6,865 research outputs found
A Course Correction for Homeland Security: Curbing Counterterrorism Abuses
In the wake of 9/11, Congress estabÂlished a new cabinet agency with a singuÂlar mission: to keep the counÂtry safe from terrorÂism. The DepartÂment of HomeÂland SecurÂity (DHS) brought together 22 agenÂcies with disparÂate funcÂtions under one roof. Two decades on, it struggles to carry out its work effectÂively and equitÂably.With the HomeÂland SecurÂity Act of 2002, Congress tasked the new departÂment with keepÂing the counÂtry safe from terrorÂist attacks. DHS carved out a role for itself in two main areas: partÂnerÂships with state, local, tribal, and territÂorial authorÂitÂies and screenÂing of travÂelÂers and immigÂrants.Section I of this report idenÂtiÂfies the agency's counÂterterÂrorÂism collabÂorÂaÂtions with state and local authorÂitÂies and private firms. These programs have routinely surveilled AmerÂican Muslims, trauÂmatÂizÂing entire communitÂies and castÂing them as hotbeds of terrorÂism. DHS agents have deployed these very tools against protestÂors, activÂists, and journÂalÂists.Section II turns to travel and immigÂraÂtion screenÂing programs. DHS has accuÂmuÂlated vast stores of informÂaÂtion about people who travel into, out of, and over the United States. The TransÂportÂaÂtion Safety AdminÂisÂtraÂtion (TSA) and Customs and Border ProtecÂtion (CBP), among other DHS componÂents, use this data to draw inferÂences about them, docuÂment their moveÂments, and subject them to warrantÂless searches and interÂrogÂaÂtions. Agents do all of this without suspiÂcion of potenÂtial wrongÂdoÂing. UnsurÂprisÂingly, reports of reliÂgious or ethnic profilÂing are common.Section III analyzes DHS's overÂsight infraÂstrucÂture. Three primary offices — the Privacy Office, the Office for Civil Rights and Civil LiberÂties (CRCL), and the Office of Inspector General (OIG) — have curbed some of the departÂment's transÂgresÂsions. But they have allowed many other civil rights and civil liberÂties violÂaÂtions to continue.Finally, this report idenÂtiÂfies five avenÂues for reform: stronger safeÂguards against profilÂing; better protecÂtions for privacy and free expresÂsion; rigorÂous evalÂuÂations of program efficÂacy; meanÂingÂful transÂparÂency about data holdÂings and the implicÂaÂtions DHS programs have for civil rights and civil liberÂties; and more robust internal overÂsight. ForthÂcomÂing BrenÂnan Center reports will delve into these recomÂmendÂaÂtions in greater detail
Beyond the War on Terrorism: Towards the New Intelligence Network
In Terrorism, Freedom, and Security, Philip B. Heymann undertakes a wide-ranging study of how the United States can - and in his view should - respond to the threat of international terrorism. A former Deputy Attorney General of the United States Department of Justice ( DOJ ) and current James Barr Ames Professor of Law at Harvard Law School, Heymann draws on his governmental experience and jurisprudential background in developing a series of nuanced approaches to preventing terrorism. Heymann makes clear his own policy and legal preferences. First, as his choice of subtitle suggests, he firmly rejects the widely used metaphor of the United States engaging in a war on terrorism. Heymann views this mental model and the policies it spawns or is said to justify as, at best, incomplete, and, at worst, ineffective in preventing terrorist attacks and harmful to democracy in the United States (pp. 19-36). Second, Heymann advocates the paramount importance of intelligence to identify and disrupt terrorists\u27 plans and to prevent terrorists from attacking their targets (p. 61). Heymann observes that the United States needs both tactical intelligence to stop specific terrorist plans and strategic intelligence to understand the goals, organization, resources, and skills of terrorist organizations (p. 62)
The Controversies over Data Mining and Warrantless Searches in the Wake of September 11
In 2004, the Congress voted to end funding for a Defense Advanced Research Projects
Agency (DARPA) data mining program called Total Information Awareness (TIA) that was
supposed to be used for preventing terrorist attacks. Because this was not the only data mining project established by the U.S. government after September 11, this paper examines the likely impact of the TIA cancellation on future efforts. It summarizes the controversy over warrantless
wiretaps in the more recent past and then turns to the broader question of the tradeoffs between privacy and security.Indiana Universit
Beyond the War on Terrorism: Towards the New Intelligence Network
In Terrorism, Freedom, and Security, Philip B. Heymann undertakes a wide-ranging study of how the United States can - and in his view should - respond to the threat of international terrorism. A former Deputy Attorney General of the United States Department of Justice ( DOJ ) and current James Barr Ames Professor of Law at Harvard Law School, Heymann draws on his governmental experience and jurisprudential background in developing a series of nuanced approaches to preventing terrorism. Heymann makes clear his own policy and legal preferences. First, as his choice of subtitle suggests, he firmly rejects the widely used metaphor of the United States engaging in a war on terrorism. Heymann views this mental model and the policies it spawns or is said to justify as, at best, incomplete, and, at worst, ineffective in preventing terrorist attacks and harmful to democracy in the United States (pp. 19-36). Second, Heymann advocates the paramount importance of intelligence to identify and disrupt terrorists\u27 plans and to prevent terrorists from attacking their targets (p. 61). Heymann observes that the United States needs both tactical intelligence to stop specific terrorist plans and strategic intelligence to understand the goals, organization, resources, and skills of terrorist organizations (p. 62)
Quis Custodiet Ipsos Custodes? Limits on Widespread Surveillance and Intelligence Gathering By Local Law Enforcement After 9/11
In the decade since the terrorist attacks of September 11, 2001, local law enforcement has become the front line in the nation’s counterterrorism strategy. This involvement has not come without controversy. As part of these counterterrorism efforts, police departments have begun to establish widespread surveillance and intelligence-gathering networks to monitor Muslim and other ethnic neighborhoods in the hopes of stopping the next terrorist attack at its source. Such surveillance does not necessarily run afoul of the Constitution, and both our political environment—in which voters demand that the government stop terrorism at all costs—as well as unprecedented levels of federal funding to fight terrorism have made these surveillance programs an attractive option for local law enforcement. But the same programs risk compromising citizens’ civil liberties and damaging police relationships with ethnic communities. This Comment analyzes whether and how a balance might be struck between national security and individual civil liberties interests, and offers a model statutory solution drawn from police surveillance in a non-terrorism- related context as one possible way forward
Ethical, Legal, and Social Issues In Homeland Security – What They Are and How to Address Them
Homeland security is a nationwide effort, including all of government across federal, state, local, territorial and tribal tiers; the public and the private sector, and the whole community, with each single citizen. The overarching homeland security vision comprises safeguarding the American way of life and is embedded into the goals of the National Security Strategy that include respect for universal values at home and abroad. It thus is evident that ethical, legal, and social-or ELSI-issues are important to consider. This chapter discusses the origins and essence of ELSI and explores ELSI integration into everyday homeland security. Two defining debates are reviewed: homeland security legislation (specifically the USA Patriot Act of 2001 and the USA Freedom Act of 2015) and domestic surveillance, with related use of technology such as drones. Subsequently, the relevance of ELSI is summarized across prevention, protection, mitigation, response, and recovery missions. After adding some examples of how ELSI are addressed in other countries\u27 civil security policy, best practices to effectively address ELSI, as well as limitations of ELSI integration in homeland security, are discussed
- …