ETHNIC PROFILING in the EUROPEAN UNION: Pervasive, Ineffective, and Discriminatory

Total Page:16

File Type:pdf, Size:1020Kb

ETHNIC PROFILING in the EUROPEAN UNION: Pervasive, Ineffective, and Discriminatory ETHNIC PROFILING IN THE EUROPEAN UNION: Pervasive, Ineffective, and Discriminatory Ethnic Profiling in the European Union: Pervasive, Ineffective, and Discriminatory OPEN SOCIETY INSTITUTE NEW YORK Copyright © 2009 by the Open Society Institute. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the prior permission of the publisher. ISBN: 978-1-891385-88-9 Published by Open Society Institute 400 West 59th Street New York, NY 10019 USA www.soros.org For more information contact: Open Society Justice Initiative 400 West 59th Street New York, NY 10019 USA www.justiceinitiative.org Cover designed by Judit Kovács l Createch Ltd. Cover photo by Diether Endlicher l Associated Press Text layout and printing by Createch Ltd. 2 Table of Contents Acknowledgments 5 I. Executive Summary and Recommendations 7 A. Executive Summary 7 B. Recommendations 13 II. Ethnic Profiling: What Is It and When Is It Unlawful? 19 A. Ethnic Profiling Defined and Described 19 B. Is Ethnic Profiling Legal? 22 III. Ethnic Profiling in Ordinary Policing 31 A. Existing Reporting of Ethnic Profiling in Europe 32 B. Quantitative Data on Ethnic Profiling in Stop-and-Search Practices 34 C. Disparate Treatment and Abusive Conduct during Stops of Minorities 36 D. Police Raids Targeting Ethnic Minorities 42 E. Immigration Enforcement 45 F. Negative Consequences of Ethnic Profiling in Ordinary Policing 48 G. Evaluating the Effectiveness of Ethnic Profiling in Ordinary Policing 51 3 IV. Ethnic Profiling in Counterterrorism Since 9/11 57 A. Ethnic Profiling in Mass Controls and Stop-and-Search Practices 60 B. Data Mining 68 C. Raids on Muslim Institutions and Harassment of Muslim Businesses 72 D. Arrest and Imprisonment 82 E. Identifying Individuals in the Process of Radicalizing 90 F. Monitoring Mosques, Muslim Organizations, and Their Members 97 G. Negative Consequences of Ethnic Profiling in Counterterrorism 109 H. Evaluating the Effectiveness of Ethnic Profiling in Counterterrorism: No Evidence of Efficacy 113 V. Alternatives to Ethnic Profiling 119 VI. Conclusion 129 Notes 133 4 ETHNIC PROFILING IN THE EUROPEAN UNION Acknowledgments This report is the result of many contributions made over several years. It was written by Rachel Neild, based on input from many others. In particular, Lanna Hollo of Hollo Human Rights Consulting helped to shape the report’s approach, and provided the bulk of the research for Chapters IV and V. The report would not have been possible without her research and expertise. James A. Goldston wrote the legal analysis and review of conceptual problems with profiling and Maxim Ferschtman provided additional legal analysis. Rebekah Delsol researched and wrote sections on U.K. practices. Indira Goris provided legal research on police powers and counterterrorism authorities in the Euro- pean Union. Peter Rodrigues, of the Anne Frank Foundation, contributed supporting materials from the Netherlands. The report was edited by David Berry, James A. Goldston, Diane Orentlicher, and Robert O. Varenik. Stephen Humphries and Andrea Kriszan prepared a first version of the report in 2006 on the basis of research provided by Boyko Boev, Jeremie Gaulthier, Philip Gounev, Andras Pap Laszlo, Joel Miller, Daniel Wagman, and Gus Hosein. Misti Duvall, Ammar Abu Zayyad, Cathy Lull, Alina Finkelshteyn, Shamus Brennan and Sebastian Kohn assisted with additional research and fact checking. Further research and legal assistance were provided by the law clinics at Harvard University and New York University. We are grateful to Jamie O’Connell, then of the Harvard Law School Human Rights Program and currently program officer, Boalt Hall Committee for International Human Rights Clinic at Berkeley Law (Boalt Hall) and 5 to students Aren Adjoian, Gwen Gordon, Colleen Guilford, Emily Gumper, and Rahul Mukhi. We also wish to give great thanks to Jayne Huckerby and Smita Narula of the International Human Rights Clinic of NYU School of Law and to students Mana Barari, Jennie Kim, and Margie van Weerden. Many thanks to participants at the May 2007 peer review meeting, and especially to Sara Silvestri and Elizabeth Collett of European Policy Centre for their cooperation in organizing and hosting the event. Finally, we are particularly grateful to security officials in Germany’s Ministry of the Interior and in the intelligence services and police of the Netherlands who took the time to review a pre-publication draft and meet with us to discuss it. We regret that French officials did not agree to a similar consultation. We also appreciate the time and consideration of staff at the U.K. Ministry of Justice and from the London Metropolitan Police Service who provided input and comments. The Open Society Justice Initiative bears sole responsibility for the final version of this report, including any errors or misrepresentations. 6 ACKNOWLEDGMENTS I. Executive Summary and Recommendations A. Executive Summary Since the 9/11 attacks in the United States, 32 percent of British Muslims report being subjected to discrimination at airports. Police carrying machine guns have conducted identity checks on 11-year-olds at German mosques. Moroccan immigrants have been called “moro de mierda” (“Arab shit”) by Spanish police. The personal data of 8.3 million people were searched in a massive German data mining exercise which targeted—among other characteristics—people who were Muslim, and which did not identify a single terrorist. These are examples of ethnic profiling by police in Europe—a common, long- standing practice that has intensified in recent years. Evidence from countries across the European Union shows that police routinely use generalizations about ethnicity, reli- gion, race, or national origin in deciding whom to target for identity checks, stops, and searches. Contemporary concerns about terrorism underlie a rising interest in ethnic profiling in Europe, which many see as an effective way to identify terrorist suspects. It might be comforting to believe that police can spot terrorists and other crimi- nals based on generalizations about ethnicity, race, national origin, or religion. But that is not the case. As this report demonstrates, ethnic profiling by police in Europe may 7 be pervasive, but it is inefficient, ineffective, and discriminatory. Fortunately, better alternatives exist. Defining Ethnic Profiling The term “profiling” refers to a police practice in which a defined set of characteristics is used to look for and apprehend someone who has committed a crime (criminal pro- filing) or to identify people likely to engage in criminal activity (behavioral profiling). Criminal and behavioral profiling are accepted and lawful policing tools designed to allow the most efficient allocation of scarce law enforcement resources. As long as the profiles used by police are based on specific information about an individual or factors that are objective and statistically proven to be significant indicators of criminal activity, profiling is legal. The term “ethnic profiling” describes the use by law enforcement of generaliza- tions grounded in ethnicity, race, religion, or national origin—rather than objective evidence or individual behavior—as the basis for making law enforcement and/or inves- tigative decisions about who has been or may be involved in criminal activity. Ethnic profiling is manifest most often in police officers’ decisions about whom to stop, ask for identity papers, question, search, and sometimes arrest. Ethnic profiling may result from the racist behavior of individual police officers, or from the institutionalized bias ingrained in many police forces. A host of bad outcomes stem from ethnic profiling, including stopping, searching, and even arresting innocent people; overlooking criminals who do not fit the established profile; undermining the rule of law and perceptions of police fairness; stigmatizing entire communities; and alienating people who could work with police to reduce crime and prevent terrorism. Ethnic Profiling Is Pervasive—and Has Grown Since 9/11 Ethnic profiling did not emerge as a post-9/11 response to terrorism. Evidence clearly indicates that police across Europe have long engaged in ethnic profiling of immigrant and minority communities. Despite a dearth of quantitative information on policing and ethnicity in most of Europe, the data that exist indicate ethnic profiling is widespread. Since the 9/11 attacks, interest in and use of ethnic profiling have grown sharply. Even if the European public may condemn high-profile abuses (such as rendition and torture) associated with the “war on terror,” many see the profiling of Muslims as a mat- ter of common sense. According to this argument, young Muslim men destroyed the World Trade Center in New York, blew up Madrid’s Atocha train station, and bombed the London Underground, so they should be the targets of police attention. With so much at stake, ethnic profiling may seem like smart law enforcement. 8 EXECUTIVE SUMMARY AND RECOMMENDATIONS Police in Europe seem to agree. In the United Kingdom (the only EU mem- ber state to systematically gather ethnic data on police practices), data show dramatic increases in stops and searches of British Asians following terrorist attacks: stops of persons of Asian descent conducted under counterterrorism powers increased three- fold following the 9/11 attacks, and five-fold after the July 2005 London Underground bomb attacks.1 In Germany, police have used preventive
Recommended publications
  • HOW the OTHER HALF VOTES HOW the OTHER Big Brother Viewers and the 2005 General Election HALF VOTES
    HOW THE OTHER HALF VOTES HOW THE OTHER Big Brother Viewers and the 2005 General Election HALF VOTES Stephen Coleman Big Brother Viewers and the 2005 General Election Why is it that the experience of taking part in Big Brother is so much more compelling for some people than the routines and rituals of electoral politics? How the Other Half Votes raises radical questions about the condition of contemporary democracy, the Stephen Coleman borders between the political and the popular and the case for thinking creatively about what it means to be politically engaged. May 2006 Price £10 Hansard Society ISBN 0 900432 18 7 www.hansardsociety.org.uk The views expressed in this report are those of the authors and the Hansard Society, as an independent non-party organisation, is neither for nor against. The Society is, however, happy to publish these views and to invite analysis and discussion of them. HOW THE OTHER HALF VOTES Big Brother Viewers and the 2005 General Election Stephen Coleman Stephen Coleman is Professor of Political © Hansard Society 2006 Communication at Leeds University All rights reserved. No part of this publication and also senior research associate may be reproduced, stored in a retrieval system, or with the Hansard Society transmitted in any form or by any means, without the prior permission of the Hansard Society. Published by The Hansard Society is an independent, Hansard Society non-partisan educational charity, which exists 40-43 Chancery Lane to promote effective parliamentary democracy. London WC2A 1JA For further information
    [Show full text]
  • Informality, Ngos, and Cairo's Trash Collectors
    Informality, NGOs, and Cairo’s Trash Collectors Economic and Social Welfare Policy in the Authoritarian Egyptian State Caroline Abadeer Submitted under the supervision of Professor Ben Ansell to the University Honors Program at the University of Minnesota-Twin Cities in partial fulfillment of the requirements for the degree of Bachelor of Arts, summa cum laude, in Political Science. May 3, 2011 ABSTRACT The following analysis provides a theoretically informed explanation of how Cairo‘s Zabbaleen (informal trash collectors) fit into the political story of economic development in Egypt. Egypt presently faces much uncertainty as its citizens call for change during an era of political reordering. Their demands stem largely from the breakdown of the ―authoritarian bargain‖ that once characterized state-society relations, as since the 1970s, the government has promoted economic liberalization and abandoned social welfare provision as a fundamental objective. This move limited opportunities available to the urban poor through the public and private sectors, leading to escalated growth in the informal economy and the third sector of non- governmental organizations. The informal sector has offered greater opportunities for employment, even as social welfare provision became the responsibility of NGOs, whose influence is strongly apparent among Egypt‘s poor. As a dispossessed societal group, the Zabbaleen offer a useful lens through which to evaluate the effects of policy change upon one segment of the populace; many of the risks they face as informal workers have been partially mitigated by the efforts of numerous NGOs that support them. Yet the uncertainty that continues to characterize the condition of the Zabbaleen also provides insight into tensions inherent within the coexistence of the authoritarian state system and an extensive informal economy and third sector.
    [Show full text]
  • Complete Issue As
    yber C y b e r O r i e n t Online Journal of the Virtual Middle East Vol. 6, Iss. 1, 2012 ISSN 1804-3194 CyberOrient Online Journal of the Virtual Middle East © American Anthropological Association 2012 CyberOrient is a peer-reviewed online journal published by the American Anthropological Association in collaboration with the Faculty of Arts of Charles University in Prague. Editor-in-Chief: Daniel Martin Varisco Managing Editor: Vit Sisler ISSN 1804-3194 http://www.cyberorient.net yber Index - Editorial Ines Braune – The Net Worth of the Arab Spring Page 4 - Articles Mohammed El-Nawawy and Sahar Khamis – Political Activism 2.0: Comparing the Role of Social Media in Egypt’s “Facebook Revolution” and Iran’s “Twitter Uprising” Page 8 Heidi A. Campbell and Diana Hawk – Al Jazeera’s Framing of Social Media During the Arab Spring Page 34 Donatella Della Ratta and Augusto Valeriani – Remixing the Spring!: Connective leadership and read-write practices in the 2011 Arab uprisings Page 52 Anton Root – Beyond the Soapbox: Facebook and the Public Sphere in Egypt Page 77 - Comments Mervat Youssef and Anup Kumar – Beyond the Soapbox: Facebook and the Public Sphere in Egypt Page 101 - Reviews Jon W. Anderson – The Digital Origins of Dictatorship and Democracy: Informati- on Technology and Political Islam Page 133 Marek Cejka – The Arab Revolution: The Lessons from the Democratic Uprising Page 141 3 yber C y b e r O rient, Vol. 6 , I s s . 1 , 2 0 1 2 The Net Worth of the Arab Spring Ines Braune Keywords Islam and civil society, Middle East, Arab Spring, information and communication technology, media studies, Middle Eastern studies, social networks When I was asked to be the guest editor of the current issue of CyberOrient, I realized this is a welcome opportunity to arrange and re-sort some aspects, points, and arguments about the role of the media during the Arab Spring.
    [Show full text]
  • Educating for Professional Life
    UOW5_22.6.17_Layout 1 22/06/2017 17:22 Page PRE1 Twenty-five Years of the University of Westminster Educating for Professional Life The History of the University of Westminster Part Five UOW5_22.6.17_Layout 1 22/06/2017 17:22 Page PRE2 © University of Westminster 2017 Published 2017 by University of Westminster, 309 Regent Street, London W1B 2HW. All rights reserved. No part of this pUblication may be reprodUced, stored in any retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, withoUt prior written permission of the copyright holder for which application shoUld be addressed in the first instance to the pUblishers. No liability shall be attached to the aUthor, the copyright holder or the pUblishers for loss or damage of any natUre sUffered as a resUlt of reliance on the reprodUction of any contents of this pUblication or any errors or omissions in its contents. ISBN 978-0-9576124-9-5 A CIP catalogue record for this book is available from The British Library. Designed by Peter Dolton. Design, editorial and production in association with Wayment Print & Publishing Solutions Ltd, Hitchin, Hertfordshire, UK. Printed and bound in the UK by Gomer Press Ltd, Ceredigion, Wales. UOW5_22.6.17_Layout 1 05/07/2017 10:49 Page PRE3 iii Contents Chancellor’s Foreword v Acknowledgements vi Abbreviations vii Institutional name changes ix List of illustrations x 1 Introduction 1 Map showing the University of Westminster’s sites in 1992 8 2 The Polytechnic and the UK HE System pre-1992
    [Show full text]
  • How Has European Integration Impacted Regionalist Political Parties’ Electoral Support?
    Claremont Colleges Scholarship @ Claremont CMC Senior Theses CMC Student Scholarship 2021 A Europe of Regionalists: How Has European Integration Impacted Regionalist Political Parties’ Electoral Support? Brandon N. Piel Follow this and additional works at: https://scholarship.claremont.edu/cmc_theses Part of the International Relations Commons Recommended Citation Piel, Brandon N., "A Europe of Regionalists: How Has European Integration Impacted Regionalist Political Parties’ Electoral Support?" (2021). CMC Senior Theses. 2669. https://scholarship.claremont.edu/cmc_theses/2669 This Open Access Senior Thesis is brought to you by Scholarship@Claremont. It has been accepted for inclusion in this collection by an authorized administrator. For more information, please contact [email protected]. Claremont McKenna College A Europe of Regionalists: How has European integration impacted regionalist political parties’ electoral support? Submitted to Professor Lisa Langdon Koch by Brandon N. Piel for Senior Thesis Fall 2020 – Spring 2021 April 26, 2021 Abstract This study investigates the question: How has European integration impacted regionalist political parties’ electoral support? European integration and regionalism are theoretically connected by Seth Jolly’s viability theory which explains that supranational organizations, such as the European Union (and precursor organizations), make small countries more viable. Using the regions of Flanders, Corsica, Sardinia, Padania, Galicia, and Catalonia as case studies, this thesis identifies
    [Show full text]
  • U.S. Naval War College Digital Commons Piracy
    U.S. Naval War College U.S. Naval War College Digital Commons CIWAG Case Studies 8-2012 Piracy Martin Murphy Follow this and additional works at: https://digital-commons.usnwc.edu/ciwag-case-studies Recommended Citation Murphy, Martin, "MIWS_05 - Piracy" (2012). CIWAG Maritime Irregular Warfare Studies. 5. https://digital- commons.usnwc.edu/ciwag-case-studies/11 This Book is brought to you for free and open access by U.S. Naval War College Digital Commons. It has been accepted for inclusion in CIWAG Case Studies by an authorized administrator of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Draft as of 121916 ARF R W ARE LA a U nd G A E R R M R I E D n o G R R E O T U N P E S C U N E IT EG ED L S OL TA R C TES NAVAL WA Piracy Dr. Martin Murphy United States Naval War College Newport, Rhode Island Piracy Martin Murphy Center on Irregular Warfare & Armed Groups (CIWAG) US Naval War College, Newport, RI [email protected] Murphy: Piracy CIWAG Case Studies Water Wars: The Brahmaputra River and Sino-Indian Relations— Mark Christopher Taliban Networks in Afghanistan—Antonio Giustozzi Operationalizing Intelligence Dominance—Roy Godson El Salvador in the 1980s: War by Other Means—Donald R. Hamilton Operational Strategies to Counter IED Threat in Iraq—Michael Iacobucci Sovereign Wealth Funds as Tools of National Strategy: Singapore’s Approach—Devadas Krishnadas Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009— Jon Lindsay and Roger Petersen Piracy—Martin Murphy An Operator’s Guide to Human Terrain Teams—Norman Nigh Revolutionary Risks: Cyber Technology and Threats in the 2011 Libyan Revolution—John Scott-Railton Organizational Learning and the Marine Corps: The Counterinsurgency Campaign in Iraq—Richard Shultz Reading the Tea Leaves: Proto-Insurgency in Honduras—John D.
    [Show full text]
  • Water, Energy, and the Arab Awakening
    Global Agenda 2013: Water, Energy, and the Arab Awakening FOREWORD BY ABDEL SALAM MAJALI EDITED BY THOMAS S. AXWORTHY AND ZAFAR ADEEL GLOBAL AGENDA 2013: Water, Energy, and the Arab Awakening GLOBAL AGENDA 2013: PAPERS FOR THE INTERACTION COUNCIL SERIES [ VOLUME 3 ] WATER, ENERGY, AND THE ARAB AWAKENING Edited by THOMAS S. AXWORTHY AND ZAFAR ADEEL ©United Nations University, 2014 The views expressed in this publication are those of the authors and do not necessarily refl ect the views of the United Nations University. Available from: United Nations University Institute for Water, Environment and Health (UNU-INWEH) 175 Longwood Road South, Suite 204 Hamilton, ON L8P 0A1 CANADA Telephone: +1-905-667-5511 Fax: +1-905-667-5510 E-mail: [email protected] The United Nations University Institute for Water, Environment and Health is a member Web: inweh.unu.edu of the United Nations University family of Facebook: facebook.com/UNUINWEH organizations. It is the UN Think Tank on Twitter Handle: @UNUINWEH Water created by the UNU Governing Council in 1996. The mission of the institute is to help Available for download at: resolve pressing water challenges that are of http://inweh.unu.edu concern to the United Nations, its Member States, and their people, through knowledge- ISBN: 978-92-808-6046-7 based synthesis of existing bodies of scientifi c discovery; through cutting edge targeted research that identifi es emerging policy issues; through application of on-the-ground UNU-INWEH is supported by: scalable solutions based on credible research; and, through relevant and targeted public Foreign Affairs, Trade and Affaires étrangères, Commerce outreach.
    [Show full text]
  • NOV 2015 Part C.Pdf
    Page | 1 CBRNE-Terrorism Newsletter – NOVEMBER 2015 www.cbrne-terrorism-newsletter.com Page | 2 CBRNE-Terrorism Newsletter – NOVEMBER 2015 Counterterrorism Bookshelf: 16 Books on Terrorism & Counter- Terrorism-Related Subjects Reviewed by Joshua Sinai Source: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/465/html This column consists of capsule reviews of recent books from various publishers. Aon and Risk Advisory, 2015 Terrorism & Political Violence Risk Map – A Guide (London, UK: The Risk Advisory Group, 2015), 38 pp. + map, no price [Paperback], http://www.aon.com/terrorismmap/. This is an annually published map on the risk of terrorism and political violence around the world, which is further analyzed in the accompanying booklet. The guide’s findings and assessments are based on what it terms empirical ‘Terrorism Tracker’ data assembled by The Risk Advisory Group and Aon. The Risk Advisory Group is a global risk consultancy, based in London, and Aon is a global risk management, insurance brokerage and reinsurance brokerage firm. In the map, what are termed ‘peril’ icons are assigned to the world’s countries, covering a spectrum of political violence risks from low to high that are aggregated on a cumulative basis in the form of terrorism, sabotage, strikes and/or riots, malicious damage, insurrection, revolution and rebellion, mutiny and/or coup d’etat, and war and/or civil war. The booklet presents an introductory commentary, macro analysis and findings, regional overviews, and the methodology underpinning the overall analysis. Edward J. Appel, Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence [Second edition] (Boca Raton, FL: CRC Press, 2015), 322 pp., US $ 67.96 [Hardcover], ISBN: 9781482238853.
    [Show full text]
  • Piracy Off the Horn of Africa
    Piracy off the Horn of Africa Lauren Ploch Analyst in African Affairs Christopher M. Blanchard Analyst in Middle Eastern Affairs Ronald O'Rourke Specialist in Naval Affairs R. Chuck Mason Legislative Attorney Rawle O. King Analyst in Financial Economics and Risk Assessment September 28, 2009 Congressional Research Service 7-5700 www.crs.gov R40528 CRS Report for Congress Prepared for Members and Committees of Congress Piracy off the Horn of Africa Summary Pirate attacks in the waters off the Horn of Africa, including those on U.S.-flagged vessels, have brought new U.S. and international attention to the long-standing problem of piracy in the region. The International Maritime Bureau (IMB) recorded 111 attacks in the waters off the Horn of Africa in 2008, almost double the number in 2007. As of September 14, 2009, the U.S. State Department reported 156 attacks had occurred in those waters since January 2009, with 33 successful hijackings. Attacks remain concentrated in the Gulf of Aden between Yemen and the northern coast of Somalia and along Somalia’s eastern coastline. However, in July 2009, the United Nations Secretary General warned that “as a result of the military presence in the region, pirates have employed more daring operational tactics, operating further seawards, towards the Seychelles, and using more sophisticated weaponry.” Pirate attacks continue to threaten commercial shipping and relief shipments bound for East Africa and the Horn, amid a regional humanitarian crisis that experts are calling the worst since 1984. The increase in pirate attacks off the Horn of Africa is directly linked to continuing insecurity and the absence of the rule of law in war-torn Somalia.
    [Show full text]
  • The Educational Backgrounds of Leading Journalists
    The Educational Backgrounds of Leading Journalists June 2006 NOT FOR PUBLICATION BEFORE 00.01 HOURS THURSDAY JUNE 15TH 2006 1 Foreword by Sir Peter Lampl In a number of recent studies the Sutton Trust has highlighted the predominance of those from private schools in the country’s leading and high profile professions1. In law, we found that almost 70% of barristers in the top chambers had attended fee-paying schools, and, more worryingly, that the young partners in so called ‘magic circle’ law firms were now more likely than their equivalents of 20 years ago to have been independently-educated. In politics, we showed that one third of MPs had attended independent schools, and this rose to 42% among those holding most power in the main political parties. Now, with this study, we have found that leading news and current affairs journalists – those figures who are so central in shaping public opinion and national debate – are more likely than not to have been to independent schools which educate just 7% of the population. Of the top 100 journalists in 2006, 54% were independently educated an increase from 49% in 1986. Not only does this say something about the state of our education system, but it also raises questions about the nature of the media’s relationship with society: is it healthy that those who are most influential in determining and interpreting the news agenda have educational backgrounds that are so different to the vast majority of the population? What is clear is that an independent school education offers a tremendous boost to the life chances of young people, making it more likely that they will attain highly in school exams, attend the country’s leading universities and gain access to the highest and most prestigious professions.
    [Show full text]
  • ARTICLE Valuing Speech and Open Source Intelligence in the Face Of
    ARTICLE Valuing Speech and Open Source Intelligence in the Face of Judicial Deference __________________________ Andrew V. Moshirnia∗ Abstract In seeking to more effectively wage the war on terror, the United States government has come close to declaring war on speech related to terrorism. The Government has taken steps to silence and punish foreign propagandists, foreign reporters, and even Americans who have produced “coordinated” speech with foreign terrorist organizations. While this latter attempt to chill speech raises serious constitutional concerns, the United States Supreme Court has seen little wrong with this approach. Indeed, the Court contorted existing First Amendment jurisprudence in Holder v. Humanitarian Law Project so as to uphold 18 U.S.C. § 2339B, an expansive material support statute encompassing “coordinated” speech. These positions, no doubt taken with American safety in mind, not only damage our First Amendment jurisprudence, but also threaten to choke off the supply of open source intelligence, which derives from publicly available sources. This intelligence is especially vital in the modern war on terror taking place on the ground as well as on the Internet. This Article highlights the extraordinary deference shown by the Court in upholding a material support statute criminalizing non-violent speech and examines other governmental actions designed to chill foreign speech. This piece examines the deleterious effects chilling foreign speech will have on domestic security, detailing the importance of open source intelligence. Finally, this Article concludes by investigating the likely effect the Government’s positions will ∗ JD, May 2011, Harvard Law School; PhD—Informational Technology, May 2008, University of Kansas; Law Clerk to the Hon.
    [Show full text]
  • Arabic-Egyptian
    ARABIC-EGYPTIAN Egyptian men, Assuit Governorate Flickr/USAID Egypt DLIFLC DEFENSE LANGUAGE INSTITUTE FOREIGN LANGUAGE CENTER CULTURAL ORIENTATION | Arabic-Egyptian Profile Introduction ................................................................................................................... 6 Geographic Divisions .................................................................................................. 7 Nile River Valley and Delta ................................................................................8 Western Desert (Al-Ṣaḥraʾ al-Gharbiyyah) .....................................................8 Eastern Desert (Al-Ṣaḥraʾ al-Libiyah) ..............................................................9 Sinai Peninsula (Shibh Jazirat Sina) ................................................................9 Climate ..........................................................................................................................10 Bodies of Water ...........................................................................................................11 Nile River (Baḥr Al-Nil) ..................................................................................... 11 Lake Nasser ........................................................................................................ 12 Suez Canal ......................................................................................................... 12 Mediterranean Sea ...........................................................................................
    [Show full text]