Anglo-American Privacy and Surveillance

Total Page:16

File Type:pdf, Size:1020Kb

Anglo-American Privacy and Surveillance Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2006 Anglo-American Privacy and Surveillance Laura K. Donohue Georgetown University Law Center, [email protected] Georgetown Public Law and Legal Theory Research Paper No. 12-030 © 2006 by Northwestern University School of Law This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/790 http://ssrn.com/abstract=2020411 96 J. of Crim. L. & Criminology 1059-1208 (2006) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Comparative and Foreign Law Commons, Military, War, and Peace Commons, and the National Security Law Commons 0091-4169/06/9603-1059 THE JOURNAL OF CRIMINAL LAw &CRIMINOLOGY Vol. 96. No. 3 Copyright 0 2006 by Northwestern University. School of Law Printed in U.S.A. CRIMINAL LAW ANGLO-AMERICAN PRIVACY AND SURVEILLANCE LAURA K. DONOHUE· TABLE OF CONTENTS INTRODUCTION ................ ....... ................ ..................... .......................... 1061 . .. I. SURVEILLANCE AND THE LAW IN THE UNITED STATES .......... ...... 1064 A. REASONABLE EXPECTATION OF PRIVACY ............................ 1 065 B. NATIONAL SECURITY AND SURVEILLANCE .......................... 1072 1. TheRed Scare ......... .. ...... ...... ............ ........ .... .. _ . ...................... 1073 2. Title III. ........... ....... ............... ......... ... .... ... ............. .................. 1077 3. Executive Excess.. ..... .... .. .. ..... ........... ...... .... _ .. _ ........ .... ............. 1080 a. NSA: Operation SHAMROCK and MINARET ......... 1080 b. FBI: COINTELPRO and the Security Index!ADEX .. 1082 c. CIA: Operation CHAOS ............................................. 1087 d. DOD: Operation CONUS ........................................... 1088 4. TheChurch Committee .. .. ....... .................. .... .. ... ...... .................. 1090 5. The Foreign Intelligence SurveillanceAct . .. ........ ... ..... ............ 1094 C. THE INFORMATION AGE ....... ... ......................... _ ........................ 1098 1. 1994 Communications Assistance for Law Enforcement Act ..... 1099 2.2001 USA PATRIOT Act ......... ........... ..... .............. _ . .................. 1101 a. FISA Alterations ......................................................... 1103 b. Delayed Notice Search Warrants ................................ 1107 • Fellow, Center fo r International Security and Cooperation, Stanford University. Special thanks to Paul Lomio, Sonia Moss, and Erika Wayne at the Robert Crown Law Library, for help in acquiring the materials used in this article. I am indebted to Barbara Babcock and Robert Weisberg for suggestions on the American constitutional discussion and to Clive Walker for comments on British surveillance law. This piece is part of a longer study of counterterrorist law in the United Kingdom and United States that will be published this coming year by Cambridge University Press. 1059 1060 LA URA K. DONOHUE [Vol. 96 c. National Security Letters ............................................. 1108 D. WEAKENING OF THE ATTORNEY GENERAL GUIDELINES.. 1118 E. SURVEILLANCE OPERATIONS .................................................... 1 121 1. Counterintelligence Field Activity... ............................. .... .......... 1121 2. Echelon ........ ..... .......... ............ ................................ ....... ............ 1127 3. Carnivore/DCS1000 ........................... ......... ..... ......................... 1129 4. Magic Lantern ............... ............................ ............. .................... 1131 5. Terrorism In/ormation and Prevention System (TIPS) ...... ......... 1 132 6. Watch Lists .. .............. ......... ................. ...................................... 1136 F. DATA MINING ................................................................................. 1 139 1. Advances in Technology and the Commodification 0/ In/ormation .................................................... ............ ..................... 1140 2. Data Mining Operations............................ ................................. 1144 II. SURVEILLANCE AND THE LAW IN THE UNITED KINGDOM ...... ... ... 1 152 A. THE EVOLUTION OF INFORMATION-GATHERING AUTHORITY ................................................................................. 1156 1. PropertyInterference .... ............... ........ ......................... .... ......... 1156 2. Interception o/ Communications...... ........................................... 1159 a. Ma lone v. Un ited Kingdom and its aftermath.... .......... 1164 h. Halford v. Un ited Kingdom and the Regulation of Investigatory Powers Act 2000 ................................. 1166 c. Effectiveness of Safeguards ...... ...... ... ... ..... ... ..... 1168 3. Covert Surveillance: Intrusive, Directed, Covert Human Intelligence Sources ......... .......... .... ............................ ..................... 1 173 a. Khan v. Un ited Kingdom ...... ........... ... ...... .............. 1174 h. 2000 Regulation ofInvestigatory Powers Act ....... 1175 4. Encrypted Data.... ........... ....................... ............................. ..... .. 1178 B. POST-9fII: THE 2001 ANTI-TERRORISM, CRIME AND SECURITY ACT ............................................................................ 1180 C. ANONYMITY AND SURVEILLANCE IN PUBLIC SPACE: CCTV ............................................................................................. 1184 1. Data Protection Act 1998 ................. ................................ .......... 1 186 2. European Courts ........................ ........ .................................. ...... 1187 3. CCTV in the United States .......................................................... 1188 III. POLICY CONSIDERATIONS. ... ... ...................... ..... ... .......... .... .... 1 190 A. RISKS ................................................................................................ 1190 1. Substantive...... ....... .............................. ............ ............ ............... 1191 2. Political .......... .............................. ........ ...................................... 1193 3. Legal ................. ............. ............. ....... ................ ......................... 1194 4. Social .............................. .......................... .................................. 1 195 2006] PRIVA CY AND SURVEILLANCE 1061 5. Economic .............. .............................. ................. ....................... 1199 B. OPTIONS ................ .... ..... .... ........... .... ................. ... .... ... .......... ... 1200 CONCLUDING REMARKS . .... ..... ...... .... ..... ... .. .... .... ... ........... .. ... 1206 INTRODUCTION In October 2001, President George W. Bush authorized the National Security Agency ("NSA") "to intercept the international communications of people with known links to al Qaida and related terrorist organizations."l Four years and two months later, news of the program became public. Attorney General Alberto Gonzales defended the Commander-in-Chiefs power to ignore warrants otherwise required under the Foreign Intelligence Surveillance Act or Title III of the Omnibus Crime Control and Safe Streets Act.2 Congress itself had authorized the President to "use all necessary and appropriate fo rce against those nations, organizations, or persons he determines planned, authorized, committed, or aided" the 9111 attacks.3 For Gonzales, this meant that the President was acting "at the zenith of his powers" under the tripartite framework set fo rth by Justice Jackson in 4 Yo ungstown v. Sawyer. This was not the first time Article II claims backed surveillance programs designed to protect the United States from attack. In the midst of the Cold War, the NSA ran Operations SHAMROCK and MINARET. The Federal Bureau of Investigation ("FBI") orchestrated COINTELPRO and amassed over 500,000 dossiers on American citizens. The Central Intelligence Agency ("CIA") oversaw Operation CHAOS and built a database that tracked 300,000 people. Routine counterintelligence operations disrupted everything from women's liberation to the civil rights movement. However, in 1978, Congress introduced the Foreign Intelligence Surveillance Act ("FISA") precisely to prevent unchecked executive surveillance of American citizens. And congressional interest in ensuring 1 President's Radio Address, 41 Weekly Compo Pres. Doc. 1881 (Dec. 17, 2005), available at http://www.whitehouse.gov/news/releases/2005/12/2005 1217.html. 2 Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, § 102, 92 Stat. 1786 (1978) (codified as amended at 50 U.S.C. §§ 1801-11 (2000)); Omnibus Crime Control and Safe Streets Act, Pub. L. No. 90-351, tit. 3, 82 Stat. 212 (codifiedat 18 U.S.C. §§ 2510-20). 3 Authorization for Use of Military Force, Pub. L. No. 107-40, §2(a), 115 Stat. 224, 224 (2001) (reported as a note to 50 U.S.C. § 1541). 4 U.S. DEP'T OF JUSTICE, LEGAL AUTHORITIES SUPPORTING THE ACTIVITIES OF THE NATIONAL SECURITY AGENCY DESCRIBED BY THE PRESIDENT 2 (2006) (discussing Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579, 635-38 (1952) (Jackson, J., concurring)). 1062 LA URA K. DONOHUE [Vol. 96 oversight did not end there: in 1991 Congress amended the 1947 National Security Act to require the President to keep the congressional intelligence
Recommended publications
  • Selected Chronology of Political Protests and Events in Lawrence
    SELECTED CHRONOLOGY OF POLITICAL PROTESTS AND EVENTS IN LAWRENCE 1960-1973 By Clark H. Coan January 1, 2001 LAV1tRE ~\JCE~ ~')lJ~3lj(~ ~~JGR§~~Frlt 707 Vf~ f·1~J1()NT .STFie~:T LA1JVi~f:NCE! i(At.. lSAG GG044 INTRODUCTION Civil Rights & Black Power Movements. Lawrence, the Free State or anti-slavery capital of Kansas during Bleeding Kansas, was dubbed the "Cradle of Liberty" by Abraham Lincoln. Partly due to this reputation, a vibrant Black community developed in the town in the years following the Civil War. White Lawrencians were fairly tolerant of Black people during this period, though three Black men were lynched from the Kaw River Bridge in 1882 during an economic depression in Lawrence. When the U.S. Supreme Court ruled in 1894 that "separate but equal" was constitutional, racial attitudes hardened. Gradually Jim Crow segregation was instituted in the former bastion of freedom with many facilities becoming segregated around the time Black Poet Laureate Langston Hughes lived in the dty-asa child. Then in the 1920s a Ku Klux Klan rally with a burning cross was attended by 2,000 hooded participants near Centennial Park. Racial discrimination subsequently became rampant and segregation solidified. Change was in the air after World "vV ar II. The Lawrence League for the Practice of Democracy (LLPD) formed in 1945 and was in the vanguard of Post-war efforts to end racial segregation and discrimination. This was a bi-racial group composed of many KU faculty and Lawrence residents. A chapter of Congress on Racial Equality (CORE) formed in Lawrence in 1947 and on April 15 of the following year, 25 members held a sit-in at Brick's Cafe to force it to serve everyone equally.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    JUNE 2011 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT 2128 ADDRESSES Education, education, education ‘Under IPv6, spammers could send out one piece of spam per IPv6 address, discard it and then move on to the next address for the next 10,000 years and 3 NEWS never need to re-use a previous address.’ Terry Zink explains why mail providers are not thrilled about Standalone comparatives using IPv6 to handle email. Apple adds daily defi nition checks page 4 Mobile insecurity CLASSES OF BROWSER MALWARE Aditya Sood and Richard Enbody propose a 3 VIRUS PREVALENCE TABLE taxonomy of browser malware with the aim to provide a better insight into the techniques and tactics used. FEATURES page 8 4 Digging through the problem of IPv6 and email 20 YEARS OF EICAR 8 A browser malware taxonomy Eddy Willems reports 13 New targeted attack via Google Images on some of the topics, debates and research presented 16 CONFERENCE REPORT at the EICAR 2011 conference. EICAR 2011: A 20th anniversary in Austria page 16 18 END NOTES & NEWS ISSN 1749-7027 COMMENT ‘In the fi ght While the perpetual debate about the effi cacy of user education runs on, a clear IT security policy in the against cybercrime workplace, along with guidance on how to adhere to knowledge can be such a policy, is surely one of the most basic steps an a very powerful organization can take to help safeguard its systems. Ensuring that employees understand their responsibilities weapon.’ – and that they are fully aware of the ramifi cations for any breaches of the policy – are also important factors.
    [Show full text]
  • CIA Intelligence Collection About Americans: CHAOS and the Office
    CIA INTELLIGENCE COLLECTION ABOUT AMERICANS : CHAOS AND THE OFFICE OF SECURITY CONTENTS I. Introduction Page A. CHAOS___________________________________------------ 681 B. MERRIMAC and RESISTANCE _ _ __ _______ ___- _______ 681 C. Special security investigations _____ _ _ - _ _ _ _ - _ -_ _ _ _ _ _ _- __ __ _ 682 D. The investigation ____________ -- _____ -- __________________ 683 E. Summary of the issues-- _____ ________________ ___________ 683 1. Statutor authority_-_______--------------------- 684 a. CTounterintelligence-- _ _ _ _ _-_ __ __ __ _-_-_ __ __ b. Protecting sources and methods of intelligence- :E 2. Statutory prohibitions--- _-_ __ _ __ __ _ _ _ _ _ __ _-__ _ _ __ 686 3. Questions raised by CHAOS----- - _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 686 4. Questions raised by the Office of Security Programs-- 688 11. History and Operation of CHAOS _ - _ _-_ __ _ ___ ___ _ _ _ _ __ _-_-__ _ __ 688 A. Background----____________-_______-_______________-__ 688 B. Authorization of CHAOS _____ __ __ __ __ __ __ _ __ __ __ _ _ --_-_ _ C. The November 1967 peace movement study- ______________ % D. Operation of the CHAOS program and related CIA projects- 693 1. Gathering information ______ __ __ __ _ __ __ __ __ ____ -_- 693 2. Processing, storage and control of CHAOS informa- tion--_________________-_____-__________--~--- 695 3. Reporting by CIA- _ _ - _ _ _ __ _ _ _ _ _ __-__ _ _ _ _ _ __ ____ _ a.
    [Show full text]
  • U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act Floyd Edwards Walden University
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2018 U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act Floyd Edwards Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Floyd Alexander Edwards has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Patricia Ripoll, Committee Chairperson, Public Policy and Administration Faculty Dr. Kathleen Schulin, Committee Member, Public Policy and Administration Faculty Dr. James Mosko, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2017 Abstract U.S. Individuals’ Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act by Floyd Edwards MS, Troy State University, 2000 BS, Troy State University, 1996 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University February 2018 Abstract Since the implementation of the USA Patriot Act in October 2001, public trust in the U.S. federal government to protect individuals’ right to privacy has been affected negatively.
    [Show full text]
  • Section 213 of the Usa Patriot Act
    FROM “SNEAK AND PEEK” TO “SNEAK AND STEAL”: SECTION 213 OF THE USA PATRIOT ACT Brett A. Shumate* I. INTRODUCTION Section 213 of the USA PATRIOT Act (Patriot Act)1 has brought to light the existence of law enforcement tools about which few people were concerned before the attacks on September 11, 2001. This provision has also been a lightning rod for criticism on Fourth Amendment grounds because it explicitly authorizes two types of delayed-notification searches: “sneak and peek” and “sneak and steal” searches.2 Unfortunately, the War on Terrorism has highly politicized the debate about these law enforcement tools. What before were seen as uncontroversial criminal law tools are now seen as a threat to civil liberties because of the current context.3 Delayed-notification searches are aptly described as covert or secret searches, surreptitious searches, and most deliberately—sneak-and-peek searches.4 These warrants allow a law enforcement agent to “enter, look around, photograph items and leave without seizing anything and without leaving a copy of the warrant.”5 Agents often perform the search * J.D., Wake Forest University School of Law, 2006; B.A., Furman University, 2003. 1 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, Pub. L. No. 107-56, 115 Stat. 272 (2001) [hereinafter USA PATRIOT Act] (codified in scattered sections of the U.S.C.). 2 See Mary DeRosa, “Sneak and Peek” Search Warrants: A Summary, in PATRIOT DEBATES: EXPERTS DEBATE THE USA PATRIOT ACT 101, 101 (Stewart A. Baker & John Kavanaugh eds., 2005) [hereinafter PATRIOT DEBATES].
    [Show full text]
  • Privacy, Wiretapping and the Citizen Congress’ Battle to Set Legal Boundaries on Government Wiretapping in the 1970S Olsen, E.A
    UvA-DARE (Digital Academic Repository) Privacy, wiretapping and the citizen Congress’ battle to set legal boundaries on government wiretapping in the 1970s Olsen, E.A. Publication date 2020 Document Version Other version License Other Link to publication Citation for published version (APA): Olsen, E. A. (2020). Privacy, wiretapping and the citizen: Congress’ battle to set legal boundaries on government wiretapping in the 1970s. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:29 Sep 2021 Privacy, Wiretapping and the Citizen: Congress’ Battle to Set Legal Boundaries on Government Wiretapping in the 1970s ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof. dr. ir. K.I.J.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    APRIL 2007 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT FUTURE TESTING Magical lights shine on you What lies ahead for anti-virus testing programmes with the introduction of new protection schemes that move away from scanner-based detection? 3 NEWS Richard Ford and Attila Ondi look to the future of VB2007 programme revealed AV testing. Third round for US anti-spyware bill page 6 ESTABLISHED RESPONSIBILITIES 3 VIRUS PREVALENCE TABLE Who is responsible when a person uses a computer that is infected with malicious software? Can the user be liable even when unaware of the infestation? 4 VIRUS ANALYSIS Can the user be liable even if they do not own or Wormhole attacks Solaris station control the computer? Patrick Knight considers what is needed to achieve justice in the digital age. page 9 FEATURES 6 Testing times ahead? VB100 ON LINUX 9 (In)justice in the digital age In this month’s VB100 test John Hawes April 2007 put 16 AV products through their paces on SUSE Linux. Find out how each of 11 COMPARATIVE REVIEW them fared. Novell SUSE Linux Enterprise Server 10 page 11 22 END NOTES & NEWS This month: anti-spam news & events, and Martin Overton catalogues some of the changes that have been seen in the 419 scam over the last few years. ISSN 1749-7027 COMMENT ‘The anti-malware is unwanted), thus revealing the presence of the trojan to the user. This would put the evidence gathering at risk: a industry has the criminal who detects a surveillance trojan on his habit of developing system would likely then delete all the evidence before the investigators have obtained it.
    [Show full text]
  • The Vietnam War, 1965-1975
    How I will compress four lectures into one because I’ve run out of time. A last‐minute addition to my bibliography: • B.G. Burkett (Vanderbilt, 66) and Glenna Whitley, Stolen Valor: How the Vietnam Generation was robbed of its Heroes and its History (Dallas, 1998). • Burkett makes many claims in this book, but the most fascinating aspect of it is his exposure of the “phony Vietnam veteran,” a phenomenon that still amazes me. “Many Flags” campaign ‐ Allied support 1.) South Korea –largest contingent – 48,000(would lose 4407 men)‐US financial support 2.) Australia – 8000, lost 469 3.)New Zealand, 1000, lost 37 4.) Thailand – 12,000 troops, 351 lost 5.) Philippines – medical and small number of forces in pacification 6.) Nationalist China –covert operations American Force levels/casualties in Vietnam(K=killed W=wounded) 1964 23,200 K 147 W 522 1965 190,000 K 1369 W 3308 1966 390,000 5008 16,526 1967 500,000 9377 32,370 1968 535,000 14,589 46,797 1969 475,000 9414 32,940 1970 334,000 4221 15,211 1971 140,000 1381 4767 1972 50,000 300 587 Soviet and Chinese Support for North Vietnam • 1.) Despite Sino‐Soviet dispute and outbreak of Cultural Revolution in China, support continues • 2.) Soviet supply of anti‐aircraft technology and supplies to the North –along with medical supplies, arms, tanks, planes, helicopters, artillery, and other military equipment. Soviet ships provided intelligence on B‐52 raids – 3000 soldiers in North Vietnam (Soviet govt. concealed extent of support) • 3.) Chinese supply of anti‐aircraft units and engineering
    [Show full text]
  • Encryption Regulation in the Wake of September 11, 2001: Must We Protect National Security at the Expense of the Economy?
    Federal Communications Law Journal Volume 55 Issue 2 Article 7 3-2003 Encryption Regulation in the Wake of September 11, 2001: Must We Protect National Security at the Expense of the Economy? Matthew Parker Voors Indiana University School of Law Follow this and additional works at: https://www.repository.law.indiana.edu/fclj Part of the Administrative Law Commons, Communications Law Commons, Internet Law Commons, and the Law and Economics Commons Recommended Citation Voors, Matthew Parker (2003) "Encryption Regulation in the Wake of September 11, 2001: Must We Protect National Security at the Expense of the Economy?," Federal Communications Law Journal: Vol. 55 : Iss. 2 , Article 7. Available at: https://www.repository.law.indiana.edu/fclj/vol55/iss2/7 This Note is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Federal Communications Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. VOORS FINAL 3/6/2003 11:20 AM NOTE Encryption Regulation in the Wake of September 11, 2001: Must We Protect National Security at the Expense of the Economy? Matthew Parker Voors* I. INTRODUCTION ............................................................................ 332 II. HISTORY OF ENCRYPTION............................................................ 335 A. What Is Encryption? ............................................................. 335 B. Background on Encryption................................................... 337 C. Recent Encryption Advancements ........................................ 338 D. Use of Encryption by Business and the Service Industry ..... 339 E. Use of Encryption by Terrorist Organizations ..................... 340 III. ENCRYPTION REGULATION OVER THE LAST DECADE ................. 343 A. The Struggle Between National Security and an Evolving Global Economy ..................................................................
    [Show full text]
  • Civil Liberties in Uncivil Times: the Ep Rilous Quest to Preserve American Freedoms Kenneth Lasson University of Baltimore School of Law, [email protected]
    University of Baltimore Law ScholarWorks@University of Baltimore School of Law All Faculty Scholarship Faculty Scholarship 2007 Civil Liberties in Uncivil Times: The eP rilous Quest to Preserve American Freedoms Kenneth Lasson University of Baltimore School of Law, [email protected] Follow this and additional works at: http://scholarworks.law.ubalt.edu/all_fac Part of the Civil Rights and Discrimination Commons, Constitutional Law Commons, and the National Security Law Commons Recommended Citation Civil Liberties in Uncivil Times: The eP rilous Quest to Preserve American Freedoms, 2 London Law Review 2 (2007) This Article is brought to you for free and open access by the Faculty Scholarship at ScholarWorks@University of Baltimore School of Law. It has been accepted for inclusion in All Faculty Scholarship by an authorized administrator of ScholarWorks@University of Baltimore School of Law. For more information, please contact [email protected]. bepress Legal Series Year Paper Civil Liberties in Uncivil Times: The Perilous Quest to Preserve American Freedoms Kenneth Lasson University of Baltimore This working paper is hosted by The Berkeley Electronic Press (bepress) and may not be commercially reproduced without the permission of the copyright holder. http://law.bepress.com/expresso/eps/1090 Copyright c 2006 by the author. Civil Liberties in Uncivil Times: The Perilous Quest to Preserve American Freedoms Abstract The perilous quest to preserve civil liberties in uncivil times is not an easy one, but the wisdom of Benjamin Franklin should remain a beacon: “Societies that trade liberty for security end often with neither.” Part I of this article is a brief history of civil liberties in America during past conflicts.
    [Show full text]
  • 'Lose in Vietnam, Bring Our Boys Home'
    Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2004 ‘Lose in Vietnam, Bring Our Boys Home’ Robert N. Strassfeld Case Western Reserve University - School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Law Commons Repository Citation Strassfeld, Robert N., "‘Lose in Vietnam, Bring Our Boys Home’" (2004). Faculty Publications. 267. https://scholarlycommons.law.case.edu/faculty_publications/267 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. "LOSE IN VIETNAM, BRING THE BOYS HOME" ROBERTN. STRASSFELD. This Article examines the contest over dissent and loyalty during the Vietnam War. The Johnson and Nixon Administrations used an array of weapons to discourage or silence antiwar opposition. These included crinLinal prosecutions for "disloyal speech," a tool that they used with less frequency than s01ne other administrations in times of war; prosecutions for other "crimes" that served as pretext for prosecuting disloyal speech; infiltration and harassment; and an attempt to characterize their critics as disloyal. The antiwar movement, in turn, responded to allegations that dissent equaled disloyalty by offering an alternative vision of loyalty and patriotism. In so doing, they recast notions of allegiance, betrayal, support of the troops, and our obligations in the face of conflicting loyalties. INTRODUCTION ..................................................................................... 1892 I. THE USES OF LOYALTY IN THE VIETNAM WAR ERA ........... 1894 A. The Model of Legal Repression: The World War I Experience ...........................................................................
    [Show full text]
  • Lalonde Melissa 200311280 M
    NATIONAL SECURITY CRISES AND THE EXPANDING AMERICAN PRESIDENCY A Thesis Submitted to the Faculty of Graduate Studies and Research In Partial Fulfillment of the Requirements for the Degree of Master of Arts In History University of Regina by MELISSA MARGUERITE LALONDE Regina, Saskatchewan August 2012 Copyright 2012: Melissa Lalonde UNIVERSITY OF REGINA FACULTY OF GRADUATE STUDIES AND RESEARCH SUPERVISORY AND EXAMINING COMMITTEE Melissa Marguerite Lalonde, candidate for the degree of Master of Arts in History, has presented a thesis titled, National Security Crises and the Expanding American Presidency, in an oral examination held on August 29, 2012. The following committee members have found the thesis acceptable in form and content, and that the candidate demonstrated satisfactory knowledge of the subject material. External Examiner: Dr. James Daschuk, Faculty of Kinesiology & Health Studies Supervisor: Dr. Mark Anderson, Department of History Committee Member: Dr. Ian Germani, Department of History Committee Member: Dr. James Pitsula, Department of History Committee Member: Dr. Philip Charrier, Department of History Chair of Defense: Dr. Troni Grande, Department of English *Not present at defense Abstract The Constitution is meant to protect the rights of American citizens, while providing the United States with a strong and responsible government. During times of crisis, the executive branch of the government has often expanded its authority claiming that it requires extra powers to defend the nation. After the September 11 terrorist attacks, the George W. Bush administration expanded executive power and Congress did not object. For example, Congress passed the USA PATRIOT Act and President Bush signed it into law on October 26, 2001, allowing law enforcement agencies to obtain records and conduct surveillance on anyone suspected of terrorism-related acts.
    [Show full text]