Breaking the Executive Branch's Monopoly Over Foreign Policy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
American Diplomacy Project: a US Diplomatic Service for the 21St
AMERICAN DIPLOMACY PROJECT A U.S. Diplomatic Service for the 21st Century Ambassador Nicholas Burns Ambassador Marc Grossman Ambassador Marcie Ries REPORT NOVEMBER 2020 American Diplomacy Project: A U.S. Diplomatic Service for the 21st Century Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 www.belfercenter.org Statements and views expressed in this report are solely those of the authors and do not imply endorsement by Harvard University, Harvard Kennedy School, or the Belfer Center for Science and International Affairs. Design and layout by Auge+Gray+Drake Collective Works Copyright 2020, President and Fellows of Harvard College Printed in the United States of America FULL PROJECT NAME American Diplomacy Project A U.S. Diplomatic Service for the 21st Century Ambassador Nicholas Burns Ambassador Marc Grossman Ambassador Marcie Ries REPORT NOVEMBER 2020 Belfer Center for Science and International Affairs | Harvard Kennedy School i ii American Diplomacy Project: A U.S. Diplomatic Service for the 21st Century Table of Contents Executive Summary ........................................................................3 10 Actions to Reimagine American Diplomacy and Reinvent the Foreign Service ........................................................5 Action 1 Redefine the Mission and Mandate of the U.S. Foreign Service ...................................................10 Action 2 Revise the Foreign Service Act ................................. 16 Action 3 Change the Culture .................................................. -
Leak of Agents Name Causes Exposure of Cia Front Firm Page of Government Exkibit Washangtonpostcom 423 Os Cr 394 Leak of Agents Name Causes Exposure of Cia Front Fir
WASHINGTONPOSTCOM LEAK OF AGENTS NAME CAUSES EXPOSURE OF CIA FRONT FIRM PAGE OF GOVERNMENT EXKIBIT WASHANGTONPOSTCOM 423 OS CR 394 LEAK OF AGENTS NAME CAUSES EXPOSURE OF CIA FRONT FIR BY WALTER PINCUS AND MIKE ALLEN WASHINGTON POST STAFF WRITERS SAWRDAY OCTOBER 2003 PAGE A03 OF FRONT THE LEAK OF CIA OPERATIVES AAXNE HAS ALSO EXPOSED THE IDENTITY CIA COMPANY POTENTIALLY BUSH ADMINISTRATION OFFICIALS SAID EXPANDING THE DAMAGECAUSED BY THE ORIGINAL DISCLOSURE YESTERDAY THE COMPANYS IDENTITY BREWSTERJENNINGS ASSOCIATES BECAME PUBLIC BECAUSE IT APPEARED IN FEDERAL ELECTION COMMISSION RECORDS ON FORM FILLED OUT IN 1999 BY VALERIE PLAME THE CASE OFFICER AT THE CENTER OF THE CONTROVERSY WHEN SHE CONTRIBUTED 1000 TO AL GORES PRESIDENTIAL PRIMARY CAMPAIGN CONFIMIED THAT IT WAS AFTER THE NAME OF THE COMPANY WAS BROADCAST YESTERDAY ADMINISTRATION OFFICIALS PLAINES HER W2 CIA FRONT THEY SAID THE OBSCURE AND POSSIBLY DEFUNCT FIRM WAS LISTED AS EMPLOYER ON TAX FORMS IN 1999 WHENSHE WAS WORKING UNDERCOVER FOR THE CIA PLANIE NAME WAS FIRST PUBLISHED JULY OFFICIALS 14 IN NEWSPAPER COLUMN BY ROBERT NOVAK THAT QUOTED TWO SENIOR ADMINISTRATION THEY MISSION WERE CRITICAL OFHER HUSBAND FORMER AMBASSADOR JOSEPH WILSON IV FOR HIS HANDLING OF CIA FOR THAT UNDERCUT PRESIDENT BUSHS CLAIM THAT IRAN HAD SCMGHT URANIUM FROM THE AFRICAN NATION OF NIGER POSSIBLE USE IN DEVELOPING NUCLEAR WEAPONS 26 THE JUSTICE DEPARTMENT BEGAN FORMAL CRIMINAL INVESTIGATION OF THE LEAK SEPT UNDERSCORES THE THE INADVERTENT DISCLOSURE OF THE NAME OF BUSINESS AFFILIATED WITH THE CIA POTENTIAL -
NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC. -
Joseph Wilson, Who Challenged Iraq War Narrative, Dies at 69 - the New York Times
9/27/2019 Joseph Wilson, Who Challenged Iraq War Narrative, Dies at 69 - The New York Times Joseph Wilson, Who Challenged Iraq War Narrative, Dies at 69 He contradicted a statement in President George W. Bushʼs State of the Union address. A week later, his wife at the time, Valerie Plame, was outed as a C.I.A. agent. By Neil Genzlinger Sept. 27, 2019, 1:52 p.m. ET https://www.nytimes.com/2019/09/27/us/joseph-wilson-who-challenged-iraq-war-narrative-dies-at-69.html 1/4 9/27/2019 Joseph Wilson, Who Challenged Iraq War Narrative, Dies at 69 - The New York Times Former Ambassador Joseph C. Wilson in 2008 with his wife at the time, the former C.I.A. officer Valerie Plame. On Friday, after his death, she called him “an American hero.” Charles Dharapak/Associated Press https://www.nytimes.com/2019/09/27/us/joseph-wilson-who-challenged-iraq-war-narrative-dies-at-69.html 2/4 9/27/2019 Joseph Wilson, Who Challenged Iraq War Narrative, Dies at 69 - The New York Times Joseph C. Wilson, the long-serving American diplomat whose clash with the administration of President George W. Bush in 2003 led to the unmasking of his wife at the time, Valerie Plame, as a C.I.A. agent, resulting in accusations that the revelation was political payback, died on Friday at his home in Santa Fe, N.M. He was 69. Ms. Plame said the cause was organ failure. Mr. Wilson served in numerous posts, many in Africa, in a 23-year diplomatic career that began in 1976. -
Annual Report 2006-2008 FINAL
WEATHERHEAD CENTER FOR INTERNATIONAL AFFAIRS H A R V A R D U N I V E R S I T Y two2006-2007 thousand six – two thousand seven ANNUAL REPORTS two2007-2008 thousand seven – two thousand eight 1737 Cambridge Street • Cambridge, MA 02138 www.wcfia.harvard.edu TABLE OF CONTENTS PEOPLE 2 Advisory Committee 2 Executive Committee 2 Administration 3 RESEARCH ACTIVITIES 5 Small Grants for Faculty Research Projects 5 Medium Grants for Faculty Research Projects 5 Large Grants for Faculty Research Projects 5 Large Grants for Faculty Research Semester Leaves 6 Junior Faculty Synergy Semester Leaves 7 Distinguished Lecture Series 8 Weatherhead Initiative in International Affairs 8 CONFERENCES 10 STUDENT PROGRAMS 31 RESEARCH SEMINARS 45 Africa Research Seminar 45 Challenges Of The Twenty-First Century: European And American Perspectives 46 Communist and Postcommunist Countries Seminar 47 Comparative Politics Research Workshop 47 Comparative Politics Seminar 52 Cultural Politics: Interdisciplinary Pespectives Seminar 52 Director’s Faculty Seminar 53 Economic Growth and Development Workshop 53 Economic History Workshop 54 Ethics And International Relations Seminar 56 Faculty Discussion Group On Political Economy 56 Futue of War Seminar 63 Herbert C. Kelman Seminar on International Conflict Analysis and Resolution 63 International Business Seminar 65 International Economics Workshop 66 International History Seminar 68 International Law and International Relations Seminar 70 Middle East Seminar 71 Political Violence and Civil War 73 Religion and Society 75 Research Workshop in International Relations 75 Research Workshop on Political Economy 77 Science and Society Seminar 83 South Asia Seminar 84 Southeast Asia Security and International Relations 85 Transatlantic Relations Semimar 85 U.S. -
Personal Liability As Administrative Law
Personal Liability as Administrative Law David Zaring* Abstract Administrative law has almost exclusively concerned itself with lawsuits against agencies as collective entities, under the auspices of the Administrative Procedure Act. In light of the growing number and prominence of suits by war on terror plaintiffs against senior government officials, this Article considers the use of personal liability to discipline government officials and assesses it as an alternative to traditional administrative law. It compares the civil suits to criminal prosecutions of these officials and compares both of them to less- obviously law related scandal campaigns. Personal sanctions—of which Bivens complaints are a principal example—are worth more attention. These mechanisms, and the constitutional tort in particular, are case studies of the popular inclination to decentralize government, of the value of symbolic laws, and, increasingly, of the personalization of law and politics. Solving some of the problems of personal liability, as it works today, might best be done not by enhancing the bite of the always-challenged lawsuits and prosecutions, but by making sure that the law makes it more possible for political cases to be made against government officials, rather than legal ones. Table of Contents I. Introduction .................................................................................. 314 II. Three Kinds of Bivens Actions ..................................................... 319 A. The Doctrinal Problems for Plaintiffs ................................... -
On Security and Privacy for Networked Information Society
Antti Hakkala On Security and Privacy for Networked Information Society Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes Turku Centre for Computer Science TUCS Dissertations No 225, November 2017 ON SECURITY AND PRIVACY FOR NETWORKED INFORMATIONSOCIETY Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes antti hakkala To be presented, with the permission of the Faculty of Mathematics and Natural Sciences of the University of Turku, for public criticism in Auditorium XXII on November 18th, 2017, at 12 noon. University of Turku Department of Future Technologies FI-20014 Turun yliopisto 2017 supervisors Adjunct professor Seppo Virtanen, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland Professor Jouni Isoaho, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland reviewers Professor Tuomas Aura Department of Computer Science Aalto University Espoo, Finland Professor Olaf Maennel Department of Computer Science Tallinn University of Technology Tallinn, Estonia opponent Professor Jarno Limnéll Department of Communications and Networking Aalto University Espoo, Finland The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service ISBN 978-952-12-3607-5 (Online) ISSN 1239-1883 To my wife Maria, I am forever grateful for everything. Thank you. ABSTRACT Our society has developed into a networked information soci- ety, in which all aspects of human life are interconnected via the Internet — the backbone through which a significant part of communications traffic is routed. This makes the Internet ar- guably the most important piece of critical infrastructure in the world. -
Greenberg – a Wicked
POLK, CLAY, LINCOLN, AND THE 1846 U.S. INVASION OF MEXICO WICKED WAR AMY S. GREENBERG I do not think there was ever a more wicked war than that waged by the United States on Mexico. I thought so at the time, when I was a youngster, only I had not moral courage enough to resign. —ULYSSES S. GRANT, 1879 Introduction THIS is THE STORY of five men, four years, and one foreign war. Henry Clay, James K. Polk, Abraham Lincoln, John J. Hardin, and Nicholas Trist were bound together in unexpected political and personal battle during the years 1844-48 as AmericaVwar against Mexico unfolded, then stumbled to an end. That conflict, which breached George Washington's injunction to avoid entanglements abroad, was an act of expansionist aggression against a neighboring country. It reshaped the United States into lord of the continent and announced the arrival of a new world power. TheJJ.S.-Mexican conflict also tipped an internecine struggle over slaveryjnto civil war. Though both Its justification and its consequences are dim now, this, America's first wgr against another republic, decisively broke with the past, shaped the future, and to this day affects how the United States acts in the world. This is also a story about politics, slavery, Manifest Destiny, Indian kill- ing, and what it meant to prove one's manhood in the nineteenth century. It explores the meaning of moral courage injVmerica, the importance of legacies passed between generations, and the imperatives that turn politi- cians into leaders. And it attempts to explain why the United States invaded a neighboring country and how it came to pass that a substantial number of Americans determined to stop the ensuing war. -
Southern Women and Their Families in the 19Th Century: Papers
A Guide to the Microfilm Edition of Research Collections in Women’s Studies General Editors: Anne Firor Scott and William H. Chafe Southern Women and Their Families in the 19th Century: Papers and Diaries Consulting Editor: Anne Firor Scott Series A, Holdings of the Southern Historical Collection, University of North Carolina, Chapel Hill Parts 4–6: Nicholas Philip Trist Papers; Alabama, South Carolina, Georgia, and Florida Collections; Virginia Collections Associate Editor and Guide Compiled by Martin P. Schipper A microfilm project of UNIVERSITY PUBLICATIONS OF AMERICA An Imprint of CIS 4520 East-West Highway • Bethesda, MD 20814-3389 Library of Congress Cataloging-in-Publication Data Southern women and their families in the 19th century, papers, and diaries. Series A, Holdings of the Southern Historical Collection, University of North Carolina, Chapel Hill [microform] / consulting editor, Anne Firor Scott. microfilm reels. -- (Research collections in women’s studies) Accompanied by printed reel guide compiled by Martin P. Schipper. Contents: pt. 1. Mary Susan Ker Papers, 1785–1923 -- [etc.] -- pt. 5. Alabama, South Carolina, Georgia, and Florida collections -- pt. 6. Virginia collections. ISBN 1-55655-417-6 (pt. 4 : microfilm) ISBN 1-55655-418-4 (pt. 5 : microfilm) ISBN 1-55655-419-2 (pt. 6 : microfilm) 1. Women--Southern States--History--19th century. 2. Family-- Southern States--History 19th century. I. Scott, Anne Firor, 1921– . II. Schipper, Martin Paul. III. Ker, Mary Susan, 1839–1923. IV. University of North Carolina at Chapel Hill. Library. Southern Historical Collection. V. University Publications of America (Firm). VI. Series. [HQ1458] 305.4′0975--dc20 91-45750 CIP Copyright © 1991 by University Publications of America. -
As Facebook Raised a Privacy Wall, It Carved an Opening for Tec
As Facebook Raised a Privacy Wall, It Carved an Opening for Tec... https://www.printfriendly.com/p/g/FEuXeA As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants nytimes.com/2018/12/18/technology/facebook-privacy.html By Gabriel J.X. Dance , Michael LaForgia and Nicholas Confessore December 19, 2018 For years, gave some of the world’s largest technology companies more intrusive access to users’ personal data than it has disclosed, effectively exempting those business partners from its usual privacy rules, according to internal records and interviews. The special arrangements are detailed in hundreds of pages of Facebook documents obtained by The New York Times. The records, generated in 2017 by the company’s internal system for tracking partnerships, provide the most complete picture yet of the social network’s data-sharing practices. They also underscore how personal data has become the most prized commodity of the digital age, traded on a vast scale by some of the most powerful companies in Silicon Valley and beyond. The exchange was intended to benefit everyone. Pushing for explosive growth, Facebook got more users, lifting its advertising revenue. Partner companies acquired features to make their products more attractive. Facebook users connected with friends across different devices and websites. But Facebook also assumed extraordinary power over the personal information of its 2.2 billion users — control it has wielded with little transparency or outside oversight. Facebook allowed Microsoft’s Bing search engine to see the names of virtually all Facebook users’ friends without consent, the records show, and gave Netflix and Spotify the ability to read Facebook users’ private messages. -
Choosing Sides and Guiding Policy United States’ and Pakistan’S Wars in Afghanistan
UNIVERSITY OF FLORDA Choosing Sides and Guiding Policy United States’ and Pakistan’s Wars in Afghanistan Azhar Merchant 4/24/2019 Table of Contents I. Introduction… 2 II. Political Settlement of the Mujahedeen War… 7 III. The Emergence of the Taliban and the Lack of U.S. Policy… 27 IV. The George W. Bush Administration… 50 V. Conclusion… 68 1 I. Introduction Forty years of war in Afghanistan has encouraged the most extensive periods of diplomatic and military cooperation between the United States and Pakistan. The communist overthrow of a relatively peaceful Afghan government and the subsequent Soviet invasion in 1979 prompted the United States and Pakistan to cooperate in funding and training Afghan mujahedeen in their struggle against the USSR. After the collapse of the Soviet Union, Afghanistan entered a period of civil war throughout the 1990s that nurtured Islamic extremism, foreign intervention, and the rise of the Taliban and Al-Qaeda, ultimately culminating in the devastating attacks against Americans on September 11th. Seventeen years later, the United States continues its war in Afghanistan while its relationship with Pakistan has deteriorated to an all-time low. The mutual fear of Soviet expansionism was the unifying cause for Americans and Pakistanis to work together in the 1980s, yet as the wars in Afghanistan evolved, so did the countries’ respective aims and objectives.1 After the Soviets were successfully pushed out of the region by the mujahedeen, the United States felt it no longer had any reason to stay. The initial policy aim of destabilizing the USSR through prolonged covert conflict in Afghanistan was achieved. -
By Any Other Name: How, When, and Why the US Government Has Made
By Any Other Name How, When, and Why the US Government Has Made Genocide Determinations By Todd F. Buchwald Adam Keith CONTENTS List of Acronyms ................................................................................. ix Introduction ........................................................................................... 1 Section 1 - Overview of US Practice and Process in Determining Whether Genocide Has Occurred ....................................................... 3 When Have Such Decisions Been Made? .................................. 3 The Nature of the Process ........................................................... 3 Cold War and Historical Cases .................................................... 5 Bosnia, Rwanda, and the 1990s ................................................... 7 Darfur and Thereafter .................................................................... 8 Section 2 - What Does the Word “Genocide” Actually Mean? ....... 10 Public Perceptions of the Word “Genocide” ........................... 10 A Legal Definition of the Word “Genocide” ............................. 10 Complications Presented by the Definition ...............................11 How Clear Must the Evidence Be in Order to Conclude that Genocide has Occurred? ................................................... 14 Section 3 - The Power and Importance of the Word “Genocide” .. 15 Genocide’s Unique Status .......................................................... 15 A Different Perspective ..............................................................