Private-Public Intelligence Partnerships in the War on Terror

Total Page:16

File Type:pdf, Size:1020Kb

Private-Public Intelligence Partnerships in the War on Terror All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror Jon D. Michaelst INTRODUCTION The "War on Terror" has dramatically increased the nation's need for intelligence, and the federal government is increasingly relying, as it does in so many other contexts, on private actors to deliver that information. While private-public collaboration in intelligence gathering is not new, what is novel today-and what drives this inquiry-is that some of these collaborations are orchestrated around handshakes rather than legal formalities, such as search warrants, and may be arranged this way to evade oversight and, at times, to defy the law. Unable to target or repel terrorists using conventional military tactics and munitions alone, the United States is acutely aware that today's pivotal battlefield is an informational one. Teams of U.S. intelligence agents, acting as eavesdroppers, infiltrators, interrogators, and data-miners, must race against the clock to anticipate terrorists' actions, frustrate their missions, and dismantle their infrastructure.' Because the U.S. government does not know the who, Copyright © 2008 California Law Review, Inc. California Law Review, Inc. (CLR) is a California nonprofit corporation. CLR and the authors are solely responsible for the content of their publications. t Acting Professor, UCLA School of Law. Law Clerk to the Hon. David H. Souter, U.S. Supreme Court, 2005-06. Law Clerk to the Hon. Guido Calabresi, U.S. Court of Appeals for the Second Circuit, 2004-05. J.D., Yale Law School, 2003. The author wishes to thank Bruce Ackerman, Guido Calabresi, Sewell Chan, Josh Civin, Patrick Curran, Nestor Davidson, Jack Goldsmith, Oona Hathaway, Robert Hockett, Orin Kerr, Allison Orr Larsen, Marty Lederman, Ronald Lee, Jerry Mashaw, Raj Nayak, Anne Joseph O'Connell, Susan Rose-Ackerman, Steven Schooner, Paul Schwartz, Nikhil Shanbhag, Reva Siegel, Alexander Slater, David Sklansky, Jeffrey Smith, Daniel Solove, Jake Sullivan, David Super, and Meredith Desautels and Marc Pilotin of the California Law Review. Special thanks, as always, to Toni Michaels. The views expressed herein are solely those of the author. 1. See PHILIP B. HEYMANN, TERRORISM, FREEDOM, AND SECURITY: WINNING WITHOUT WAR 61-65 (2003) (noting the importance of tactical and strategic intelligence, which "allow[s] prevention by incapacitating a critical group of the terrorists or denying them the resources or CALIFORNIA LA W REVIEW [Vol. 96:901 what, where, and when of the next terrorist strike, but recognizes that the plot might be hatched on domestic soil, its first step must be to cast a wide net to gather all sorts of data points, 2 any one of which might be the clue that leads intelligence agents to prevent another September 1 -like catastrophe. 3 In this regard, there is no better ally than the private sector. Its comparative advantage over the government in acquiring vast amounts of potentially useful data is a function both of industry's unparalleled access to the American public's intimate affairs-access given by all those who rely on businesses to facilitate their personal, social, and economic transactions-and of regulatory asymmetries insofar as private organizations can at times obtain and share more easily and under fewer legal restrictions than the government information 4 can when it collects similar information on its own. access their plan requires. That necessitates identifying a sufficient and critical set of participants and learning their plan"); PATRICK RADDEN KEEFE, CHATTER: DISPATCHES FROM THE SECRET WORLD OF GLOBAL EAVESDROPPING 228 (2005); RON SUSKIND, THE ONE PERCENT DOCTRINE: DEEP INSIDE AMERICA'S PURSUIT OF ITS ENEMIES SINCE 9/11, at 26, 63 (2006); NAT'L COMM'N ON TERRORIST ATTACKS UPON THE U.S., THE 9/1I COMMISSION REPORT (2004); U.S. DEPARTMENT OF DEFENSE, QUADRENNIAL DEFENSE REVIEW REPORT (2006); Jack M. Balkin & Sanford Levinson, The Process of Constitutional Change: From PartisanEntrenchment to the National Surveillance State, 75 FORDHAM L. REV. 489, 520-22 (2006); Seth F. Kreimer, Watching the Watchers: Surveillance, Transparency,and PoliticalFreedom in the War on Terror, 7 U. PA. J. CONST. L. 133, 133 (2004); see also Peter P. Swire, Privacy and Information Sharing in the War on Terrorism, 51 VILL. L. REV. 951, 955 (2006) ("[P]rogress in information technology offers the most effective response to the new [terrorist] threat."). 2. See HEYMANN, supra note 1, at 62; RICHARD A. POSNER, PREVENTING SURPRISE ATTACKS: INTELLIGENCE REFORM IN THE WAKE OF 9/I I, at 99 (2005) [hereinafter POSNER, PREVENTING]; Anne Joseph O'Connell, The Architecture of Smart Intelligence: Structuring and Overseeing Agencies in the Post-9/11 World, 94 CALIF. L. REV. 1662-63, 1665 (2006); TODD MASSE, CONG. RESEARCH SERV., HOMELAND SECURITY INTELLIGENCE: PERCEPTIONS, STATUTORY DEFINITIONS, AND APPROACHES (2006), available at http://www.fas.org/ sgp/crs/intel/RL33616.pdf; JEFFREY W. SEIFERT, CONG. RESEARCH SERV., DATA MINING AND HOMELAND SECURITY: AN OVERVIEW (2007), available at http://www.fas.org/ sgp/crs/intel/RL31798.pdf; see also Jeffrey Rosen, The Naked Crowd: Balancing Privacy and Security in an Age of Terror, 46 ARIZ. L. REV. 607, 610 (2004) (describing data mining as the "consolidat[ion] and analy[sis of] public and private data in the hope of unearthing unusual patterns that might predict suspicious activity"). 3. William C. Banks, And the Wall Came Tumbling Down: Secret Surveillance After the Terror, 57 U. MIAMI L. REV. 1147, 1151 (2003) ("A major component of our counterterrorism strategy is interdiction - taking efforts to stop the terrorists before they strike. An effective capability to conduct secret intelligence collection is of critical importance in combating terrorism."); Peter P. Swire, The System of Foreign Intelligence Surveillance Law, 72 GEO. WASH. L. REV. 1306, 1343 (2004) [hereinafter Swire, System] ("In a world of asymmetrical warfare, greater surveillance can detect and respond to newly emerging threats."). 4. See DANIEL J. SOLOVE, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE 166 (2004) [hereinafter SOLOVE, DIGITAL PERSON] ("Personal information [mined from business databases] can help the government detect fraud, espionage, fugitives, drug distribution rings, and terrorist cells. Information about a person's financial transactions, purchases, and religious and political beliefs can assist the investigation of uspected criminals and can be used to profile people for more thorough searches at airports."); JAY STANLEY, AM. CIVIL LIBERTIES UNION, THE SURVEILLANCE-INDUSTRIAL COMPLEX: HOW THE AMERICAN GOVERNMENT IS CONSCRIPTING BUSINESSES AND INDIVIDUALS IN THE CONSTRUCTION OF A 2008] PRIVA TE-PUBLIC INTELLIGENCE PARTNERSHIPS Seeking to bridge the private sector's data-gathering capabilities and the nation's need for homeland security is an Executive with a voracious appetite for intelligence and correspondingly little patience for anything that might interfere with its efforts to neutralize the terrorist threat. The Executive is institutionally predisposed to act decisively and unilaterally during times of national crisis, even if it means bypassing legal restrictions, skirting congressional and judicial oversight, and encroaching on civil liberties.5 As Justice Souter remarked in Hamdi v. Rumsfeld: deciding . on what is a reasonable degree of guaranteed liberty whether in peace or war (or some condition in between) is not well entrusted to the Executive Branch of Government, whose particular responsibility is to maintain security. For reasons of inescapable human nature, the branch of the Government asked to counter a serious threat is not the branch on which to rest the Nation's entire reliance in striking the balance between the will to win and the cost in liberty on the way to victory; the responsibility for security6 will naturally amplify the claim that security legitimately raises. Unilateral executive policymaking of this sort has figured prominently in post-September 11 national-security policies and is reflected in the United States' approach to military detainees, interrogation tactics, battlefield contractors, and, of course, intelligence operations.7 SURVEILLANCE SOCIETY 1 (2004), available at http://www.aclu.org/FilesPDFs/ surveillancejreport.pdf ("The ongoing revolution in communications, computers, databases, cameras and sensors means that the technological obstacles to the creation of a truly nightmarish 'surveillance society' have now been overcome."); Susan Freiwald, Online Surveillance: Remembering the Lessons of the Wiretap Act, 56 ALA. L. REV. 9, 11-12 (2004) (noting that extensive personal data is available via the Internet); Daniel J. Solove & Chris Jay Hoofnagle, A Model Regime of Privacy Protection, 2006 U. ILL. L. REV. 357, 359 (indicating that private companies often have fewer legal restrictions placed upon them vis-A-vis accessing other people's personal information than the government does); Orin S. Kerr, Internet Surveillance Law After the USA PATRIOT Act: The Big Brother That lsn't, 97 Nw. U. L. REV. 607, 610 (2003) [hereinafter Kerr, Internet Surveillance]; James X. Dempsey & Lara M. Flint, CommercialData and National Security, 72 GEO. WASH. L. REV. 1459 (2004) [hereinafter Dempsey & Flint, Commercial Data]. 5. See, e.g., David Golove & Stephen Holmes, Terrorism & Accountability: Why Checks and Balances Apply Even in "The War on Terrorism," N.Y.U. REV. L. & SECURITY, Apr. 2004, at 2, 2 ("Executive power, by its very nature, seeks
Recommended publications
  • The Civilian Impact of Drone Strikes
    THE CIVILIAN IMPACT OF DRONES: UNEXAMINED COSTS, UNANSWERED QUESTIONS Acknowledgements This report is the product of a collaboration between the Human Rights Clinic at Columbia Law School and the Center for Civilians in Conflict. At the Columbia Human Rights Clinic, research and authorship includes: Naureen Shah, Acting Director of the Human Rights Clinic and Associate Director of the Counterterrorism and Human Rights Project, Human Rights Institute at Columbia Law School, Rashmi Chopra, J.D. ‘13, Janine Morna, J.D. ‘12, Chantal Grut, L.L.M. ‘12, Emily Howie, L.L.M. ‘12, Daniel Mule, J.D. ‘13, Zoe Hutchinson, L.L.M. ‘12, Max Abbott, J.D. ‘12. Sarah Holewinski, Executive Director of Center for Civilians in Conflict, led staff from the Center in conceptualization of the report, and additional research and writing, including with Golzar Kheiltash, Erin Osterhaus and Lara Berlin. The report was designed by Marla Keenan of Center for Civilians in Conflict. Liz Lucas of Center for Civilians in Conflict led media outreach with Greta Moseson, pro- gram coordinator at the Human Rights Institute at Columbia Law School. The Columbia Human Rights Clinic and the Columbia Human Rights Institute are grateful to the Open Society Foundations and Bullitt Foundation for their financial support of the Institute’s Counterterrorism and Human Rights Project, and to Columbia Law School for its ongoing support. Copyright © 2012 Center for Civilians in Conflict (formerly CIVIC) and Human Rights Clinic at Columbia Law School All rights reserved Printed in the United States of America. Copies of this report are available for download at: www.civiliansinconflict.org Cover: Shakeel Khan lost his home and members of his family to a drone missile in 2010.
    [Show full text]
  • Administrative National Security
    ARTICLES Administrative National Security ELENA CHACHKO* In the past two decades, the United States has applied a growing num- ber of foreign and security measures directly targeting individualsÐ natural or legal persons. These individualized measures have been designed and carried out by administrative agencies. Widespread appli- cation of individual economic sanctions, security watchlists and no-¯y lists, detentions, targeted killings, and action against hackers responsible for cyberattacks have all become signi®cant currencies of U.S. foreign and security policy. Although the application of each of these measures in discrete contexts has been studied, they have yet to attract an inte- grated analysis. This Article examines this phenomenon with two main aims. First, it documents what I call ªadministrative national securityº: the growing individualization of U.S. foreign and security policy, the administrative mechanisms that have facilitated it, and the judicial response to these mechanisms. Administrative national security encompasses several types of individualized measures that agencies now apply on a routine, inde®- nite basis through the exercise of considerable discretion within a broad framework established by Congress or the President. It is therefore best understood as an emerging practice of administrative adjudication in the foreign and security space. Second, this Article considers how administrative national security integrates with the presidency and the courts. Accounting for administra- tive national security illuminates the President's constitutional role as chief executive and commander-in-chief and his control of key aspects of * Lecturer on Law, Harvard Law School (Fall 2019); Post-doctoral Fellow, Perry World House, University of Pennsylvania; S.J.D. Candidate, Harvard Law School; LL.B., Hebrew University of Jerusalem (2014).
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Health Journalism 2018
    May 2018 CrainsNewsPro.com Checking Into Medical Centers How to Tap Into Hospital Expertise Page 8 The Best in Health Coverage AHCJ Honors Top Reporting of 2017 Page 19 How ABC News Trains Doctors Program Offers Doctors a TV Residency Page 24 An Education In Medicine The World’s Longest Covering Medical Internship Page 34 Health Policy Reporters Push for Better Access — and It’s Paying Off Page 4 ENVIRONMENTAL JOURNALISM 2018 SOCIETY OF ENVIRONMENTAL JOURNALISTS 28TH ANNUAL CONFERENCE FRESH , FRESH Hosted by University of Michigan-Flint Oct. 3-7, 2018 18np0026.pdf RunDate:5/7/18 Full Page Color: 4/C FROM THE EDITOR CrainsNewsPro.com Prescription for Trust Being a health journalist isn’t easy even in the best of times. Reporters covering medical issues bear a responsibility to their audience that requires them to be true to the facts, remaining impartial and, at the same time, being discerning, as “facts” can change CONTENTS depending on what study is coming out or who’s talking about the issues. COVERING PUBLIC POLICY ................. 4 But this year got o to a shaky start on the federal level. Reporters were being singled After a Rough Start, Journalists Are out for exclusive access to federal press briengs while others fought to nd out what was Making Inroads in Washington happening. One reporter was cut o during a press conference call. Even nding people ALTERNATE SOURCES .......................... 6 to interview about complicated regulatory issues was a monumental task. Some Organizations Provide Options for anks to the eorts of the medical press, things are slowly changing for the better.
    [Show full text]
  • Change and Structure in the Law of Armed Conflict After September 11 Peter Margulies
    Marquette Law Review Volume 95 Article 13 Issue 4 Summer 2012 The ogF of War Reform: Change and Structure in the Law of Armed Conflict After September 11 Peter Margulies Follow this and additional works at: http://scholarship.law.marquette.edu/mulr Part of the Law Commons Repository Citation Peter Margulies, The Fog of War Reform: Change and Structure in the Law of Armed Conflict After September 11, 95 Marq. L. Rev. 1417 (2012). Available at: http://scholarship.law.marquette.edu/mulr/vol95/iss4/13 This Article is brought to you for free and open access by the Journals at Marquette Law Scholarly Commons. It has been accepted for inclusion in Marquette Law Review by an authorized administrator of Marquette Law Scholarly Commons. For more information, please contact [email protected]. 18 - MARGULIES (DO NOT DELETE) 7/9/2012 10:27 PM THE FOG OF WAR REFORM: CHANGE AND STRUCTURE IN THE LAW OF ARMED CONFLICT AFTER SEPTEMBER 11 * PETER MARGULIES Salim Hamdan’s conviction in a military commission for material support of Al Qaeda separates utilitarians, who generally defer to state power, from protective theorists, who seek to shield civilians by curbing official discretion. Utilitarians view military commissions as efficient means for trying suspected terrorists. Protective theorists criticize the amorphous nature of material support charges. The clash between utilitarians and protective theorists colors other issues, including “enhanced” interrogation and limits on targeting. Protective theorists merit praise for their scrutiny of interrogation. In contrast, utilitarians have trivialized interrogation abuses. However, protective theorists’ scrutiny of states is burdened by hindsight bias.
    [Show full text]
  • Intelligence Legalism and the National Security Agency's Civil Liberties
    112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business.
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • Bruce Ackerman
    BOOK REVIEW CONSTITUTIONAL ALARMISM THE DECLINE AND FALL OF THE AMERICAN REPUBLIC. By Bruce Ackerman. Cambridge, Mass.: The Belknap Press of Harvard University Press. 2010. Pp. 270. $25.95. Reviewed by Trevor W. Morrison∗ INTRODUCTION The Decline and Fall of the American Republic is a call to action. Professor Bruce Ackerman opens the book with the claim that “some- thing is seriously wrong — very seriously wrong — with the tradition of government that we have inherited” (p. 3). The problem, he says, is the modern American presidency, which he portrays as recently trans- formed into “an especially dangerous office” (p. 189 n.1) posing “a se- rious threat to our constitutional tradition” (p. 4). Ackerman urges us to confront this “potential for catastrophic decline — and act before it is too late” (p. 11). Concerns of this kind are not new. Indeed, in some respects De- cline and Fall reads as a sequel to Professor Arthur Schlesinger’s 1973 classic, The Imperial Presidency.1 Ackerman writes consciously in that tradition, but with a sense of renewed urgency driven by a convic- tion that “the presidency has become far more dangerous today” than in Schlesinger’s time (p. 188). The sources and mechanisms of that purported danger are numerous; Decline and Fall sweeps across jour- nalism, national opinion polls, the Electoral College, civilian-military relations, presidential control of the bureaucracy, and executive branch lawyering to contend that “the foundations of our own republic are eroding before our very eyes” (p. 188). ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– ∗ Professor of Law, Columbia University. For helpful comments on earlier drafts, I thank Akhil Amar, David Barron, Ariela Dubler, Jack Goldsmith, Marty Lederman, Peter Margulies, Gillian Metzger, Henry Monaghan, Rick Pildes, Jeff Powell, John Witt, and participants in faculty workshops at Vanderbilt University and the University of Washington.
    [Show full text]
  • The Protean Take Care Clause
    ARTICLE THE PROTEAN TAKE CARE CLAUSE JACK GOLDSMITH† & JOHN F. MANNING†† INTRODUCTION ............................................................................ 1835 I. THE CASE LAW ........................................................................ 1839 A. The Removal Power ................................................................... 1839 B. Standing Doctrine ...................................................................... 1844 C. Prosecutorial Discretion ............................................................... 1847 D. Legislative Supremacy and the Antidispensation Principle ................ 1848 E. Presidential “Completion Power” ................................................... 1851 II. “TAKE CARE” QUESTIONS FOR THE COURT ............................ 1853 A. (Non)interpretation of the Take Care Clause .................................. 1853 1. Text and Structure .............................................................. 1854 2. Interpretive Canons ............................................................ 1859 3. History and Constitutional Meaning ................................... 1861 B. Consistency and Line Drawing ..................................................... 1863 CONCLUSION ................................................................................ 1867 INTRODUCTION Most of Article II, Section 3 of the Constitution sets forth mundane presidential responsibilities or powers. Section 3 prescribes the President’s duty “from time to time” to report to Congress on “the State of the Union”
    [Show full text]
  • The Contributions of the Obama Administration to the Practice and Theory of International Law
    \\jciprod01\productn\H\HLI\57-2\HLI205.txt unknown Seq: 1 14-OCT-16 13:24 Volume 57, Number 2, Spring 2016 The Contributions of the Obama Administration to the Practice and Theory of International Law Jack Goldsmith* My aim in this essay is to give a tour of the horizon of the Obama admin- istration’s international law record in order to identify the distinctiveness of its approach and to tie it in to some general themes in international and foreign relations law. Due to his upbringing and education, Barack Obama came to the Presi- dency with a cosmopolitan outlook and an informed commitment to inter- national law. This attitude differed sharply from his predecessor, George W. Bush, who was suspicious of international law and generally viewed it as an obstacle to the exercise of American power. By contrast, Obama devoted a chapter of his 2006 book The Audacity of Hope to international relations and made plain that he understood international law intimately and viewed it as a constructive force in international relations.1 He criticized the view that “international law [was] an encroachment on American sovereignty [and] a foolish constraint on America’s ability to impose its will around the world”—a position that Obama associated with Henry Cabot Lodge, but one that might also describe the early Bush administration.2 And Obama argued it was “in America’s interest to work with other countries to build up international institutions and promote international norms . because the more international norms were reinforced and the more America sig- naled a willingness to show restraint in the exercise of its power, the fewer the number of conflicts that would arise.”3 On the campaign trail Obama gave voice to this attitude when he criticized the Bush administration for its weak compliance with U.S.
    [Show full text]
  • Questioning the National Security Agency's Metadata Program
    I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY Secret without Reason and Costly without Accomplishment: Questioning the National Security Agency’s Metadata Program JOHN MUELLER & MARK G. STEWART* I. INTRODUCTION When Edward Snowden’s revelations emerged in June 2013 about the extent to which the National Security Agency was secretly gathering communications data as part of the country’s massive 9/11- induced effort to catch terrorists, the administration of Barack Obama set in motion a program to pursue him to the ends of the earth in order to have him prosecuted to the full extent of the law for illegally exposing state secrets. However, the President also said that the discussions about the programs these revelations triggered have actually been a good thing: “I welcome this debate. And I think it’s healthy for our democracy. I think it’s a sign of maturity because probably five years ago, six years ago, we might not have been having this debate.”1 There may be something a bit patronizing in the implication that the programs have been secret because we were not yet mature enough to debate them when they were put into place. Setting that aside, however, a debate is surely to be welcomed—indeed, much overdue. It should be conducted not only about the National Security Agency’s (NSA) amazingly extensive data-gathering programs to * John Mueller is a professor of political science at Ohio State University and a Senior Fellow at the Cato Insitute. Mark G. Stewart is a professor of engineering at the University of Newcastle, Australia.
    [Show full text]
  • The Taint of Torture: the Roles of Law and Policy in Our Descent to the Dark Side
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2012 The Taint of Torture: The Roles of Law and Policy in Our Descent to the Dark Side David Cole Georgetown University Law Center, [email protected] Georgetown Public Law and Legal Theory Research Paper No. 12-054 This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/908 http://ssrn.com/abstract=2040866 49 Hous. L. Rev. 53-69 (2012) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Human Rights Law Commons, Military, War, and Peace Commons, and the National Security Law Commons Do Not Delete 4/8/2012 2:44 AM ARTICLE THE TAINT OF TORTURE: THE ROLES OF LAW AND POLICY IN OUR DESCENT TO THE DARK SIDE David Cole* TABLE OF CONTENTS I. INTRODUCTION ........................................................................ 53 II.TORTURE AND CRUELTY: A MATTER OF LAW OR POLICY? ....... 55 III.ACCOUNTABILITY AND LEGAL VIOLATIONS ............................. 62 IV.THE LAW AND POLICY OF DETENTION AND TARGETING.......... 64 I. INTRODUCTION Philip Zelikow has provided a fascinating account of how officials in the U.S. government during the “War on Terror” authorized torture and cruel treatment of human beings whom they labeled “high value al Qaeda detainee[s],” “enemy combatants,” or “the worst of the worst.”1 Professor Zelikow * Professor, Georgetown Law. 1. Philip Zelikow, Codes of Conduct for a Twilight War, 49 HOUS. L. REV. 1, 22–24 (2012) (providing an in-depth analysis of the decisions made by the Bush Administration in implementing interrogation policies and practices in the period immediately following September 11, 2001); see Military Commissions Act of 2006, Pub.
    [Show full text]