Oral History Project 9/11: The Unanticipated Line to Edward Snowden and Rand Paul by Michael Fine. AP Comparative Politics Mrs. Flynn June 15, 2015

Size: px
Start display at page:

Download "Oral History Project 9/11: The Unanticipated Line to Edward Snowden and Rand Paul by Michael Fine. AP Comparative Politics Mrs. Flynn June 15, 2015"

Transcription

1 Oral History Project 9/11: The Unanticipated Line to Edward Snowden and Rand Paul by Michael Fine AP Comparative Politics Mrs. Flynn June 15, 2015 * * * The terrorist attacks in the United States on September 11, 2001 were the culmination of a lengthy, well-organized and well-financed plan by Al-Qaeda ( the Group ). For the citizens of the United States, the attacks constituted one of those rare national tragedies that every adult who was alive at the time can recall years later in great detail. 1 In hindsight, the attack might have been prevented if various warning signals had been recognized or pieced together by the U.S. intelligence services. For instance: 2 the FBI failed to follow through on warnings from its agents in Arizona that terrorists may be training in local flight schools; the CIA failed to notify other agencies that Al-Qaeda members had entered the U.S.; reporting from human intelligence was not shared showing that Khalid Sheikh Mohammed (one of the planners of the bombing of the World Trade Center in 1993) wanted to send terrorists to the U.S. and attack from within; information from phone intercepts among known terrorists (including the hijackers) was not shared, nor was the fact that some of these calls originated from the U.S. or that known terrorists were living in the U.S. and being supported here (including by renting rooms from an FBI 1 Note on oral history from the Author s parents: previous days of U.S. national tragedy (where every adult can remember in great detail where they were and the details of such events) include: Pearl Harbor day (December 7, 1941) and the assassination of President John F. Kennedy (November 22, 1963). On 9/11, the Author s father was working in midtown Manhattan and watched the Twin Towers crumble on TV at a Radio Shack near his office. His strongest memory is how deathly quiet the streets were at about noon, despite being filled with people covered in soot who had walked from lower Manhattan and were continuing on their way north, all in utter silence. 2 Greg Miller, More 9/11 Clues Were Overlooked, The Los Angeles Times, December 12,

2 informant). One of the main problems was that such information was designed not to be shared - sometimes (perhaps understandably) to protect sources and methods that were being used, in other cases (inexplicably) by persons seeking to protect or legitimize their budget or the purpose of their agency. In fact, the highly compartmentalized nature of the U.S. intelligence community dated from the Cold War era (1950s 1990s), where access to information was highly restricted, on purpose, to prevent accidental or other unauthorized disclosures. Also, in possibly the greatest failure, there was no single U.S. governmental person or agency that was tasked with assembling the different threads of information and weaving them together into an overall story. Thus, no single person recognized the larger picture of an emerging global terrorist threat posed by Al-Qaeda and other non-state entities. The attack on 9/11 consisted of the hijacking of four planes by a total of 19 terrorists. Two planes were crashed into the World Trade Center (Twin Towers) in New York City, causing the buildings to crumble and the death of over 3,000 people, including over 400 police and firemen. A third plane crashed into the Pentagon building in Washington D.C., killing about 125 people, and the fourth plane crashed into a field outside Shanksville, Pennsylvania after a revolt by passengers brought the plane down short of its mission apparently to crash into the White House or the Capitol Building. 3 As tragic as this was, Al-Qaeda had in fact originally planned a larger operation, involving attacks using10 planes, and even landing the final plane in Washington D.C., containing the murdered bodies of all male passengers /11 Attacks Facts and Summary, History.com. Accessed June 12, >> 4 David Stout, Original Plan for 9/11 Attacks Involved 10 Planes, Panel Says, The New York Times, June 16,

3 In the immediate aftermath of 9/11 the American people rallied around their leaders. 5 President George W. Bush s approval rating increased to 90% and members of Congress gathered on the outside steps of the Capitol Building to sing God Bless America. One of the first concrete steps in a newly announced Global War on Terrorism involved military action by the U.S. and certain allies against the Taliban in Afghanistan, as such group was seen as a strong supporter of Al-Qaeda. At home, a new cabinet-level Department of Homeland Security was formed, and just six weeks after 9/11 legislation called The USA Patriot Act was passed in the Senate by a vote of 98-1 and in the House of Representatives by The Patriot Act was designed to improve counter-terrorism efforts by giving the government broad new surveillance powers. At the time there was overwhelming public support for an intelligence effort that would weave together the threads and connect the dots of various terrorist warnings, as had not been done prior to 9/11, and for giving such group or persons the tools to accomplish this mission. It was true that powers contained in the Patriot Act included the right to collect information selectively or in bulk, including against U.S. citizens, without a warrant and without other normal oversight for instance, the government no longer had to demonstrate the object of a search was an agent of a foreign power or there existed a reasonable suspicion that any seized records were related to criminal activity. 7 At this time, the desire to prevent another attack on the homeland was the paramount concern. Other physical and behavioral changes in the U.S. were also beginning to occur. Airport security was no longer handled by individual airports; rather this now fell under control of the 5 Jason Villemez, 9/11 to Now: Ways We Have Changed, PBS.org, September 14, Patriot Act US Department of Justice, Justice.gov. Accessed June 10, >> of the USA Patriot Act.<< 7 Surveillance Under the USA Patriot Act, American Civil Liberties Union; aclu.org. Accessed June 12, >> -usa-patriot-act.<< 3

4 newly created Transportation Security Administration who introduced a variety of screening procedures still used today. Public access to governmental buildings became more restricted, metal screening machines were installed in office building lobbies around the country, heavy bulwark anti-crash barriers sprang up on sidewalks in front of banks, courthouses, stadiums and other public spaces, in each case designed to thwart another terror attack on U.S. soil. 8 Another fundamental change was occurring as well an increased collaboration among the different intelligence services. The guiding principle changed from need to know to responsibility to share. 9 One of the great successes from this new policy was a collaborative sharing of information used eventually to target and kill Osama Bin Laden, the leader of Al-Qaeda. However, the increased sharing of intelligence also increased the risk that leaks would occur - the most spectacular being the purposeful leaks made in 2013 by NSA contractor Edward Snowden. Although the exact facts are not known (some speculate, for instance, that Snowden was a Russia-recruited spy 10 ), Snowden says that he was particularly disturbed by the domestic surveillance programs instituted under the Patriot Act. Thus, even as a fairly low-level IT tech at a regional NSA cryptology center (in Hawaii), Snowden had access to a vast quantity of intelligence materials which he was able to steal and leak to the press before fleeing to Hong Kong and eventually Russia. 11 This is the very risk that Cold-War intelligence 8 Note on oral history from the Author s parents: prior to 9/11, it was common to arrive at the airport a few minutes before the flight and run straight to the departure gate (where a ticket agent designated was stationed to look for runners before closing the airplane doors), or to go straight to office building elevators when arriving for any business meeting, or to carry bags or other materials into any ball yard without delay. None of these things are possible after 9/11. 9 James R. Clapper. How 9/11 Transformed the Intelligence Community, The Wall Street Journal. September 7, Zoe Szathmary and Associated Press. Russian Spy Agency Sought To Recruit NSA Leaker Edward Snowden, DailyMail.com. June 4, Luke Harding. How Edward Snowden Went from Loyal NSA Contractor to Whistleblower, The Guardian.com, February 1,

5 compartmentalization was designed to stop. It is ironic that the 9/11 attacks led to the Patriot Act, which allowed employment and access for someone like Snowden, who was himself able to damage the efforts designed to prevent another 9/11. Snowden says he takes the threat of terrorism seriously but cannot justify programs that cost us liberties and freedoms that our Constitution says we should not give up. 12 It is true that we are all protected under the Constitution s 4th Amendment against unreasonable searches and seizures. It is also true that these Constitutional protections are inherently at odds with the government s expanded powers under the Patriot Act. Since we are now almost 14 years removed from 9/11, the cost of surveillance versus liberties is being weighed differently by many people. Senator Rand Paul of Kentucky led a recent debate against re-authorization of the Patriot Act, particularly those provisions allowing bulk collection of telephone records. As a result of this and other legislative maneuverings, the Congress this month just curtailed, for the first time since 9/11, some of the surveillance powers under the Patriot Act particularly those related to collection of phone records, the program first revealed by Edward Snowden. 13 The new legislation (approved on June 2 by a vote of in the Senate, and previously by in the House) is called the USA Freedom Act. There have been extraordinary changes in the U.S. since 9/11. The debate about government power versus individual liberty is one aspect of our culture that continues to be central in people s thinking and everyday life. Such debate can be traced in a line from 9/11 to 12 Ashley Alman. Edward Snowden Reflects on 9/11: I Take the Threat of Terrorism Seriously, The Huffington Post. May 28, Jennifer Steinhauer and Jonathan Weismann. U.S. Surveillance in Place Since 9/11 is Sharply Curtailed, The New York Times. June 2,

6 the actions of Edward Snowden to the debate of Rand Paul (and others) on Capitol Hill, an unexpected and fascinating result. LIST OF WORKS CITED: 9/11 Attacks Facts and Summary, History.com. Accessed June 12, >> Ashley Alman. Edward Snowden Reflects on 9/11: I Take the Threat of Terrorism Seriously, The Huffington Post. May 28, James R. Clapper. How 9/11 Transformed the Intelligence Community, The Wall Street Journal. September 7, Luke Harding. How Edward Snowden Went from Loyal NSA Contractor to Whistleblower, The Guardian.com, February 1, Greg Miller, More 9/11 Clues Were Overlooked, The Los Angeles Times, December 12, Patriot Act US Department of Justice, Justice.gov. Accessed June 10, >> of the USA Patriot Act.<< Jennifer Steinhauer and Jonathan Weismann. U.S. Surveillance in Place Since 9/11 is Sharply Curtailed, The New York Times. June 2, David Stout, Original Plan for 9/11 Attacks Involved 10 Planes, Panel Says, The New York Times, June 16, Surveillance Under the USA Patriot Act, American Civil Liberties Union; aclu.org. Accessed June 12, >> -usa-patriot-act.<< Zoe Szathmary and Associated Press. Russian Spy Agency Sought To Recruit NSA Leaker Edward Snowden, DailyMail.com. June 4, Jason Villemez, 9/11 to Now: Ways We Have Changed, PBS.org, September 14,

Name. September 11, 2001: A Turning Point

Name. September 11, 2001: A Turning Point Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

CITIZEN ADVOCACY CENTER

CITIZEN ADVOCACY CENTER CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs

DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2016 Instructor: Professor James K. Conant 631 Founders

More information

Key Concepts Chart (The United States after the Cold War)

Key Concepts Chart (The United States after the Cold War) Unit 10, Activity 1, Key Concepts Chart Key Concepts Chart (The United States after the Cold War) Key Concept +? - Explanation Extra Information NAFTA Presidents George H.W. Bush and Bill Clinton both

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

TEACHER SUPPORT PAGES

TEACHER SUPPORT PAGES September 11 Online support for these lessons is available at: www.onlinelearningexchange.com/content/products/home.html Copyright 2011 Pearson Education, Inc., or its affiliates. All Rights Reserved.

More information

IN THE WAR ON TERRORISM

IN THE WAR ON TERRORISM THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Bush Lets U.S. Spy on Callers Without Courts

Bush Lets U.S. Spy on Callers Without Courts Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

New York: Center of the World Teacher s Guide

New York: Center of the World Teacher s Guide Page 1 The Center of the World offers insights into American history topics including the post-world War II economic order, city planning in the era of urban renewal, and globalization and its consequences.

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing

More information

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR

More information

Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2015

Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2015 Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2015 Instructor: Professor Conant Phone: (703)-993-1416 Office: Robinson

More information

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties?

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties? USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties? Historical Thinking Skills Assessed: Sourcing, Critical Reading, Corroboration Author/School/System: Matt Hipszer, Howard County

More information

THE NOT A SEARCH GAME

THE NOT A SEARCH GAME THE NOT A SEARCH GAME JOHN F. STINNEFORD * The privacy versus security discussion is not just about the Fourth Amendment it involves policy considerations as well. The Fourth Amendment concerns frame the

More information

Privacy and Civil Liber0es Oversight Board

Privacy and Civil Liber0es Oversight Board Privacy and Civil Liber0es Oversight Board Report on the Surveillance Program Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act JULY 2, 2014 PRI V ACY AND CI VIL LI BE RTIES

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,

More information

FREEDOM OF INFORMATION REQUEST

FREEDOM OF INFORMATION REQUEST FREEDOM OF INFORMATION REQUEST Request Number: F 2011 01978 Keyword: Crime Subject: Cameras Request and Answer: Question There appears to be a load of new cameras appearing outside police stations and

More information

HOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES WORK. by Allan B. Cobb. Core Library

HOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES WORK. by Allan B. Cobb. Core Library HOW THE HOW THE US GOVERNMENT WORKS US SECURITY AGENCIES WORK by Allan B. Cobb Core Library HOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES by Allan B. Cobb WORK Content Consultant Dr. Lamont

More information

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA ) ) v. ) Criminal No. 01-455-A ) ZACARIAS MOUSSAOUI, ) Defendant ) Statement of Facts

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

Homeland Security and Terrorism COURSE SYLLABUS

Homeland Security and Terrorism COURSE SYLLABUS Homeland Security and COURSE SYLLABUS Course: CRJU 491T Section: 001 Semester: Spring 2015 UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE Instructor: Leslie G. Wiser, Jr. Office:

More information

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight

More information

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Prepared for an international conference on Countering Modern Terrorism History, Current Issues, and Future Threats 16-17 December 2004 Berlin Under

More information

Ten Years After 9/11: A Status Report On Information Sharing

Ten Years After 9/11: A Status Report On Information Sharing Statement of Zoe Baird Budinger 1 and Jeffrey H. Smith 2 Senate Committee on Homeland Security & Governmental Affairs October 12, 2011 Ten Years After 9/11: A Status Report On Information Sharing Thank

More information

2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT

2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT MAY 13, 2016. Committed to the Committee of the Whole House

More information

Terrorism Risk Insurance Program Reauthorization Act of 2007 (TRIPRA)

Terrorism Risk Insurance Program Reauthorization Act of 2007 (TRIPRA) Terrorism Risk Insurance Program Reauthorization Act of 2007 (TRIPRA) 13 th Annual ACI-NA Insurance & Risk Management Conference January 13, 2012 Stephen P. Dinsdale Senior Vice President, ACE USA Any

More information

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut)

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut) Date submitted: 14/08/2009 Librarians Shushed No More: The USA PATRIOT Act, The Connecticut Four, and Professional Ethics Barbara M. Jones, Ph.D. International Library Consultant, USA Former University

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

CSA Survey Results Government Access to Information July 2013

CSA Survey Results Government Access to Information July 2013 CSA Survey Results Government Access to Information July 2013 EXECUTIVE OVERVIEW During June and July of 2013, news of a whistleblower, US government contractor Edward Snowden, dominated global headlines.

More information

Academic Standards for Civics and Government

Academic Standards for Civics and Government Academic Standards for June 1, 2009 FINAL Elementary Standards Grades 3-8 Pennsylvania Department of Education These standards are offered as a voluntary resource for Pennsylvania s schools and await action

More information

ADVANCED PLACEMENT UNITED STATES GOVERNMENT AND POLITICS

ADVANCED PLACEMENT UNITED STATES GOVERNMENT AND POLITICS ADVANCED PLACEMENT UNITED STATES GOVERNMENT AND POLITICS TEXTBOOK: Government in America: People and Policy. (12 th Edition) Edwards, Wattenberg, and Lineberry SUPPLEMENTAL TEXT: American Government Readings

More information

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence Blinking Red Book Review March 2014 Reviewed by Roger Z. George The far-reaching intelligence

More information

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire Working paper GTJMCE-2015-1 This working paper along with others in the same series can be found online at:

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS )LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

Subject: Review of Aviation Security in Australia

Subject: Review of Aviation Security in Australia REF:SM/17/09/03 September 17, 2003 Mr John Carter Committee Secretary Joint Committee of Public Accounts & Audit Parliament House CANBERRA ACT 2600 Dear Mr Carter Subject: Review of Aviation Security in

More information

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,

More information

Statement for the Record of The Electronic Privacy Information Center (EPIC)

Statement for the Record of The Electronic Privacy Information Center (EPIC) Statement for the Record of The Electronic Privacy Information Center (EPIC) Marc Rotenberg, EPIC President Ginger McCall, Director, EPIC Open Government Project Hearing on "DHS Monitoring of Social Networking

More information

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION GROWTH CATALYSTS & LEGISLATION The current policy funding and policy landscape surrounding cybersecurity initiatives and funding is convoluted with

More information

A Critique of President Obama s Reforms of U.S. Intelligence

A Critique of President Obama s Reforms of U.S. Intelligence CENTER FOR SECURITY POLICY OCCASIONAL PAPER SERIES A Center for Security Policy Analysis Fred Fleitz and Clare Lopes 1/27/2014 Fred Fleitz served in U.S. national security positions for 25 years at the

More information

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the

More information

A Policy Forum on the Use of Big Data in Homeland Security

A Policy Forum on the Use of Big Data in Homeland Security National Security Program Homeland Security Project A Policy Forum on the Use of Big Data in Homeland Security Meeting Proceedings On October 30, 2013, the Bipartisan Policy Center and Intel Corporation

More information

How To Make A Terrorist Watchlist More Secure

How To Make A Terrorist Watchlist More Secure United States Department of Homeland Security Transportation Security Administration Statement of Kip Hawley Assistant Secretary (Transportation Security Administration) Committee on Commerce, Science

More information

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

17. WHO BECOMES PRESIDENT OF THE UNITED STATES IF THE PRESIDENT SHOULD DIE? 22. HOW MANY CHANGES OR AMENDMENTS ARE THERE TO THE CONSTITUTION?

17. WHO BECOMES PRESIDENT OF THE UNITED STATES IF THE PRESIDENT SHOULD DIE? 22. HOW MANY CHANGES OR AMENDMENTS ARE THERE TO THE CONSTITUTION? DEPARTMENT OF JUSTICE Immigration & Naturalization Service 100 Typical Questions 1. WHAT ARE THE COLORS OF OUR FLAG? 2. HOW MANY STARS ARE THERE IN OUR FLAG? 3. WHAT COLOR ARE THE STARS ON OUR FLAG? 4.

More information

of Flight 93 The People 9/11: Exhibit Visit

of Flight 93 The People 9/11: Exhibit Visit Overview With Flight 93, students have the unique opportunity to put themselves in the shoes of the victims of 9/11 by experiencing their individual stories. Often students depersonalize historical events,

More information

July 25, 1947 Three Romanian terrorists kill an aircrew member on board a Romanian Airlines flight, resulting in the world s first fatal hijacking.

July 25, 1947 Three Romanian terrorists kill an aircrew member on board a Romanian Airlines flight, resulting in the world s first fatal hijacking. Intro: The timeline of airline security measures going back several decades shows that security has adapted to threats as they arose. But while the terrorist threat has changed over time, checkpoint security

More information

Global Information Society Watch 2014

Global Information Society Watch 2014 Global Information Society Watch 2014 Communications surveillance in the digital age This report was originally published as part of a larger compilation, which can be downloaded from GISWatch.org Association

More information

The Design of an Undergraduate Program In Homeland Security

The Design of an Undergraduate Program In Homeland Security VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department

More information

The Ethics of Information Sharing Between the FBI and CIA

The Ethics of Information Sharing Between the FBI and CIA The Ethics of Information Sharing Between the FBI and CIA Nicholas Jones, Lauren Mallik, William McLaughlin, Dustin Toy Introduction Prior to the 9/11 attacks, the CIA was aware of the presence of two

More information

WE RE GOING TO DO SOMETHING

WE RE GOING TO DO SOMETHING GENERAL GREETING Welcome to the Flight 93 National Memorial Cell Phone Tour. Tour stops are indicated by signs throughout the park. Stops range from under a minute to approximately 5 minutes. If you have

More information

Decision in Europe: Controversial Revival of Practical Obscurity Implications of the Google Spain Case

Decision in Europe: Controversial Revival of Practical Obscurity Implications of the Google Spain Case Decision in Europe: Controversial Revival of Practical Obscurity Implications of the Google Spain Case May 20, 2014 By: Robert Gellman and Pam Dixon On May 13, 2014, the European Court of Justice decided

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

How To Get A Law Passed In The United States

How To Get A Law Passed In The United States HARVARD MODEL CONGRESS SAN FRANCISCO 2015 BRIEFING SUMMARIES A Memo for Members of the Presidential Cabinet RECENT UPDATES CIA - Cyber Hacking The CIA is concerned about cyberhacking because it has the

More information

Cell Phone Tour Scripts Version: Fall 2012

Cell Phone Tour Scripts Version: Fall 2012 National Park Service U.S. Department of the Interior Flight 93 National Memorial Cell Phone Tour Scripts Version: Fall 2012 EXPERIENCE YOUR AMERICA Page 2 GENERAL GREETING Welcome to the Flight 93 National

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

Homeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action

Homeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action Homeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action Legislative Research Division Michigan Legislative Service Bureau Research Report Vol. 23 No. 11 December, 2003

More information

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August

More information

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint

More information

The Need to Share: The U.S. Intelligence Community and Law Enforcement

The Need to Share: The U.S. Intelligence Community and Law Enforcement The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need

More information

Four Key Constitutional Principles

Four Key Constitutional Principles University of Virginia Center for Politics Four Key Constitutional Principles Purpose: Through this lesson, students will understand the four key principles of the Constitution: separation of powers, checks

More information

MEDIA & COMMUNICATIONS

MEDIA & COMMUNICATIONS The American Legion MEDIA & COMMUNICATIONS P.O. BOX 1055 INDIANAPOLIS, IN 46206-1055 (317) 630-1253 Fax (317) 630-1368 For God and Country Memorial Day 2016 The American Legion Media & Communications Division

More information

The Report of the 9/11 Commission of the U.S. Senate and New Forces Shaping the Planet

The Report of the 9/11 Commission of the U.S. Senate and New Forces Shaping the Planet Case Study The Report of the 9/11 Commission of the U.S. Senate and New Forces Shaping the Planet OVERVIEW Case Situation At 8:46 of that morning, an airliner traveling hundreds of miles an hour and carrying

More information

In this activity, students try to solve a mystery about the Pledge of Allegiance.

In this activity, students try to solve a mystery about the Pledge of Allegiance. Enrichment Activity 1 The Changing Pledge In this activity, students try to solve a mystery about the Pledge of Allegiance. They are provided with a version of the Pledge from October 1892 and are asked

More information

These are just two examples of the opportunities and privacy risks involved in U.S. fusion centers.

These are just two examples of the opportunities and privacy risks involved in U.S. fusion centers. This article was published in the May 2008 issue of The Privacy Advisor. The Privacy Advisor is a membership benefit of the International Association of Privacy Professionals (IAPP). If you are interested

More information

HOUSE BILL REPORT ESHB 1440

HOUSE BILL REPORT ESHB 1440 HOUSE BILL REPORT As Passed Legislature Title: An act relating to prohibiting the use of a cell site simulator device without a warrant. Brief Description: Prohibiting the use of a cell site simulator

More information

b. Other serious crimes, including organized crime, that are transnational in nature; and

b. Other serious crimes, including organized crime, that are transnational in nature; and Frequently Asked Questions Regarding Customs and Border Protection Receipt of Passenger Name Records Related to Flights between the European Union and the United States United States law requires airlines

More information

Cuban Missile Crisis Lesson Plan. Central Historical Question: Why did the Russians pull their missiles out of Cuba?

Cuban Missile Crisis Lesson Plan. Central Historical Question: Why did the Russians pull their missiles out of Cuba? Lesson Plan Central Historical Question: Why did the Russians pull their missiles out of Cuba? Materials: United Streaming Video Segment: The Hour of Maximum Danger (from Freedom: A History of the US:

More information

Oceanside Police Criminal Misconduct & Conspiracy, With Mayor Jim Wood, To Assault And Kidnap Citizens

Oceanside Police Criminal Misconduct & Conspiracy, With Mayor Jim Wood, To Assault And Kidnap Citizens Oceanside Police Criminal Misconduct & Conspiracy, With Mayor Jim Wood, To Assault And Kidnap Citizens To: Oceanside Police Department Criminal Complaint # 10003712 Suspects: Sgt. Marco Mendoza Officer

More information

Data-Based Detection of Potential Terrorist Attacks on Airplanes

Data-Based Detection of Potential Terrorist Attacks on Airplanes Data-Based Detection of Potential Terrorist Attacks on Airplanes Karen Kafadar Max D. Morris Department of Mathematics Department of Statistics & Department of Industrial Engineering University of Colorado-Denver

More information

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act. Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Keynote Presentation to. Simon Fraser University Vancouver, BC November 8, 2013. Elizabeth Denham Information and Privacy Commissioner for B.C.

Keynote Presentation to. Simon Fraser University Vancouver, BC November 8, 2013. Elizabeth Denham Information and Privacy Commissioner for B.C. CHECK AGAINST DELIVERY Keynote Presentation to MEDIA DEMOCRACY DAYS Simon Fraser University Vancouver, BC November 8, 2013 Elizabeth Denham Information and Privacy Commissioner for B.C. Thank you so much.

More information

DEBATE IN THE HOUSE OF REPRESENTATIVES ON THE USA PATRIOT ACT OF 2001

DEBATE IN THE HOUSE OF REPRESENTATIVES ON THE USA PATRIOT ACT OF 2001 DEBATE IN THE HOUSE OF REPRESENTATIVES ON THE USA PATRIOT ACT OF 2001 [Selections from debate] October 12, 2001 REP. JIM SENSENBRENNER (R-WI): Mr. Speaker, on September 11, 2001, a war was started on United

More information

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout

More information

HOMELAND SECURITY INTELLIGENCE RPAD 556

HOMELAND SECURITY INTELLIGENCE RPAD 556 HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course

More information

CONSTITUTIONFACTS.COM

CONSTITUTIONFACTS.COM 1. The length of term of members of the House of Representatives is: b. 6 years c. 4 years d. 5 years 2. The Constitutional Convention met in: a. New York b. Philadelphia c. Washington, D.C. d. Boston

More information

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE

More information

UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C.

UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. TOP 8ECRET//COMJNTt/NOFOR..~ UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN RE APPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE PRODUCTION IB TH

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 6. Homeland Security Congress should monitor closely the implementation of the new Department of Homeland Security

More information

SUNDAY, JUNE 16, 2013. MARINA Internet metadata

SUNDAY, JUNE 16, 2013. MARINA Internet metadata ABCDE SUNDAY, JUNE 16, 2013 NSA SURVEILLANCE The Architecture Four-pronged U.S. approach relies heavily on data behind Internet, phone communications By Barton Gellman On March 12, 2004, acting attorney

More information

The George Washington University Graduate School of Political Management Summer 2013

The George Washington University Graduate School of Political Management Summer 2013 The George Washington University Graduate School of Political Management Summer 2013 PSC250 Homeland Security Policy Mondays, Wednesdays 6-8pm Hall of States Kevin J. Fandl, JD, PhD Phone: 202-725-5305

More information

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy By: Dan Arnaudo Copyright 2013, ASA Institute for Risk & Innovation Keywords: Congress, CISPA, Critical Infrastructure,

More information

HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW

HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW UNITED STATES INSTITUTE OF PEACE Academy for International Conflict Management and Peacebuilding HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW May 15 17, 2012 Tuesday Thursday Washington, DC Developed

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information