-
1
-
-
33747086324
-
-
A selection of the proposals to create federal strategies, agencies, and departments to counter the terrorist threat include the following: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, H.R. 3162 (USA PATRIOT Act), 24 October
-
A selection of the proposals to create federal strategies, agencies, and departments to counter the terrorist threat include the following: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, H.R. 3162 (USA PATRIOT Act), 24 October 2000
-
(2000)
-
-
-
2
-
-
33747131611
-
-
Homeland Security Act of 2002, H.R. 5005, 22 November
-
Homeland Security Act of 2002, H.R. 5005, 22 November 2002
-
(2002)
-
-
-
3
-
-
33747087636
-
-
Aviation and Transportation Security Act of 2001, S. 1447, 16 November
-
Aviation and Transportation Security Act of 2001, S. 1447, 16 November 2001
-
(2001)
-
-
-
4
-
-
33747117145
-
-
Military Order of 13 November Detention, Treatment, and Trial of Certain Non-Citizens in the War against Terrorism
-
Military Order of 13 November 2000 Detention, Treatment, and Trial of Certain Non-Citizens in the War against Terrorism
-
(2000)
-
-
-
5
-
-
33747086024
-
-
Bill to Establish a Homeland Intelligence Agency (short title: Foreign Intelligence Collection Improvement Act of 2003) 13 February
-
Bill to Establish a Homeland Intelligence Agency (short title: Foreign Intelligence Collection Improvement Act of 2003), S.410, 13 February 2003
-
(2003)
-
-
-
6
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board, draft released 18 September available at and the Pentagon's Total Information Awareness Program
-
President's Critical Infrastructure Protection Board, "National Strategy to Secure Cyberspace," draft released 18 September 2002, available at http://csrc.nist.gov/policies/cyberstrategy-draft.pdf; and the Pentagon's Total Information Awareness Program.
-
(2002)
-
-
-
9
-
-
33747125266
-
"A Travesty of Justice"
-
Major media outlets, such as the Washington Post and the New York Times, have written countless news stories and editorials about the expansion of executive power under the Bush administration, including editorial, 16 November
-
Major media outlets, such as the Washington Post and the New York Times, have written countless news stories and editorials about the expansion of executive power under the Bush administration, including "A Travesty of Justice," editorial, New York Times, 16 November 2001, A24
-
(2001)
New York Times
-
-
-
10
-
-
85023438065
-
"Justice Deformed: War and the Constitution"
-
editorial, 2 December Sec
-
"Justice Deformed: War and the Constitution," editorial, New York Times, 2 December 2001, Sec. 4, 14
-
(2001)
New York Times
, vol.4
, pp. 14
-
-
-
11
-
-
33744495192
-
"You Are a Suspect"
-
14 November
-
William Safire, "You Are a Suspect," New York Times, 14 November 2002, A35
-
(2002)
New York Times
-
-
Safire, W.1
-
12
-
-
33747112218
-
"Too Much Power"
-
editorial, 4 January
-
"Too Much Power," editorial, Washington Post, 4 January 2004, B06
-
(2004)
Washington Post
-
-
-
13
-
-
33747118172
-
"No Choice, but Guilty"
-
29 July
-
and Michael Powell, "No Choice, but Guilty," Washington Post, 29 July 2003, A01.
-
(2003)
Washington Post
-
-
Powell, M.1
-
14
-
-
33747130193
-
-
The American Civil Liberties Union (ACLU) has issued dozens of action items, position papers, and press releases about a perceived government assault on civil liberties, including "ACLU Calls on President Bush to Disavow New Cyber-Spying Scheme That Seeks to Put Every American under Scrutiny," 14 November available at
-
The American Civil Liberties Union (ACLU) has issued dozens of action items, position papers, and press releases about a perceived government assault on civil liberties, including "ACLU Calls on President Bush to Disavow New Cyber-Spying Scheme That Seeks to Put Every American under Scrutiny," 14 November 2002, available at http://www.aclu.org.
-
(2002)
-
-
-
15
-
-
33747147268
-
"Police State USA"
-
Conservative politicians have even sounded warning bells. Representative Ron Paul (R-Tex.), for example, issued a number of speeches, statements, and press releases, including Texas Straight Talk: A Weekly Column, 10 August available at
-
Conservative politicians have even sounded warning bells. Representative Ron Paul (R-Tex.), for example, issued a number of speeches, statements, and press releases, including "Police State USA," Texas Straight Talk: A Weekly Column, 10 August 2004, available at http://www.house.gov/paul
-
(2004)
-
-
-
16
-
-
33747115557
-
"Is America a Police State?"
-
statement on the floor of the House of Representatives, 27 June
-
and "Is America a Police State?" statement on the floor of the House of Representatives, 27 June 2002.
-
(2002)
-
-
-
18
-
-
0004137269
-
-
(Oxford: Blackwell,)
-
and Charles Tilly, Coercion, Capital, and European States, AD 990-1990 (Oxford: Blackwell, 1992).
-
(1992)
Coercion, Capital, and European States, AD 990-1990
-
-
Tilly, C.1
-
20
-
-
33747148281
-
-
note
-
This article focuses on the state's mobilization strategies and its regulatory and investigative powers. The state's extractive powers have not expanded in the wake of September 11 either; the Bush administration has not raised taxes or reinstated conscription, although it has (controversially) extended tours of duty for both the armed services and the National Guard. Furthermore, although the new Department of Homeland Security has millions of dollars' worth of private contracts, it has not sought to mobilize American industry in any centrally directive way.
-
-
-
-
21
-
-
0004137269
-
-
According to Charles Tilly, war makes the state and the state makes war
-
According to Charles Tilly, war makes the state and the state makes war. Tilly, Coercion, Capital, and European States, 67-95.
-
Coercion, Capital, and European States
, pp. 67-95
-
-
Tilly, C.1
-
22
-
-
33747150299
-
-
Karl Marx once wrote that "men make their own history, but they do not make it just as they please; they do not make it under self-selected circumstances, but under circumstances directly encountered, given, and transmitted from the past." (New York: International Publishers,)
-
Karl Marx once wrote that "men make their own history, but they do not make it just as they please; they do not make it under self-selected circumstances, but under circumstances directly encountered, given, and transmitted from the past." Karl Marx, 18th Brumaire of Louis Bonaparte (New York: International Publishers, 1963), 1.
-
(1963)
18th Brumaire of Louis Bonaparte
, pp. 1
-
-
Marx, K.1
-
23
-
-
84972364235
-
"The Second Image Reversed: The International Sources of Domestic Politics"
-
See (Autumn)
-
See Peter Gourevitch, "The Second Image Reversed: The International Sources of Domestic Politics," International Organization 32, no. 4 (Autumn 1978): 881-911.
-
(1978)
International Organization
, vol.32
, Issue.4
, pp. 881-911
-
-
Gourevitch, P.1
-
25
-
-
0003792360
-
-
For a competing explanation of the rise of the international state system, see (Princeton: Princeton University Press,)
-
For a competing explanation of the rise of the international state system, see Henrik Spruyt, The Sovereign State and Its Competitors (Princeton: Princeton University Press, 1996).
-
(1996)
The Sovereign State and Its Competitors
-
-
Spruyt, H.1
-
27
-
-
0030536446
-
"War and Strong States, Peace and Weak States?"
-
(Spring)
-
Michael C. Desch, "War and Strong States, Peace and Weak States?" International Organization 50, no. 2 (Spring 1996): 237.
-
(1996)
International Organization
, vol.50
, Issue.2
, pp. 237
-
-
Desch, M.C.1
-
30
-
-
84972364235
-
"Second Image Reversed: The International Sources of Domestic Politics"
-
(Autumn)
-
Gourevitch, "Second Image Reversed"
-
(1978)
International Organization
, vol.32
, Issue.4
, pp. 881-911
-
-
Gourevitch, P.1
-
31
-
-
0003228247
-
"Military Organization and the Organization of the State"
-
ed. Felix Gilbert (New York: Oxford University Press,)
-
and Otto Hintze, "Military Organization and the Organization of the State," in The Historical Essays of Otto Hintze, ed. Felix Gilbert (New York: Oxford University Press, 1975), 178-215.
-
(1975)
The Historical Essays of Otto Hintze
, pp. 178-215
-
-
Hintze, O.1
-
32
-
-
53949102313
-
"Approaches to the State: Alternative Conceptions and Historical Dynamics"
-
(January)
-
Steven D. Krasner, "Approaches to the State: Alternative Conceptions and Historical Dynamics," Comparative Politics 16, no. 2 (January 1984): 223-46.
-
(1984)
Comparative Politics
, vol.16
, Issue.2
, pp. 223-246
-
-
Krasner, S.D.1
-
33
-
-
0004143192
-
-
(Princeton: Princeton University Press,)
-
Jeffrey Herbst, States and Power in Africa (Princeton: Princeton University Press, 2000).
-
(2000)
States and Power in Africa
-
-
Herbst, J.1
-
34
-
-
27844547004
-
"The Transatlantic Bridge: Mirrors, Charles Tilly, and State Formation in the River Plate"
-
ed. Miguel Angel Centeno and Fernando López-Alves (Princeton: Princeton University Press,)
-
Fernando López-Alves, "The Transatlantic Bridge: Mirrors, Charles Tilly, and State Formation in the River Plate," in The Other Mirror: Grand Theory through the Lens of Latin America, ed. Miguel Angel Centeno and Fernando López-Alves (Princeton: Princeton University Press, 2000).
-
(2000)
The Other Mirror: Grand Theory Through the Lens of Latin America
-
-
López-Alves, F.1
-
35
-
-
0004075002
-
-
(Washington: Institute for International Economics,)
-
Dani Rodrik, Has Globalization Gone Too Far? (Washington: Institute for International Economics, 1997).
-
(1997)
Has Globalization Gone Too Far?
-
-
Rodrik, D.1
-
40
-
-
33747104037
-
-
This view was advanced in the various writings cited in note 2
-
This view was advanced in the various writings cited in note 2.
-
-
-
-
41
-
-
33747093880
-
-
John Yoo has argued that unilateral executive-branch measures for dealing with security threats are consistent with the Constitution and have rich historical precedent. See (Chicago: University of Chicago Press,)
-
John Yoo has argued that unilateral executive-branch measures for dealing with security threats are consistent with the Constitution and have rich historical precedent. See John Yoo, The Powers of War and Peace: The Constitution and Foreign Affairs after 9/11 (Chicago: University of Chicago Press, 2005).
-
(2005)
The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11
-
-
Yoo, J.1
-
42
-
-
33747141255
-
-
"ACLU Calls on President Bush to Disavow New Cyber-Spying Scheme."
-
"ACLU Calls on President Bush to Disavow New Cyber-Spying Scheme."
-
-
-
-
45
-
-
0007029184
-
"Approaches to the State: Alternative Conceptions and Historical Dynamics"
-
Other definitions include the state as ruling class, the state as government, and the state as normative order. See (January)
-
Other definitions include the state as ruling class, the state as government, and the state as normative order. See Stephen Krasner, "Approaches to the State: Alternative Conceptions and Historical Dynamics," Comparative Politics 16, no. 2 (January 1984): 238.
-
(1984)
Comparative Politics
, vol.16
, Issue.2
, pp. 238
-
-
Krasner, S.1
-
46
-
-
0004094597
-
-
Stephen Krasner operationalizes the state as the central decision makers in the executive branch, specifically the "President and those [executive] bureaus relatively insulated from societal pressures." (Princeton: Princeton University Press,)
-
Stephen Krasner operationalizes the state as the central decision makers in the executive branch, specifically the "President and those [executive] bureaus relatively insulated from societal pressures." Stephen Krasner, Defending the National Interest: Raw Materials Investments and U.S. Foreign Policy (Princeton: Princeton University Press, 1978), 62.
-
(1978)
Defending the National Interest: Raw Materials Investments and U.S. Foreign Policy
, pp. 62
-
-
Krasner, S.1
-
47
-
-
0004188675
-
-
For literature on the state, see (Princeton: Princeton University Press,)
-
For literature on the state, see Peter B. Evans, Embedded Autonomy (Princeton: Princeton University Press, 1995)
-
(1995)
Embedded Autonomy
-
-
Evans, P.B.1
-
48
-
-
33747106749
-
Dietrich Rueschmeyer, and Theda Skocpol
-
eds., (Cambridge: Cambridge University Press,)
-
Peter B. Evans, Dietrich Rueschmeyer, and Theda Skocpol, eds., Bringing the State Back In (Cambridge: Cambridge University Press, 1985)
-
(1985)
Bringing the State Back In
-
-
Evans, P.B.1
-
51
-
-
0007029184
-
"Approaches to the State: Alternative Conceptions and Historical Dynamics"
-
(January)
-
Krasner, "Approaches to the State"
-
(1984)
Comparative Politics
, vol.16
, Issue.2
, pp. 238
-
-
Krasner, S.1
-
54
-
-
0003502601
-
-
(New Brunswick: Transaction,)
-
Ellen Kay Trimberger, Revolutions from Above: Military Bureaucrats and Development in Japan, Turkey, Egypt, and Peru (New Brunswick: Transaction, 1978)
-
(1978)
Revolutions from Above: Military Bureaucrats and Development in Japan, Turkey, Egypt, and Peru
-
-
Trimberger, E.K.1
-
55
-
-
0038078220
-
-
(Princeton: Princeton University Press,)
-
and Fareed Zakaria, From Wealth to Power (Princeton: Princeton University Press, 1999).
-
(1999)
From Wealth to Power
-
-
Zakaria, F.1
-
56
-
-
0030536446
-
"War and Strong States, Peace and Weak States?"
-
(Spring)
-
Desch, "War and Strong States," 241 Michael C. Desch, "War and Strong States, Peace and Weak States?" International Organization 50, no. 2 (Spring 1996):
-
(1996)
International Organization
, vol.50
, Issue.2
, pp. 241
-
-
Desch, M.C.1
-
58
-
-
0004212175
-
"Bringing the State Back In: Strategies of Analysis in Current Research"
-
in Evans, Reuschmeyer, and Skocpol
-
Theda Skocpol, "Bringing the State Back In: Strategies of Analysis in Current Research," in Evans, Reuschmeyer, and Skocpol, Bringing the State Back In, 15
-
Bringing the State Back In
, pp. 15
-
-
Skocpol, T.1
-
61
-
-
0030536446
-
"War and Strong States, Peace and Weak States?"
-
On minimal vs. maximal states, see (Spring)
-
On minimal vs. maximal states, see Desch, "War and Strong States," 241. Desch, "War and Strong States," 241 Michael C. Desch, "War and Strong States, Peace and Weak States?" International Organization 50, no. 2 (Spring 1996):
-
(1996)
International Organization
, vol.50
, Issue.2
, pp. 241
-
-
Desch, M.C.1
-
62
-
-
0030536446
-
"War and Strong States, Peace and Weak States?"
-
(Spring)
-
Desch, "War and Strong States," 245 Desch, "War and Strong States," 245 Michael C. Desch, "War and Strong States, Peace and Weak States?" International Organization 50, no. 2 (Spring 1996):
-
(1996)
International Organization
, vol.50
, Issue.2
, pp. 245
-
-
Desch, M.C.1
-
63
-
-
33747094955
-
-
(Boston: Unwin Hyman,)
-
Rasler and Thompson, War and State Making, 209. Karen A. Rasler and William R. Thompson, War and State Making: The Shaping of the Global Powers (Boston: Unwin Hyman, 1989), 2.
-
(1989)
War and State Making: The Shaping of the Global Powers
, vol.2
, pp. 209
-
-
Rasler, K.A.1
Thompson, W.R.2
-
64
-
-
33747093188
-
-
These are the six elements of the U.S. National Strategy for Homeland Security, released July 2002, available at
-
These are the six elements of the U.S. National Strategy for Homeland Security, released July 2002, available at http://www.whitehouse.gov.
-
-
-
-
65
-
-
33747147935
-
"A Guide to the Patriot Act, Part I: Should You Be Scared of the Patriot Act?"
-
For a small sample of the many articles and books citing these cases as real or potential expansions of executive power, see Slate.com, 8 September available at
-
For a small sample of the many articles and books citing these cases as real or potential expansions of executive power, see Dhalia Litwak and Julia Turner, "A Guide to the Patriot Act, Part I: Should You Be Scared of the Patriot Act?" Slate.com, 8 September 2003, available at http://slate.msn.com/id/2087984/
-
(2003)
-
-
Litwak, D.1
Turner, J.2
-
66
-
-
33747088358
-
"License to Torture"
-
15 October
-
Anthony Lewis, "License to Torture," New York Times, 15 October 2005, A19
-
(2005)
New York Times
-
-
Lewis, A.1
-
67
-
-
33747120392
-
"IT Warns Against Slippery Slope to Regulation"
-
E-Week.com, 22 November
-
Carson Carlson, "IT Warns Against Slippery Slope to Regulation," E-Week.com, 22 November 2002, http://www.eweek.com/article2/0,1759,1662335,00.asp
-
(2002)
-
-
Carlson, C.1
-
68
-
-
33747124181
-
"Encountering Turbulence: So How Goes the Federal Takeover of Airline Security?"
-
17 June available at
-
Kate O'Beirne, "Encountering Turbulence: So How Goes the Federal Takeover of Airline Security?" National Review, 17 June 2002, available at http://www.nationalreview.com/issue/kob061702.asp
-
(2002)
National Review
-
-
O'Beirne, K.1
-
69
-
-
33747106735
-
"Security Act to Pervade Daily Lives"
-
21 November available at
-
Gail Russell Chaddock, "Security Act to Pervade Daily Lives," Christian Science Monitor, 21 November 2002, available at http://www.csmonitor.com/2002/1121/p01s03-usju.html
-
(2002)
Christian Science Monitor
-
-
Chaddock, G.R.1
-
70
-
-
33747085340
-
"ACLU Criticizes Federal Commission Internal CIA Recommendation; Questions Need for Domestic Intelligence Agency"
-
ACLU, 16 December available at
-
ACLU, "ACLU Criticizes Federal Commission Internal CIA Recommendation; Questions Need for Domestic Intelligence Agency," 16 December 2002, available at http://www.aclu.org.
-
(2002)
-
-
-
71
-
-
33747099394
-
-
USA Patriot Act
-
USA Patriot Act.
-
-
-
-
72
-
-
84882310099
-
"Six Weeks in Autumn"
-
When Attorney General John Ashcroft first introduced the Patriot Act legislation, he gave Congress one week to pass the bill_without changes. After minor modifications and hurried negotiations, the bill passed the Senate 98-1 and the House 357-66. The bill became law less than one month after the its introduction. 27 October
-
When Attorney General John Ashcroft first introduced the Patriot Act legislation, he gave Congress one week to pass the bill_without changes. After minor modifications and hurried negotiations, the bill passed the Senate 98-1 and the House 357-66. The bill became law less than one month after the its introduction. Robert O'Harrow, Jr., "Six Weeks in Autumn," Washington Post, 27 October 2002, W06.
-
(2002)
Washington Post
-
-
O'Harrow Jr., R.1
-
73
-
-
33747107928
-
"On Eve of War, New Right-Left Coalition Forms to Fight Justice Department Plans for Legislation That Would Diminish Liberty, Fail to Bolster Security"
-
ACLU, 17 March available at
-
ACLU, "On Eve of War, New Right-Left Coalition Forms to Fight Justice Department Plans for Legislation That Would Diminish Liberty, Fail to Bolster Security," 17 March 2003, available at http://www.aclu.org
-
(2003)
-
-
-
74
-
-
33747149749
-
"Left and Right United to Challenge Patriot Act Provisions"
-
23 March
-
and Edward Epstein, "Left and Right United to Challenge Patriot Act Provisions," San Francisco Chronicle, 23 March 2005, A3.
-
(2005)
San Francisco Chronicle
-
-
Epstein, E.1
-
76
-
-
33747116773
-
"Congress Urged to Renew Patriot Act: Minor Changes Would Address Concerns, Gonzales and Mueller Tell Senate Panel"
-
6 April
-
Dan Eggen, "Congress Urged to Renew Patriot Act: Minor Changes Would Address Concerns, Gonzales and Mueller Tell Senate Panel," Washington Post, 6 April 2005, A17.
-
(2005)
Washington Post
-
-
Eggen, D.1
-
77
-
-
33747132575
-
"Ashcroft Kicks Off Campaign to Defend Patriot Act"
-
CNN.com, 19 August
-
"Ashcroft Kicks Off Campaign to Defend Patriot Act," CNN.com, 19 August 2003
-
(2003)
-
-
-
78
-
-
33747093884
-
"President Calls on Congress to Extend Patriot Act Provisions"
-
21 July
-
and Michael Fletcher, "President Calls on Congress to Extend Patriot Act Provisions," Washington Post, 21 July 2005, A06.
-
(2005)
Washington Post
-
-
Fletcher, M.1
-
79
-
-
33747128695
-
"Their Own Patriot Act"
-
20 December
-
E. J. Dionne, Jr., "Their Own Patriot Act," Washington Post, 20 December 2005, A31.
-
(2005)
Washington Post
-
-
Dionne Jr., E.J.1
-
80
-
-
84898143771
-
"Congress Renews Patriot Act, with Changes"
-
8 March
-
Charles Babington, "Congress Renews Patriot Act, with Changes," Washington Post, 8 March 2006, A03.
-
(2006)
Washington Post
-
-
Babington, C.1
-
81
-
-
33747138451
-
"Letter to Ridge Is Latest Jab in Fight over Balance of Powers"
-
5 March
-
Alison Mitchell, "Letter to Ridge Is Latest Jab in Fight over Balance of Powers," New York Times, 5 March 2002, A8.
-
(2002)
New York Times
-
-
Mitchell, A.1
-
82
-
-
33747106732
-
-
Department of National Homeland Security Bill of 2001, S. 1534, 11 October
-
Department of National Homeland Security Bill of 2001, S. 1534, 11 October 2001.
-
(2001)
-
-
-
83
-
-
33747113214
-
"Ridge: Bush Should Veto Cabinet-Level Homeland Security Office"
-
Quoted in 30 May available at
-
Quoted in Brody Mullins, "Ridge: Bush Should Veto Cabinet-Level Homeland Security Office," Congress Daily, 30 May 2002, available at http://www.govexec.com/dailyfed/0502/053002cd1.htm.
-
(2002)
Congress Daily
-
-
Mullins, B.1
-
84
-
-
33747111533
-
"Critical Infrastructure Protection: Who's in Charge?"
-
Hearings held by the Senate Committee on Governmental Affairs include 4 October
-
Hearings held by the Senate Committee on Governmental Affairs include "Critical Infrastructure Protection: Who's in Charge?" 4 October 2001
-
(2001)
-
-
-
85
-
-
33747107236
-
"Has Airport Security Improved?"
-
14 November
-
"Has Airport Security Improved?" 14 November 2001
-
(2001)
-
-
-
86
-
-
33747146034
-
"How Secure Is Our Critical Infrastructure?"
-
12 September
-
"How Secure Is Our Critical Infrastructure?" 12 September 2001
-
(2001)
-
-
-
87
-
-
33747111164
-
"Legislative Options to Strengthen Homeland Defense"
-
12 October
-
"Legislative Options to Strengthen Homeland Defense," 12 October 2001
-
(2001)
-
-
-
88
-
-
33747127993
-
"The Local Role in Homeland Security"
-
11 December
-
"The Local Role in Homeland Security," 11 December 2001
-
(2001)
-
-
-
89
-
-
33747107927
-
"Public Hearing to Discuss Legislation to Establish a Department of National Homeland Security and a White House Office to Combat Terrorism"
-
11 April
-
"Public Hearing to Discuss Legislation to Establish a Department of National Homeland Security and a White House Office to Combat Terrorism," 11 April 2002
-
(2002)
-
-
-
90
-
-
33747150298
-
"Responding to Homeland Threats: Is Our Government Organized for the Challenge?"
-
21 September
-
"Responding to Homeland Threats: Is Our Government Organized for the Challenge?" 21 September 2001
-
(2001)
-
-
-
91
-
-
33747142867
-
"Riding the Rails: How Secure Is Our Passenger and Transit Infrastructure?"
-
13 December
-
"Riding the Rails: How Secure Is Our Passenger and Transit Infrastructure?" 13 December 2001
-
(2001)
-
-
-
92
-
-
33747125575
-
"Weak Links: Assessing the Vulnerability of U.S. Ports and Whether the Government Is Adequately Structured to Safeguard Them"
-
6 December
-
"Weak Links: Assessing the Vulnerability of U.S. Ports and Whether the Government Is Adequately Structured to Safeguard Them," 6 December 2001
-
(2001)
-
-
-
93
-
-
33747094264
-
"Weak Links: How Should the Federal Government Manage Airline Passenger and Baggage Screening?"
-
25 September
-
and "Weak Links: How Should the Federal Government Manage Airline Passenger and Baggage Screening?" 25 September 2001.
-
(2001)
-
-
-
94
-
-
33748854194
-
"Before Attack: U.S. Expected Different Hit: Germ Agents Focus of Preparations"
-
Press criticisms include 2 October
-
Press criticisms include Jo Warrick and Joe Stephens, "Before Attack: U.S. Expected Different Hit: Germ Agents Focus of Preparations," Washington Post, 2 October 2001, A01
-
(2001)
Washington Post
-
-
Warrick, J.1
Stephens, J.2
-
95
-
-
33747120405
-
"Earlier Hijackings Offered Signals That Were Missed"
-
3, October
-
Matthew Wald, "Earlier Hijackings Offered Signals That Were Missed," New York Times, 3 October 2001, B2
-
(2001)
New York Times
-
-
Wald, M.1
-
96
-
-
33747131614
-
"FBI Knew Terrorists Were Using Flight Schools"
-
23 September
-
and Steve Fainaru and James V. Grimaldi, "FBI Knew Terrorists Were Using Flight Schools," Washington Post, 23 September 2001, A24.
-
(2001)
Washington Post
-
-
Fainaru, S.1
Grimaldi, J.V.2
-
97
-
-
33747138116
-
-
Bush gave a televised address to the nation calling for a cabinet-level department on 6 June A short report titled "The Department of Homeland Security" was posted on the White House website the same day
-
Bush gave a televised address to the nation calling for a cabinet-level department on 6 June 2002. A short report titled "The Department of Homeland Security" was posted on the White House website the same day.
-
(2002)
-
-
-
98
-
-
33747139870
-
-
Homeland Security Act of 2002, H.R. 5005, 22 November
-
Homeland Security Act of 2002, H.R. 5005, 22 November 2002.
-
(2002)
-
-
-
99
-
-
33747147590
-
-
note
-
According to the Homeland Security Act of 2002, the department's primary responsibilities correspond to the five major functions identified in the bill: Information analysis and infrastructure protection; chemical, biological, radiological, nuclear, and related countermeasures; border and transportation security; emergency preparedness and response; and coordination with other parts of the federal government, with state and local governments, and with the private sector. The act also directs the department to continue to carry out other functions of the agencies it will absorb.
-
-
-
-
100
-
-
33646798743
-
"Storm Exposed Failure at the Top"
-
4 September
-
Susan B. Glasser and Josh White, "Storm Exposed Failure at the Top," Washington Post, 4 September 2005, A01
-
(2005)
Washington Post
-
-
Glasser, S.B.1
White, J.2
-
101
-
-
33747118150
-
"Homeland Insecurity"
-
(September) available at
-
Charles Mann, "Homeland Insecurity," Atlantic Monthly 290, no. 2 (September 2002), available at http://www.theatlantic.com/doc/prem/ 200209/mann
-
(2002)
Atlantic Monthly
, vol.290
, Issue.2
-
-
Mann, C.1
-
102
-
-
33747148621
-
"Department of Homeland Security Screw-Up: What Is the Bush Administration Doing?"
-
Slate.com, 6 September available at
-
Tim Naftali, "Department of Homeland Security Screw-Up: What Is the Bush Administration Doing?" Slate.com, 6 September 2005, available at http://www.slate.msn.com.
-
(2005)
-
-
Naftali, T.1
-
103
-
-
33747097115
-
"How Safe Can We Get? The System Has Been Vulnerable for Years; Marginal Improvements Aren't Enough"
-
24 September available at
-
Daniel Eisenberg, "How Safe Can We Get? The System Has Been Vulnerable for Years; Marginal Improvements Aren't Enough," Time, 24 September 2001, available at http://www.time.com/time/covers/1101010924/bsecurity.html.
-
(2001)
Time
-
-
Eisenberg, D.1
-
104
-
-
33747097115
-
"How Safe Can We Get? The System Has Been Vulnerable for Years; Marginal Improvements Aren't Enough"
-
24 September available at
-
Ibid.
-
(2001)
Time
-
-
Eisenberg, D.1
-
105
-
-
33747097115
-
"How Safe Can We Get? The System Has Been Vulnerable for Years; Marginal Improvements Aren't Enough"
-
24 September available at
-
Ibid.
-
(2001)
Time
-
-
Eisenberg, D.1
-
106
-
-
33747093542
-
-
Aviation and Transportation Security Act, S. 1447, 11 October
-
Aviation and Transportation Security Act, S. 1447, 11 October 2001.
-
(2001)
-
-
-
107
-
-
33747118148
-
-
The Airport Security Federalization Act, H.R. 3150, 1 November
-
The Airport Security Federalization Act, H.R. 3150, 1 November 2001.
-
(2001)
-
-
-
108
-
-
33747092838
-
-
Representative (R-Alaska), Chairman of the House Transportation and Infrastructure Committee, said in his statement to the floor that in the House bill, "the Federal government will take over the job of screening passengers and their baggage at our airports.... [W]here we differ from some of our colleagues is how do we best achieve the goal of a truly secure federally controlled aviation screening process. We do it by insuring that it is the federal government that will set the compensation for the screeners. It is the federal government that mandates the level of competency and training for the screeners ... and if the screeners don't do their job and perform well, under our bill they can be removed, their certificates can be revoked and the entire company can be fired and fined for any violations of rules or regulations." Text of Don Young's statement to the floor available at
-
Representative Don Young (R-Alaska), Chairman of the House Transportation and Infrastructure Committee, said in his statement to the floor that in the House bill, "the Federal government will take over the job of screening passengers and their baggage at our airports.... [W]here we differ from some of our colleagues is how do we best achieve the goal of a truly secure federally controlled aviation screening process. We do it by insuring that it is the federal government that will set the compensation for the screeners. It is the federal government that mandates the level of competency and training for the screeners ... and if the screeners don't do their job and perform well, under our bill they can be removed, their certificates can be revoked and the entire company can be fired and fined for any violations of rules or regulations." Text of Don Young's statement to the floor available at http://www.house.gov/transportation/press/ press2001/release144.html.
-
-
-
Young, D.1
-
109
-
-
33747126930
-
-
Aviation and Transportation Security Act of 2001, S. 1447, 16 November Young stated, "On the issue of expanded screening security, we reached a compromise that will allow total federal oversight and authority of the screening process. We will have a trained federal workforce for the first two years and pilot programs that will be based upon the successful European federal-private sector model. After two years, each airport will then be given the flexibility to work with the new Undersecretary of Transportation Security to determine which program would provide the best screening security for each airport." Statement available at
-
Aviation and Transportation Security Act of 2001, S. 1447, 16 November 2001. Young stated, "On the issue of expanded screening security, we reached a compromise that will allow total federal oversight and authority of the screening process. We will have a trained federal workforce for the first two years and pilot programs that will be based upon the successful European federal-private sector model. After two years, each airport will then be given the flexibility to work with the new Undersecretary of Transportation Security to determine which program would provide the best screening security for each airport." Statement available at http://www.house.gov/transportation/press/press2001/release151.html.
-
(2001)
-
-
-
110
-
-
33747114126
-
-
Aviation and Transportation Security Act of 2001, S. 1447, 16 November Young stated, "On the issue of expanded screening security, we reached a compromise that will allow total federal oversight and authority of the screening process. We will have a trained federal workforce for the first two years and pilot programs that will be based upon the successful European federal-private sector model. After two years, each airport will then be given the flexibility to work with the new Undersecretary of Transportation Security to determine which program would provide the best screening security for each airport." Statement available at
-
Ibid.
-
(2001)
-
-
-
111
-
-
33747112193
-
"Hearing on a Review of the Airport Screener Privatization Pilot Program (PP5)"
-
Committee on Transportation and Infrastructure, Aviation Subcommittee, 22 April transcript available at Similar conclusions were reached in a follow-up report released a year later, which noted that, despite the federalization of most passenger screeners, airport security at passenger checkpoints had not measurably improved since September 11
-
Committee on Transportation and Infrastructure, Aviation Subcommittee, "Hearing on a Review of the Airport Screener Privatization Pilot Program (PP5)," 22 April 2004, transcript available at http://www.house.gov/transportation/aviation/04-22-04/108-61.pdf. Similar conclusions were reached in a follow-up report released a year later, which noted that, despite the federalization of most passenger screeners, airport security at passenger checkpoints had not measurably improved since September 11.
-
(2004)
-
-
-
112
-
-
33747122814
-
"Sioux Falls Regional Airport Is to Join TSA's Screening Partnership Program"
-
TSA, press release, 27 July available at
-
TSA, "Sioux Falls Regional Airport Is to Join TSA's Screening Partnership Program," press release, 27 July 2005, available at http://www.tsa.gov/public/display?theme=44&content=0900051980150f8b.
-
(2005)
-
-
-
113
-
-
33747085339
-
"TSA Prepares Airport Guidance on Using Private Screeners"
-
GovExec.com, 23 April available at
-
Chris Strom, "TSA Prepares Airport Guidance on Using Private Screeners," GovExec.com, 23 April 2004, available at http://www.govexec.com/dailyfed/0404/042304c1.htm.
-
(2004)
-
-
Strom, C.1
-
114
-
-
33747115546
-
-
note
-
Prior to September 11, the FBI was primarily a law enforcement agency that focused on criminal investigations. It was nominally charged with domestic intelligence responsibilities, but intelligence collection and analysis were not high priorities. (Due in part to legal changes that came out of the Church Committee investigations into the executive abuses of the 1970's, a conscious effort had been made to erect legal barriers between law enforcement and domestic intelligence collection.) The lack of attention to intelligence was also the result of the culture at the FBI that rewarded employees for criminal prosecutions, but not for intelligence analysis. Since September 11, the wall between law enforcement and domestic intelligence has been knocked down and the FBI has attempted - unsuccessfully according to most analysts - to better perform the domestic intelligence and counterterrorism functions.
-
-
-
-
115
-
-
33747110790
-
remarks as prepared for delivery at DARPATech 2002 Conference
-
See Anaheim, Calif., 2 August
-
See John Poindexter, remarks as prepared for delivery at DARPATech 2002 Conference, Anaheim, Calif., 2 August 2002.
-
(2002)
-
-
Poindexter, J.1
-
116
-
-
33747119503
-
"FutureMAP Has No Future"
-
30 July available at
-
Cynthia L. Webb, "FutureMAP Has No Future," Washington Post, 30 July 2003, available at http://www.findarticles.com/p/articles/mi m0NTQ/is 2003 July 30/ai 106042669.
-
(2003)
Washington Post
-
-
Webb, C.L.1
-
117
-
-
33747105685
-
"Congress Kills Data-Mining Computer Program"
-
25 September available at
-
Audrey Hudson. "Congress Kills Data-Mining Computer Program," Washington Times, 25 September 2003, available at http://www.washingtontimes.com/national/20030925-115156-7992r.htm.
-
(2003)
Washington Times
-
-
Hudson, A.1
-
118
-
-
3543110425
-
"This War on Terrorism Is Bogus"
-
6 September available at
-
Michael Meacher. "This War on Terrorism Is Bogus," The Guardian, 6 September 2003, available at http://politics.guardian.co.uk/iraq/comment/0,12956,1036687,00.html.
-
(2003)
The Guardian
-
-
Meacher, M.1
-
119
-
-
33747093880
-
-
This is the prevailing view among leading constitutional scholars. John Yoo, however, has recently argued that the Constitution actually grants the executive wide authority to conduct foreign affairs and national security policy. (Chicago: University of Chicago Press,)
-
This is the prevailing view among leading constitutional scholars. John Yoo, however, has recently argued that the Constitution actually grants the executive wide authority to conduct foreign affairs and national security policy. See Yoo, Powers of War and Peace.
-
(2005)
The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11
-
-
Yoo, J.1
-
120
-
-
0007718506
-
-
For proponents of the prevailing view, see (Oxford: Oxford University Press,)
-
For proponents of the prevailing view, see Louis Henkin, Foreign Affairs and the U.S. Constitution (Oxford: Oxford University Press, 1997)
-
(1997)
Foreign Affairs and the U.S. Constitution
-
-
Henkin, L.1
-
122
-
-
0007700459
-
-
(Princeton: Princeton University Press,)
-
and Michael Glennon, Constitutional Diplomacy (Princeton: Princeton University Press, 1991).
-
(1991)
Constitutional Diplomacy
-
-
Glennon, M.1
-
123
-
-
33747119507
-
-
Constitution of the United States of America, Art. I, sec. 8
-
Constitution of the United States of America, Art. I, sec. 8.
-
-
-
-
126
-
-
33747138795
-
"On a Just Partition of Power"
-
Federalist No. 51, cited by Friedberg
-
Federalist No. 51, "On a Just Partition of Power," cited by Friedberg, In the Shadow of the Garrison State, 17.
-
In the Shadow of the Garrison State
, vol.17
-
-
-
127
-
-
34347355680
-
-
For example, Charles Jones argued that too exclusive a focus on the presidency distorts the picture of how national government really works. He explores how presidents find their place in the permanent government and how they are "fitted in" by others, most notably those on Capitol Hill. (Washington: Brookings Institution Press,)
-
For example, Charles Jones argued that too exclusive a focus on the presidency distorts the picture of how national government really works. He explores how presidents find their place in the permanent government and how they are "fitted in" by others, most notably those on Capitol Hill. Charles O. Jones, the Presidency in a Separated System (Washington: Brookings Institution Press, 1994).
-
(1994)
The Presidency in a Separated System
-
-
Jones, C.O.1
-
128
-
-
33747103270
-
-
Franklin D. Roosevelt's proposed legislation to pack the Supreme Court with New Deal sympathizers was resisted and eventually killed in Congress. A more sympathetic Court was realized only when one judge changed his voting pattern and others retired of their own volition. See (New York: Random House,) 1993
-
Franklin D. Roosevelt's proposed legislation to pack the Supreme Court with New Deal sympathizers was resisted and eventually killed in Congress. A more sympathetic Court was realized only when one judge changed his voting pattern and others retired of their own volition. See Kenneth S. Davis, Into the Storm: 1937-1940 (New York: Random House, 1993)
-
Into the Storm: 1937-1940
-
-
Davis, K.S.1
-
132
-
-
0004267478
-
-
Seminal works on interest-group politics include (Princeton: Princeton University Press,)
-
Seminal works on interest-group politics include Jeffrey M. Berry, Lobbying for the People (Princeton: Princeton University Press, 1977)
-
(1977)
Lobbying for the People
-
-
Berry, J.M.1
-
135
-
-
0002946809
-
"Issue Networks and the Executive Establishment"
-
(Washington: American Enterprise Institute,) ed. Anthony King
-
Hugh Heclo, "Issue Networks and the Executive Establishment," in The New American Political System, ed. Anthony King (Washington: American Enterprise Institute, 1990)
-
(1990)
The New American Political System
-
-
Heclo, H.1
-
138
-
-
0004142908
-
-
Allison's formulation was preceded by other work in a similar vein, including Richard Neustadt, (New York: Wiley)
-
Allison's formulation was preceded by other work in a similar vein, including Richard Neustadt, Presidential Power and the Modern Presidents (New York: Wiley, 1960).
-
(1960)
Presidential Power and the Modern Presidents
-
-
-
139
-
-
0001448330
-
"Bureaucratic Politics and American Foreign Policy: A Critique"
-
For excellent critiques of Allison see (December)
-
For excellent critiques of Allison see Robert J. Art, "Bureaucratic Politics and American Foreign Policy: A Critique,"Policy Sciences 4, no. 4 (December 1973): 467-90
-
(1973)
Policy Sciences
, vol.4
, Issue.4
, pp. 467-490
-
-
Art, R.J.1
-
140
-
-
0000107067
-
"Are Bureaucracies Important? Or Allison Wonderland"
-
(Summer)
-
and Stephen Krasner, "Are Bureaucracies Important? Or Allison Wonderland," Foreign Policy 7 (Summer 1972): 159-79
-
(1972)
Foreign Policy
, vol.7
, pp. 159-179
-
-
Krasner, S.1
-
141
-
-
84877291671
-
"The Organizational and Bureaucratic Politics Paradigms: Retrospect and Prospect"
-
For excellent reviews of the debate, see (Fall)
-
For excellent reviews of the debate, see David Welch, "The Organizational and Bureaucratic Politics Paradigms: Retrospect and Prospect," International Security 17, no. 2 (Fall 1992): 112-46
-
(1992)
International Security
, vol.17
, Issue.2
, pp. 112-146
-
-
Welch, D.1
-
146
-
-
84970399843
-
"Bureaucratic Politics and Belief System: Explaining the Chinese Policy Debate 1964-66"
-
For examples, see
-
For examples, see Steve Chan, "Bureaucratic Politics and Belief System: Explaining the Chinese Policy Debate 1964-66,"Journal of Peace Research 16, no. 4 (1979): 333-47
-
(1979)
Journal of Peace Research
, vol.16
, Issue.4
, pp. 333-347
-
-
Chan, S.1
-
147
-
-
33747149401
-
"The Limits of the Bureaucratic Politics Model: Observations on the Soviet Case"
-
(Winter)
-
Karen Dawisha, "The Limits of the Bureaucratic Politics Model: Observations on the Soviet Case," Studies in Comparative Communism 13, no. 4 (Winter 1980): 300-346
-
(1980)
Studies in Comparative Communism
, vol.13
, Issue.4
, pp. 300-346
-
-
Dawisha, K.1
-
148
-
-
84952506963
-
-
eds., (Boston: Little, Brown,)
-
Morton H. Halperin and Arnold Kanter, eds., Readings in American Foreign Policy, A Bureaucratic Perspective (Boston: Little, Brown, 1973)
-
(1973)
Readings in American Foreign Policy, A Bureaucratic Perspective
-
-
Halperin, M.H.1
Kanter, A.2
-
152
-
-
84938050306
-
"Bureaucratic Politics and the Soviet Invasion of Czechoslovakia"
-
(Spring)
-
and Jim Valenta, "Bureaucratic Politics and the Soviet Invasion of Czechoslovakia," Political Science Quarterly 94, no. 1 (Spring 1979): 55-76.
-
(1979)
Political Science Quarterly
, vol.94
, Issue.1
, pp. 55-76
-
-
Valenta, J.1
-
153
-
-
33747093878
-
-
See Military Order of 13 November Detention, Treatment, and Trial of Certain Non-Citizens in the War against Terrorism, available at
-
See Military Order of 13 November 2001, Detention, Treatment, and Trial of Certain Non-Citizens in the War against Terrorism, available at http://www.whitehouse.gov/news/releases/2001/11/20011113-27.html.
-
(2001)
-
-
-
154
-
-
33747117814
-
-
note
-
Ex parte Quirin, 317 U.S. 1 In 1942, eight Nazi German saboteurs were captured by the FBI. They had entered the United States by submarine, shed their uniforms, and planned to use explosives in attacks on American war industries. The president proclaimed that enemies who entered the United States to commit "hostile or warlike acts should be promptly tried in accordance with the laws of war." Proclamation No. 2561, of July 2, 1942, 7 Fed. Reg. 5101, 56 Stat. 1964. The Supreme Court denied the saboteurs their writs of habeas corpus and further argued that citizenship was irrelevant to "enemy belligerent" status.
-
-
-
-
155
-
-
33747146235
-
"Guantanamo Bay: Empty Beds, Empty Stomachs"
-
24 September
-
"Guantanamo Bay: Empty Beds, Empty Stomachs," The Economist, 24 September 2005, 38.
-
(2005)
The Economist
, pp. 38
-
-
-
156
-
-
33747144660
-
"Freeing Mr. Hamdi"
-
editorial, 24 September
-
"Freeing Mr. Hamdi," editorial, Washington Post, 24 September 2004, A24.
-
(2004)
Washington Post
-
-
-
157
-
-
33747096721
-
-
U.S. Supreme Court, Hamdi v Rumsfeld, Secretary of Defense, et al., no. 03-6696, decided 28 June
-
U.S. Supreme Court, Hamdi v Rumsfeld, Secretary of Defense, et al., no. 03-6696, decided 28 June 2004.
-
(2004)
-
-
-
158
-
-
33747097311
-
-
For more details on the Hamdi case, see "Hamdi Voices Innocence, Joy about Reunion: Man Held as Enemy Combatant Now Back in Saudi Arabia," CNN.com, 14 October available at
-
For more details on the Hamdi case, see "Hamdi Voices Innocence, Joy about Reunion: Man Held as Enemy Combatant Now Back in Saudi Arabia," CNN.com, 14 October 2004, available at http://www.cnn.com/2004/WORLD/meast/10/14/hamdi/
-
(2004)
-
-
-
159
-
-
33747129036
-
"The Hamdi Backflip"
-
editorial, 12 August
-
and "The Hamdi Backflip," editorial, Washington Post, 12 August 2004, A22.
-
(2004)
Washington Post
-
-
-
160
-
-
33747114813
-
-
note
-
A "dirty bomb," or radiological dispersion device, combines a conventional explosive with radioactive material. Most of the deaths from a dirty bomb explosion would likely be due to the conventional munitions. The radioactive materials in a dirty bomb could cause panic but would probably not lead to severe illness or death. For this reason. dirty bombs are sometimes called weapons of mass disruption.
-
-
-
-
161
-
-
33747104026
-
-
note
-
U.S. Court of Appeals for the Second Circuit, Jose Padilla v Donald Rumsfeld, no. 03-2235 (L); 03-2438 (Con.), argued 17 November 2003, decided 18 December 2003.
-
-
-
-
162
-
-
33747108295
-
"Supreme Court Expands Review of Enemy Combatant Cases"
-
New York Times, 9 January available at
-
David Stout, "Supreme Court Expands Review of Enemy Combatant Cases," New York Times, 9 January 2004, available at http://www.nytimes.com/2004/01/09/national/0 9CND-SCOT.html?ex=1130821200&en=e8938894a679288a&ei=5070.
-
(2004)
-
-
Stout, D.1
-
163
-
-
33747105654
-
-
U.S. Supreme Court, Rumsfeld v Padilla, no. 03-1027, decided 28 June
-
U.S. Supreme Court, Rumsfeld v Padilla, no. 03-1027, decided 28 June 2004.
-
(2004)
-
-
-
164
-
-
33747099055
-
-
U.S. District Court for the District of South Carolina, Jose Padilla v Commander C. T. Hanft, no 2:04-2221-26AJ, decided 28 February
-
U.S. District Court for the District of South Carolina, Jose Padilla v Commander C. T. Hanft, no 2:04-2221-26AJ, decided 28 February 2005.
-
(2005)
-
-
-
165
-
-
33747122811
-
"Federal Judge: Charge Padilla or Release Him"
-
CNN.com, 1 March
-
Phil Hirschcrom, "Federal Judge: Charge Padilla or Release Him," CNN.com, 1 March 2005.
-
(2005)
-
-
Hirschcrom, P.1
-
166
-
-
33747109636
-
-
U.S. Circuit Court of Appeals for the Fourth Circuit, Padilla v Hanft, no. 05-6396, decided 9 September
-
U.S. Circuit Court of Appeals for the Fourth Circuit, Padilla v Hanft, no. 05-6396, decided 9 September 2005
-
(2005)
-
-
-
168
-
-
33747110444
-
"Judge Says U.S. Terror Suspect Can't Be Held as an Enemy Combatant"
-
They argued that a key difference between the Padilla and Hamdi cases is that Padilla was arrested in the United States, whereas Hamdi was arrested on a battlefield in Afghanistan. This raises the burden of proof for the government in the Padilla case. See 28 February available at
-
They argued that a key difference between the Padilla and Hamdi cases is that Padilla was arrested in the United States, whereas Hamdi was arrested on a battlefield in Afghanistan. This raises the burden of proof for the government in the Padilla case. See Neil A. Lewis, "Judge Says U.S. Terror Suspect Can't Be Held as an Enemy Combatant," New York Times, 28 February 2005, available at http://www.nytimes.com/2005/03/01/ 01terror.html?ex=1267419600&en=7f8871e1943f70f8&ei=5090& partner=rssuserland
-
(2005)
New York Times
-
-
Lewis, N.A.1
-
169
-
-
33747102555
-
"U.S. Can Confine Citizens without Charges, Court Rules"
-
Washington Post, 10 September
-
and Jerry Markon, "U.S. Can Confine Citizens without Charges, Court Rules," Washington Post, 10 September 2005, A01.
-
(2005)
-
-
Markon, J.1
-
170
-
-
33747111526
-
"Padilla's Lawyers Suggest Indictment Helps Government Avoid Court Fight"
-
22 November available at
-
Fred Barbash, "Padilla's Lawyers Suggest Indictment Helps Government Avoid Court Fight," Washington Post, 22 November 2005, available at http://www.washingtonpost.com/wp-dyn/content/article/2005/11/22/ AR2005112201061.html.
-
(2005)
Washington Post
-
-
Barbash, F.1
-
171
-
-
33747120058
-
-
U.S. Supreme Court, Rasul v. Bush, no 03-334, decided 28 June
-
U.S. Supreme Court, Rasul v. Bush, no 03-334, decided 28 June 2004.
-
(2004)
-
-
-
172
-
-
33747089029
-
"Combatant Status Review Tribunal Order Issued"
-
7 July no. 651-04, available at
-
"Combatant Status Review Tribunal Order Issued," 7 July 2004, no. 651-04, available at http://www.defenselink.mil/releases/2004/ nr20040707-0992.html.
-
(2004)
-
-
-
173
-
-
33747121771
-
"3 Guantanamo Detainees Freed"
-
21 July
-
Josh White, "3 Guantanamo Detainees Freed," Washington Post, 21 July 2005, A02.
-
(2005)
Washington Post
-
-
White, J.1
-
174
-
-
33747142862
-
U.S. District Court for the District of Columbia, "Memorandum Opinion Denying in Part and Granting in Part Respondents' Motion to Dismiss or for Judgment as a Matter of Law"
-
regard to Guantánamo Detainee Cases 02-CV-0299, 02-CV-0828, 02-CV-1130, 04-CV-1135, 04-CV-1136, 04-CV-1137, 04-CV-1144, 04-CV-1164, 04-CV-1194, 04-CV-1227, and 04-CV-1254, decided 31 January
-
Joyce Hens Green, U.S. District Court for the District of Columbia, "Memorandum Opinion Denying in Part and Granting in Part Respondents' Motion to Dismiss or for Judgment as a Matter of Law," in regard to Guantánamo Detainee Cases 02-CV-0299, 02-CV-0828, 02-CV-1130, 04-CV-1135, 04-CV-1136, 04-CV-1137, 04-CV-1144, 04-CV-1164, 04-CV-1194, 04-CV-1227, and 04-CV-1254, decided 31 January 2005.
-
(2005)
-
-
Green, J.H.1
-
175
-
-
33747064115
-
"Judge Rules Detainee Tribunals Illegal"
-
1 February
-
Carol D. Leonnig, "Judge Rules Detainee Tribunals Illegal," Washington Post, 1 February 2005, A01.
-
(2005)
Washington Post
-
-
Leonnig, C.D.1
-
176
-
-
84881999144
-
"Senators Agree on Detainee Rights: Deal Would Allow Some Court Access"
-
15 November
-
Jonathan Weisman, "Senators Agree on Detainee Rights: Deal Would Allow Some Court Access," Washington Post, 15 November 2005, A01.
-
(2005)
Washington Post
-
-
Weisman, J.1
-
177
-
-
33747146235
-
"Empty Beds, Empty Stomachs"
-
As quoted in 22 September
-
As quoted in "Empty Beds, Empty Stomachs," The Economist, 22 September 2005, 38.
-
(2005)
The Economist
, pp. 38
-
-
-
178
-
-
33747092842
-
"Beyond Guantanamo"
-
20 August
-
Matthew Waxman, "Beyond Guantanamo," Washington Post, 20 August 2005, A17.
-
(2005)
Washington Post
-
-
Waxman, M.1
-
179
-
-
33747140910
-
"Empty Beds, Empty Stomachs"
-
"Empty Beds, Empty Stomachs."
-
-
-
-
180
-
-
33747113428
-
"Guantanamo Staffing to Be Reduced about 20%"
-
22 February
-
Josh White, "Guantanamo Staffing to Be Reduced about 20%," Washington Post, 22 February 2006, A06.
-
(2006)
Washington Post
-
-
White, J.1
-
183
-
-
33747126931
-
"CERT Advisory 1999-04 Melissa Macro Virus"
-
Computer Emergency Response Team (CERT) Coordination Center, 27 March
-
Computer Emergency Response Team (CERT) Coordination Center, "CERT Advisory 1999-04 Melissa Macro Virus," 27 March 1999, http://www.cert.org/advisories/CA-1999-04.html
-
(1999)
-
-
-
184
-
-
33747115898
-
"Love Bug Virus Running Amok"
-
4 May This was also the period during which much media-hyped attention was directed at the looming "crisis" that might be caused by "the Y2K problem" - the concern that major computer-controlled systems and infrastructures might go haywire if internal clocks were to mistakenly interpret the date 1 January 2000 as 1 January 1900
-
and "Love Bug Virus Running Amok," Wired News, 4 May 2000, http://www.wired.com/news/technology/ 0,1282,36113,00.html?tw=wn_story_related. This was also the period during which much media-hyped attention was directed at the looming "crisis" that might be caused by "the Y2K problem" - the concern that major computer-controlled systems and infrastructures might go haywire if internal clocks were to mistakenly interpret the date 1 January 2000 as 1 January 1900.
-
(2000)
Wired News
-
-
-
185
-
-
33747147248
-
"Defending America's Cyberspace: National Plan for Information Systems Protection, Version 1.0, An Invitation to Dialogue"
-
The White House, January available at
-
The White House, "Defending America's Cyberspace: National Plan for Information Systems Protection, Version 1.0, An Invitation to Dialogue," January 2000, available at http://www.fas.org/irp/offdocs/pdd/CIP-plan.pdf.
-
(2000)
-
-
-
186
-
-
33747131926
-
"CERT Advisory 2001-26 Nimda Worm"
-
CERT Coordination Center, 18 September
-
CERT Coordination Center, "CERT Advisory 2001-26 Nimda Worm," 18 September 2001, http://www.cert.org/advisories/CA-2001-26.html
-
(2001)
-
-
-
187
-
-
0242320133
-
"Executive Order 13231, Critical Infrastructure Protection in the Information Age"
-
The White House, 16 October
-
and the White House, "Executive Order 13231, Critical Infrastructure Protection in the Information Age," 16 October 2001, http://www.whitehouse.gov/news/releases/2001/10/20011016-12.html.
-
(2001)
-
-
-
188
-
-
33747097312
-
-
note
-
Many computer security experts question the Pearl Harbor analogy, believing there are easier targets for terrorists to attack and that there is too much redundancy in most computer-operated infrastructures for them to fail completely or for long. There is, however, a strong consensus that a terrorist cyber attack is possible, probably as an adjunct to a physical attack. Many cyber attacks are now almost completely automated; they can also be embedded with "sleeper" commands that could conceivably be pre-programmed to coordinate a cyber attack with a physical terrorist attack on some future date.
-
-
-
-
189
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board
-
President's Critical Infrastructure Protection Board, "National Strategy to Secure Cyberspace."
-
-
-
-
190
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board, recommendations R2-5, R3-15, R4-25, and R4-26
-
Ibid., recommendations R2-5, R3-15, R4-25, and R4-26.
-
-
-
-
191
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board, recommendations R2-5, R3-17, and R4-39
-
Ibid., recommendations R2-5, R3-17, and R4-39.
-
-
-
-
192
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board, Ibid., recommendations R2-2, R2-7, R3-1, R3-2, R3-5, R3-10, R3-17, R4-14
-
Ibid., recommendations R2-2, R2-7, R3-1, R3-2, R3-5, R3-10, R3-17, R4-14.
-
-
-
-
193
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board, recommendation R4-4
-
Ibid., recommendation R4-4.
-
-
-
-
194
-
-
33747113206
-
"Cybersecurity Czar Takes Aim at Private Industry"
-
Clarke's "seat belt" analogy appears in many of his speeches; he first made the comment publicly in a speech to computer security practitioners in Las Vegas in August 2002. See (5 August)
-
Clarke's "seat belt" analogy appears in many of his speeches; he first made the comment publicly in a speech to computer security practitioners in Las Vegas in August 2002. See Ann Saita, "Cybersecurity Czar Takes Aim at Private Industry," Security Wire Digest 4, no. 58 (5 August 2002)
-
(2002)
Security Wire Digest
, vol.4
, Issue.58
-
-
Saita, A.1
-
195
-
-
33747135195
-
"Security Czar Points Finger of Blame"
-
CNET News.com, 31 July available at
-
and Robert Lemos, "Security Czar Points Finger of Blame," CNET
-
(2002)
-
-
Lemos, R.1
-
196
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board, recommendation R3-6
-
President's Critical Infrastructure Protection Board, "National Strategy to Secure Cyberspace," recommendation R3-6.
-
-
-
-
197
-
-
33747113206
-
"Cybersecurity Czar Takes Aim at Private Industry"
-
Clarke made this recommendation in public speeches. Although the recommendation did not make it into the draft, the IT industry leaders were still troubled by this recommendation, perhaps fearing that it would re-emerge in the final version of the strategy. See (5 August)
-
Clarke made this recommendation in public speeches. Although the recommendation did not make it into the draft, the IT industry leaders were still troubled by this recommendation, perhaps fearing that it would re-emerge in the final version of the strategy. See Saita, "Cybersecurity Czar."
-
(2002)
Security Wire Digest
, vol.4
, Issue.58
-
-
Saita, A.1
-
198
-
-
0242351531
-
"National Strategy to Secure Cyberspace"
-
President's Critical Infrastructure Protection Board
-
President's Critical Infrastructure Protection Board, "National Strategy to Secure Cyberspace," 41.
-
, vol.41
-
-
-
199
-
-
3242785680
-
"Who's Liable for Insecure Networks?"
-
(June)
-
Erin Kenneally, "Who's Liable for Insecure Networks?" Computer 35, no. 6 (June 2002): 93-95
-
(2002)
Computer
, vol.35
, Issue.6
, pp. 93-95
-
-
Kenneally, E.1
-
201
-
-
33747115178
-
"IT Trends 2002: Security Standards and Compliance"
-
15 January available at
-
Michael Rassmussen, "IT Trends 2002: Security Standards and Compliance," Ideabyte, 15 January 2002, available at http://images.telos.com/files/external/Giga_IT_Trends_2002.pdf
-
(2002)
Ideabyte
-
-
Rassmussen, M.1
-
202
-
-
0344792106
-
"Managing Online Security Risks"
-
1 June
-
and Hal Varian, "Managing Online Security Risks," New York Times, 1 June 2000, C2.
-
(2000)
New York Times
, vol.C2
-
-
Varian, H.1
-
203
-
-
33747110003
-
"Government Unveils Cybersecurity Plan"
-
Percentage cited in 8 September available at
-
Percentage cited in Robert Lemos, "Government Unveils Cybersecurity Plan," CNET News, 8 September 2002, available at http://news.com.com/2100-1023-956353.html.
-
(2002)
CNET News
-
-
Lemos, R.1
-
204
-
-
0003994024
-
"Critical Foundations: Protecting America's Infrastructure"
-
See the Marshall Institute, 12 November available at
-
See Robert Marsh, "Critical Foundations: Protecting America's Infrastructure," the Marshall Institute, 12 November 1997, available at http://www.marshall.org/article.php?id=65.
-
(1997)
-
-
Marsh, R.1
-
205
-
-
33747111854
-
"Defending America's Cyberspace"
-
The White House
-
The White House, "Defending America's Cyberspace."
-
-
-
-
206
-
-
0242320133
-
"Executive Order 13231, Critical Infrastructure Protection in the Information Age"
-
The White House
-
The White House, "Executive Order 13231, Critical Infrastructure Protection in the Information Age."
-
-
-
-
207
-
-
33747111522
-
"Summit in California's Silicon Valley to Focus on Cybersecurity"
-
3 December
-
Elise Ackerman, "Summit in California's Silicon Valley to Focus on Cybersecurity," San Jose Mercury News, 3 December 2002.
-
(2002)
San Jose Mercury News
-
-
Ackerman, E.1
-
208
-
-
33747119501
-
-
Archived minutes of meetings of the National Infrastructure Advisory Council (NIAC) are available online at
-
Archived minutes of meetings of the National Infrastructure Advisory Council (NIAC) are available online at http://www.dhs.gov/dhspublic/ interapp/editorial/editorial 0353.xml
-
-
-
-
209
-
-
33747091435
-
"IT Resists Mandatory Cyber Security"
-
see also E-week.com, 8 January available at
-
see also Carson Carlson, "IT Resists Mandatory Cyber Security," E-week.com, 8 January 2003, available at http://www.eweek.com/article2/ 0,3959,813715,00.asp.
-
(2003)
-
-
Carlson, C.1
-
210
-
-
33747091435
-
"IT Resists Mandatory Cyber Security"
-
As quoted in E-week.com 8 January available at
-
As quoted in Carlson, "IT Resists Mandatory Cyber Security."
-
(2003)
-
-
Carlson, C.1
-
211
-
-
33747120392
-
"IT Warns Against Slippery Slope"
-
E-Week.com, 22 November
-
Carlson, "IT Warns Against Slippery Slope."
-
(2002)
-
-
Carlson, C.1
-
212
-
-
33747091435
-
"IT Resists Mandatory Cyber Security"
-
Archived minutes of NIAC meetings; and E-week.com, 8 January available at
-
Archived minutes of NIAC meetings; and Carlson, "IT Resists Mandatory Cyber Security."
-
(2003)
-
-
Carlson, C.1
-
213
-
-
33747141898
-
-
Personick and Patterson, Critical Infrastructure Information Sharing
-
Personick and Patterson, Critical Infrastructure Information Sharing.
-
-
-
-
214
-
-
33747120392
-
"IT Warns Against Slippery Slope"
-
E-Week.com, 22 November
-
Carlson, "IT Warns Against Slippery Slope."
-
(2002)
-
-
Carlson, C.1
-
215
-
-
33747128314
-
"Feds Delay Release of Cyber-Security Plan"
-
E-week.com, 17 September available at
-
"Feds Delay Release of Cyber-Security Plan," E-week.com, 17 September 2002, available at http://www.findarticles.com/p/articles/mi_zdewk/is_200209/ai_ziff31142.
-
(2002)
-
-
-
216
-
-
33747145381
-
-
White House, The National Strategy to Secure Cyberspace, February available at
-
White House, The National Strategy to Secure Cyberspace, February 2003, available at http://www.whitehouse.gov/pcipb/.
-
(2003)
-
-
-
217
-
-
33747114501
-
-
The most thorough and best known proposal is the bill introduced by Senator John Edwards (D-N.C.) in February 2003 to establish a Homeland Intelligence Agency: Foreign Intelligence Collection Improvement Act of 2003, S. 410, introduced 13 February
-
The most thorough and best known proposal is the bill introduced by Senator John Edwards (D-N.C.) in February 2003 to establish a Homeland Intelligence Agency: Foreign Intelligence Collection Improvement Act of 2003, S. 410, introduced 13 February 2003.
-
(2003)
-
-
-
218
-
-
33747123818
-
"ACLU Says Intelligence Czar Should Not Spy on Americans"
-
For examples of resistance by civil libertarians, see 9 December available at
-
For examples of resistance by civil libertarians, see "ACLU Says Intelligence Czar Should Not Spy on Americans," 9 December 2002, available at http://www.aclu.org
-
(2002)
-
-
-
219
-
-
33747095247
-
"ACLU Criticizes Federal Commission"
-
and "ACLU Criticizes Federal Commission."
-
-
-
-
220
-
-
0141599475
-
"Bush Aides Consider Domestic Spy Agency: Concerns of FBI's Performance Spurs Debate of Options"
-
For overviews of bureaucratic resistance, see 16 November
-
For overviews of bureaucratic resistance, see Dana Priest and Dan Eggen, "Bush Aides Consider Domestic Spy Agency: Concerns of FBI's Performance Spurs Debate of Options," Washington Post, 16 November 2002, A1
-
(2002)
Washington Post
-
-
Priest, D.1
Eggen, D.2
-
221
-
-
4243901014
-
"Administration Begins to Rewrite Decades-Old Spying Restrictions"
-
30 November
-
and David Johnston, "Administration Begins to Rewrite Decades-Old Spying Restrictions," New York Times, 30 November 2002, A1.
-
(2002)
New York Times
-
-
Johnston, D.1
-
222
-
-
33747133808
-
"Lawmakers Put Domestic Spy Agency on Their Agenda"
-
15 October available at
-
Martin Kady II, "Lawmakers Put Domestic Spy Agency on Their Agenda," Congressional Quarterly Daily Monitor, 15 October 2002, available at http://www.smithbrandon.com/news.aspx?id=31.
-
(2002)
Congressional Quarterly Daily Monitor
-
-
Kady II, M.1
-
223
-
-
33747101468
-
"Terror Watch: At Odds"
-
7 July available at
-
Michael Isikoff and Mark Hosenball, "Terror Watch: At Odds," Newsweek, 7 July 2004, available at http://www.msnbc.msn.com/id/5388509/site/newsweek/.
-
(2004)
Newsweek
-
-
Isikoff, M.1
Hosenball, M.2
-
224
-
-
0141599475
-
"Bush Aides Consider Domestic Spy Agency: Concerns of FBI's Performance Spurs Debate of Options"
-
16 November
-
Preist and Eggen, "Bush Aides Consider Domestic Spy Agency."
-
(2002)
Washington Post
-
-
Priest, D.1
Eggen, D.2
-
225
-
-
84858920700
-
-
Senate Select Committee on Intelligence and House Permanent Select Committee on Intelligence, released December
-
Senate Select Committee on Intelligence and House Permanent Select Committee on Intelligence, Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001, released December 2002, http://www.gpoaccess.gov/serialset/creports/911.html.
-
(2002)
Report of the Joint Inquiry Into the Terrorist Attacks of September 11, 2001
-
-
-
226
-
-
0141599475
-
"Bush Aides Consider Domestic Spy Agency: Concerns of FBI's Performance Spurs Debate of Options"
-
Officials in attendance included National Security Advisor Condoleezza Rice, White House Chief of Staff Andrew Card, Defense Secretary Donald Rumsfeld, Director of Central Intelligence George Tenet, Attorney General John Ashcroft, and FBI Director Robert Mueller. 16 November
-
Officials in attendance included National Security Advisor Condoleezza Rice, White House Chief of Staff Andrew Card, Defense Secretary Donald Rumsfeld, Director of Central Intelligence George Tenet, Attorney General John Ashcroft, and FBI Director Robert Mueller. Priest and Eggen, "Bush Aides Consider Domestic Spy Agency."
-
(2002)
Washington Post
, vol.A1
-
-
Priest, D.1
Eggen, D.2
-
227
-
-
33747135192
-
"ACLU Says Intelligence Czar Should Not Spy on Americans"
-
"ACLU Says Intelligence Czar Should Not Spy on Americans,"
-
-
-
-
228
-
-
33747095247
-
"ACLU Criticizes Federal Commission"
-
and "ACLU Criticizes Federal Commission."
-
-
-
-
229
-
-
4243901014
-
"Administration Begins to Rewrite Decades-Old Spying Restrictions"
-
30 November
-
Johnston, "Administration Begins to Rewrite Decades-Old Spying Restrictions."
-
(2002)
New York Times
-
-
Johnston, D.1
-
230
-
-
33747118838
-
"DoD Intel Chief Addresses 9/11 Commission Recommendations"
-
11 May available at
-
Doug Sample, "DoD Intel Chief Addresses 9/11 Commission Recommendations," American Forces Information Service, 11 May 2005, available at http://www.defenselink.mil/news/Aug2004/ n08112004_2004081105.html.
-
(2005)
American Forces Information Service
-
-
Sample, D.1
-
231
-
-
4243901014
-
"Administration Begins to Rewrite Decades-Old Spying Restrictions"
-
30 November
-
Johnston, "Administration Begins to Rewrite Decades-Old Spying Restrictions."
-
(2002)
New York Times
-
-
Johnston, D.1
-
232
-
-
2642555480
-
"Protecting America's Freedom in an Information Age"
-
Markle Foundation Task Force on National Security in an Information Age, 7 October available at Members of the task force included Ashton Carter, Wesley Clark, Sidney Drell, John Gage, Morton Halperin, John Hamre, Judith Miller, and Philip Zelikow, among others
-
Markle Foundation Task Force on National Security in an Information Age, "Protecting America's Freedom in an Information Age," 7 October 2002, available at http://www.markletaskforce.org. Members of the task force included Ashton Carter, Wesley Clark, Sidney Drell, John Gage, Morton Halperin, John Hamre, Judith Miller, and Philip Zelikow, among others.
-
(2002)
-
-
-
233
-
-
27644534758
-
"Fact Sheet: Strengthening Intelligence to Better Protect America"
-
Office of the Press Secretary, the White House, 14 February available at
-
Office of the Press Secretary, the White House, "Fact Sheet: Strengthening Intelligence to Better Protect America," 14 February 2003, available at http://www.whitehouse.gov/news/releases/2003/02/ 20030214-1.html.
-
(2003)
-
-
-
234
-
-
33747130888
-
-
note
-
The guidelines had been introduced in the 1970s in response to perceived FBI abuses in the last decades of the J. Edgar Hoover era, which included spying on law-abiding civil rights activists and anti-war protesters.
-
-
-
-
235
-
-
33747135191
-
-
The Attorney General's Guidelines on General Crimes, Racketeering Enterprise and Terrorism Enterprise Investigations, 30 May available at
-
The Attorney General's Guidelines on General Crimes, Racketeering Enterprise and Terrorism Enterprise Investigations, 30 May 2002, available at http://www.usdoj.gov/olp/generalcrimes2.pdf.
-
(2002)
-
-
-
236
-
-
33747098350
-
"CDT's Analysis of New FBI Guidelines"
-
For background and analysis, see Center for Democracy and Technology (CDT), 30 May available at
-
For background and analysis, see Center for Democracy and Technology (CDT), "CDT's Analysis of New FBI Guidelines," 30 May 2002, available at http://www.cdt.org/wiretap/020530guidelines.shtml.
-
(2002)
-
-
-
237
-
-
33747135536
-
"Speech to Citizens Crime Commission of New York City"
-
19 December available at
-
Robert Mueller, "Speech to Citizens Crime Commission of New York City," 19 December 2002, available at http://www.fbi.gov/pressrel/ speeches/milsteinlecture.htm.
-
(2002)
-
-
Mueller, R.1
-
239
-
-
0141599475
-
"Bush Aides Consider Domestic Spy Agency: Concerns of FBI's Performance Spurs Debate of Options"
-
16 November
-
Priest and Eggen, "Bush Aides Consider Domestic Spy Agency."
-
(2002)
Washington Post
-
-
Priest, D.1
Eggen, D.2
-
240
-
-
33747109634
-
"A New Spy Agency?"
-
editorial, 28 November
-
"A New Spy Agency?" editorial, Washington Post, 28 November 2002, A46.
-
(2002)
Washington Post
-
-
-
241
-
-
0141599475
-
"Bush Aides Consider Domestic Spy Agency: Concerns of FBI's Performance Spurs Debate of Options"
-
16 November
-
Priest and Eggen, "Bush Aides Consider Domestic Spy Agency."
-
(2002)
Washington Post
-
-
Priest, D.1
Eggen, D.2
-
242
-
-
33747124515
-
"Fourth Annual Report to the President and the Congress of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction" (Gilmore Commission Report)
-
15 December available at
-
"Fourth Annual Report to the President and the Congress of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction" (Gilmore Commission Report), 15 December 2002, available at http://www.rand.org/nsrd/terrpanel.
-
(2002)
-
-
-
243
-
-
0013294184
-
"State of the Union Address"
-
28 January available at
-
George W. Bush, "State of the Union Address," 28 January 2003, available at http://www.whitehouse.gov/news/releases/2003/01/ 20030128-19.html.
-
(2003)
-
-
Bush, G.W.1
-
244
-
-
33747094617
-
"Statement for the Record of John O. Brennan, Director, Terrorist Threat Integration Center, Before the House of Representatives Committee on the Judiciary and the House of Representatives Select Committee on Homeland Security"
-
22 July available at
-
John O. Brennan, "Statement for the Record of John O. Brennan, Director, Terrorist Threat Integration Center, Before the House of Representatives Committee on the Judiciary and the House of Representatives Select Committee on Homeland Security," 22 July 2003, available at http://judiciary.house.gov/legacy/brennan072203.htm.
-
(2003)
-
-
Brennan, J.O.1
-
245
-
-
33747092450
-
-
An FBI representative stated, "The FBI strongly supports the formation of the Terrorist Threat Integration Center (TTIC) and is proud to be a partner with the CIA, the Department of Homeland Security, the Department of Defense, and all the other participating agencies." Testimony of Pasquale J.D. Amuro, executive assistant director for counterterrorism/counterintelligence, FBI, at a hearing before the Senate Governmental Affairs Committee, 26 February available at
-
An FBI representative stated, "The FBI strongly supports the formation of the Terrorist Threat Integration Center (TTIC) and is proud to be a partner with the CIA, the Department of Homeland Security, the Department of Defense, and all the other participating agencies." Testimony of Pasquale J.D. Amuro, executive assistant director for counterterrorism/counterintelligence, FBI, at a hearing before the Senate Governmental Affairs Committee, "Consolidating Intelligence Analysis: Review of the President's Proposal to Create a Terrorist Threat Integration Center," 26 February 2003, available at http://hsgac.senate.gov/_files/shrg10854ttic.pdf.
-
(2003)
"Consolidating Intelligence Analysis: Review of the President's Proposal to Create a Terrorist Threat Integration Center"
-
-
-
246
-
-
84869274361
-
-
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, 31 March available at
-
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, "Final Report to the President," 31 March 2005, available at http://www.wmd.gov/report
-
(2005)
"Final Report to the President"
-
-
-
248
-
-
33747114124
-
-
For arguments for and against a director of national intelligence, see Commission Hearings of the 9/11 Commission,14 October available at
-
For arguments for and against a director of national intelligence, see Commission Hearings of the 9/11 Commission,14 October 2003, available at http://www.9-11commission.gov/archive/hearing4/ 9-11commission_hearing_2003-10-14.htm
-
(2003)
-
-
-
249
-
-
33747141896
-
"The Position of Director of National Intelligence: Issues for Congress"
-
12 August available at
-
Alfred Cumming. "The Position of Director of National Intelligence: Issues for Congress," Congressional Research Service Report for Congress, 12 August 2004, available at http://www.fas.org
-
(2004)
Congressional Research Service Report for Congress
-
-
Cumming, A.1
-
250
-
-
33747103265
-
"Intelligence: No Easy Fix"
-
September-October
-
John Prados, "Intelligence: No Easy Fix," Bulletin of the Atomic Scientists, September-October 2004, 17-19
-
(2004)
Bulletin of the Atomic Scientists
, pp. 17-19
-
-
Prados, J.1
-
251
-
-
33747131597
-
"Making America Secure Again: Setting the Right Course for Foreign Policy"
-
3 December available at
-
John F. Kerry, "Making America Secure Again: Setting the Right Course for Foreign Policy," Speech to the Council on Foreign Relations, 3 December 2003, available at http://www.cfr.org/publication.html?id=6576
-
(2003)
Speech to the Council on Foreign Relations
-
-
Kerry, J.F.1
-
252
-
-
33747096715
-
-
Office of Senator Dianne Feinstein (D-Calif.), "Sponsors of Senate Bill to Create Director of National Intelligence Urge President to Support their Legislation," 3 August available at
-
Office of Senator Dianne Feinstein (D-Calif.), "Sponsors of Senate Bill to Create Director of National Intelligence Urge President to Support their Legislation," 3 August 2004, available at http://feinstein.senate.gov/04Releases/r-bush-dni-ltr.html.
-
(2004)
-
-
-
253
-
-
33747133415
-
-
For example, in testimony before the House Appropriations Committee in June 2004, Mueller discussed the FBI's "vision to enhance [its] enterprise-wide intelligence capabilities." He argued that, for two and a half years, the FBI "had been transforming and realigning resources to combat international terrorism" and was now dedicated to strengthening its intelligence program. Robert Mueller, Testimony Before the House Appropriations Committee, Subcommittee on the Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies, 3 June available at
-
For example, in testimony before the House Appropriations Committee in June 2004, Mueller discussed the FBI's "vision to enhance [its] enterprise-wide intelligence capabilities." He argued that, for two and a half years, the FBI "had been transforming and realigning resources to combat international terrorism" and was now dedicated to strengthening its intelligence program. Robert Mueller, Testimony Before the House Appropriations Committee, Subcommittee on the Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies, 3 June 2004, available at http://www.fbi.gov/congress/congress04/mueller060304.htm.
-
(2004)
-
-
-
254
-
-
33747120757
-
-
Intelligence Reform and Terrorism Prevention Act, PL 104-408, 7 December
-
Intelligence Reform and Terrorism Prevention Act, PL 104-408, 7 December 2004.
-
(2004)
-
-
-
255
-
-
84900924810
-
"Bush Approves Spy Agency Changes"
-
30 June A01
-
Dan Eggen and Walter Pincus, "Bush Approves Spy Agency Changes," Washington Post, 30 June 2005, A01.
-
(2005)
Washington Post
-
-
Eggen, D.1
Pincus, W.2
-
256
-
-
33747136390
-
"FBI Lags in Security"
-
For examples of some of the FBI's failures as it sought to remake itself as an intelligence agency, 21 October
-
For examples of some of the FBI's failures as it sought to remake itself as an intelligence agency, see Dan Eggen, "FBI Lags in Security," Washington Post, 21 October 2005, A08
-
(2005)
Washington Post
-
-
Eggen, D.1
-
257
-
-
33747129361
-
"Report: FBI Wasted Millions on Virtual Case File"
-
and CNN.com, 3 February available at
-
and Terry Frieden, "Report: FBI Wasted Millions on Virtual Case File," CNN.com, 3 February 2005, available at http://www.cnn.com/2005/US/02/03/fbi.computers.
-
(2005)
-
-
Frieden, T.1
-
258
-
-
33747087612
-
-
The president's WMD commission also cited FBI problems in its final report. See Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, Final Report to the President, 31 March available at
-
The president's WMD commission also cited FBI problems in its final report. See Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, Final Report to the President, 31 March 2005, available at http://www.wmd.gov/report.
-
(2005)
-
-
-
259
-
-
33747138440
-
"CIA Identity Flap Sparks Debate over Need for New Domestic Intelligence Agency"
-
30 September available at
-
Gary Thomas, "CIA Identity Flap Sparks Debate over Need for New Domestic Intelligence Agency," Voice of America, 30 September 2003, available at http://www.iwar.org.uk/news-archive/2003/09-30-5.html.
-
(2003)
Voice of America
-
-
Thomas, G.1
-
260
-
-
33747105676
-
"Governing Russia: Putin's Federal Dilemmas"
-
January available at
-
Fiona Hill, "Governing Russia: Putin's Federal Dilemmas," New Europe Review, January 2005, available at http://apps49.brookings.edu/views/articles/hillf/20050104.htm
-
(2005)
New Europe Review
-
-
Hill, F.1
-
261
-
-
33747137425
-
"The Kremlin Is Going Too Far"
-
editorial, 14 September available at
-
"The Kremlin Is Going Too Far," editorial, Financial Times, 14 September 2004, available at http://www.guardian.co.uk/editor/story/ 0,1304552,00.html
-
(2004)
Financial Times
-
-
-
262
-
-
33747086353
-
"Duma Gives Nod to Putin's Governors Bill"
-
and 1 November available at
-
and Oksana Yablokova, "Duma Gives Nod to Putin's Governors Bill," Moscow Times, 1 November 2004, available at http://www.rusnet.nl/news/2004/11/01/print/currentaffairs02.shtml.
-
(2004)
Moscow Times
-
-
Yablokova, O.1
-
263
-
-
0004066028
-
The Liberal Tradition in America
-
(New York: Harcourt)
-
Louis Hartz, The Liberal Tradition in America (New York: Harcourt, 1991).
-
(1991)
-
-
Hartz, L.1
-
264
-
-
85059414340
-
"Domestic Structure and International Change"
-
For a review of domestic political explanations in security studies and their origin as a response to systemic theories, ed. John Ikenberry and Michael Doyle (New York: Westview)
-
For a review of domestic political explanations in security studies and their origin as a response to systemic theories, see Matthew Evangelista, "Domestic Structure and International Change," in New Thinking in International Relations Theory, ed. John Ikenberry and Michael Doyle (New York: Westview, 1997), 202-28
-
(1997)
New Thinking in International Relations Theory
, pp. 202-228
-
-
Evangelista, M.1
-
265
-
-
0032339799
-
"Domestic Politics, Foreign Policy, and Theories of International Relations"
-
and
-
and James Fearon, "Domestic Politics, Foreign Policy, and Theories of International Relations," Annual Review of Political Science 1 (1998): 289-313.
-
(1998)
Annual Review of Political Science
, vol.1
, pp. 289-313
-
-
Fearon, J.1
-
266
-
-
0003483665
-
-
For seminal works that argue for the importance of domestic politics in security studies, (New Haven: Yale University Press)
-
For seminal works that argue for the importance of domestic politics in security studies, see Bruce Bueno de Mesquita and David Lalman, War and Reason (New Haven: Yale University Press, 1992)
-
(1992)
War and Reason
-
-
Bueno de Mesquita, B.1
Lalman, D.2
-
275
-
-
0002093939
-
"Coping with Terrorism: Norms and Internal Security in Germany and Japan"
-
For another approach to counterterrorism policy, ed. Judith Goldstein and Robert O. Keohane (Ithaca: Cornell University Press)
-
For another approach to counterterrorism policy, see Peter Katzenstein, "Coping with Terrorism: Norms and Internal Security in Germany and Japan," in Ideas and Foreign Policy: Beliefs, Institutions, and Political Change, ed. Judith Goldstein and Robert O. Keohane (Ithaca: Cornell University Press, 1993), 265-95.
-
(1993)
Ideas and Foreign Policy: Beliefs, Institutions, and Political Change
, pp. 265-295
-
-
Katzenstein, P.1
-
284
-
-
25144434119
-
"Outsourcing Torture: The Secret History of America's Extraordinary Rendition Program"
-
14 February available at
-
Jane Mayer, "Outsourcing Torture: The Secret History of America's Extraordinary Rendition Program," New Yorker, 14 February 2005, available at http://www.newyorker.com/fact/content/?050214fa fact6.
-
(2005)
New Yorker
-
-
Mayer, J.1
-
285
-
-
33747110440
-
"Rice Defends Tactics Used against Suspects: Europe Aware of Operations She Implies"
-
6 December
-
See Glenn Kessler, "Rice Defends Tactics Used against Suspects: Europe Aware of Operations She Implies," Washington Post, 6 December 2005, A01.
-
(2005)
Washington Post
-
-
Kessler, G.1
-
286
-
-
84927073838
-
-
This finding has implications for a growing body of work on the privatization of security. Scholars have recently begun to chronicle the proliferation of private firms that are performing defense and security functions and to explore the consequences of this phenomenon for accountability, national security, and the future role of the state. (Cambridge: Cambridge University Press)
-
This finding has implications for a growing body of work on the privatization of security. Scholars have recently begun to chronicle the proliferation of private firms that are performing defense and security functions and to explore the consequences of this phenomenon for accountability, national security, and the future role of the state. See Deborah D. Avant, The Market for Force: The Consequences of Privatizing Security (Cambridge: Cambridge University Press, 2005)
-
(2005)
The Market for Force: The Consequences of Privatizing Security
-
-
Avant, D.D.1
-
287
-
-
33747127983
-
"Private Security Companies: The Case for Regulation"
-
Stockholm International Peace Research Institute policy paper no. 9 (January)
-
Caroline Holmquist, "Private Security Companies: The Case for Regulation," Stockholm International Peace Research Institute policy paper no. 9 (January 2005)
-
(2005)
-
-
Holmquist, C.1
-
289
-
-
79956017045
-
"The Case against Privatizing National Security"
-
paper presented at the Study Group on the Arms Trade and the Transnationalization of the Defense Industry, Council on Foreign Relations, New York City, 1 October available at
-
Ann Markusen, "The Case against Privatizing National Security," paper presented at the Study Group on the Arms Trade and the Transnationalization of the Defense Industry, Council on Foreign Relations, New York City, 1 October 1999, available at http://www.gao.gov/a76panel/fortherecord/amarkusenpaper.pdf
-
(1999)
-
-
Markusen, A.1
-
291
-
-
1642303587
-
-
and (Ithaca: Cornell University Press) This scholarship, however, unnecessarily limits the scope of the phenomenon it seeks to describe. The United States is not merely "privatizing" security but "outsourcing" it. Outsourcing security includes both privatizing security functions to nongovernmental firms and organizations as well as "offshoring" security functions to foreign governments. Although the extant literature has thoroughly explored the consequences of privatizing security, it has not developed a compelling theoretical explanation for why privatization, or offshoring for that matter, occurs in the first place. Our work suggests that the outsourcing of security is at least partly the result of domestic political processes that have thwarted U.S. government attempts to develop new capacities for dealing with nontraditional security challenges
-
and P. W. Singer, Corporate Warriors: The Rise of the Privatized Military Industry (Ithaca: Cornell University Press, 2004). This scholarship, however, unnecessarily limits the scope of the phenomenon it seeks to describe. The United States is not merely "privatizing" security but "outsourcing" it. Outsourcing security includes both privatizing security functions to nongovernmental firms and organizations as well as "offshoring" security functions to foreign governments. Although the extant literature has thoroughly explored the consequences of privatizing security, it has not developed a compelling theoretical explanation for why privatization, or offshoring for that matter, occurs in the first place. Our work suggests that the outsourcing of security is at least partly the result of domestic political processes that have thwarted U.S. government attempts to develop new capacities for dealing with nontraditional security challenges.
-
(2004)
Corporate Warriors: The Rise of the Privatized Military Industry
-
-
Singer, P.W.1
|