Terrorism and the Constitution


Book Description

Tracing the history of government intrusions on Constitutional rights in response to threats from abroad, Cole and Dempsey warn that a society in which civil liberties are sacrificed in the name of national security is in fact less secure than one in which they are upheld. A new chapter includes a discussion of domestic spying, preventive detention, the many court challenges to post-9/11 abuses, implementation of the PATRIOT ACT, and efforts to reestablish the checks and balances left behind in the rush to strengthen governmental powers.




The NSA Report


Book Description

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.




National Security, Civil Liberties and the War on Terror


Book Description

This collection of thirty-one essays on national security, counter terrorism and civil liberties, examines competing views on the lengths to which personal freedoms and constitutional guarantees may be curtailed in the name of security. Divided into sections covering the history of the current anti-terrorism climate, interrogation practices, immigration and racial profiling, secrecy and surveillance and detention and the constitution, essays address such topics as justifying wartime limits on civil rights and liberties, torture and positive law, the use of "common-sense" profiling and comparative perspectives on the State Secrets Privilege. Most entries have been drawn from previously published works and the volume includes the relevant transcripts of several important court cases and government policy statements and documents. Contributors are influential professors of law from a variety of institutions. Annotation ©2011 Book News, Inc., Portland, OR (booknews.com).




The Future of Foreign Intelligence


Book Description

Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of intelligence. Absent information about foreign threats, the thinking went, the country and its citizens stood in great peril. To address this, the Courts and Congress have historically given the President broad leeway to obtain foreign intelligence. But in order to find information about an individual in the United States, the executive branch had to demonstrate that the person was an agent of a foreign power. Today, that barrier no longer exists. The intelligence community now collects massive amounts of data and then looks for potential threats to the United States. As renowned national security law scholar Laura K. Donohue explains in The Future of Foreign Intelligence, global communications systems and digital technologies have changed our lives in countless ways. But they have also contributed to a worrying transformation. Together with statutory alterations instituted in the wake of 9/11, and secret legal interpretations that have only recently become public, new and emerging technologies have radically expanded the amount and type of information that the government collects about U.S. citizens. Traditionally, for national security, the Courts have allowed weaker Fourth Amendment standards for search and seizure than those that mark criminal law. Information that is being collected for foreign intelligence purposes, though, is now being used for criminal prosecution. The expansion in the government's acquisition of private information, and the convergence between national security and criminal law threaten individual liberty. Donohue traces the evolution of U.S. foreign intelligence law and pairs it with the progress of Fourth Amendment jurisprudence. She argues that the bulk collection programs instituted by the National Security Agency amount to a general warrant, the prevention of which was the reason the Founders introduced the Fourth Amendment. The expansion of foreign intelligence surveillanceleant momentum by advances in technology, the Global War on Terror, and the emphasis on securing the homelandnow threatens to consume protections essential to privacy, which is a necessary component of a healthy democracy. Donohue offers a road map for reining in the national security state's expansive reach, arguing for a judicial re-evaluation of third party doctrine and statutory reform that will force the executive branch to take privacy seriously, even as Congress provides for the collection of intelligence central to U.S. national security. Alarming and penetrating, this is essential reading for anyone interested in the future of foreign intelligence and privacy in the United States.




The Patriot Act


Book Description

Examines six controversial essays that debate the issue of the Patriot Act, and includes model essays, sidebar notes and guided exercises.




Terrorism and the Constitution


Book Description

Tracing the history of government intrusions on Constitutional rights in response to threats from abroad, Cole and Dempsey warn that a society in which civil liberties are sacrificed in the name of national security is in fact less secure than one in which they are upheld. A new chapter includes a discussion of domestic spying, preventive detention, the many court challenges to post-9/11 abuses, implementation of the Patriot Act, and efforts to reestablish the checks and balances left behind in the rush to strengthen governmental powers.




Security V. Liberty


Book Description

Explores the varied ways in which threats to national security have affected civil liberties throughout American history. Has the government’s response to such threats led to a gradual loss of freedoms once taken for granted, or has the nation learned how to restore civil liberties after threats subside and how to put protections in place for the future? The authors focus on periods of national emergency in the twentieth century—from World War I through the Vietnam War—to explore how past episodes might bear upon today’s dilemma. They show that civil liberties are a not an immutable right, but the historically shifting result of a continuous struggle that has extended over two centuries. From publisher description.




The Patriot Act


Book Description




Civil Liberties Vs. National Security in a Post-9/11 World


Book Description

A timely and balanced debate by leading experts on the trade-offs between national security and civil liberties.




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.