Intelligence Information and Judicial Evidentiary Standards

Total Page:16

File Type:pdf, Size:1020Kb

Intelligence Information and Judicial Evidentiary Standards 811 INTELLIGENCE INFORMATION AND JUDICIAL EVIDENTIARY STANDARDS ROBERT BEJESKYt I. INTRODUCTION................................... 811 II. FACT FINDERS .................................... 813 III. NUCLEAR CAPABILITY ........................... 820 IV. BIOLOGICAL WEAPONS........................... 836 V. CHEMICAL WEAPONS ............................ 845 VI. DELIVERY SYSTEMS .............................. 851 VII. M ENS REA ......................................... 854 VIII. INVOLVEMENT WITH TERRORISM ............... 855 IX. CONCLUSION ..................................... 875 I. INTRODUCTION Senator Kennedy called it "reprehensible" that the "administra- tion distorted, misrepresented and manipulated the intelligence" on Iraq.' Louis Fisher wrote: "There should be no question that the pre- war information was distorted, hyped, and fabricated. The October 2002 [National Intelligence Estimate ("NIE")] prepared by the intelli- gence community is plain evidence of that . ."2 University of Pitts- burgh President Jem Spectar contended that the "Bush administration exploited, furthered, manipulated or thrived on the public's confusion .... "3 Professor Yamamoto explained, "Many have documented this ad- ministration's penchant for deliberate misrepresentations on national security-in blunt terms, [and] for lying to the American people about threats at home and abroad."4 Harvard Emeritus Professor Stanley t MA Political Science (Michigan), MA Applied Economics (Michigan), LL.M. In- ternational Law (Georgetown). The author has taught courses in International Law at Cooley Law School and for the Department of Political Science at the University of Michigan, courses in American Government and Constitutional Law at Alma College, and courses in Business Law at Central Michigan University and the University of Miami. 1. J M Spectar, Beyond the Rubicon: PresidentialLeadership, InternationalLaw & The Use of Force in the Long Hard Slog, 22 CoN. J. Irr'iL L. 47, 90 (2006). 2. Louis Fisher, Lost ConstitutionalMoorings: Recovering the War Power, 81 IND. L.J. 1200, 1253 (2006); Spectar, supra note 1, at 87 (the intelligence conclusions were based on "flimsy, weak and opportunistic circumstantial evidence"). 3. Spectar, supra note 1, at 90. 4. Eric K Yamamoto, White (House)Lies: Why the PublicMust Compel the Courts to Hold the President Accountable for National Security Abuses, 68 LAw & CoNTEMP. PROa. 285, 286-87 (2005) (citing list of books); see generally David L. Altheide, The Mass Media, Crime and Terrorism, 4 J. INT'L CRIM. JUST. 982 (2006). 812 CREIGHTON LAW REVIEW [Vol. 44 Hoffman perceived a similar administration penchant and reminded that "if you repeat a lie often enough, people swallow it."5 In 2008, former Congresswoman Holtzman stated that a "ground for impeach- ing President Bush has do with his use of fraud and deception to drive the United States into war in Iraq."6 Senator Rockefeller, the Senate Select Committee on Intelligence ("SSCI") Chairman, remarked: "In making the case for war, the Administration repeatedly presented in- telligence as fact when in reality it was unsubstantiated, contradicted, or even non-existent ... Sadly, the Bush Administration led the na- tion into war under false pretenses."7 Alternatively, four months after the invasion, President Bush maintained: "We based our decisions on good, sound intelligence . and the truth will say that this intelligence was good intelligence. There's no doubt in my mind."8 British Prime Minister Blair affirmed that "every fiber of instinct and conviction I have" confirms that the decision was correct.9 National Security Advisor Rice referred to the evidence by stating that "I've read a lot of intelligence cases over my almost 20 years now in this field, and this was a very strong case."' 0 In 2007, former Central Intelligence Agency ("CIA") Director Tenet addressed the fallout by distinguishing between domestic court evi- dentiary standards and the process of gathering, analyzing, and using intelligence information in producing national security determina- tions by noting: "There was lots of data. There's lots of technical data .... So you put all of this together, it's not evidence in the court of law." 1 This Article analyzes the data to assess competing perceptions. 5. News World: The World According to Bush (CBC news television broadcast Oct. 17, 2004), availableat http://www.cbc.ca/passionateeyesunday/feature 171004.html (In- terview with Hoffman). 6. Hon. Elizabeth Holtzman, Impeachment as a Remedy, 62 U. MIAI L. REV. 213, 218 (2008). 7. SEN. SELECT COMM. ON INTELLIGENCE, 110TH CONG., PRESS RELEASE OF INTELLI. GENCE COMMITTEE (2008), available at http://intelligence.senate.gov/press/re- cord.cfm?id=298775 [hereinafter SSCI/PR]; Walter Pincus, Records Could Shed Light on Iraq Group, WASH. PosT, June 9, 2008. 8. Blair, Bush Defend War, CNN (July 18, 2003), available at http://edition.cnn. com/2003/US/07/17/blair/. 9. Id. 10. NewsHour, Newsmaker: Condoleezza Rice (PBS television broadcast July 30, 2003), available at http://www.pbs.org/newshour/bb/white-house/july-dec03/rice-7-30. html. 11. 60 Minutes, George Tenet: At the Center of the Storm (CBS television broadcast Apr. 29, 2007), available at http://www.cbsnews.com/stories/2007/04/25/60minutes/ main2728375_page5.shtml [hereinafter 60 Minutes, George Tenet]. 2011] INTELLIGENCE INFORMATION 813 II. FACT FINDERS A. EVIDENTIARY STANDARDS Judicial opinions and national security estimates are similar in the process of applying facts to decision-making criteria. In common law systems, parties gather supportive information that must sur- mount hearsay hurdles, document authentication requirements, and other evidentiary filters during court processes. Judges and juries render decisions by weighing verified direct and probative circumstan- tial evidence pursuant to standards, such as "preponderance" in civil cases and "beyond a reasonable doubt" in criminal cases. Decisions alleviate, remedy, occasionally preempt disputes, and punish offenders. Within the national security apparatus, the Intelligence Commu- nity ("IC"), which consists of multiple agencies/departments, including the CIA, the Pentagon Defense Intelligence Agency ("DIA"), and the State Department Bureau of Intelligence Research ("INR"), collects in- formation, much like a civil law system of investigatory judges. IC analysts assess and weigh evidence as the judge and jury and present conclusions, often with probability guidelines, such as "High Confi- dence," "Moderate Confidence," or "Low Confidence." 12 Political ac- tors use estimates to make foreign policy decisions, invoke Constitutional war powers,' 3 and assess the behavior of other states pursuant to treaty rules and dominant norms. Despite analytical similarities in applying facts to decision-mak- ing, there are important distinctions between judicial and national se- curity processes. For example, the party that garners the requisite weight of evidence and presents more compelling arguments will win 12. SEN. SELECT COMM. ON INTELLIGENCE, 108TH CONG., REPORT ON THE U.S. INTEL- LIGENCE COMMUNITY'S PREWAR ASSESSMENTS ON IRAQ 185 (2004) [hereinafter SSCI/ 2004]. The 2007 NIE on Iran employs stronger caveat language than the NIE on Iraq. The 2007 NIE states: "We use phrases such as we judge, we assess, and we estimate- and probabilistic terms such as probably and likely-to convey analytical assessments and judgments. Such statements are not facts, proof, or knowledge." OFFICE OF THE DIR. OF NAT'L INTELLIGENCE, NAT'L INTELLIGENCE COUNCIL, IRAN: NUCLEAR INTENTIONS AND CAPABILITIES, NATIONAL INTELLIGENCE ESTIMATE 3 (2007), available at http://www. globalsecurity.org/jhtml/jframe.html#http://www.globalsecurity.org/intell/library/re- ports/2007/nieiran-nuclear_20071203.pdf (last visited Aug. 6, 2011). "A Na- tional Intelligence Estimate is the IC's most authoritative written judgment concerning a specific national security issue." SSCI/2004, supra, at 9. 13. See Kristan J. Wheaton & Michael T. Beerbower, Towards a New Definition of Intelligence, 17 STAN. L. & POL'Y REV. 319, 329 (2006) (defining "intelligence" as a "pro- cess, focused externally and using information from all available sources, that is de- signed to reduce the level of uncertainty for a decisionmaker."). See generally L. Britt Snider, Sharing Secrets with Lawmakers: Congress as a User of Intelligence, in INTELLI- GENCE AND THE NATIONAL SECURITY STRATEGIST: ENDURING ISSUES AND CHALLENGES (Roger Z. George & Robert D. Kline eds., 2006). 814 CREIGHTON LAW REVIEW [Vol. 44 a court case and attain a remedy against the opposing party for a manifested harm. Executive enforcement protects the integrity of the courts' prescriptive jurisdiction, including for decisions and processes that compel and verify information, such as with contempt orders and criminal punishment for perjury and falsifying information. In the national security environment, the vulnerable interest is broader, demonstrability of evidence is limited, and a remedy is not sought for a manifested harm. There is no prescriptive jurisdiction over a territory in which threats are allegedly forming although sover- eign intrusions via authorized weapon inspections (Iraq, Iran, and North Korea) may improve accuracy of perceptions. Compulsive mechanisms under the progression of United Nations ("UN") Charter Chapter 7 sanctions, Security Council resolutions, and fear of the use of force may leverage compliance. Witness accounts are not subject to perjury standards and classified data have no
Recommended publications
  • Iraq and Weapons of Mass Destruction
    1/9/2017 Iraq and Weapons of Mass Destruction home | about | documents | news | publications | FOIA | research | internships | search | donate | mailing list Iraq and Weapons of Mass Destruction National Security Archive Electronic Briefing Book No. 80 Updated ­ February 11, 2004 Edited by Jeffrey Richelson Originally posted December 20, 2002 Previously updated February 26, 2003 Documents ­ Press release ­ Further reading Between Iraq's invasion of Kuwait in August 1990, and the commencement of military ac绳on in January 1991, then President George H.W. Bush raised the specter of the Iraqi pursuit of nuclear weapons as one jus绳fica绳on for taking decisive ac绳on against Iraq. In the then‐classified Na绳onal Security Direc绳ve 54, signed on January 15, 1991, authorizing the use of force to expel Iraq from Kuwait, he iden绳fied Iraqi use of weapons of mass destruc绳on (WMD) against allied forces as an ac绳on that would lead the U.S. to seek the removal of Saddam Hussein from power. (Note 1) In the aermath of Iraq's defeat, the U.S.‐led U.N. coali绳on was able to compel Iraq to agree to an inspec绳on and monitoring regime, intended to insure that Iraq dismantled its WMD programs and did not take ac绳ons to recons绳tute them. The means of implemen绳ng the relevant U.N. resolu绳ons was the Special Commission on Iraq (UNSCOM). That inspec绳on regime con绳nued un绳l December 16, 1998 ‐ although it involved interrup绳ons, confronta绳ons, and Iraqi aꬫempts at denial and decep绳on ‐ when UNSCOM withdrew from Iraq in the face of Iraqi refusal to cooperate, and harassment. Subsequent to George W. Bush's assump绳on of the presidency in January 2001, the U.S.
    [Show full text]
  • Iraq's WMD Capability
    BRITISH AMERICAN SECURITY INFORMATION COUNCIL BASIC SPECIAL REPORT Unravelling the Known Unknowns: Why no Weapons of Mass Destruction have been found in Iraq By David Isenberg and Ian Davis BASIC Special Report 2004.1 January 2004 1 The British American Security Information Council The British American Security Information Council (BASIC) is an independent research organization that analyzes international security issues. BASIC works to promote awareness of security issues among the public, policy makers and the media in order to foster informed debate on both sides of the Atlantic. BASIC in the U.K. is a registered charity no. 1001081 BASIC in the U.S. is a non-profit organization constituted under Section 501(c)(3) of the U.S. Internal Revenue Service Code David Isenberg, Senior Analyst David Isenberg joined BASIC's Washington office in November 2002. He has a wide background in arms control and national security issues, and brings close to 20 years of experience in this field, including three years as a member of DynMeridian's Arms Control & Threat Reduction Division, and nine years as Senior Analyst at the Center for Defense Information. Ian Davis, Director Dr. Ian Davis is Executive Director of BASIC and has a rich background in government, academia, and the non-governmental organization (NGO) sector. He received both his Ph.D. and B.A. in Peace Studies from the University of Bradford. He was formerly Program Manager at Saferworld before being appointed as the new Executive Director of BASIC in October 2001. He has published widely on British defense and foreign policy, European security, the international arms trade, arms export controls, small arms and light weapons and defense diversification.
    [Show full text]
  • Px Hawkish Hack.Qxp 06/12/2006 15:54 Page 1
    px hawkish hack cover (HDS).qxp 07/12/2006 20:25 Page 1 think tank of the year Much of the discourse on the war on terror sacrifices historical 2006/2007 perspective for an often partisan focus on the day-by-day flow of events. Confessions of a Hawkish Hack: The Media and the War on Terror is Matthew d’Ancona’s critique of such short-termism. In it, he outlines his own interpretation of the attacks of 9/11 and the media’s coverage of events since then. Above all, he urges the West to show greater patience and stamina in a conflict that is likely to last for decades and may never have a clear end point. Thus far our biggest deficit in waging war on terror has been a lack of ideas—the“ kind of reshaping ideas that Viner, Brodie, Schelling, and others developed to cope with the emergence of the nuclear threat during the Cold War. In this remarkable essay, Matthew d’Ancona undertakes precisely this groundbreaking effort, focusing on the fraught relationship between the media and the wars on terror. It is a triumph.” Philip Bobbitt, author of The Shield of Achilles Matthew d'Ancona blends the slow, medium and fast pulses of history in a“ way that truly illuminates the bundle of problems facing open societies confronting international terrorism of a kind and on a scale none of them have experienced before. Would that more journalists had the intellectual Confessions of a and verbal horsepower evident in this immensely thoughtful piece.” Peter Hennessy, Attlee Professor of Contemporary British History, Queen Mary, University of London Hawkish
    [Show full text]
  • The Report of the Iraq Inquiry: Executive Summary
    Return to an Address of the Honourable the House of Commons dated 6 July 2016 for The Report of the Iraq Inquiry Executive Summary Report of a Committee of Privy Counsellors Ordered by the House of Commons to be printed on 6 July 2016 HC 264 46561_00b Viking_Executive Summary Title Page.indd 1 23/06/2016 14:22 © Crown copyright 2016 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/ version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Where we have identifi ed any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/government/publications Any enquiries regarding this publication should be sent to us at [email protected] Print ISBN 9781474133319 Web ISBN 9781474133326 ID 23051602 46561 07/16 Printed on paper containing 75% recycled fi bre content minimum Printed in the UK by the Williams Lea Group on behalf of the Controller of Her Majesty’s Stationery Offi ce 46561_00b Viking_Executive Summary Title Page.indd 2 23/06/2016 14:22 46561_00c Viking_Executive Summary.indd 1 23/06/2016 15:04 46561_00c Viking_Executive Summary.indd 2 23/06/2016 14:17 EXECUTIVE SUMMARY Contents Introduction ...................................................................................................................... 4 Pre‑conflict strategy and planning .................................................................................... 5 The UK decision to support US military action ................................................................. 6 UK policy before 9/11 ................................................................................................
    [Show full text]
  • Suez 1956 24 Planning the Intervention 26 During the Intervention 35 After the Intervention 43 Musketeer Learning 55
    Learning from the History of British Interventions in the Middle East 55842_Kettle.indd842_Kettle.indd i 006/09/186/09/18 111:371:37 AAMM 55842_Kettle.indd842_Kettle.indd iiii 006/09/186/09/18 111:371:37 AAMM Learning from the History of British Interventions in the Middle East Louise Kettle 55842_Kettle.indd842_Kettle.indd iiiiii 006/09/186/09/18 111:371:37 AAMM Edinburgh University Press is one of the leading university presses in the UK. We publish academic books and journals in our selected subject areas across the humanities and social sciences, combining cutting-edge scholarship with high editorial and production values to produce academic works of lasting importance. For more information visit our website: edinburghuniversitypress.com © Louise Kettle, 2018 Edinburgh University Press Ltd The Tun – Holyrood Road, 12(2f) Jackson’s Entry, Edinburgh EH8 8PJ Typeset in 11/1 3 Adobe Sabon by IDSUK (DataConnection) Ltd, and printed and bound in Great Britain. A CIP record for this book is available from the British Library ISBN 978 1 4744 3795 0 (hardback) ISBN 978 1 4744 3797 4 (webready PDF) ISBN 978 1 4744 3798 1 (epub) The right of Louise Kettle to be identifi ed as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988, and the Copyright and Related Rights Regulations 2003 (SI No. 2498). 55842_Kettle.indd842_Kettle.indd iivv 006/09/186/09/18 111:371:37 AAMM Contents Acknowledgements vii 1. Learning from History 1 Learning from History in Whitehall 3 Politicians Learning from History 8 Learning from the History of Military Interventions 9 How Do We Learn? 13 What is Learning from History? 15 Who Learns from History? 16 The Learning Process 18 Learning from the History of British Interventions in the Middle East 21 2.
    [Show full text]
  • Personal Liability As Administrative Law
    Personal Liability as Administrative Law David Zaring* Abstract Administrative law has almost exclusively concerned itself with lawsuits against agencies as collective entities, under the auspices of the Administrative Procedure Act. In light of the growing number and prominence of suits by war on terror plaintiffs against senior government officials, this Article considers the use of personal liability to discipline government officials and assesses it as an alternative to traditional administrative law. It compares the civil suits to criminal prosecutions of these officials and compares both of them to less- obviously law related scandal campaigns. Personal sanctions—of which Bivens complaints are a principal example—are worth more attention. These mechanisms, and the constitutional tort in particular, are case studies of the popular inclination to decentralize government, of the value of symbolic laws, and, increasingly, of the personalization of law and politics. Solving some of the problems of personal liability, as it works today, might best be done not by enhancing the bite of the always-challenged lawsuits and prosecutions, but by making sure that the law makes it more possible for political cases to be made against government officials, rather than legal ones. Table of Contents I. Introduction .................................................................................. 314 II. Three Kinds of Bivens Actions ..................................................... 319 A. The Doctrinal Problems for Plaintiffs ...................................
    [Show full text]
  • Confidentiality Complications
    Confidentiality Complications: How new rules, technologies and corporate practices affect the reporter’s privilege and further demonstrate the need for a federal shield law The Reporters Committee for Freedom of the Press June 2007 Lucy A. Dalglish, Esq. Gregg P. Leslie, Esq. Elizabeth J. Soja, Esq. 1101 Wilson Blvd., Suite 1100 Arlington, Virginia 22209 (703) 807-2100 Executive Summary The corporate structure of the news media has created new obstacles, both financial and practical, for journalists who must keep promises of confidentiality. Information that once existed only in a reporter’s notebook can now be accessed by companies that have obligations not only to their reporters, but to their shareholders, their other employees, and the public. Additionally, in the wake of an unprecedented settlement in the Wen Ho Lee Privacy Act case, parties can target news media corporations not just for their access to a reporter’s information, but also for their deep pockets. The potential for conflicts of interest is staggering, but the primary concerns of The Reporters Committee for Freedom of the Press are that: • because of the 21st-century newsroom’s reliance on technology, corporations now have access to notes, correspondence and work-product information that before only existed in a reporter’s notebook; • the new federal “e-discovery” court rules allow litigants to discover vastly more information than a printed page – or even a saved e-mail – would provide during litigation; • while reporters generally only have responsibilities to themselves,
    [Show full text]
  • Tuesday We Mentioned Briefly the Alleged Iraq-Niger Deal Concerning
    Tuesday we mentioned briefly the alleged Iraq-Niger deal concerning shipping Iraq 500 tons of yellowcake {lightly enriched uranium oxide ore}, referenced to British sources in George Bush's State of the Union Speech, January, 2003. The story is murky and convoluted. Here are highlights: The Intelligence Community failed to authenticate in a timely fashion transparently forged documents purporting to show that Iraq had attempted to procure uranium from Niger. Finding 4: Robb-Silberman Report, 2004, "The Commission on the Intelligence Capabilities of the United States regarding Weapons of Mass Destruction." • A small Iraqi delegation visits Niger in 1999, reportedly for "expanding commercial relations" and other matters. • In late 2001, early 2002, three reports from a foreign liaison service state that an agreement was signed between Iraq and Niger to deliver 500 tons of yellowcake to Iraq. Intelligence analysts in the Dept. of State and some in CIA question the reliability of the source. The original documents, including a copy of the presumed agreement, is not received at this time. • Niger is an important producer of yellowcake; the mining operation is a consortium of nations, controlled by France. • The reporting of this proposed deal is included in a CIA briefing of Vice President Cheney in early 2002; he expresses interest in the report which originated with the DIA. CIA officials are skeptical, but decide to sent Ambassador Joseph Wilson, whose wife works undercover for CIA, to Niger to investigate the report. Wilson previously served in Niger and other African countries and has good contacts there. The CIA does not have a station in Niger.
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 113 CONGRESS, SECOND SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 113 CONGRESS, SECOND SESSION Vol. 160 WASHINGTON, THURSDAY, MAY 29, 2014 No. 82 Senate The Senate was not in session today. Its next meeting will be held on Friday, May 30, 2014, at 2 p.m. House of Representatives THURSDAY, MAY 29, 2014 The House met at 10 a.m. and was ment that my colleagues and I were proach me at Memorial Day events to called to order by the Speaker pro tem- prevented from offering an amendment say that they agree that Afghanistan is pore (Mr. BENTIVOLIO). to the NDAA dealing with the constitu- not worth the blood that has been shed f tional responsibility of Congress to de- there. Furthermore, they agreed with clare war. me that Afghanistan is not worth DESIGNATION OF SPEAKER PRO Like many Members of Congress, I America continuing to borrow money TEMPORE had the opportunity to speak at events from foreign nations, driving up fur- The SPEAKER pro tempore laid be- on Saturday, Sunday, and Monday on ther the debt of our Nation to fund fore the House the following commu- Memorial Day weekend. Every time I President Karzai’s corrupt government nication from the Speaker: spoke, I mentioned my frustration that when we have a multitude of problems WASHINGTON, DC, the McGovern-Jones amendment was and needs right here in America. May 29, 2014. not able to be brought to the floor for Mr. Speaker, I would like to close my I hereby appoint the Honorable KERRY L.
    [Show full text]
  • Fair Game: How a Top Spy Was Betrayed by Her Own Government Free
    FREE FAIR GAME: HOW A TOP SPY WAS BETRAYED BY HER OWN GOVERNMENT PDF Valerie Plame Wilson | 412 pages | 10 Jun 2008 | SIMON & SCHUSTER | 9781416537625 | English | New York, NY, United States Fair Game : How a Top CIA Agent Was Betrayed by Her Own Government, Paperback | eBay Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge cover. Error rating book. Refresh and try again. Open Preview See a Problem? Details if other :. Thanks for telling us about the problem. Return to Book Page. Laura Rozen Afterword. Get A Copy. More Details Edition Language. Other Editions 1. Friend Reviews. To see what your friends thought of this book, please sign up. To ask other readers questions about Fair Gameplease sign up. Lists with This Book. This book is not yet featured on Listopia. Community Reviews. Showing Average rating 3. Rating details. More filters. Sort order. The book itself is well done and a worthy read. However, I gave the book five stars due to its importance both when it was Fair Game: How a Top Spy Was Betrayed by Her Own Government and now The behavior of the George W. Bush administration with regard to Iraq was shameful at many levels, clearly illegal, and undoubtedly immoral. Among other things this Fair Game: How a Top Spy Was Betrayed by Her Own Government helps the reader to realize, Fair Game: How a Top Spy Was Betrayed by Her Own Government total lie about the WMD that Iraq was alleged to have.
    [Show full text]
  • The Culture of Leaks Has to Change, but at What Expense to Congressional Oversight of the Executive Branch?
    SESSA_THE CULTURE OF LEAKS HAS TO CHANGE.DOCX 6/2/2014 5:00 PM “The culture of leaks has to change”1, but at what expense to congressional oversight of the Executive Branch? An examination of Title V. of the Intelligence Authorization Act for Fiscal Year 2013. Roseanne Sessa INTRODUCTION ......................................................................... 236 I: INTELLIGENCE LEAKS AND CONGRESSIONAL OVERSIGHT WITH RESPECT TO THE MEDIA......................................... 237 A. Unauthorized and Authorized Disclosures .............. 237 B. Congressional Oversight of the Executive Branch .. 239 C. Increase in Executive Power and Privilege Since September 11th ......................................................... 241 D. Historical National Security Leaks in the Media .... 242 E. Recent National Security Leaks in the Media ......... 244 II: THE INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2013 ....................................................................... 246 A. History and Purpose of the Intelligence Authorization Act for Fiscal Year 2013 .................. 246 B. Intelligence Authorization Act for Fiscal Year 2013 .......................................................................... 247 C. § 505: Prohibition on Certain Individuals Serving as Consultants ......................................................... 248 D. § 506: Limitation on Persons Authorized to Communicate With the Media ................................ 248 III: CRITICISM AND RESPONSE .................................................. 249 A. Journalists
    [Show full text]
  • Operation in Iraq, Our Diplomatic Efforts Were Concentrated in the UN Process
    OPERATIONS IN IRAQ First Reflections IRAQ PUBLISHED JULY 2003 Produced by Director General Corporate Communication Design by Directorate of Corporate Communications DCCS (Media) London IRAQ FIRST REFLECTIONS REPORT Contents Foreword 2 Chapter 1 - Policy Background to the Operation 3 Chapter 2 - Planning and Preparation 4 Chapter 3 - The Campaign 10 Chapter 4 - Equipment Capability & Logistics 22 Chapter 5 - People 28 Chapter 6 - Processes 32 Chapter 7 - After the Conflict 34 Annex A - Military Campaign Objectives 39 Annex B - Chronology 41 Annex C - Deployed Forces and Statistics 43 1 Foreword by the Secretary of State for Defence On 20 March 2003 a US-led coalition, with a substantial contribution from UK forces, began military operations against the Saddam Hussein regime in Iraq. Just 4 weeks later, the regime was removed and most of Iraq was under coalition control. The success of the military campaign owed much to the determination and professionalism of the coalition’s Armed Forces and the civilians who supported them. I regret that, during the course of combat operations and subsequently, a number of Service personnel lost their lives. Their sacrifice will not be forgotten. The UK is playing a full part in the re-building of Iraq through the establishment of conditions for a stable and law-abiding Iraqi government. This process will not be easy after years of repression and neglect by a brutal regime. Our Armed Forces are performing a vital and dangerous role by contributing to the creation of a secure environment so that normal life can be resumed, and by working in support of humanitarian organisations to help the Iraqi people.
    [Show full text]