Oral History Project 9/11: The Unanticipated Line to Edward Snowden and Rand Paul by Michael Fine. AP Comparative Politics Mrs. Flynn June 15, 2015
|
|
- Jemima Barker
- 7 years ago
- Views:
Transcription
1 Oral History Project 9/11: The Unanticipated Line to Edward Snowden and Rand Paul by Michael Fine AP Comparative Politics Mrs. Flynn June 15, 2015 * * * The terrorist attacks in the United States on September 11, 2001 were the culmination of a lengthy, well-organized and well-financed plan by Al-Qaeda ( the Group ). For the citizens of the United States, the attacks constituted one of those rare national tragedies that every adult who was alive at the time can recall years later in great detail. 1 In hindsight, the attack might have been prevented if various warning signals had been recognized or pieced together by the U.S. intelligence services. For instance: 2 the FBI failed to follow through on warnings from its agents in Arizona that terrorists may be training in local flight schools; the CIA failed to notify other agencies that Al-Qaeda members had entered the U.S.; reporting from human intelligence was not shared showing that Khalid Sheikh Mohammed (one of the planners of the bombing of the World Trade Center in 1993) wanted to send terrorists to the U.S. and attack from within; information from phone intercepts among known terrorists (including the hijackers) was not shared, nor was the fact that some of these calls originated from the U.S. or that known terrorists were living in the U.S. and being supported here (including by renting rooms from an FBI 1 Note on oral history from the Author s parents: previous days of U.S. national tragedy (where every adult can remember in great detail where they were and the details of such events) include: Pearl Harbor day (December 7, 1941) and the assassination of President John F. Kennedy (November 22, 1963). On 9/11, the Author s father was working in midtown Manhattan and watched the Twin Towers crumble on TV at a Radio Shack near his office. His strongest memory is how deathly quiet the streets were at about noon, despite being filled with people covered in soot who had walked from lower Manhattan and were continuing on their way north, all in utter silence. 2 Greg Miller, More 9/11 Clues Were Overlooked, The Los Angeles Times, December 12,
2 informant). One of the main problems was that such information was designed not to be shared - sometimes (perhaps understandably) to protect sources and methods that were being used, in other cases (inexplicably) by persons seeking to protect or legitimize their budget or the purpose of their agency. In fact, the highly compartmentalized nature of the U.S. intelligence community dated from the Cold War era (1950s 1990s), where access to information was highly restricted, on purpose, to prevent accidental or other unauthorized disclosures. Also, in possibly the greatest failure, there was no single U.S. governmental person or agency that was tasked with assembling the different threads of information and weaving them together into an overall story. Thus, no single person recognized the larger picture of an emerging global terrorist threat posed by Al-Qaeda and other non-state entities. The attack on 9/11 consisted of the hijacking of four planes by a total of 19 terrorists. Two planes were crashed into the World Trade Center (Twin Towers) in New York City, causing the buildings to crumble and the death of over 3,000 people, including over 400 police and firemen. A third plane crashed into the Pentagon building in Washington D.C., killing about 125 people, and the fourth plane crashed into a field outside Shanksville, Pennsylvania after a revolt by passengers brought the plane down short of its mission apparently to crash into the White House or the Capitol Building. 3 As tragic as this was, Al-Qaeda had in fact originally planned a larger operation, involving attacks using10 planes, and even landing the final plane in Washington D.C., containing the murdered bodies of all male passengers /11 Attacks Facts and Summary, History.com. Accessed June 12, >> 4 David Stout, Original Plan for 9/11 Attacks Involved 10 Planes, Panel Says, The New York Times, June 16,
3 In the immediate aftermath of 9/11 the American people rallied around their leaders. 5 President George W. Bush s approval rating increased to 90% and members of Congress gathered on the outside steps of the Capitol Building to sing God Bless America. One of the first concrete steps in a newly announced Global War on Terrorism involved military action by the U.S. and certain allies against the Taliban in Afghanistan, as such group was seen as a strong supporter of Al-Qaeda. At home, a new cabinet-level Department of Homeland Security was formed, and just six weeks after 9/11 legislation called The USA Patriot Act was passed in the Senate by a vote of 98-1 and in the House of Representatives by The Patriot Act was designed to improve counter-terrorism efforts by giving the government broad new surveillance powers. At the time there was overwhelming public support for an intelligence effort that would weave together the threads and connect the dots of various terrorist warnings, as had not been done prior to 9/11, and for giving such group or persons the tools to accomplish this mission. It was true that powers contained in the Patriot Act included the right to collect information selectively or in bulk, including against U.S. citizens, without a warrant and without other normal oversight for instance, the government no longer had to demonstrate the object of a search was an agent of a foreign power or there existed a reasonable suspicion that any seized records were related to criminal activity. 7 At this time, the desire to prevent another attack on the homeland was the paramount concern. Other physical and behavioral changes in the U.S. were also beginning to occur. Airport security was no longer handled by individual airports; rather this now fell under control of the 5 Jason Villemez, 9/11 to Now: Ways We Have Changed, PBS.org, September 14, Patriot Act US Department of Justice, Justice.gov. Accessed June 10, >> of the USA Patriot Act.<< 7 Surveillance Under the USA Patriot Act, American Civil Liberties Union; aclu.org. Accessed June 12, >> -usa-patriot-act.<< 3
4 newly created Transportation Security Administration who introduced a variety of screening procedures still used today. Public access to governmental buildings became more restricted, metal screening machines were installed in office building lobbies around the country, heavy bulwark anti-crash barriers sprang up on sidewalks in front of banks, courthouses, stadiums and other public spaces, in each case designed to thwart another terror attack on U.S. soil. 8 Another fundamental change was occurring as well an increased collaboration among the different intelligence services. The guiding principle changed from need to know to responsibility to share. 9 One of the great successes from this new policy was a collaborative sharing of information used eventually to target and kill Osama Bin Laden, the leader of Al-Qaeda. However, the increased sharing of intelligence also increased the risk that leaks would occur - the most spectacular being the purposeful leaks made in 2013 by NSA contractor Edward Snowden. Although the exact facts are not known (some speculate, for instance, that Snowden was a Russia-recruited spy 10 ), Snowden says that he was particularly disturbed by the domestic surveillance programs instituted under the Patriot Act. Thus, even as a fairly low-level IT tech at a regional NSA cryptology center (in Hawaii), Snowden had access to a vast quantity of intelligence materials which he was able to steal and leak to the press before fleeing to Hong Kong and eventually Russia. 11 This is the very risk that Cold-War intelligence 8 Note on oral history from the Author s parents: prior to 9/11, it was common to arrive at the airport a few minutes before the flight and run straight to the departure gate (where a ticket agent designated was stationed to look for runners before closing the airplane doors), or to go straight to office building elevators when arriving for any business meeting, or to carry bags or other materials into any ball yard without delay. None of these things are possible after 9/11. 9 James R. Clapper. How 9/11 Transformed the Intelligence Community, The Wall Street Journal. September 7, Zoe Szathmary and Associated Press. Russian Spy Agency Sought To Recruit NSA Leaker Edward Snowden, DailyMail.com. June 4, Luke Harding. How Edward Snowden Went from Loyal NSA Contractor to Whistleblower, The Guardian.com, February 1,
5 compartmentalization was designed to stop. It is ironic that the 9/11 attacks led to the Patriot Act, which allowed employment and access for someone like Snowden, who was himself able to damage the efforts designed to prevent another 9/11. Snowden says he takes the threat of terrorism seriously but cannot justify programs that cost us liberties and freedoms that our Constitution says we should not give up. 12 It is true that we are all protected under the Constitution s 4th Amendment against unreasonable searches and seizures. It is also true that these Constitutional protections are inherently at odds with the government s expanded powers under the Patriot Act. Since we are now almost 14 years removed from 9/11, the cost of surveillance versus liberties is being weighed differently by many people. Senator Rand Paul of Kentucky led a recent debate against re-authorization of the Patriot Act, particularly those provisions allowing bulk collection of telephone records. As a result of this and other legislative maneuverings, the Congress this month just curtailed, for the first time since 9/11, some of the surveillance powers under the Patriot Act particularly those related to collection of phone records, the program first revealed by Edward Snowden. 13 The new legislation (approved on June 2 by a vote of in the Senate, and previously by in the House) is called the USA Freedom Act. There have been extraordinary changes in the U.S. since 9/11. The debate about government power versus individual liberty is one aspect of our culture that continues to be central in people s thinking and everyday life. Such debate can be traced in a line from 9/11 to 12 Ashley Alman. Edward Snowden Reflects on 9/11: I Take the Threat of Terrorism Seriously, The Huffington Post. May 28, Jennifer Steinhauer and Jonathan Weismann. U.S. Surveillance in Place Since 9/11 is Sharply Curtailed, The New York Times. June 2,
6 the actions of Edward Snowden to the debate of Rand Paul (and others) on Capitol Hill, an unexpected and fascinating result. LIST OF WORKS CITED: 9/11 Attacks Facts and Summary, History.com. Accessed June 12, >> Ashley Alman. Edward Snowden Reflects on 9/11: I Take the Threat of Terrorism Seriously, The Huffington Post. May 28, James R. Clapper. How 9/11 Transformed the Intelligence Community, The Wall Street Journal. September 7, Luke Harding. How Edward Snowden Went from Loyal NSA Contractor to Whistleblower, The Guardian.com, February 1, Greg Miller, More 9/11 Clues Were Overlooked, The Los Angeles Times, December 12, Patriot Act US Department of Justice, Justice.gov. Accessed June 10, >> of the USA Patriot Act.<< Jennifer Steinhauer and Jonathan Weismann. U.S. Surveillance in Place Since 9/11 is Sharply Curtailed, The New York Times. June 2, David Stout, Original Plan for 9/11 Attacks Involved 10 Planes, Panel Says, The New York Times, June 16, Surveillance Under the USA Patriot Act, American Civil Liberties Union; aclu.org. Accessed June 12, >> -usa-patriot-act.<< Zoe Szathmary and Associated Press. Russian Spy Agency Sought To Recruit NSA Leaker Edward Snowden, DailyMail.com. June 4, Jason Villemez, 9/11 to Now: Ways We Have Changed, PBS.org, September 14,
Name. September 11, 2001: A Turning Point
Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point
More informationNational Security Agency
National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the
More informationCITIZEN ADVOCACY CENTER
CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical
More informationVocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights
A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationPOTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges
Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic
More informationDRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs
DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2016 Instructor: Professor James K. Conant 631 Founders
More informationKey Concepts Chart (The United States after the Cold War)
Unit 10, Activity 1, Key Concepts Chart Key Concepts Chart (The United States after the Cold War) Key Concept +? - Explanation Extra Information NAFTA Presidents George H.W. Bush and Bill Clinton both
More informationSection II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY
Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,
More informationTEACHER SUPPORT PAGES
September 11 Online support for these lessons is available at: www.onlinelearningexchange.com/content/products/home.html Copyright 2011 Pearson Education, Inc., or its affiliates. All Rights Reserved.
More informationIN THE WAR ON TERRORISM
THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...
More informationE3211. DOT Hazmat Security Awareness. Leader s Guide
E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the
More informationEspionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
More informationBush Lets U.S. Spy on Callers Without Courts
Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December
More informationSUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
More informationNew York: Center of the World Teacher s Guide
Page 1 The Center of the World offers insights into American history topics including the post-world War II economic order, city planning in the era of urban renewal, and globalization and its consequences.
More informationNSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
More informationTESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE
TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing
More informationTOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND
All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR
More informationManaging Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2015
Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2015 Instructor: Professor Conant Phone: (703)-993-1416 Office: Robinson
More informationUSA PATRIOT ACT: Protecting National Security or Violating Civil Liberties?
USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties? Historical Thinking Skills Assessed: Sourcing, Critical Reading, Corroboration Author/School/System: Matt Hipszer, Howard County
More informationTHE NOT A SEARCH GAME
THE NOT A SEARCH GAME JOHN F. STINNEFORD * The privacy versus security discussion is not just about the Fourth Amendment it involves policy considerations as well. The Fourth Amendment concerns frame the
More informationPrivacy and Civil Liber0es Oversight Board
Privacy and Civil Liber0es Oversight Board Report on the Surveillance Program Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act JULY 2, 2014 PRI V ACY AND CI VIL LI BE RTIES
More informationCRS Report for Congress
Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,
More informationFREEDOM OF INFORMATION REQUEST
FREEDOM OF INFORMATION REQUEST Request Number: F 2011 01978 Keyword: Crime Subject: Cameras Request and Answer: Question There appears to be a load of new cameras appearing outside police stations and
More informationHOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES WORK. by Allan B. Cobb. Core Library
HOW THE HOW THE US GOVERNMENT WORKS US SECURITY AGENCIES WORK by Allan B. Cobb Core Library HOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES by Allan B. Cobb WORK Content Consultant Dr. Lamont
More informationFUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE
FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist
More informationIN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA ) ) v. ) Criminal No. 01-455-A ) ZACARIAS MOUSSAOUI, ) Defendant ) Statement of Facts
More informationTheme: The Growing Role of Private Security Companies in Protecting the Homeland.
Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist
More informationHomeland Security and Terrorism COURSE SYLLABUS
Homeland Security and COURSE SYLLABUS Course: CRJU 491T Section: 001 Semester: Spring 2015 UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE Instructor: Leslie G. Wiser, Jr. Office:
More informationRECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING
U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight
More informationINFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE
INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Prepared for an international conference on Countering Modern Terrorism History, Current Issues, and Future Threats 16-17 December 2004 Berlin Under
More informationTen Years After 9/11: A Status Report On Information Sharing
Statement of Zoe Baird Budinger 1 and Jeffrey H. Smith 2 Senate Committee on Homeland Security & Governmental Affairs October 12, 2011 Ten Years After 9/11: A Status Report On Information Sharing Thank
More information2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT
114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT MAY 13, 2016. Committed to the Committee of the Whole House
More informationTerrorism Risk Insurance Program Reauthorization Act of 2007 (TRIPRA)
Terrorism Risk Insurance Program Reauthorization Act of 2007 (TRIPRA) 13 th Annual ACI-NA Insurance & Risk Management Conference January 13, 2012 Stephen P. Dinsdale Senior Vice President, ACE USA Any
More informationBarbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut)
Date submitted: 14/08/2009 Librarians Shushed No More: The USA PATRIOT Act, The Connecticut Four, and Professional Ethics Barbara M. Jones, Ph.D. International Library Consultant, USA Former University
More informationIntroducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report
Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,
More informationCSA Survey Results Government Access to Information July 2013
CSA Survey Results Government Access to Information July 2013 EXECUTIVE OVERVIEW During June and July of 2013, news of a whistleblower, US government contractor Edward Snowden, dominated global headlines.
More informationAcademic Standards for Civics and Government
Academic Standards for June 1, 2009 FINAL Elementary Standards Grades 3-8 Pennsylvania Department of Education These standards are offered as a voluntary resource for Pennsylvania s schools and await action
More informationADVANCED PLACEMENT UNITED STATES GOVERNMENT AND POLITICS
ADVANCED PLACEMENT UNITED STATES GOVERNMENT AND POLITICS TEXTBOOK: Government in America: People and Policy. (12 th Edition) Edwards, Wattenberg, and Lineberry SUPPLEMENTAL TEXT: American Government Readings
More informationBGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence
BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence Blinking Red Book Review March 2014 Reviewed by Roger Z. George The far-reaching intelligence
More informationThe USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire
The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire Working paper GTJMCE-2015-1 This working paper along with others in the same series can be found online at:
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationSPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS
)LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%
More informationDOT HAZMAT SECURITY AWARENESS TRAINING
ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader
More informationSubject: Review of Aviation Security in Australia
REF:SM/17/09/03 September 17, 2003 Mr John Carter Committee Secretary Joint Committee of Public Accounts & Audit Parliament House CANBERRA ACT 2600 Dear Mr Carter Subject: Review of Aviation Security in
More informationCase 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,
More informationStatement for the Record of The Electronic Privacy Information Center (EPIC)
Statement for the Record of The Electronic Privacy Information Center (EPIC) Marc Rotenberg, EPIC President Ginger McCall, Director, EPIC Open Government Project Hearing on "DHS Monitoring of Social Networking
More informationDEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION
DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION GROWTH CATALYSTS & LEGISLATION The current policy funding and policy landscape surrounding cybersecurity initiatives and funding is convoluted with
More informationA Critique of President Obama s Reforms of U.S. Intelligence
CENTER FOR SECURITY POLICY OCCASIONAL PAPER SERIES A Center for Security Policy Analysis Fred Fleitz and Clare Lopes 1/27/2014 Fred Fleitz served in U.S. national security positions for 25 years at the
More informationTIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS
TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the
More informationA Policy Forum on the Use of Big Data in Homeland Security
National Security Program Homeland Security Project A Policy Forum on the Use of Big Data in Homeland Security Meeting Proceedings On October 30, 2013, the Bipartisan Policy Center and Intel Corporation
More informationHow To Make A Terrorist Watchlist More Secure
United States Department of Homeland Security Transportation Security Administration Statement of Kip Hawley Assistant Secretary (Transportation Security Administration) Committee on Commerce, Science
More informationUS Intelligence Community. 2005-6 Thomas Patrick Carroll 1
US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel
More information17. WHO BECOMES PRESIDENT OF THE UNITED STATES IF THE PRESIDENT SHOULD DIE? 22. HOW MANY CHANGES OR AMENDMENTS ARE THERE TO THE CONSTITUTION?
DEPARTMENT OF JUSTICE Immigration & Naturalization Service 100 Typical Questions 1. WHAT ARE THE COLORS OF OUR FLAG? 2. HOW MANY STARS ARE THERE IN OUR FLAG? 3. WHAT COLOR ARE THE STARS ON OUR FLAG? 4.
More informationof Flight 93 The People 9/11: Exhibit Visit
Overview With Flight 93, students have the unique opportunity to put themselves in the shoes of the victims of 9/11 by experiencing their individual stories. Often students depersonalize historical events,
More informationJuly 25, 1947 Three Romanian terrorists kill an aircrew member on board a Romanian Airlines flight, resulting in the world s first fatal hijacking.
Intro: The timeline of airline security measures going back several decades shows that security has adapted to threats as they arose. But while the terrorist threat has changed over time, checkpoint security
More informationGlobal Information Society Watch 2014
Global Information Society Watch 2014 Communications surveillance in the digital age This report was originally published as part of a larger compilation, which can be downloaded from GISWatch.org Association
More informationThe Design of an Undergraduate Program In Homeland Security
VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department
More informationThe Ethics of Information Sharing Between the FBI and CIA
The Ethics of Information Sharing Between the FBI and CIA Nicholas Jones, Lauren Mallik, William McLaughlin, Dustin Toy Introduction Prior to the 9/11 attacks, the CIA was aware of the presence of two
More informationWE RE GOING TO DO SOMETHING
GENERAL GREETING Welcome to the Flight 93 National Memorial Cell Phone Tour. Tour stops are indicated by signs throughout the park. Stops range from under a minute to approximately 5 minutes. If you have
More informationDecision in Europe: Controversial Revival of Practical Obscurity Implications of the Google Spain Case
Decision in Europe: Controversial Revival of Practical Obscurity Implications of the Google Spain Case May 20, 2014 By: Robert Gellman and Pam Dixon On May 13, 2014, the European Court of Justice decided
More informationworking group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
More informationHow To Get A Law Passed In The United States
HARVARD MODEL CONGRESS SAN FRANCISCO 2015 BRIEFING SUMMARIES A Memo for Members of the Presidential Cabinet RECENT UPDATES CIA - Cyber Hacking The CIA is concerned about cyberhacking because it has the
More informationCell Phone Tour Scripts Version: Fall 2012
National Park Service U.S. Department of the Interior Flight 93 National Memorial Cell Phone Tour Scripts Version: Fall 2012 EXPERIENCE YOUR AMERICA Page 2 GENERAL GREETING Welcome to the Flight 93 National
More informationFederal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
More informationHomeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action
Homeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action Legislative Research Division Michigan Legislative Service Bureau Research Report Vol. 23 No. 11 December, 2003
More informationTESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
More information28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).
TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint
More informationThe Need to Share: The U.S. Intelligence Community and Law Enforcement
The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need
More informationFour Key Constitutional Principles
University of Virginia Center for Politics Four Key Constitutional Principles Purpose: Through this lesson, students will understand the four key principles of the Constitution: separation of powers, checks
More informationMEDIA & COMMUNICATIONS
The American Legion MEDIA & COMMUNICATIONS P.O. BOX 1055 INDIANAPOLIS, IN 46206-1055 (317) 630-1253 Fax (317) 630-1368 For God and Country Memorial Day 2016 The American Legion Media & Communications Division
More informationThe Report of the 9/11 Commission of the U.S. Senate and New Forces Shaping the Planet
Case Study The Report of the 9/11 Commission of the U.S. Senate and New Forces Shaping the Planet OVERVIEW Case Situation At 8:46 of that morning, an airliner traveling hundreds of miles an hour and carrying
More informationIn this activity, students try to solve a mystery about the Pledge of Allegiance.
Enrichment Activity 1 The Changing Pledge In this activity, students try to solve a mystery about the Pledge of Allegiance. They are provided with a version of the Pledge from October 1892 and are asked
More informationThese are just two examples of the opportunities and privacy risks involved in U.S. fusion centers.
This article was published in the May 2008 issue of The Privacy Advisor. The Privacy Advisor is a membership benefit of the International Association of Privacy Professionals (IAPP). If you are interested
More informationHOUSE BILL REPORT ESHB 1440
HOUSE BILL REPORT As Passed Legislature Title: An act relating to prohibiting the use of a cell site simulator device without a warrant. Brief Description: Prohibiting the use of a cell site simulator
More informationb. Other serious crimes, including organized crime, that are transnational in nature; and
Frequently Asked Questions Regarding Customs and Border Protection Receipt of Passenger Name Records Related to Flights between the European Union and the United States United States law requires airlines
More informationCuban Missile Crisis Lesson Plan. Central Historical Question: Why did the Russians pull their missiles out of Cuba?
Lesson Plan Central Historical Question: Why did the Russians pull their missiles out of Cuba? Materials: United Streaming Video Segment: The Hour of Maximum Danger (from Freedom: A History of the US:
More informationOceanside Police Criminal Misconduct & Conspiracy, With Mayor Jim Wood, To Assault And Kidnap Citizens
Oceanside Police Criminal Misconduct & Conspiracy, With Mayor Jim Wood, To Assault And Kidnap Citizens To: Oceanside Police Department Criminal Complaint # 10003712 Suspects: Sgt. Marco Mendoza Officer
More informationData-Based Detection of Potential Terrorist Attacks on Airplanes
Data-Based Detection of Potential Terrorist Attacks on Airplanes Karen Kafadar Max D. Morris Department of Mathematics Department of Statistics & Department of Industrial Engineering University of Colorado-Denver
More informationElectronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.
Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for
More informationGAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony
GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationKeynote Presentation to. Simon Fraser University Vancouver, BC November 8, 2013. Elizabeth Denham Information and Privacy Commissioner for B.C.
CHECK AGAINST DELIVERY Keynote Presentation to MEDIA DEMOCRACY DAYS Simon Fraser University Vancouver, BC November 8, 2013 Elizabeth Denham Information and Privacy Commissioner for B.C. Thank you so much.
More informationDEBATE IN THE HOUSE OF REPRESENTATIVES ON THE USA PATRIOT ACT OF 2001
DEBATE IN THE HOUSE OF REPRESENTATIVES ON THE USA PATRIOT ACT OF 2001 [Selections from debate] October 12, 2001 REP. JIM SENSENBRENNER (R-WI): Mr. Speaker, on September 11, 2001, a war was started on United
More informationPrinciples of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout
More informationHOMELAND SECURITY INTELLIGENCE RPAD 556
HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course
More informationCONSTITUTIONFACTS.COM
1. The length of term of members of the House of Representatives is: b. 6 years c. 4 years d. 5 years 2. The Constitutional Convention met in: a. New York b. Philadelphia c. Washington, D.C. d. Boston
More informationUNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE
JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT
More informationFACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy
FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with
More informationJOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE
JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE
More informationUNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C.
TOP 8ECRET//COMJNTt/NOFOR..~ UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN RE APPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE PRODUCTION IB TH
More informationCATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.
CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 6. Homeland Security Congress should monitor closely the implementation of the new Department of Homeland Security
More informationSUNDAY, JUNE 16, 2013. MARINA Internet metadata
ABCDE SUNDAY, JUNE 16, 2013 NSA SURVEILLANCE The Architecture Four-pronged U.S. approach relies heavily on data behind Internet, phone communications By Barton Gellman On March 12, 2004, acting attorney
More informationThe George Washington University Graduate School of Political Management Summer 2013
The George Washington University Graduate School of Political Management Summer 2013 PSC250 Homeland Security Policy Mondays, Wednesdays 6-8pm Hall of States Kevin J. Fandl, JD, PhD Phone: 202-725-5305
More informationResearch Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy
Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy By: Dan Arnaudo Copyright 2013, ASA Institute for Risk & Innovation Keywords: Congress, CISPA, Critical Infrastructure,
More informationHUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW
UNITED STATES INSTITUTE OF PEACE Academy for International Conflict Management and Peacebuilding HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW May 15 17, 2012 Tuesday Thursday Washington, DC Developed
More informationThank you for the opportunity to join you here today.
Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.
More information