The War On Our Freedoms


Book Description

In each generation, for different reasons, America witnesses a tug of war between the instinct to suppress and the instinct for openness. Today, with the perception of a mortal threat from terrorists, the instinct to suppress is in the ascendancy. Part of the reason for this is the trauma that our country experienced on September 11, 2001, and part of the reason is that the people who are in charge of our government are inclined to use the suppression of information as a management strategy. Rather than waiting ten or fifteen years to point out what's wrong with the current rush to limit civil liberties in the name of "national security," these essays by top thinkers, scholars, journalists, and historians lift the veil on what is happening and why the implications are dangerous and disturbing and ultimately destructive of American values and ideals. Without our even being aware, the judiciary is being undermined, the press is being intimidated, racial profiling is rampant, and our privacy is being invaded. The "war on our freedoms " is just as real as the "war on terror " -- and, in the end, just as dangerous.




United States Code


Book Description

"The United States Code is the official codification of the general and permanent laws of the United States of America. The Code was first published in 1926, and a new edition of the code has been published every six years since 1934. The 2012 edition of the Code incorporates laws enacted through the One Hundred Twelfth Congress, Second Session, the last of which was signed by the President on January 15, 2013. It does not include laws of the One Hundred Thirteenth Congress, First Session, enacted between January 2, 2013, the date it convened, and January 15, 2013. By statutory authority this edition may be cited "U.S.C. 2012 ed." As adopted in 1926, the Code established prima facie the general and permanent laws of the United States. The underlying statutes reprinted in the Code remained in effect and controlled over the Code in case of any discrepancy. In 1947, Congress began enacting individual titles of the Code into positive law. When a title is enacted into positive law, the underlying statutes are repealed and the title then becomes legal evidence of the law. Currently, 26 of the 51 titles in the Code have been so enacted. These are identified in the table of titles near the beginning of each volume. The Law Revision Counsel of the House of Representatives continues to prepare legislation pursuant to 2 U.S.C. 285b to enact the remainder of the Code, on a title-by-title basis, into positive law. The 2012 edition of the Code was prepared and published under the supervision of Ralph V. Seep, Law Revision Counsel. Grateful acknowledgment is made of the contributions by all who helped in this work, particularly the staffs of the Office of the Law Revision Counsel and the Government Printing Office"--Preface.




Terrorist Material Support


Book Description

There are 2 fed. material support statutes have been at the heart of the Justice Dept¿s. terrorist prosecution efforts. One provision outlaws providing material support for the commission of certain designated offenses that might be committed by terrorists. The other outlaws providing material support to certain terrorist org. They share a common definition of the term ¿material support,¿ some aspects of which have come under constitutional attack. Contents of this report: (1) Introduction; (2) Background; (3) Support of Designated Terrorist Org.: Attempt, Conspiracy, Aiding and Abetting; Material Support; Other Constitutional Challenges; Terrorist Org.; Consequences of Charge or Conviction; Extraterritorial Jurisdiction; Civil Actions; (4) Support of Terrorism.




The Right to Privacy


Book Description

Reproduction of the original: The Right to Privacy by Samuel D. Warren, Louis D. Brandeis




The NSA Report


Book Description

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.




Terrorism and the Constitution


Book Description

Tracing the history of government intrusions on Constitutional rights in response to threats from abroad, Cole and Dempsey warn that a society in which civil liberties are sacrificed in the name of national security is in fact less secure than one in which they are upheld. A new chapter includes a discussion of domestic spying, preventive detention, the many court challenges to post-9/11 abuses, implementation of the PATRIOT ACT, and efforts to reestablish the checks and balances left behind in the rush to strengthen governmental powers.




The Freedom to Read


Book Description







Engaging Privacy and Information Technology in a Digital Age


Book Description

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.




Report on the Telephone Records Program Conducted Under Section 215 of the USA Patriot Act and on the Operations of the Foreign Intelligence Surveillance Court


Book Description

The Privacy and Civil Liberties Oversight Board (PCLOB) is an independent bipartisan agency within the executive branch established by the Implementing Recommendations of the 9/11 Commission Act of 2007. The Board is comprised of four part-time members and a full-time chairman, all appointed by the President and confirmed by the Senate. On June 5, 2013, the British newspaper The Guardian published the first of a series of articles based on unauthorized disclosures of classified documents by Edward Snowden, a contractor for the National Security Agency ("NSA"). The article described an NSA program to collect millions of telephone records, including records about purely domestic calls. Over the course of the next several days, there were additional articles regarding this program as well as another NSA program referred to in leaked documents as "PRISM." These disclosures caused a great deal of concern both over the extent to which they damaged national security and over the nature and scope of the surveillance programs they purported to reveal. In response to the congressional and presidential requests, the Board immediately initiated a study of the 215 and 702 programs and the operation of the FISA court. This Report contains the results of the Board's 215 program study as well as our analysis and recommendations regarding the FISC's operation.