einstein, whose letter to then President Franklin Roosevelt helped convince him to fund them, talked about the imperative to seek peace and new ways of thinking about everything as he neared death (2). Bertrand Russell coauthored a Manifesto with Einstein (and nine others) to warn the world that everything had changed (3). Yet thousands of thoughtful people still felt compelled by the urgencies of World War II to make nuclear weapons and to use two of them against other human beings. To end the war, they said to each other, and perhaps to show the Soviets who would be the big dog following. But then what? Another arms race had begun, and bigger, badder WMDs would be developed soon. As soon as more than one nation had nuclear weapons, some strategy had to be conceived for their use. Mutual Assured Destruction was the main result, and millions learned the irony of a “MAD” strategy, where safety was to be assured by capabilities and declared will to destroy human civilization if we were frightened enough by any enemy. Those we terrified produced similar weapons and strategies.
    [Show full text]
  • Severn House Paperbacks Spring 2021
    SEVERN HOUSE PUBLISHERS Hitmen I Have Known Bill James In the 35th installment of the popular Harpur and Iles police procedural series, tensions in the community are mounting following the gruesome deaths of two men. Alarmingly, suspicion falls on Assistant Chief Constable Iles. He seems at ease with the accusations, as are his superiors in the police f... Summary Assistant Chief Constable Iles finds himself suspected of murder in the fast-paced 35th installment of the popular Harpur and Iles police procedural series. Tensions in the community are mounting following the gruesome deaths of two men, both of whom were accused yet acquitted of the murder of an undercover police officer. It looks like vigilante justice, but who is responsible? Alarmingly, suspicion falls on Assistant Chief Constable Iles. Severn House Publishers 9781847519900 Matters escalate when a TV show investigating the murders is aired, further implicating Iles. Iles seems at Pub Date: 1/26/21 ease with the accusations, as are his superiors in the police force. But others are not feeling so secure. $17.95 USD/$19.95 CAD Trade Paperback Local crime bosses Ralph Ember and Mansel Shale fear reprisals against Iles will result in their own businesses 192 Pages Carton Qty: 38 suffering. And so they begin to plan how to remove potential troublemakers from their path . Fiction / Mystery & Detective Contributor Bio FIC022020 Critically acclaimed crime writer Bill James is a former journalist who wrote for The Sunday Times, Daily Series: A Harpur and Iles Mirror, Spectator, New Review and Punch. Married with four children, he lives in Wales.
    [Show full text]
  • Book Reviews
    Journal of Strategic Security Volume 3 Number 1 Volume 3, No. 1: March 2010 Article 8 Book Reviews Timothy Hsia Sheldon Greaves Donald J. Goldstein Henley-Putnam University Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 71-78 Recommended Citation Hsia, Timothy; Greaves, Sheldon; and Goldstein, Donald J.. "Book Reviews." Journal of Strategic Security 3, no. 1 (2010) : 71-78. DOI: http://dx.doi.org/10.5038/1944-0472.3.1.7 Available at: https://scholarcommons.usf.edu/jss/vol3/iss1/8 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Book Reviews This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol3/iss1/8 Hsia et al.: Book Reviews Book Reviews The History of Camp Tracy: Japanese WWII POWs and the Future of Strategic Interrogation. By Alexander D. Corbin. Fort Belvoir, VA: Ziedon Press, 2009. ISBN: 978-0-578-02979- 5. Maps. Photographs. Notes. Bibliography. Index. Pp. 189. $15.95. The History of Camp Tracy, which received the Joint Chiefs of Staff His- tory Office's Fleet Admiral Chester W. Nimitz Archival Research Award, is an illuminating and educating read. The book is written by Alexander Corbin, an intelligence officer in the U.S.
    [Show full text]
  • Carleton University Winter 2000
    Carleton University Winter 2012 Department of Political Science PSCI 4008B NATIONAL SECURITY AND INTELLIGENCE IN THE MODERN STATE Tuesday 14:35 - 17:25 Please confirm location on Carleton Central Instructor: A. Bartley Office: B643 Loeb Building E-mail: [email protected] Office Hours: 5:30-6:00 p.m. Tuesday Phone: 613 520-2600 x 3214 (no voicemail) (or by appointment) Course Description: This is primarily a research seminar where students examine issues of national security and intelligence in the modern, democratic state. The course is designed to provide an overview of the intelligence process, the role of intelligence in government and the management of intelligence policy in democratic societies. The course has five themes: the nature and structure of the intelligence process, the role of intelligence in national security, a survey of intelligence institutions in modern democracies, the instruments and institutions modern states use to manage their intelligence communities and the evolving threat environment. There will be reference to current issues in intelligence and national security including: intelligence theory and practice, intelligence policy development, terrorism and law enforcement, individual privacy, human rights and state rights. Requirements: The major course requirement is a critical essay examining one specific issue or concept related to topics raised in lectures or readings. Essay proposals are to be submitted in writing (maximum 400 words) not later than Tuesday, Feb. 14. Proposals will be graded and returned at the next class. The essay is to be a maximum 25 pages in length (double-spaced, using a generally accepted scholarly style). Papers are due not later than 4 p.m., Tuesday, April 3.
    [Show full text]
  • Can Technology Prevent Leaks?
    CAN TECHNOLOGY PREVENT LEAKS? Nathan Alexander Sales* The past decade has witnessed an unprecedented explosion in leak prosecutions. Since 2005, the government has charged leakers with violating the Espionage Act of 1917—which makes it a crime for government employees to reveal national defense information to persons not entitled to receive it1—ten times, including no fewer than nine prosecutions since President Obama took office in 2009. This prosecutorial surge stands in sharp contrast to the two Espionage Act cases brought in three quarters of a century after Congress enacted that World War I-era statute. Yet this dramatic jump in prosecutions does not appear to have corresponded with a comparably dramatic decline in the number of leaks that have occurred or in their severity. Government officials at all levels continue to reveal highly classified information routinely, from the senior administration officials who disclosed President Obama’s personal role in selecting targets for drone strikes to low-level employees like Bradley (now Chelsea) Manning and Edward Snowden who exfiltrated huge troves of diplomatic, military, and intelligence documents. “[L]eaking classified information occurs so regularly in Washington” that it has become “a routine method of communication about government.”2 Why? Part of the answer, I think, is that criminal prohibitions on leaking are fairly modest deterrents, especially for ideologically motivated leakers who seek to disclose large tranches of classified documents. The law attempts to deter undesirable conduct through commands backed by threats of punishment; the greater the magnitude of the sanctions, and the greater the probability those sanctions will be imposed, the less likely it is that people will commit the proscribed offense.
    [Show full text]
  • Journal of Strategic Security
    JOURNAL OF STRATEGIC SECURITY Vol. III, No. 1 March 2010 Editor Jeremy Tamsett, M.A. Associate Editors Gary Ackerman, M.A. Randy Borum, Ph.D. Monte Bullard, Ph.D. Denise Greaves, Ph.D. Edward J. Hagerty, Ph.D. Tom Hunter, M.A, M.Litt. Kim Lewis, M.I.M. Vincent Pollard, Ph.D. Ed Urie, M.S. Published Quarterly by Henley-Putnam University Press www.henley-putnam.edu Copyright © 2010 by Henley-Putnam University All rights reserved. No part of this publication shall be reproduced, stored in a retrieval system, or transmitted by any means electronic, mechanical, photocopying, recording, or otherwise without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this publication, the publisher and author(s) assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. Paperback ISSN: 1944-0464 eBook ISSN: 1944-0472 Warning and Disclaimer Every effort has been made to make this publication as complete and as accurate as possible, but no warranty of fitness is implied. The informa- tion provided is on an "as is" basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this publication. ii Editorial Advisory Board Major General Craig Bambrough, USA (ret.) Dr. Donald Goldstein, Institute for Defense Analyses Dr. Richard J. Kilroy Jr., Virginia Military Institute Dr.
    [Show full text]
  • Introduction to Intelligence
    COURSE OUTLINE INTRODUCTION TO INTELLIGENCE Teacher: David CHUTER Academic year 2018/2019: Paris School of International Affairs – Fall Semester BIOGRAPHICAL INFORMATION David Chuter spent more than thirty years in two governments, international organizations and think-tanks. A specialist in international issues, he has been involved in defence and security issues around the world. His last job was as Special Adviser to the Policy Director of the French Ministry of Defence from 2005 to 2008. After that job he took early retirement to become an independent author, lecturer and consultant, based in Paris. He is the author of four books and many articles, on subjects ranging from the organization of the security sector to African security issues, transitional justice and the relationship between security and development. COURSE OUTLINE Session 1: (title) Introduction: what intelligence is and why it matters Recommended readings: Two good general introductions by former government officials are: • Michael Herman, Intelligence Power in Peace and War, Cambridge University Press, 1996 • David Omand, Securing the State, C Hurst, 2010 • A short but useful discussion of definitions by a distinguished intelligence historian is Michael Warner, “Wanted: A definition of ‘intelligence’ “ Studies in Intelligence, Vol 46, No 3, (2002) • Christopher Andrew, Richard J. Aldrich and Wesley K. Wark (eds), Secret Intelligence: A Reader, Routledge 2008, brings together a large number of essays on intelligence-related subjects. The essays are of varying quality, and some are too focused on Anglo-American style intelligence issues, but a number are of considerable value. All the essays were published elsewhere, and, where cited here, are given first with their original publication details.
    [Show full text]
  • Prepublication Review in the Intelligence Community
    TILL DEATH DO US PART: PREPUBLICATION REVIEW IN THE INTELLIGENCE COMMUNITY Kevin Casey* As a condition of access to classified information, most employees of the U.S. intelligence community are required to sign nondisclosure agreements that mandate lifetime prepublication review. In essence, these agreements require employees to submit any works that discuss their experiences working in the intelligence community---whether writ- ten or oral, fiction or nonfiction---to their respective agencies and receive approval before seeking publication. Though these agreements constitute an exercise of prior restraint, the Supreme Court has held them constitu- tional. This Note does not argue fororagainsttheconstitutionality of prepublication review; instead, it explores how prepublication review is actually practiced by agencies and concludes that thecurrentsystem, which lacks executive-branch-wide guidance, grants too much discretion to individual agencies. It compares the policies of individual agencies with the experiences of actual authors who have clashed with prepublication-review boards to argue that agencies conduct review in a manner that is inconsistent at best, and downright biased and discriminatory at worst. The level of secrecy shrouding intelligence agencies and the concomitant dearth of publicly available information about their activi- ties make it difcult to evaluate their performance and, by extension, the performance of our electedofcials in overseeing such activities. In such circumstances, memoirs and other forms of expression
    [Show full text]
  • Fixing Leaks Assessing the Department of Defense’S Approach to Preventing and Deterring Unauthorized Disclosures
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. JAMES B. BRUCE ■ W. GEORGE JAMESON FIXING LEAKS ASSESSING THE DEPARTMENT OF DEFENSE’S APPROACH TO PREVENTING AND DETERRING UNAUTHORIZED DISCLOSURES C O R P O R A T I O N NATIONAL DEFENSE RESEARCH INSTITUTE FIXING LEAKS ASSESSING THE DEPARTMENT OF DEFENSE’S APPROACH TO PREVENTING AND DETERRING UNAUTHORIZED DISCLOSURES JAMES B.
    [Show full text]
  • Volume 5, Issue 2 (Fall/Winter 2017) Isbn-13: 978-0-692-11069-0 Isbn-10: 0-692-11069-0 Articles
    TM VOLUME 5 ISSUE 2 FALL/WINTER 2017 National Security Law Journal Antonin Scalia Law School George Mason University 3301 Fairfax Drive Arlington, VA 22201 www.nslj.org © 2017 National Security Law Journal. All rights reserved. Library of Congress Publication Data (Serial) ‪National Security Law Journal. ‪‪Arlington, Va. : National Security Law Journal, 2013-‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ K14 .N18 ‪ ‪‪ISSN: ‪2373-8464‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ Variant title: NSLJ National security—Law and legislation—Periodicals LC control no. 2014202997 (http://lccn.loc.gov/2014202997) Past issues available in print at the Law Library Reading Room of the Library of Congress (Madison, LM201). VOLUME 5, ISSUE 2 (FALL/WINTER 2017) ISBN-13: 978-0-692-11069-0 ISBN-10: 0-692-11069-0 ARTICLES REFORM OF THE INTELLIGENCE COMMUNITY PREPUBLICATION REVIEW PROCESS: BALANCING FIRST AMENDMENT RIGHTS AND NATIONAL SECURITY INTERESTS Christopher E. Bailey MULTIPLE PRINCIPALS AND THE (LACK OF) INTELLIGENCE OVERSIGHT Tobias T. Gibson COMMENTS THE KATZ OUTTA THE BAG: BRINGING NATIONAL SECURITY LETTERS INTO COMPLIANCE WITH THE “REASONABLE EXPECTATION OF PRIVACY” TEST Anees Mokhiber OUR ALLIES HAVE RIGHTS, TOO: JUDICIAL DEPARTURE FROM IN PERSONAM CASE LAW TO INTERFERENCE IN INTERNATIONAL POLITICS Laura J. Rosenberger VOLUME 5 FALL/WINTER 2017 ISSUE 2 PUBLISHED BY THE ANTONIN SCALIA LAW SCHOOL AT GEORGE MASON UNIVERSITY Cite as 5 NAT’L SEC. L.J. ___ (2017). The National Security Law Journal (“NSLJ”) is a student-edited legal periodical published twice annually at George Mason University School of Law in Arlington, Virginia. We print timely, insightful scholarship on pressing matters that further the dynamic field of national security law, including topics relating to foreign affairs, homeland security, intelligence, and national defense.
    [Show full text]
  • ALA Denounces Library Destruction at Occupy Wall Street
    Editor: Henry Reichman, California State University, East Bay Founding Editor: Judith F. Krug (1940–2009) Publisher: Barbara Jones Office for Intellectual Freedom, American Library Association ISSN 0028-9485 January 2012 Vol. LXI No. 1 www.ala.org/nif The American Library Association has denounced the destruction of books at a library established by Occupy Wall Street demonstrators when New York police raided a park where protesters were staying. The People’s Library, a library constructed by the New York Occupy Wall Street move- ment, was seized in the early morning hours of November 15 by the New York Police Department during a planned raid to evict Occupy Wall Street protesters from Zuccotti Park. The library held a collection of more than 5,000 items and provided free access ALA to books, magazines, newspapers and other materials. According to ALA members who visited the site, the library reflected many of ALA’s core intellectual freedom values and denounces best practices—a balanced, cataloged collection, representing diverse points of view, that included children’s books and reference service often provided by professional librarians library “The dissolution of a library is unacceptable,” said a statement by ALA President Molly Raphael. “Libraries serve as the cornerstone of our democracy and must be safeguarded.” destruction at During what the New York Police Department described as a temporary cleaning of Zuccotti Park, the library was torn down in the dark of night and its books, laptops, Occupy Wall archives, and support materials were thrown into dumpsters by armed police and city sani- tation workers. Numerous library staff were arrested, and, in one case, a librarian strapped the notebooks of original poetry from the library’s poetry readings to her body before Street lending aid to others who had been pepper-sprayed.
    [Show full text]