메뉴 건너뛰기




Volumn 192, Issue , 2007, Pages 81-115

Beyond interrogations: An analysis of the protection under the military commissions act of 2006 of technical classified sources, methods and activities employed in the global war on terror

Author keywords

[No Author keywords available]

Indexed keywords


EID: 79951936120     PISSN: 00264040     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (237)
  • 1
    • 79951917399 scopus 로고
    • J. Patrick ed.
    • 8 WRITINGS OF GEORGE WASHINGTON 478-79 (J. Patrick ed., 1933).
    • (1933) Writings of George Washington , vol.8 , pp. 478-479
  • 2
    • 79951925269 scopus 로고    scopus 로고
    • While "war" itself is used to describe virtually any struggle-including those pitched on the fields of athletic endeavor-it is most commonly understood to be the state of international or internal armed conflict
    • While "war" itself is used to describe virtually any struggle-including those pitched on the fields of athletic endeavor-it is most commonly understood to be the state of international or internal armed conflict.
  • 3
    • 79951925687 scopus 로고    scopus 로고
    • See, e.g., JOINT FORCES STAFF COLLEGE, PUB. 1, app. O, defining war as "a state of undeclared or declared armed hostile action characterized by the sustained use of armed force between nations or organized groups within a nation involving regular and irregular forces in a series of connected military operations or campaigns to achieve vital national objectives"
    • See, e.g., JOINT FORCES STAFF COLLEGE, PUB. 1, THE JOINT STAFF OFFICER'S GUIDE 1997 app. O (1997) (defining war as "[a] state of undeclared or declared armed hostile action characterized by the sustained use of armed force between nations or organized groups within a nation involving regular and irregular forces in a series of connected military operations or campaigns to achieve vital national objectives").
    • (1997) The Joint Staff Officer's Guide , pp. 1997
  • 4
    • 79951886624 scopus 로고    scopus 로고
    • Consider, for example, the definitive end of World War II with Emperor Hirohito's signature on the U. S. S. Missouri on 27 September 1945, or the symbolic and-for all practical purposes-military end of the U. S. Civil War with General Robert E. Lee's surrender at the Appomattox courthouse on 9 April 1865
    • Consider, for example, the definitive end of World War II with Emperor Hirohito's signature on the U. S. S. Missouri on 27 September 1945, or the symbolic and-for all practical purposes-military end of the U. S. Civil War with General Robert E. Lee's surrender at the Appomattox courthouse on 9 April 1865.
  • 5
    • 12244304765 scopus 로고    scopus 로고
    • As the National Commission on Terrorist Attacks Upon the United States the 9/11 Commission noted: The problem is that al Qaeda represents an ideological movement, not a finite group of people. It initiates and inspires, even if it no longer directs. In this way it has transformed itself into a decentralized force. Bin Ladin may be limited in his ability to organize major attacks from his hideouts. Yet killing or capturing him, while extremely important, would not end terror. His message of inspiration to a new generation of terrorists would continue, hereinafter 9/11 COMMISSION REPORT
    • As the National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission) noted: The problem is that al Qaeda represents an ideological movement, not a finite group of people. It initiates and inspires, even if it no longer directs. In this way it has transformed itself into a decentralized force. Bin Ladin may be limited in his ability to organize major attacks from his hideouts. Yet killing or capturing him, while extremely important, would not end terror. His message of inspiration to a new generation of terrorists would continue. FINAL REPORT OF THE NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES 16 (2004) [hereinafter 9/11 COMMISSION REPORT].
    • (2004) Final Report of the National Commission on Terrorist Attacks Upon the United States , pp. 16
  • 6
    • 79951907203 scopus 로고    scopus 로고
    • The words of President George W. Bush in the wake of the September 11th attacks regarding the scope and expected duration of this conflict have held true: Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped and defeated.... Americans should not expect one battle, but a lengthy campaign, unlike any other we have ever seen. President's Address to a Joint Session of Congress on the United States Response to the Terrorist Attacks of September 11, 1349 Sept. 20
    • The words of President George W. Bush in the wake of the September 11th attacks regarding the scope and expected duration of this conflict have held true: Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped and defeated.... Americans should not expect one battle, but a lengthy campaign, unlike any other we have ever seen. President's Address to a Joint Session of Congress on the United States Response to the Terrorist Attacks of September 11, 37 WEEKLY COMP. PRES. DOC. 1347, 1349 (Sept. 20, 2001).
    • (2001) Weekly Comp. Pres. Doc. , vol.37 , pp. 1347
  • 7
    • 36448960729 scopus 로고    scopus 로고
    • The Department of Defense DOD has defined intelligence sources to include "people, documents, equipment, or technical sensors". U. S. DEP'T OF DEFENSE, JOINT PUB. 1-02, 12 Apr, as amended through 12 July, hereinafter DOD Dictionary
    • The Department of Defense (DOD) has defined intelligence sources to include "people, documents, equipment, or technical sensors". U. S. DEP'T OF DEFENSE, JOINT PUB. 1-02, DICTIONARY OF MILITARY AND ASSOCIATED TERMS 269 (12 Apr. 2001, as amended through 12 July 2007) [hereinafter DOD Dictionary].
    • (2001) Dictionary of Military and Associated Terms , pp. 269
  • 8
    • 79951909168 scopus 로고    scopus 로고
    • According to the DOD Dictionary, counterterrorism is defined as "operations that include the offensive measures taken to prevent, deter, preempt, and respond to terrorism". Id. at 130. as used in this article, "counterterrorism" has the meaning ascribed to it in the DOD Dictionary
    • According to the DOD Dictionary, counterterrorism is defined as "[o]perations that include the offensive measures taken to prevent, deter, preempt, and respond to terrorism". Id. at 130. as used in this article, "counterterrorism" has the meaning ascribed to it in the DOD Dictionary.
  • 9
    • 77951967977 scopus 로고    scopus 로고
    • Why military commissions are the proper forum and why terrorists will have "full and fair" trials: A rebuttal to military commissions: Trying American justice
    • As one commentator has noted, "this is an unusual situation given that almost all war crimes and war-related offenses are prosecuted after the end of hostilities, when the need to protect national security information and safeguard participants in the trial is greatly reduced.", Nov, at
    • As one commentator has noted, "[t]his is an unusual situation given that almost all war crimes and war-related offenses are prosecuted after the end of hostilities, when the need to protect national security information and safeguard participants in the trial is greatly reduced". Frederic L. Borch III, Why Military Commissions Are the Proper Forum and Why Terrorists Will Have "Full and Fair" Trials: A Rebuttal to Military Commissions: Trying American Justice, ARMY LAW., Nov. 2003, at 10
    • (2003) Army Law. , pp. 10
    • Frederic III, L.B.1
  • 10
    • 70349801819 scopus 로고    scopus 로고
    • Military commissions: Trying American justice
    • responding to, Nov, at
    • (responding to Kevin J. Barry, Military Commissions: Trying American Justice, ARMY LAW., Nov. 2003, at 1).
    • (2003) Army Law. , pp. 1
    • Barry, K.J.1
  • 11
    • 79951862745 scopus 로고    scopus 로고
    • Military Commissions Act MCA of 2006, §, LEXIS, hereinafter MCA. The first conviction before a military commission convened under the MCA was that of David Hicks, an Australian trained by al Qaeda who pleaded guilty on 26 March 2007 to providing material support to a terrorist organization
    • Military Commissions Act (MCA) of 2006, 10 U. S. C. S. § 948a-950w (LEXIS 2007) [hereinafter MCA]. The first conviction before a military commission convened under the MCA was that of David Hicks, an Australian trained by al Qaeda who pleaded guilty on 26 March 2007 to providing material support to a terrorist organization.
    • (2007) U. S. C. S , vol.10
  • 12
    • 77951970144 scopus 로고    scopus 로고
    • Plea of guilty from detainee in guantánamo
    • See, Mar. 27, at
    • See William Glaberson, Plea of Guilty from Detainee in Guantánamo, N. Y. TIMES, Mar. 27, 2007, at A1.
    • (2007) N. Y. Times
    • Glaberson, W.1
  • 13
    • 79951880923 scopus 로고    scopus 로고
    • 18 U. S. C. App. III (2000).
    • (2000) U. S. C. App. , vol.18
  • 15
    • 79951874239 scopus 로고    scopus 로고
    • The drafters of the MCA decided to limit its protection of sensitive information to information that is actually classified, as discussed in greater detail below. See infra notes 27-31 and accompanying text
    • The drafters of the MCA decided to limit its protection of sensitive information to information that is actually classified, as discussed in greater detail below. See infra notes 27-31 and accompanying text.
  • 16
    • 79951860689 scopus 로고    scopus 로고
    • See, § 949d f 2 B
    • See 10 U. S. C. S. § 949d (f) (2) (B).
    • U. S. C. S , vol.10
  • 17
    • 84858464177 scopus 로고    scopus 로고
    • See, e.g., at, hereinafter HUMAN RIGHTS WATCH Q & A stating that the protection of classified sources and methods of interrogations, in particular, will make it "extremely difficult for defendants to establish that evidence was obtained through torture or other coercive interrogation methods"
    • See, e.g., HUMAN RIGHTS WATCH, Q AND A: MILITARY COMMISSIONS ACT OF 2006, at 4 (2006), http://hrw.org/backgrounder/usa/qna1006/usqna1006web.pdf [hereinafter HUMAN RIGHTS WATCH Q & A] (stating that the protection of classified sources and methods of interrogations, in particular, will make it "extremely difficult for defendants to establish that evidence was obtained through torture or other coercive interrogation methods");
    • (2006) Human Rights Watch, Q and A: Military Commissions Act of 2006 , pp. 4
  • 18
    • 79951898131 scopus 로고    scopus 로고
    • HUMAN RIGHTS FIRST, "The administration has claimed that the so-called 'alternative interrogation techniques' used on 14 former CIA detainees now held at Guantanamo are classified. The Government could seek to include hearsay testimony derived from these interrogations, claim that the techniques used are classified, and defense lawyers would have a hard time showing that evidence should be excluded because it was obtained through torture".
    • HUMAN RIGHTS FIRST, ANALYSIS OF PROPOSED RULES FOR MILITARY COMMISSIONS TRIALS 2 (2007), http://www.humanrightsfirst.info/pdf/07125-usls-hrf-rcm- analysis.pdf ("[T]he administration has claimed that the so-called 'alternative interrogation techniques' used on 14 former CIA detainees now held at Guantanamo are classified.... The Government could seek to include hearsay testimony derived from these interrogations, claim that the techniques used are classified, and defense lawyers would have a hard time showing that evidence should be excluded because it was obtained through torture.");
    • (2007) Analysis of Proposed Rules for Military Commissions Trials , pp. 2
  • 19
    • 79951907202 scopus 로고    scopus 로고
    • Amnesty International, Sept. 29, stating that an accused's inability "effectively to challenge the 'sources, methods or activities' by which the Government acquired the evidence... is of particular concern in light of the high level of secrecy and resort to national security arguments employed by the administration in the 'war on terror'"
    • Amnesty International, Military Commissions Act of 2006-Turning Bad Policy Into Bad Law, Sept. 29, 2006, http://web.amnesty.org/library/Index/ ENGAMR511542006 (stating that an accused's inability "effectively to challenge the 'sources, methods or activities' by which the Government acquired the evidence... is of particular concern in light of the high level of secrecy and resort to national security arguments employed by the administration in the 'war on terror'").
    • (2006) Military Commissions Act of 2006-turning Bad Policy Into Bad Law
  • 20
    • 84937540066 scopus 로고    scopus 로고
    • Military Order of November 13, 2001, hereinafter Military Order
    • Military Order of November 13, 2001, 3 C. F. R. 918 (2002) [hereinafter Military Order].
    • (2002) C. F. R , vol.3 , pp. 918
  • 21
    • 79951929696 scopus 로고    scopus 로고
    • See U. S. Dep't of Defense, Military Commission Order No. 1 21 Mar. 2002, §§ 9.1-9.12, hereinafter DOD MCO No. 1. For instance, DOD MCO No. 1 set forth the number of military officers required for a panel, the powers vested in the presiding officer of the panel, and certain procedural safeguards afforded to the accused
    • See U. S. Dep't of Defense, Military Commission Order No. 1 (21 Mar. 2002), 32 C. F. R. §§ 9.1-9.12 (2005) [hereinafter DOD MCO No. 1]. For instance, DOD MCO No. 1 set forth the number of military officers required for a panel, the powers vested in the presiding officer of the panel, and certain procedural safeguards afforded to the accused.
    • (2005) C. F. R , vol.32
  • 22
    • 79951905891 scopus 로고    scopus 로고
    • Id. §§ 9.4 A 2 - A 5, 9.5
    • Id. §§ 9.4 (A) (2) - (A) (5), 9.5.
  • 23
    • 79951928410 scopus 로고    scopus 로고
    • See 32 C. F. R. §§ 10-18 2005
    • See 32 C. F. R. §§ 10-18 (2005).
  • 24
    • 79951876861 scopus 로고    scopus 로고
    • DOD MCO No. 1 defined "protected information" to include: A information classified or classifiable pursuant to Executive Order 12, 958, now Executive Order 13, 292; B information protected by law or rule from unauthorized disclosure; C information the disclosure of which may endanger the physical safety of participants in Commission proceedings, including prospective witnesses; D information concerning intelligence and law enforcement sources, methods, or activities; or E information concerning other national security interests
    • DOD MCO No. 1 defined "protected information" to include: (A) information classified or classifiable pursuant to [Executive Order 12, 958, now Executive Order 13, 292]; (B) information protected by law or rule from unauthorized disclosure; (C) information the disclosure of which may endanger the physical safety of participants in Commission proceedings, including prospective witnesses; (D) information concerning intelligence and law enforcement sources, methods, or activities; or (E) information concerning other national security interests.
  • 25
    • 79951903749 scopus 로고    scopus 로고
    • DOD MCO No. 1, supra note 16, § 9.6 d 5 i
    • DOD MCO No. 1, supra note 16, § 9.6 (d) (5) (i).
  • 26
    • 79951884437 scopus 로고    scopus 로고
    • See id. §§ 9.6 d 2 iv, 9.6 d 5 ii - iv
    • See id. §§ 9.6 (d) (2) (iv), 9.6 (d) (5) (ii) - (iv).
  • 27
    • 79951872140 scopus 로고    scopus 로고
    • 548 U. S.
    • U. S. , vol.548
  • 28
    • 33746899988 scopus 로고    scopus 로고
    • Salim Ahmed Hamdan, a Yemeni national, allegedly worked as Osama bin Laden's bodyguard and chauffer. He was captured in Afghanistan in 2001 and was brought to Guantánamo Bay, Cuba, in 2002
    • S. Ct. 2749 (2006). Salim Ahmed Hamdan, a Yemeni national, allegedly worked as Osama bin Laden's bodyguard and chauffer. He was captured in Afghanistan in 2001 and was brought to Guantánamo Bay, Cuba, in 2002.
    • (2006) S. Ct. , vol.126 , pp. 2749
  • 29
    • 79951897251 scopus 로고    scopus 로고
    • Id. at 2778. Specifically, the Court concluded that the commissions lacked requisite Congressional authorization; that Common Article 3 of the Geneva Conventions applies to detainees; and that the military commissions procedures deviated substantially from those applicable under the Geneva Conventions and courts-martial
    • Id. at 2778. Specifically, the Court concluded that the commissions lacked requisite Congressional authorization; that Common Article 3 of the Geneva Conventions applies to detainees; and that the military commissions procedures deviated substantially from those applicable under the Geneva Conventions and courts-martial.
  • 30
    • 79951899383 scopus 로고    scopus 로고
    • See id. at 2749. With respect to the lack of congressional authorization, the Court held that the power to create military commissions, if it exists, is among the "powers granted jointly to the President and Congress in time of war".
    • See id. at 2749. With respect to the lack of congressional authorization, the Court held that the power to create military commissions, if it exists, is among the "powers granted jointly to the President and Congress in time of war".
  • 31
    • 79951913842 scopus 로고    scopus 로고
    • Id. at 2773. It further held that Congress' authorization to use "all necessary and appropriate force against all nations, organizations, or persons" involved in the September 11th attacks which was granted under the Authorization for use of Military Force, Pub. L. No. 1107-40
    • Id. at 2773. It further held that Congress' authorization to use "all necessary and appropriate force against all nations, organizations, or persons" involved in the September 11th attacks which was granted under the Authorization for use of Military Force, Pub. L. No. 1107-40
  • 32
    • 84866116077 scopus 로고    scopus 로고
    • § 2 a, did not amount to a congressional authorization of military commissions
    • Stat. 224, § 2 (a) (2001), did not amount to a congressional authorization of military commissions.
    • (2001) Stat , vol.115 , pp. 224
  • 33
    • 84858679103 scopus 로고    scopus 로고
    • at, Specifically, the Court stated: While we assume that the AUMF Authorization for use of Military Force activated the President's war powers,. and that those powers include authority to convene military commissions in appropriate circumstances,... there is nothing in the text or legislative history of the AUMF even hinting that Congress intended to expand or alter the authorization set forth in Article 21 of the UCMJ Uniform Code of Military Justice.... Together, the UCMJ, the AUMF, and the DTA Detainee Treatment Act of 2005 at most acknowledge a general Presidential authority to convene military commissions in circumstances where justified under the "Constitution and laws, " including the law of war. Absent a more specific congressional authorization, the task of this Court is... to decide whether Hamdan's military commission is so justified
    • Hamdan, 126 S. Ct. at 2775. Specifically, the Court stated: [W]hile we assume that the AUMF [Authorization for use of Military Force] activated the President's war powers,... and that those powers include authority to convene military commissions in appropriate circumstances,... there is nothing in the text or legislative history of the AUMF even hinting that Congress intended to expand or alter the authorization set forth in Article 21 of the UCMJ [Uniform Code of Military Justice].... Together, the UCMJ, the AUMF, and the DTA [Detainee Treatment Act of 2005] at most acknowledge a general Presidential authority to convene military commissions in circumstances where justified under the "Constitution and laws, " including the law of war. Absent a more specific congressional authorization, the task of this Court is... to decide whether Hamdan's military commission is so justified.
    • S. Ct. , vol.126 , pp. 2775
    • Hamdan1
  • 34
    • 79951872949 scopus 로고    scopus 로고
    • Id. Note that congressional sanction of the use of military commissions to try offenders of the law of war, as a general matter, was not at issue in Hamdan, as the Supreme Court had already determined that Congress had sanctioned the use of military commissions
    • Id. Note that congressional sanction of the use of military commissions to try offenders of the law of war, as a general matter, was not at issue in Hamdan, as the Supreme Court had already determined that Congress had sanctioned the use of military commissions.
  • 35
    • 33645010504 scopus 로고
    • Ex parte Quirin, 28, pointing to UCMJ article 15, now UCMJ article 21, which states: "The jurisdiction of courts-martial shall not be construed as depriving military commissions. of concurrent jurisdiction in respect of offenders or offenses that by statute or by law of war may be tried by such... commissions.". Rather, what was at issue was whether the President was justified in convening the military commissions under the laws of war absent a specific congressional authorization
    • Ex parte Quirin, 317 U. S. 1, 28 (1942) (pointing to UCMJ article 15, now UCMJ article 21, which states: "The jurisdiction [of] courts-martial shall not be construed as depriving military commissions... of concurrent jurisdiction in respect of offenders or offenses that by statute or by law of war may be tried by such... commissions."). Rather, what was at issue was whether the President was justified in convening the military commissions under the laws of war absent a specific congressional authorization.
    • (1942) U. S. , vol.317 , pp. 1
  • 36
    • 33947575097 scopus 로고    scopus 로고
    • See, at, Breyer, J. concurring "Nothing prevents the President from returning to Congress to seek the authority he believes necessary".
    • See Hamdan, 126 S. Ct. at 2799 (Breyer, J. concurring) ("Nothing prevents the President from returning to Congress to seek the authority he believes necessary.").
    • S. Ct. , vol.126 , pp. 2799
    • Hamdan1
  • 37
    • 77951920732 scopus 로고    scopus 로고
    • 420 daily ed. Sept. 28
    • 152 CONG. REC. S10, 420 (daily ed. Sept. 28, 2006);
    • (2006) Cong. Rec. , vol.152
  • 38
    • 34547796776 scopus 로고    scopus 로고
    • Senate approves detainee bill backed by bush
    • see also, Sept. 29, at, The House of Representatives passed the bill the following day, and the MCA was signed into law by the President on 17 October 2006. Upon signing the bill, the President noted: In the months after 9/11, I authorized a system of military commissions to try foreign terrorists accused of war crimes.... Yet the legality of the system I established was challenged in the court, and the Supreme Court ruled that the military commissions needed to be explicitly authorized by the United States Congress. And so I asked Congress for that authority, and they have provided it. President Bush Signs Military Commissions Act of 2006, Oct. 17, 2006, available at
    • see also Charles Babington & Jonathan Weisman, Senate Approves Detainee Bill Backed by Bush, WASH POST., Sept. 29, 2006, at A01. The House of Representatives passed the bill the following day, and the MCA was signed into law by the President on 17 October 2006. Upon signing the bill, the President noted: In the months after 9/11, I authorized a system of military commissions to try foreign terrorists accused of war crimes.... Yet the legality of the system I established was challenged in the court, and the Supreme Court ruled that the military commissions needed to be explicitly authorized by the United States Congress. And so I asked Congress for that authority, and they have provided it. President Bush Signs Military Commissions Act of 2006, Oct. 17, 2006, available at http://www.whitehouse.gov/news/releases/2006/10/20061017-1. html.
    • (2006) Wash Post.
    • Babington, C.1    Weisman, J.2
  • 39
    • 79951903747 scopus 로고    scopus 로고
    • Agreement is reached on detainee bill
    • See, e.g., Sept. 21, at
    • See, e.g., Agreement Is Reached on Detainee Bill, N. Y. TIMES, Sept. 21, 2006, at A-1;
    • (2006) N. Y. Times
  • 40
    • 84900280476 scopus 로고    scopus 로고
    • Senators near pact on interrogation rules
    • Sept. 22, at, Finding middle ground with the President over how to deal with sensitive information in military commission proceedings was a concern for many Senators. For instance, Senator John McCain listed his priorities in the wake of Hamdan as follows: Ever since the Supreme Court announced its decision in the case of Hamdan v. Rumsfeld, I have made clear that my three primary goals for legislation authorizing military tribunals were: 1 Adjudicating the cases of detained terrorists in proceedings that are consistent with our values of justice, 2 protecting classified information, and 3 ensuring that our military and intelligence officers have clear standards for what is, and is not, permissible during detention and interrogation operations
    • R. Jeffrey Smith & Charles Babington, Senators Near Pact on Interrogation Rules, Wash. Post, Sept. 22, 2006, at A01. Finding middle ground with the President over how to deal with sensitive information in military commission proceedings was a concern for many Senators. For instance, Senator John McCain listed his priorities in the wake of Hamdan as follows: Ever since the Supreme Court announced its decision in the case of Hamdan v. Rumsfeld, I have made clear that my three primary goals for legislation authorizing military tribunals were: (1) Adjudicating the cases of detained terrorists in proceedings that are consistent with our values of justice, (2) protecting classified information, and (3) ensuring that our military and intelligence officers have clear standards for what is, and is not, permissible during detention and interrogation operations.
    • (2006) Wash. Post
    • Smith, R.J.1    Babington, C.2
  • 41
    • 77951920732 scopus 로고    scopus 로고
    • 275 daily ed. Sept. 27, statement of Sen. McCain emphasis added
    • CONG. REC. S10, 275 (daily ed. Sept. 27, 2006) (statement of Sen. McCain) (emphasis added).
    • (2006) Cong. Rec. , vol.152
  • 42
    • 70349801819 scopus 로고    scopus 로고
    • Military commissions: Trying American justice
    • Those procedural rules were almost universally criticized by commentators both within and outside of the Judge Advocate community. See, e.g., Nov, at
    • Those procedural rules were almost universally criticized by commentators both within and outside of the Judge Advocate community. See, e.g., Kevin J. Barry, Military Commissions: Trying American Justice, ARMY LAW., Nov. 2003, at 1;
    • (2003) Army Law. , pp. 1
    • Barry, K.J.1
  • 43
    • 79951887969 scopus 로고    scopus 로고
    • Trials and error
    • Nov. 12, at, "Further undermining the legitimacy of the process is the fact that the Defense Department's instructions for the military commissions grant broad discretion to the President and Secretary of Defense to close the entire proceeding, acting on undefined 'national security interests.'"
    • Philip Allen Lacovara, Trials and Error, WASH. POST, Nov. 12, 2003, at A23 ("Further undermining the legitimacy of the process is the fact that the Defense Department's instructions for the military commissions grant broad discretion to the President and Secretary of Defense to close the entire proceeding, acting on undefined 'national security interests.'");
    • (2003) Wash. Post
    • Lacovara, P.A.1
  • 44
    • 79951902824 scopus 로고    scopus 로고
    • HUMAN RIGHTS FIRST
    • HUMAN RIGHTS FIRST, TRIALS UNDER MILITARY ORDER (2006), http://www.humanrightsfirst.org/us-law/PDF/detainees/trials-under-order0604.pdf.
    • (2006) Trials Under Military Order
  • 45
    • 79951869085 scopus 로고    scopus 로고
    • See DOD MCO No. 1, supra note 16, § 9.6 d 5 ii. Unlike those rules, the MCA does not allow for the exclusion of the accused from portions of his trial and does not permit the introduction of evidence before the commission without it being disclosed to the accused. Rather, it allows for the exclusion of the accused only for disruptive or dangerous conduct
    • See DOD MCO No. 1, supra note 16, § 9.6 (d) (5) (ii). Unlike those rules, the MCA does not allow for the exclusion of the accused from portions of his trial and does not permit the introduction of evidence before the commission without it being disclosed to the accused. Rather, it allows for the exclusion of the accused only for disruptive or dangerous conduct.
  • 46
    • 79951919545 scopus 로고    scopus 로고
    • See, § 949d e LEXIS, In drafting the rules for exclusion of the accused, legislators appear to have paid particular attention to the Hamdan Court's statement that "at least absent express statutory provision to the contrary, information used to convict a person of a crime must be disclosed to him".
    • See 10 U. S. C. S. § 949d (e) (LEXIS 2007). In drafting the rules for exclusion of the accused, legislators appear to have paid particular attention to the Hamdan Court's statement that "at least absent express statutory provision to the contrary, information used to convict a person of a crime must be disclosed to him".
    • (2007) U. S. C. S , vol.10
  • 47
    • 33847336671 scopus 로고    scopus 로고
    • Hamdan, at, Legislators also apparently took to heart the concerns of senior Judge Advocates from the various armed services in this regard
    • Hamdan, 126 S. Ct. at 2798. Legislators also apparently took to heart the concerns of senior Judge Advocates from the various armed services in this regard.
    • S. Ct. , vol.126 , pp. 2798
  • 48
    • 79951930144 scopus 로고    scopus 로고
    • Brigadier General James C. Walker, Staff Judge Advocate to the Commandant U. S. Marine Corps "I concur with my colleagues that if we get to a point where the sole evidence against an accused is classified, he must be able to see that evidence. That's just essentially one of those elements of a full and fair trial."
    • See, e.g., Standards of Military Tribunals: Hearing Before the H. Comm. on Armed. Servs., 109th Cong. (2006) (statements of Major General Scott Black, United States Army, Judge Advocate General ("I can't imagine any military judge believing that an accused has had a full and fair hearing if all the Government's evidence that was introduced was all classified and the accused was not able to see any of it.") and Brigadier General James C. Walker, Staff Judge Advocate to the Commandant U. S. Marine Corps ("I concur with my colleagues that if we get to a point where the sole evidence against an accused is classified, he must be able to see that evidence. That's just essentially one of those elements of a full and fair trial."). In an editorial, The New York Times, a vociferous critic of the military commission procedures proposed under both the MCA and the Pentagon rules, noted the significance of the compromises that led to "Mr. Bush's agreement to drop his insistence on allowing prosecutors of suspected terrorists to introduce classified evidence kept secret from the defendant".
    • (2006) Standards of Military Tribunals: Hearing Before the H. Comm. on Armed. Servs.
  • 49
    • 70449407309 scopus 로고    scopus 로고
    • Sept. 22, at
    • N. Y. TIMES, Sept. 22, 2006, at A-20.
    • (2006) N. Y. Times
  • 50
    • 77951920732 scopus 로고    scopus 로고
    • Safeguarding counterintelligence means was clearly on the Senators' minds in the weeks leading up to the passage of the MCA. Weeks before it was passed, Senator William H. Frist noted that the bill which became the MCA "protects classified information-our critical sources and methods-from terrorists who could exploit it to plan another terrorist attack.", 243 daily ed. Sept. 27, statement of Sen. Frist. Senator Levin added, "the bill does not permit the use of secret evidence that is not revealed to the defendant. Instead, the bill clarifies that information about sources, methods, or activities by which the United States obtained evidence may be redacted before the evidence is provided to the defendant and introduced at trial".
    • Safeguarding counterintelligence means was clearly on the Senators' minds in the weeks leading up to the passage of the MCA. Weeks before it was passed, Senator William H. Frist noted that the bill which became the MCA "protects classified information-our critical sources and methods-from terrorists who could exploit it to plan another terrorist attack". 152 CONG. REC. S10, 243 (daily ed. Sept. 27, 2006) (statement of Sen. Frist). Senator Levin added, "the bill does not permit the use of secret evidence that is not revealed to the defendant. Instead, the bill clarifies that information about sources, methods, or activities by which the United States obtained evidence may be redacted before the evidence is provided to the defendant and introduced at trial".
    • (2006) Cong. Rec. , vol.152
  • 51
    • 77951920732 scopus 로고    scopus 로고
    • 244 daily ed. Sept. 27, statement of Sen. Levin. Senator Lindsey Graham, a member of the Senate Armed Services Committee, remarked: "We're going to protect our classified information, and we're going to protect our methods and sources".
    • Cong. Rec. S10, 244 (daily ed. Sept. 27, 2006) (statement of Sen. Levin). Senator Lindsey Graham, a member of the Senate Armed Services Committee, remarked: "We're going to protect our classified information, and we're going to protect our methods and sources".
    • (2006) Cong. Rec. , vol.152
  • 52
    • 79951923584 scopus 로고    scopus 로고
    • Graham says tribunal bill goes too far; senator upset by clause to withhold relevant evidence
    • Sept. 9, at
    • James Rosen, Graham Says Tribunal Bill Goes Too Far; Senator Upset By Clause to Withhold Relevant Evidence, MYRTLE BEACH SUN-NEWS, Sept. 9, 2006, at A1.
    • (2006) Myrtle Beach Sun-news
    • Rosen, J.1
  • 53
    • 79951861054 scopus 로고    scopus 로고
    • Classified information has been defined under the Classified Information Procedures Act CIPA as "any information or material that has been determined by the United States Government pursuant to an executive order, statute, or regulation, to require protection against unauthorized disclosure for reasons of national security.", § 1 a, CIPA defines "national security" as "the national defense and foreign relations of the United States".
    • Classified information has been defined under the Classified Information Procedures Act (CIPA) as "any information or material that has been determined by the United States Government pursuant to an executive order, statute, or regulation, to require protection against unauthorized disclosure for reasons of national security". 18 U. S. C. app. III, § 1 (a) (2000). CIPA defines "national security" as "the national defense and foreign relations of the United States".
    • (2000) U. S. C. App. III , vol.18
  • 54
    • 79951870698 scopus 로고    scopus 로고
    • Id
    • Id.
  • 55
    • 79951898555 scopus 로고    scopus 로고
    • Exec. Order No. 13, 292
    • Exec. Order No. 13, 292, 3 C. F. R. 196 (2004).
    • (2004) C. F. R , vol.3 , pp. 196
  • 56
    • 79951917397 scopus 로고    scopus 로고
    • The stated purpose of the order is to establish "a uniform system for classifying, safeguarding and declassifying national security information, including information relating to defense against transnational terrorism".
    • The stated purpose of the order is to establish "a uniform system for classifying, safeguarding and declassifying national security information, including information relating to defense against transnational terrorism".
  • 57
    • 79951937760 scopus 로고    scopus 로고
    • Id. With limited exception, the ability to classify information originally may be exercised only by the "original classification authorities, " namely, the President, the Vice President in the performance of executive duties and agency heads and officials designated by the President in the Federal Register
    • Id. With limited exception, the ability to classify information originally may be exercised only by the "original classification authorities, " namely, the President, the Vice President (in the performance of executive duties) and agency heads and officials designated by the President in the Federal Register.
  • 58
    • 79951884436 scopus 로고    scopus 로고
    • Id. at 197. These original classification authorities must receive training on Executive Order No. 13, 292 and its implementation directives including possible criminal, civil and administrative sanctions in connection with unauthorized disclosures of the information and may delegate their classification authority in writing to subordinate officials who have a "demonstrable and continuing" need to exercise it
    • Id. at 197. These original classification authorities must receive training on Executive Order No. 13, 292 and its implementation directives (including possible criminal, civil and administrative sanctions in connection with unauthorized disclosures of the information) and may delegate their classification authority in writing to subordinate officials who have a "demonstrable and continuing" need to exercise it.
  • 59
    • 79951871237 scopus 로고    scopus 로고
    • Id. at 197-98
    • Id. at 197-98.
  • 60
    • 79951900705 scopus 로고    scopus 로고
    • See id. at 215. Three classification sensitivity levels apply in the United States: i Top Secret, for information that, if publicly disclosed, reasonably could be expected to cause "exceptionally grave damage" to the national security; ii Secret, for information that, if publicly disclosed, reasonably could be expected to cause "serious damage" to the national security; and iii Confidential, for information that, if publicly disclosed, reasonably could be expected to cause "damage" to the national security if disclosed to the public. Note that it is impermissible to classify information in order to cover up illegal activities or merely because it would be embarrassing to state actors or others; information may only be classified to protect national security objectives
    • See id. at 215. Three classification sensitivity levels apply in the United States: (i) Top Secret, for information that, if publicly disclosed, reasonably could be expected to cause "exceptionally grave damage" to the national security; (ii) Secret, for information that, if publicly disclosed, reasonably could be expected to cause "serious damage" to the national security; and (iii) Confidential, for information that, if publicly disclosed, reasonably could be expected to cause "damage" to the national security if disclosed to the public. Note that it is impermissible to classify information in order to cover up illegal activities or merely because it would be embarrassing to state actors or others; information may only be classified to protect national security objectives.
  • 61
    • 79951931462 scopus 로고    scopus 로고
    • See id. at 200 setting forth restrictions on reasons for classification
    • See id. at 200 (setting forth restrictions on reasons for classification).
  • 62
    • 85015209284 scopus 로고    scopus 로고
    • The availability of the federal courts and courts-martial as legal avenues that recognize and protect classified information has led some to assert that detainee prosecutions should take place in those systems. An examination of whether suspected terrorists should be tried either under these or other legal regimes instead of by military commissions is beyond the scope of this article. Nevertheless, with respect to the use of federal courts, the prosecution of Zacharias Moussaoui serves as a cautionary tale as far as disclosure of sensitive information is concerned. To the dismay of many, Moussaoui was prosecuted in federal court. See, e.g., Fox television broadcast Dec. 16, statement of Sen. Joseph Lieberman "If Moussaoui is not a candidate for a military tribunal, who is?"
    • The availability of the federal courts and courts-martial as legal avenues that recognize and protect classified information has led some to assert that detainee prosecutions should take place in those systems. An examination of whether suspected terrorists should be tried either under these or other legal regimes instead of by military commissions is beyond the scope of this article. Nevertheless, with respect to the use of federal courts, the prosecution of Zacharias Moussaoui serves as a cautionary tale as far as disclosure of sensitive information is concerned. To the dismay of many, Moussaoui was prosecuted in federal court. See, e.g., Fox News Sunday (Fox television broadcast Dec. 16, 2001) (statement of Sen. Joseph Lieberman) ("If [Moussaoui] is not a candidate for a military tribunal, who is?");
    • (2001) Fox News Sunday
  • 63
    • 79951891788 scopus 로고    scopus 로고
    • Treatment and trial of certain non-citizens in the war against terrorism, hearing on military order on detention before the S. Armed servs
    • statement of Sen. Carl Levin "The glove fits so perfectly here for prosecution before a military commission".
    • Treatment and Trial of Certain Non-citizens in the War Against Terrorism, Hearing on Military Order on Detention Before the S. Armed Servs. Comm., 107th Cong. (2001) (statement of Sen. Carl Levin) ("The glove fits so perfectly here [for prosecution before a military commission].");
    • (2001) Comm., 107th Cong
  • 64
    • 79951887968 scopus 로고    scopus 로고
    • The moussaoui experiment
    • see also Editorial, Jan. 27, at, suggesting that Moussaoui's trial be moved to military court. Once Moussaoui was brought to the civilian courts, he benefited from the full range of rights afforded to criminal defendants who are American citizens, which he is not he is a French citizen. For certain technical reasons, his case was not a CIPA case. Regardless, the prosecution had great difficulty restricting Moussaoui's access to sensitive information, and especially to sensitive sources
    • see also Editorial, The Moussaoui Experiment, WASH. POST, Jan. 27, 2003, at A18 (suggesting that Moussaoui's trial be moved to military court). Once Moussaoui was brought to the civilian courts, he benefited from the full range of rights afforded to criminal defendants who are American citizens, which he is not (he is a French citizen). For certain technical reasons, his case was not a CIPA case. Regardless, the prosecution had great difficulty restricting Moussaoui's access to sensitive information, and especially to sensitive sources.
    • (2003) Wash. Post
  • 65
    • 79951904612 scopus 로고    scopus 로고
    • See, e.g., United States v. Moussaoui, 4th Cir
    • See, e.g., United States v. Moussaoui, 365 F.3d 292 (4th Cir. 2004);
    • (2004) F.3d , vol.365 , pp. 292
  • 66
    • 79951886199 scopus 로고    scopus 로고
    • The Moussaoui case: The mess from Minnesota
    • discussing the challenges in prosecuting Moussaoui in the civil criminal courts. Trying Guantánamo detainees and other suspected terrorists in the federal court system would involve similar complications
    • A. John Rasdan, The Moussaoui Case: The Mess from Minnesota, 31 WM. MITCHELL L. REV. 1417 (2005) (discussing the challenges in prosecuting Moussaoui in the civil criminal courts). Trying Guantánamo detainees and other suspected terrorists in the federal court system would involve similar complications.
    • (2005) Wm. Mitchell L. Rev. , vol.31 , pp. 1417
    • Rasdan, A.J.1
  • 67
    • 79951873825 scopus 로고
    • See, No. 96-823, at
    • See S. REP. No. 96-823, at 2 (1980)
    • (1980) S. Rep. , pp. 2
  • 68
    • 79951895750 scopus 로고    scopus 로고
    • reprinted in, 4295. The impetus for CIPA's passage was primarily to facilitate the criminal prosecution of Cold War-era spies
    • reprinted in 1980 U. S. C. C. A. N. 4294, 4295. The impetus for CIPA's passage was primarily to facilitate the criminal prosecution of Cold War-era spies.
    • U. S. C. C. A. N. , vol.1980 , pp. 4294
  • 70
    • 79951903746 scopus 로고    scopus 로고
    • See, app. III, § 5
    • See 18 U. S. C. app. III, § 5.
    • U. S. C. , vol.18
  • 71
    • 79951864569 scopus 로고    scopus 로고
    • See id. § 4 allowing for the deletion, substitution or summarizing of classified information during discovery. "Congress intended section 4 to clarify the court's powers under Fed. R. Crim. P. 16 d 1 to deny or restrict discovery in order to protect national security".
    • See id. § 4 (allowing for the deletion, substitution or summarizing of classified information during discovery). "Congress intended section 4 to clarify the court's powers under Fed. R. Crim. P. 16 (d) (1) to deny or restrict discovery in order to protect national security".
  • 72
    • 79951921446 scopus 로고
    • United States v. Sarkissian, 965 9th Cir
    • United States v. Sarkissian, 841 F.2d 959, 965 (9th Cir. 1988)
    • (1988) F.2d , vol.841 , pp. 959
  • 73
  • 74
    • 79951887073 scopus 로고    scopus 로고
    • reprinted in
    • reprinted in 1980 U. S. C. C. A. N. 4299-4300);
    • U. S. C. C. A. N. , vol.1980 , pp. 4299-4300
  • 75
    • 84892757005 scopus 로고
    • see also United States v. Yunis, 621 D. C. Cir, stating that § 4 of CIPA "contemplates an application of the general law of discovery in criminal cases to the classified information area with limitations imposed based on the sensitive nature of classified information"
    • see also United States v. Yunis, 867 F.2d 617, 621 (D. C. Cir. 1989) (stating that § 4 of CIPA "contemplates an application of the general law of discovery in criminal cases to the classified information area with limitations imposed based on the sensitive nature of classified information").
    • (1989) F.2d , vol.867 , pp. 617
  • 76
    • 79951904179 scopus 로고    scopus 로고
    • app. III § 4
    • 18 U. S. C. app. III § 4;
    • U. S. C. , vol.18
  • 77
    • 79951865125 scopus 로고
    • A critical review of the classified information procedures act
    • see also, 291
    • see also Brian Z. Tamanaha, A Critical Review of the Classified Information Procedures Act, 13 AM. J. CRIM. L. 277, 291 n. 73 (1986);
    • (1986) Am. J. Crim. L. , vol.13 , Issue.73 , pp. 277
    • Tamanaha, B.Z.1
  • 78
    • 18144398937 scopus 로고    scopus 로고
    • Secret evidence in the war on terror
    • Note, 1962-63
    • Note, Secret Evidence in the War on Terror, 118 HARV. L. REV. 1962, 1962-63 (2005);
    • (2005) Harv. L. Rev. , vol.118 , pp. 1962
  • 79
    • 79951926557 scopus 로고    scopus 로고
    • United States v. Libby, 48 D. D. C, An authorization by the court to so delete or substitute requires a "sufficient showing" by the Government. Although "sufficient showing" is not defined in CIPA, as discussed in greater detail below, courts have fashioned standards and tests to determine whether defendants should prevail on CIPA discovery requests for classified information. See infra notes 84-97 and accompanying text. Although beyond the scope of this article, note that CIPA also requires that a defendant file a notice describing the classified information he "reasonably expects to disclose or cause the disclosures of" at trial. 18 U. S. C. app. III, § 5 a. Hence, if classified information is disclosed to or otherwise possessed by a defendant who intends to use it in the proceedings, the Government may request a hearing to determine the "use, relevance or admissibility" of the information
    • United States v. Libby, 429 F. Supp. 2d 46, 48 (D. D. C. 2006). An authorization by the court to so delete or substitute requires a "sufficient showing" by the Government. Although "sufficient showing" is not defined in CIPA, as discussed in greater detail below, courts have fashioned standards and tests to determine whether defendants should prevail on CIPA discovery requests for classified information. See infra notes 84-97 and accompanying text. Although beyond the scope of this article, note that CIPA also requires that a defendant file a notice describing the classified information he "reasonably expects to disclose or cause the disclosures of" at trial. 18 U. S. C. app. III, § 5 (a). Hence, if classified information is disclosed to (or otherwise possessed by) a defendant who intends to use it in the proceedings, the Government may request a hearing to determine the "use, relevance or admissibility" of the information.
    • (2006) F. Supp. 2d , vol.429 , pp. 46
  • 80
    • 79951867203 scopus 로고    scopus 로고
    • Id. § 6 a. If the court then rules that the classified information is admissible, the Government may move to substitute or summarize the information
    • Id. § 6 (a). If the court then rules that the classified information is admissible, the Government may move to substitute or summarize the information.
  • 81
    • 79951926558 scopus 로고    scopus 로고
    • Id. § 6 c 1. In fact, the court is required to grant the Government's motion for an alternative to outright disclosure if that alternative will provide the defendant "with substantially the same ability to make his defense as would disclosure of the specified classified information. "
    • Id. § 6 (c) (1). In fact, the court is required to grant the Government's motion for an alternative to outright disclosure if that alternative will provide the defendant "with substantially the same ability to make his defense as would disclosure of the specified classified information. "
  • 82
    • 79951863746 scopus 로고    scopus 로고
    • Id
    • Id.
  • 83
    • 79951882617 scopus 로고    scopus 로고
    • MCM, supra note, 505 c
    • MCM, supra note 11, MIL. R. EVID. 505 (c).
    • Mil. R. Evid. , vol.11
  • 84
    • 77951964786 scopus 로고    scopus 로고
    • See id, 505 g 2. This evidentiary rule provides: Limited disclosure. The military judge, upon motion of the Government, shall authorize A the deletion of specified items of classified information from documents to be made available to the defendant, B the substitution of a portion or summary of the information for such classified documents, or C the substitution of a statement admitting relevant facts that the classified information would tend to prove, unless the military judge determines that disclosure of the classified information itself is necessary to enable the accused to prepare for trial. The Government's motion and any materials submitted in support thereof shall, upon request of the Government, be considered by the military judge in camera and shall not be disclosed to the accused
    • See id. MIL. R. EVID. 505 (g) (2). This evidentiary rule provides: Limited disclosure. The military judge, upon motion of the Government, shall authorize (A) the deletion of specified items of classified information from documents to be made available to the defendant, (B) the substitution of a portion or summary of the information for such classified documents, or (C) the substitution of a statement admitting relevant facts that the classified information would tend to prove, unless the military judge determines that disclosure of the classified information itself is necessary to enable the accused to prepare for trial. The Government's motion and any materials submitted in support thereof shall, upon request of the Government, be considered by the military judge in camera and shall not be disclosed to the accused.
    • Mil. R. Evid.
  • 85
    • 79951930153 scopus 로고    scopus 로고
    • Id
    • Id.
  • 86
    • 79951876022 scopus 로고    scopus 로고
    • Id. Similar to § 6 a of CIPA, MRE 505 allows the Government to make a motion for an in camera proceeding to determine whether, and in what form, classified information may be disclosed and used during the court-martial trial proceeding
    • Id. Similar to § 6 (a) of CIPA, MRE 505 allows the Government to make a motion for an in camera proceeding to determine whether, and in what form, classified information may be disclosed and used during the court-martial trial proceeding.
  • 87
    • 77951964786 scopus 로고    scopus 로고
    • Id, 505 i 4. Classified information may only be disclosed if it is "relevant and necessary to an element of the offense or a legally cognizable defense".
    • Id. MIL. R. EVID. 505 (i) (4). Classified information may only be disclosed if it is "relevant and necessary to an element of the offense or a legally cognizable defense".
    • Mil. R. Evid.
  • 88
    • 77951964786 scopus 로고    scopus 로고
    • Id, 505 i 4 B
    • Id. MIL. R. EVID. 505 (i) (4) (B);
    • Mil. R. Evid.
  • 89
    • 79951914816 scopus 로고
    • see also United States v. Lonetree, 856 N. M. C. M. R
    • see also United States v. Lonetree, 31 M. J. 849, 856 (N. M. C. M. R. 1990)
    • (1990) M. J. , vol.31 , pp. 849
  • 90
    • 79951868636 scopus 로고
    • aff'd, C. M. A
    • aff'd 35 M. J. 396 (C. M. A. 1992)
    • (1992) M. J. , vol.35 , pp. 396
  • 91
    • 79951893606 scopus 로고
    • cert. denied
    • cert. denied, 507 U. S. 1017 (1993).
    • (1993) U. S. , vol.507 , Issue.1017
  • 92
    • 79951886186 scopus 로고    scopus 로고
    • note
    • Specifically, § 949d (f) (1) of the MCA states: (f) Protection of Classified Information-(1) NATIONAL SECURITY PRIVILEGE-(A) Classified information shall be protected and is privileged from disclosure if disclosure would be detrimental to the national security. The rule in the preceding sentence applies to all stages of the proceedings of military commissions under this chapter. (B) The privilege referred to in subparagraph (A) may be claimed by the head of the executive or military department or Government agency concerned based on a finding by the head of that department or agency that-(i) the information is properly classified; and (ii) disclosure of the information would be detrimental to the national security. Note that the military judge may not assess the validity of the national security privilege. Rather, it appears that Congress intended to defer exclusively to the department or agency head on the substance of the privilege assertion, as determined in accordance with § 949d (f) (1) (B), and that the military judge's review consists merely of ensuring that the relevant department or agency head has made the required finding as to (i) the proper classification of the information at issue, and (ii) the potential impact of its disclosure.
  • 93
    • 79951938603 scopus 로고    scopus 로고
    • § 949d f 1 LEXIS
    • 10 U. S. C. S. § 949d (f) (1) (LEXIS 2007).
    • (2007) U. S. C. S , vol.10
  • 94
    • 77951920732 scopus 로고    scopus 로고
    • the words of Senator John McCain, "While ensuring a full and fair process, the legislation that became the MCA also recognizes the important role that classified information is likely to play in these trials. The legislation expressly provides the Government with a privilege to protect classified information. ", at, 275 daily ed. Sept. 7, statement of Sen. McCain
    • In the words of Senator John McCain, "[W]hile ensuring a full and fair process, the legislation [that became the MCA] also recognizes the important role that classified information is likely to play in these trials. The legislation expressly provides the Government with a privilege to protect classified information. " 152 CONG. REC. at S10, 275 (daily ed. Sept. 7, 2006) (statement of Sen. McCain).
    • (2006) Cong. Rec. , vol.152
  • 95
    • 79951940996 scopus 로고    scopus 로고
    • Note that even after discovery, during an examination of a witness, trial counsel may object to admission into evidence of any classified information and the military judge who may choose to review trial counsel's claim of privilege in camera and on an ex parte basis must thereafter safeguard the information, § 949d f 2 C stating, in relevant part: "During the examination of any witness, trial counsel may object to any question, line of inquiry, or motion to admit evidence that would require the disclosure of classified information. Following such an objection, the military judge shall take suitable action to safeguard such classified information. "
    • Note that even after discovery, during an examination of a witness, trial counsel may object to admission into evidence of any classified information and the military judge (who may choose to review trial counsel's claim of privilege in camera and on an ex parte basis) must thereafter safeguard the information. 10 U. S. C. S. § 949d (f) (2) (C) (stating, in relevant part: "During the examination of any witness, trial counsel may object to any question, line of inquiry, or motion to admit evidence that would require the disclosure of classified information. Following such an objection, the military judge shall take suitable action to safeguard such classified information. ").
    • U. S. C. S , vol.10
  • 96
    • 79951901953 scopus 로고    scopus 로고
    • A parallel to this is found in CIPA, which requires that the court take protective action when the defense's questioning of a witness may require the disclosure of classified information, app. III § 8 c
    • A parallel to this is found in CIPA, which requires that the court take protective action when the defense's questioning of a witness may require the disclosure of classified information. 18 U. S. C. app. III § 8 (c) (2000).
    • (2000) U. S. C. , vol.18
  • 97
    • 79951935341 scopus 로고    scopus 로고
    • Section 949d f 2 A of the MCA states as follows: A ALTERNATIVES TO DISCLOSURE.-To protect classified information from disclosure, the military judge, upon motion of trial counsel, shall authorize, to the extent practicable-i the deletion of specified items of classified information from documents to be introduced as evidence before the military commission; ii the substitution of a portion or summary of the information for such classified documents; or iii the substitution of a statement of relevant facts that the classified information would tend to prove
    • Section 949d (f) (2) (A) of the MCA states as follows: (A) ALTERNATIVES TO DISCLOSURE.-To protect classified information from disclosure, the military judge, upon motion of trial counsel, shall authorize, to the extent practicable-(i) the deletion of specified items of classified information from documents to be introduced as evidence before the military commission; (ii) the substitution of a portion or summary of the information for such classified documents; or (iii) the substitution of a statement of relevant facts that the classified information would tend to prove.
  • 98
    • 79951860266 scopus 로고    scopus 로고
    • Id
    • Id.
  • 99
    • 79951877767 scopus 로고    scopus 로고
    • Id. § 949d f 2 B
    • Id. § 949d (f) (2) (B).
  • 100
    • 79951885755 scopus 로고    scopus 로고
    • This explicit protection of counterintelligence means was obviously intentional. In the words of Senator Lindsey Graham, We struck a great balance.... We need to be very clear that, in prosecuting the terrorists during a time of war, we do not have to reveal our sources and methods to protect us, our classified procedures.... But if the Government decides to provide information to the jury that would result in a conviction, sending someone to jail for a long period of time, or to the death chamber, an American trial must allow that person to know what the jury found them guilty of so they can confront the evidence
    • This explicit protection of counterintelligence means was obviously intentional. In the words of Senator Lindsey Graham, We struck a great balance.... We need to be very clear that, in prosecuting the terrorists during a time of war, we do not have to reveal our sources and methods to protect us, our classified procedures.... But if the Government decides to provide information to the jury that would result in a conviction, sending someone to jail for a long period of time, or to the death chamber, an American trial must allow that person to know what the jury found them guilty of so they can confront the evidence.
  • 101
    • 79951887072 scopus 로고    scopus 로고
    • The detainee deal: The white house won-and so did McCain
    • Sept. 22, available at
    • Byron York, The Detainee Deal: The White House Won-and So Did McCain, NAT'L REV. ONLINE, Sept. 22, 2006, available at http://article.nationalreview. com/?q=YWYON TjhOGVjMGRkNTBkZGY1NTZkYTg4MGViY2I1ZTE=.
    • (2006) Nat'l Rev. Online
    • York, B.1
  • 102
    • 77954967128 scopus 로고    scopus 로고
    • Protecting national security evidence while prosecuting war crimes: Problems and lessons for international justice from the ICTY
    • The Government's protectiveness over such information in legal proceedings is not limited to restricting disclosure in U. S. courts; rather, it also has gone to great pains to protect its classified sources and methods in the context of international criminal justice. See, e.g., For instance, the U. S. Government allowed its former officials to testify before the ICTY at Slobodan Milošević's trial only in a closed session with two Government officials present and with permission to delete any testimony from the record that it believed compromised U. S. national security
    • The Government's protectiveness over such information in legal proceedings is not limited to restricting disclosure in U. S. courts; rather, it also has gone to great pains to protect its classified sources and methods in the context of international criminal justice. See, e.g., Laura Moranchek, Protecting National Security Evidence While Prosecuting War Crimes: Problems and Lessons for International Justice from the ICTY, 31 YALE J. INT'L L. 477 (2006). For instance, the U. S. Government allowed its former officials to testify before the ICTY at Slobodan Milošević's trial only in a closed session with two Government officials present and with permission to delete any testimony from the record that it believed compromised U. S. national security.
    • (2006) Yale J. Int'l L. , vol.31 , pp. 477
    • Moranchek, L.1
  • 103
    • 79951875592 scopus 로고    scopus 로고
    • Id. at 484. The reason given for these conditions to testimony was as follows: "It is a matter of intelligence collection and a fear that sources and methods of obtaining information could be jeopardized if the former officials have to testify in open court".
    • Id. at 484. The reason given for these conditions to testimony was as follows: "It is a matter of intelligence collection and a fear that sources and methods of obtaining information could be jeopardized if [the former officials] have to testify in open court".
  • 104
    • 79951923180 scopus 로고    scopus 로고
    • Id.
    • Id.
  • 105
    • 79951919534 scopus 로고    scopus 로고
    • Wesley clark testifies in secret at milosevic trial
    • see also, Dec. 16, at
    • see also Ian Black, Wesley Clark Testifies in Secret at Milosevic Trial, GUARDIAN, Dec. 16, 2003, at 11;
    • (2003) Guardian , pp. 11
    • Black, I.1
  • 106
    • 79951885308 scopus 로고    scopus 로고
    • Closed session ordered for envoy's war crimes testimony
    • June 14, at
    • Closed Session Ordered for Envoy's War Crimes Testimony, AUSTRALIAN, June 14, 2002, at 9;
    • (2002) Australian , pp. 9
  • 107
    • 79951895328 scopus 로고    scopus 로고
    • Clark testifies against milosevic at hague tribunal
    • Dec. 16, at
    • Elaine Sciolino, Clark Testifies Against Milosevic at Hague Tribunal, N. Y. TIMES, Dec. 16, 2003, at A3.
    • (2003) N. Y. Times
    • Sciolino, E.1
  • 108
    • 79951862895 scopus 로고    scopus 로고
    • An examination of the validity or morality of detainee interrogation techniques employed by any DOD or governmental agency program is beyond the scope of this article. Nevertheless, it cannot be disputed that interrogations of suspected high-ranking terrorists have, at times, proved modestly effective in yielding useful intelligence. The CIA's High Value Terrorist Detainee Program has been particularly effective in this regard, reporting success in using interrogation methods that have led to the capture of al Qaeda operations chief Khalid Shaykh Mohammad, better known as the mastermind of the September 11 attacks, and Ramzi bin al-Shibh, another September 11 plotter
    • An examination of the validity or morality of detainee interrogation techniques employed by any DOD or governmental agency program is beyond the scope of this article. Nevertheless, it cannot be disputed that interrogations of suspected high-ranking terrorists have, at times, proved modestly effective in yielding useful intelligence. The CIA's High Value Terrorist Detainee Program has been particularly effective in this regard, reporting success in using interrogation methods that have led to the capture of al Qaeda operations chief Khalid Shaykh Mohammad, better known as the mastermind of the September 11 attacks, and Ramzi bin al-Shibh, another September 11 plotter.
  • 109
    • 79951872518 scopus 로고    scopus 로고
    • See, Once captured, Khalid Shaykh Mohammad himself appears to have provided a plethora of information about other terrorists and planned operations
    • See OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE, SUMMARY OF THE HIGH VALUE TERRORIST DETAINEE PROGRAM (2006), http://www.dni.gov/announcements/ content/TheHighValueDetaineeProgram.pdf. Once captured, Khalid Shaykh Mohammad himself appears to have provided a plethora of information about other terrorists and planned operations.
    • (2006) Office of the Director of National Intelligence, Summary of the High Value Terrorist Detainee Program
  • 110
    • 79951936999 scopus 로고    scopus 로고
    • See id. Information from interrogations has also played an important part in averting additional terrorist plots, including one involving the destruction of commercial airliners from London in the summer of 2006
    • See id. Information from interrogations has also played an important part in averting additional terrorist plots, including one involving the destruction of commercial airliners from London in the summer of 2006.
  • 111
    • 75249099063 scopus 로고    scopus 로고
    • The reach of war; new generation of qaeda chiefs is seen on rise
    • See, Apr. 2, at
    • See Mark Mazzetti, The Reach of War; New Generation of Qaeda Chiefs Is Seen on Rise, N. Y. TIMES, Apr. 2, 2007, at A-1.
    • (2007) N. Y. Times
    • Mazzetti, M.1
  • 112
    • 79951929254 scopus 로고    scopus 로고
    • As noted above, some critics have focused exclusively on potential invocation of privilege over counter intelligence sources, methods and activities to conceal in commission proceedings abusive and/or illegal interrogation techniques that may either embarrass the Government or permit coerced statements. See supra note 14. as one commentator states bluntly: The bill that became the MCA includes a number of provisions that protect classified "sources, methods, or activities" against being revealed. The likely impact of such provisions is to bar any inquiry into the CIA's abusive interrogation practices. For sources, substitute "disappeared" detainees; for methods, substitute torture, and for activities, substitute water-boarding, stress positions, and days without sleep.
    • As noted above, some critics have focused exclusively on potential invocation of privilege over counter intelligence sources, methods and activities to conceal in commission proceedings abusive and/or illegal interrogation techniques that may either embarrass the Government or permit coerced statements. See supra note 14. as one commentator states bluntly: The bill [that became the MCA] includes a number of provisions that protect classified "sources, methods, or activities" against being revealed. The likely impact of such provisions is to bar any inquiry into the CIA's abusive interrogation practices. (For sources, substitute " disappeared" detainees; for methods, substitute torture, and for activities, substitute water-boarding, stress positions, and days without sleep.)
  • 114
    • 79951884875 scopus 로고    scopus 로고
    • note
    • see also HUMAN RIGHTS WATCH Q & A, supra note 14, at 4 ("Unless military commission judges are extremely vigilant [in the application of protection over classified sources, methods and activities], the prohibition on evidence obtained through torture could be become virtually meaningless."). While beyond the scope of this article, the admission of potentially "coerced" evidence is quite limited under the MCA. A statement obtained prior to the enactment of the Detainee Treatment Act of 2005 (42 U. S. C. S. § 2000dd (LEXIS 2007) [hereinafter DTA 2005]) where the degree of coercion is disputed, may be admitted only if the military judge concludes that (i) the statement is reliable and possesses sufficient probative value, and (ii) that the interests of justice would be best served by admitting the statement; for statement obtained after enactment of DTA 2005, the military judge also must conclude that the interrogation methods used were not cruel, inhuman, or degrading. 10 U. S. C. S. § 948r.
  • 115
    • 79951884865 scopus 로고    scopus 로고
    • Improving human intelligence has been a common theme in administrative and congressional reviews since the September 11th attacks. See, e.g., H. SUBCOMM. ON TERRORISM & HOMELAND SEC., H. PERM. SELECT COMM. ON INTELLIGENCE, REPORT ON COUNTERTERRORISM INTELLIGENCE CAPABILITIES AND PERFORMANCE PRIOR TO 9-11, 107th Cong. 2 2002, available at, hereinafter Counterterrorism Capabilities Report recommending that CIA leadership "penetrate terrorist cells, disrupt terrorist operations and capture and render terrorists to law enforcement.... More core collectors need to be put on the streets.". The lack of human intelligence in Afghanistan and Iraq prior to the September 11th attacks is viewed as a major intelligence community failure. In fact, former National Security Advisor Samuel Berger testified before Congress that the United States maintained no significant intelligence assets in Afghanistan after 1989
    • Improving human intelligence has been a common theme in administrative and congressional reviews since the September 11th attacks. See, e.g., H.
  • 117
    • 79951917814 scopus 로고    scopus 로고
    • see also, supra, at, "CIA did not sufficiently penetrate the al-Qa'ida organization before September 11th. Because of the perceived reduction in the threat environment... and the concomitant reduction in resources for basic human intelligence collection, there were fewer operations, officers, fewer stations, fewer agents, and fewer intelligence reports produced".
    • see also COUNTERTERRORISM CAPABILITIES REPORT, supra, at 2 ("CIA did not sufficiently penetrate the al-Qa'ida organization before September 11th. Because of the perceived reduction in the threat environment... and the concomitant reduction in resources for basic human intelligence collection, there were fewer operations, officers, fewer stations, fewer agents, and fewer intelligence reports produced.").
    • Counterterrorism Capabilities Report , pp. 2
  • 118
    • 79951911291 scopus 로고    scopus 로고
    • According to a Department of Justice publication, this program is narrowly focused on international calls for which there is a reasonable basis to believe that one party to the communication is affiliated with al Qaeda. U. S. DEP'T OF JUSTICE
    • According to a Department of Justice publication, this program is narrowly focused on international calls for which there is a reasonable basis to believe that one party to the communication is affiliated with al Qaeda. U. S. DEP'T OF JUSTICE, THE NSA PROGRAM TO DETECT AND PREVENT TERRORIST ATTACKS: MYTH V. REALITY 2 (2006), http://www.usdoj.gov/opa/documents/nsa-myth-v-reality.pdf.
    • (2006) The Nsa Program to Detect and Prevent Terrorist Attacks: Myth V. Reality , pp. 2
  • 119
    • 79951911670 scopus 로고    scopus 로고
    • note
    • Although not aimed at intercepting an enemy nation's signals, the TSP nevertheless falls within classic signals intelligence. According to the DOD Definitions, signals intelligence is defined as "communications intelligence, electronic intelligence, and foreign instrumentation signals intelligence, however transmitted". DOD Dictionary, supra note 6, at 492. The use of signals intelligence to track and capture non-state figures through their communications is not new. One noted case where it has been used is that of Kurdistan Workers' Party leader Abdullah Oçalan, who led a bloody war in the 1990s against Turkish forces for an independent Kurdish state. (There are approximately twenty-five million Kurds, primarily in Iraq, Iran, Syria and southeast Turkey, making them the largest ethnic population without a state in the world.) Oçalan was captured in 1999 in Kenya after being expelled some years earlier from Syria and subsequently being freed from house arrest in Italy. The exact circumstances of how he was located and apprehended are not clear, although The New York Times published a report citing unnamed U. S. sources claiming that U. S., British and Israeli intelligence agents tracked his mobile phone activity and passed on information about his whereabouts to Turkey.
  • 120
    • 0006631552 scopus 로고    scopus 로고
    • U. S. Helped turkey find and capture kurd rebel
    • Feb. 20, at, The United States officially maintains it did not participate in the capture of Oçalan
    • Tim Weiner, U. S. Helped Turkey Find and Capture Kurd Rebel, N. Y. TIMES, Feb. 20, 1999, at 1. The United States officially maintains it did not participate in the capture of Oçalan.
    • (1999) N. Y. Times , pp. 1
    • Weiner, T.1
  • 121
    • 33747589464 scopus 로고    scopus 로고
    • Bush lets U. S. Spy on callers without courts
    • The TSP was disclosed to the public in December 2005. See, e.g., Dec. 16, at, In a recent suit brought by the American Civil Liberties Union ACLU and certain journalists, academics and lawyers, a U. S. district court judge in Michigan held that the program's warrantless monitoring violated the Separation of Powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, and statutory law
    • The TSP was disclosed to the public in December 2005. See, e.g., James Risen & Eric Lichtabu, Bush Lets U. S. Spy on Callers Without Courts, N. Y. TIMES, Dec. 16, 2005, at A-1. In a recent suit brought by the American Civil Liberties Union (ACLU) and certain journalists, academics and lawyers, a U. S. district court judge in Michigan held that the program's warrantless monitoring violated the Separation of Powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, and statutory law.
    • (2005) N. Y. Times
    • Risen, J.1    Lichtabu, E.2
  • 122
    • 84894325177 scopus 로고    scopus 로고
    • See ACLU vs. NSA, 782 E. D. Mich, The Sixth Circuit, however, vacated the district court's order and remanded the case with instructions that it be dismissed for lack of jurisdiction based on the plaintiffs' inability to establish standing for any of their asserted claims
    • See ACLU vs. NSA, 438 F. Supp. 2d 754, 782 (E. D. Mich. 2006). The Sixth Circuit, however, vacated the district court's order and remanded the case with instructions that it be dismissed for lack of jurisdiction based on the plaintiffs' inability to establish standing for any of their asserted claims.
    • (2006) F. Supp. 2d , vol.438 , pp. 754
  • 123
    • 79951911671 scopus 로고    scopus 로고
    • See ACLU v. NSA, Nos. 06-2095/2140, at 35 6th Cir. July 6, 2007. The Government had argued that the President had the "inherent" authority under the Constitution to engage in signals intelligence as Commander-in-Chief, that the AUMF implicitly authorized the activity and that the telephone conversations were intercepted only where the Government "has a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda". Attorney General Alberto Gonzales and General Michael Hayden, Principal Deputy Director for National Intelligence, White House Press Briefing, Dec. 19, 2005, available at
    • See ACLU v. NSA, Nos. 06-2095/2140, at 35 (6th Cir. July 6, 2007). The Government had argued that the President had the "inherent" authority under the Constitution to engage in signals intelligence as Commander-in-Chief, that the AUMF implicitly authorized the activity and that the telephone conversations were intercepted only where the Government "has a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda". Attorney General Alberto Gonzales and General Michael Hayden, Principal Deputy Director for National Intelligence, White House Press Briefing, Dec. 19, 2005, available at http://www.whitehouse.gov/news/releases/2005/12/20051219-1.html.
  • 124
    • 79951924844 scopus 로고    scopus 로고
    • supra note 4, at, The operatives spent more than $270, 000 in the United States and incurred "additional expenses including travel to obtain passports and visas, travel to the United States, expenses incurred by the plot leader and facilitators outside the United States, and expenses incurred by the people selected to be hijackers who ultimately did not participate".
    • 9/11 COMMISSION REPORT, supra note 4, at 169. The operatives spent more than $270, 000 in the United States and incurred "additional expenses includ[ing] travel to obtain passports and visas, travel to the United States, expenses incurred by the plot leader and facilitators outside the United States, and expenses incurred by the people selected to be hijackers who ultimately did not participate".
    • Commission Report , vol.9-11 , pp. 169
  • 125
    • 79951872528 scopus 로고    scopus 로고
    • Id. at 499 n. 131
    • Id. at 499 n. 131.
  • 126
    • 79951882201 scopus 로고    scopus 로고
    • As the future co-Chairman of the 9/11 Commission, Lee H. Hamilton, noted: Tracking al Qaeda financing is an effective way to locate terrorist operatives and supporters and to disrupt terrorist plots.... Following the money to identify terrorist operatives and sympathizers provides a particularly powerful tool in the fight against terrorist groups. use of this tool almost always remains invisible to the general public, but it is a critical part of the overall campaign against al Qaeda. National Commission on Terrorist Attacks Upon the United States, Statement Before the S. Comm. on Banking, Housing & Urban Affairs, 108th Cong. 2004 statement of former Vice Chair Lee H. Hamilton and Commissioner Slade Gorton, available at
    • As the future co-Chairman of the 9/11 Commission, Lee H. Hamilton, noted: [T]racking al Qaeda financing is an effective way to locate terrorist operatives and supporters and to disrupt terrorist plots.... Following the money to identify terrorist operatives and sympathizers provides a particularly powerful tool in the fight against terrorist groups. use of this tool almost always remains invisible to the general public, but it is a critical part of the overall campaign against al Qaeda. National Commission on Terrorist Attacks Upon the United States, Statement Before the S. Comm. on Banking, Housing & Urban Affairs, 108th Cong. (2004) (statement of former Vice Chair Lee H. Hamilton and Commissioner Slade Gorton), available at http://banking.senate.gov/ -files/joint-st.pdf.
  • 127
    • 79951875591 scopus 로고    scopus 로고
    • This executive order states, in relevant part: Because of the pervasiveness and expansiveness of the financial foundations of foreign terrorists, this Order authorizes the U. S. Government to block the assets of individuals and entities that provide support, services, or assistance to, or otherwise associate with, terrorists and terrorist organizations designated under this Order, as well as their subsidiaries, front organizations, agents, and associates
    • This executive order states, in relevant part: [B]ecause of the pervasiveness and expansiveness of the financial foundations of foreign terrorists, [this] Order authorizes the U. S. Government to block the assets of individuals and entities that provide support, services, or assistance to, or otherwise associate with, terrorists and terrorist organizations designated under [this] Order, as well as their subsidiaries, front organizations, agents, and associates.... I also find that because of the pervasiveness and expansiveness of the financial foundation of foreign terrorists, financial sanctions may be appropriate for those foreign persons that support or otherwise associate with these foreign terrorists. I also find that a need exists for further consultation and cooperation with, and sharing of information by, United States and foreign financial Exec. Order No. 13, 224, 3 C. F. R. 786 (2002). Through this executive order, President Bush froze the assets of twenty-seven organizations and individuals having suspected links to terrorists. Thirty-nine names were added within the next month.
    • (2002) C. F. R , vol.3 , pp. 786
  • 128
    • 79951908737 scopus 로고    scopus 로고
    • As the 9/11 Commission noted, "al Qaeda had many sources of funding and a pre-September 11th annual budget estimated at $30 million. " 9/11, supra note 4, at 170
    • As the 9/11 Commission noted, "al Qaeda had many sources of funding and a pre-September 11th annual budget estimated at $30 million. " 9/11 COMMISSION REPORT, supra note 4, at 170.
    • Commission Report
  • 129
    • 79951902814 scopus 로고    scopus 로고
    • It also uses regional financial officers to further manage its funds
    • ROHAN GUNARATNA, INSIDE AL QAEDA: GLOBAL NETWORK OF TERROR 81 (2003). It also uses regional financial officers to further manage its funds.
    • (2003) Rohan Gunaratna, Inside Al Qaeda: Global Network of Terror , pp. 81
  • 130
    • 79951878649 scopus 로고    scopus 로고
    • Id
    • Id.
  • 131
    • 79951904611 scopus 로고    scopus 로고
    • Id. at 83-84. Among other things, this document instructs the reader how to counterfeit currency and credit cards and forge official documents
    • Id. at 83-84. Among other things, this document instructs the reader how to counterfeit currency and credit cards and forge official documents.
  • 132
    • 79951889248 scopus 로고    scopus 로고
    • Id. Interestingly, it articulates several financial security principles, including the following: i funds should be either invested for financial return or set aside and scattered for use in operations; ii very few members should know the location of funds at any one time; and iii monies should be left with non-members of the organization
    • Id. Interestingly, it articulates several financial security principles, including the following: (i) funds should be either invested for financial return or set aside (and scattered) for use in operations; (ii) very few members should know the location of funds at any one time; and (iii) monies should be left with non-members of the organization.
  • 133
    • 79951874237 scopus 로고    scopus 로고
    • Id. at 84
    • Id. at 84.
  • 134
    • 79951879448 scopus 로고    scopus 로고
    • As the 9/11 Commission pointed out, "Al Qaeda and its friends took advantage of Islam's strong calls for charitable giving, zakat. These financial facilitators also appeared to rely heavily on certain imams at mosques who were willing to divert zakat donations to al Qaeda's cause.", supra note 4, at, Some of these donations have been generated from unwitting philanthropic organizations
    • As the 9/11 Commission pointed out, "Al Qaeda and its friends took advantage of Islam's strong calls for charitable giving, zakat. These financial facilitators also appeared to rely heavily on certain imams at mosques who were willing to divert zakat donations to al Qaeda's cause". 9/11 COMMISSION REPORT, supra note 4, at 170. Some of these donations have been generated from unwitting philanthropic organizations.
    • Commission Report , vol.9-11 , pp. 170
  • 135
    • 7644226084 scopus 로고    scopus 로고
    • Strangling the hydra: Targeting al Qaeda's finances
    • See, e.g., in, James F. Hodge, Jr. & Gideon Rose eds.
    • See, e.g., William E. Wechsler, Strangling the Hydra: Targeting al Qaeda's Finances, in HOW DID THIS HAPPEN? TERRORISM AND THE NEW WAR 137 (James F. Hodge, Jr. & Gideon Rose eds., 2001).
    • (2001) How Did this Happen? Terrorism and the New War , pp. 137
    • Wechsler, W.E.1
  • 136
    • 79951930610 scopus 로고    scopus 로고
    • Indeed, it appears "al Qaeda found fertile fund-raising ground in Saudi Arabia, where extreme religious views are common and charitable giving was both essential to the culture and subject to very limited oversight.", supra note 4, at
    • Indeed, it appears "al Qaeda found fertile fund-raising ground in Saudi Arabia, where extreme religious views are common and charitable giving was both essential to the culture and subject to very limited oversight". 9/11 COMMISSION REPORT, supra note 4, at 171.
    • Commission Report , vol.9-11 , pp. 171
  • 137
    • 79951940252 scopus 로고    scopus 로고
    • GUNARATNA, supra note 57, at 87
    • GUNARATNA, supra note 57, at 87.
  • 138
    • 79951870691 scopus 로고    scopus 로고
    • ® truck by convicted terrorist Muhammad Salameh and his co-bombers in connection with the 1993 World Trade Center bombing. However, it may also mean day-to-day expenditures, such as rent payments for sleeper cells and training facility necessities
    • ® truck by convicted terrorist Muhammad Salameh and his co-bombers in connection with the 1993 World Trade Center bombing. However, it may also mean day-to-day expenditures, such as rent payments for sleeper cells and training facility necessities.
  • 139
    • 79951899374 scopus 로고    scopus 로고
    • GUNARATNA, supra note 57, at 90
    • GUNARATNA, supra note 57, at 90.
  • 141
    • 0039094842 scopus 로고    scopus 로고
    • Al Qaeda cash tied to diamond trade: Sale of gems from sierra leone rebels raised millions, sources say
    • See also, Nov. 2, at, reporting that one European investigator opined: "I now believe that to cut off al Qaeda funds and laundering activities you have to cut off the diamond pipeline.... We are talking about millions and maybe tens of millions of dollars in profits and laundering".
    • See also Douglas Farah, Al Qaeda Cash Tied to Diamond Trade: Sale of Gems From Sierra Leone Rebels Raised Millions, Sources Say, WASH. POST, Nov. 2, 2001, at A01 (reporting that one European investigator opined: "I now believe that to cut off al Qaeda funds and laundering activities you have to cut off the diamond pipeline.... We are talking about millions and maybe tens of millions of dollars in profits and laundering.");
    • (2001) Wash. Post.
    • Farah, D.1
  • 142
    • 79951910846 scopus 로고    scopus 로고
    • Al Qaeda bought diamonds before
    • Aug. 7, reporting witness accounts that six senior al Qaeda associates dealt directly with then-Liberian President Charles Taylor and other warlords beginning in 1999
    • Al Qaeda Bought Diamonds Before 9/11, USA Today, Aug. 7, 2004 (reporting witness accounts that six senior al Qaeda associates dealt directly with then-Liberian President Charles Taylor and other warlords beginning in 1999).
    • (2004) USA Today , vol.9-11
  • 143
    • 79951930610 scopus 로고    scopus 로고
    • Nevertheless, the 9/11 Commission concluded: "we have seen no persuasive evidence that al-Qaeda funded itself by trading in African conflict diamonds.", supra note 4, at
    • Nevertheless, the 9/11 Commission concluded: "we have seen no persuasive evidence that al-Qaeda funded itself by trading in African conflict diamonds". 9/11 COMMISSION REPORT, supra note 4, at 171.
    • Commission Report , vol.9-11 , pp. 171
  • 144
    • 79951869084 scopus 로고    scopus 로고
    • note
    • Several forms of hawala exist, mostly in South Asia and in the Middle East. In its simplest form, it consists of a broker located in one location taking a fee to transfer money to a recipient in a different location through a trusted contact of the broker. The steps of a typical hawala transaction are as follows: (i) the sender gives the broker the amount to be transferred, plus his fee (typically about one percent of the transaction), (ii) the broker notifies a personal contact in proximity of the recipient of the intended transfer through e-mail, instant message, phone, or fax, (ii) the contact approaches the recipient, who often must provide a pre-designated password or detail to complete the transaction, (iii) the contact extends the money to the recipient, and (iv) the broker and his contact keep detailed ledgers and either cancel existing debt or physically settle the transaction by falsifying invoices for phantom goods and services or by providing goods (including commodities such as gold and diamonds) or services of equivalent value as an alternative to cash. The system relies on a high level of trust between the broker and his contact, as their bilateral settlement is not secured. Large-scale use of hawala appears to have begun in the 1940s when, for a variety of reasons, an enormous number of people migrated from South Asian rural areas to cities throughout the world, transferring what wealth they could through trusted friends and extended family.
  • 145
    • 84872991276 scopus 로고    scopus 로고
    • Michelle Cottle, Hawalah v. The War on Terrorism, Oct. 15, at, Hawala exploded in the 1960s and 1970s, as migrants of Asian and Middle Eastern expatriates arranged to send earnings to family members in their country of origin without paying the high banking and exchange rates required of such transfers in the official banking system
    • Michelle Cottle, Hawalah v. The War on Terrorism, NEW REPUBLIC, Oct. 15, 2001, at 1-2. Hawala exploded in the 1960s and 1970s, as migrants of Asian and Middle Eastern expatriates arranged to send earnings to family members in their country of origin without paying the high banking and exchange rates required of such transfers in the official banking system.
    • (2001) New Republic , pp. 1-2
  • 146
    • 79951899774 scopus 로고    scopus 로고
    • Id. Hawala remains a significant method for large numbers of businesses of all sizes and individuals to repatriate funds and purchase gold.... It is favoured because it usually costs less than moving funds through the banking system, it operates 24 hours per day and every day of the year, it is virtually completely reliable, and there is minimal paperwork required". ORG. FOR ECON. CO-OPERATION AND DEV. OECD FIN. ACTION TASK FORCE ON MONEY LAUNDERING, REPORT ON MONEY LAUNDERING TYPOLOGIES 1999-2000
    • Id. Hawala remains a significant method for large numbers of businesses of all sizes and individuals to repatriate funds and purchase gold.... It is favoured because it usually costs less than moving funds through the banking system, it operates 24 hours per day and every day of the year, it is virtually completely reliable, and there is minimal paperwork required". ORG. FOR ECON. CO-OPERATION AND DEV. (OECD) FIN. ACTION TASK FORCE ON MONEY LAUNDERING, REPORT ON MONEY LAUNDERING TYPOLOGIES 1999-2000 (2000), http://www.fatf-gafi. org/dataoecd/29/37/34038120.pdf.
    • (2000)
  • 147
    • 79951875594 scopus 로고    scopus 로고
    • fact, the Department of the Treasury Under Secretary for Terrorism and Financial Intelligence noted in 2004: as the formal and informal financial sectors become increasingly inhospitable to financiers of terrorism, we have witnessed an increasing reliance by al-Qaida and terrorist groups on cash couriers. The movement of money via cash couriers is now one of the principle methods that terrorists use to move funds
    • In fact, the Department of the Treasury Under Secretary for Terrorism and Financial Intelligence noted in 2004: as the formal and informal financial sectors become increasingly inhospitable to financiers of terrorism, we have witnessed an increasing reliance by al-Qaida and terrorist groups on cash couriers. The movement of money via cash couriers is now one of the principle methods that terrorists use to move funds.
  • 148
    • 79951864148 scopus 로고    scopus 로고
    • Legislative Proposals to, 108th Cong, Prepared testimony of Stuart A. Levey, Undersecretary for Terrorism and Financial Intelligence, U. S. Department of the Treasury hereinafter Levey FSC Testimony. Charitable organizations also may be used by terrorist organizations to move funds
    • Legislative Proposals to Implement the Recommendations of the 9/11 Commission: Hearing Before the H. Comm. on Fin. Servs., 108th Cong. 35 (2004) (Prepared testimony of Stuart A. Levey, Undersecretary for Terrorism and Financial Intelligence, U. S. Department of the Treasury) [hereinafter Levey FSC Testimony]). Charitable organizations also may be used by terrorist organizations to move funds.
    • (2004) Implement the Recommendations of the 9/11 Commission: Hearing Before the H. Comm. on Fin. Servs. , pp. 35
  • 149
    • 79951930610 scopus 로고    scopus 로고
    • supra note 4, at, One notable such case is that of Dihab Shill, a Somali-based hawaladar broker that was identified as the financier of the 1998 attacks on the American embassies in Kenya and Tanzania. One terrorist involved in the attack, Mohamed Al-Owhali, apparently had no money or identity papers, but was nevertheless able to receive funds from Dihab Shill because the al Qaeda contact who sent him cash from Yemen had written a note on the transfer which, according to the Dihab Shill owner in Nairobi, Kenya, said: "This person doesn't have any proper documents... please give him without documents".
    • 9/11 COMMISSION REPORT, supra note 4, at 171. One notable such case is that of Dihab Shill, a Somali-based hawaladar (broker) that was identified as the financier of the 1998 attacks on the American embassies in Kenya and Tanzania. One terrorist involved in the attack, Mohamed Al-Owhali, apparently had no money or identity papers, but was nevertheless able to receive funds from Dihab Shill because the al Qaeda contact who sent him cash from Yemen had written a note on the transfer which, according to the Dihab Shill owner in Nairobi, Kenya, said: "This person doesn't have any proper documents... please give him without documents".
    • Commission Report , vol.9-11 , pp. 171
  • 150
    • 79951891342 scopus 로고    scopus 로고
    • Trail of terrorist dollars that spans the world
    • Nov. 29, at
    • John Willman, Trail of Terrorist Dollars That Spans the World, FIN. TIMES, Nov. 29, 2001, at https://specials.ft.com/attack onterrorism/FT3RNR3XMUC. html.
    • (2001) Fin. Times
    • Willman, J.1
  • 151
    • 79951912073 scopus 로고    scopus 로고
    • Note, however, that the 9/11 Commission found no evidence of hawala being used in connection with the September 11 attacks, supra note 4, at, n. 131
    • Note, however, that the 9/11 Commission found no evidence of hawala being used in connection with the September 11 attacks. 9/11 COMMISSION REPORT, supra note 4, at 499 n. 131.
    • Commission Report , vol.9-11 , pp. 499
  • 152
    • 79951868068 scopus 로고    scopus 로고
    • For instance, according to the estimates of Shaukut Aziz, Pakistan's Minister of Finance and a former executive vice president of Citibank in New York, as of 2001, Pakistani hawala networks accounted for transfers of between two and five billion U. S. dollars per year; on the higher end, this is many multiples greater than the amount of foreign transfers made annually through the official Pakistani banking system
    • For instance, according to the estimates of Shaukut Aziz, Pakistan's Minister of Finance and a former executive vice president of Citibank in New York, as of 2001, Pakistani hawala networks accounted for transfers of between two and five billion U. S. dollars per year; on the higher end, this is many multiples greater than the amount of foreign transfers made annually through the official Pakistani banking system.
  • 153
    • 79951937749 scopus 로고    scopus 로고
    • A nation challenged: Ancient secret system moves money globally
    • See, Oct. 3, at
    • See Douglas Frantz, A Nation Challenged: Ancient Secret System Moves Money Globally, N. Y. TIMES, Oct. 3, 2001, at 2.
    • (2001) N. Y. Times , pp. 2
    • Frantz, D.1
  • 154
    • 84870582519 scopus 로고    scopus 로고
    • See U. S. Dep't of Treasury Secretary John W. Snow, Letter to the Editor, June 29, 2006 hereinafter Secretary Snow Letter stating "while terrorists are relying more heavily than before on cumbersome methods to move money, such as cash couriers, we have continued to see them using the formal financial system...". It stands to reason that the lower the amount involved, the less the ability of the bank to flag and scrutinize a cash transaction due to the sheer volume of daily transactions. The Bank Secrecy Act of 1970, which was amended by the USA PATRIOT Act of 2001, established an arbitrary threshold of $10, 000 for daily cash transactions, above which U. S. banks must file a report known as a "Currency Transaction Report".
    • See U. S. Dep't of Treasury Secretary John W. Snow, Letter to the Editor, N. Y. TIMES, June 29, 2006 [hereinafter Secretary Snow Letter] (stating "[w]hile terrorists are relying more heavily than before on cumbersome methods to move money, such as cash couriers, we have continued to see them using the formal financial system..."). It stands to reason that the lower the amount involved, the less the ability of the bank to flag and scrutinize a cash transaction due to the sheer volume of daily transactions. The Bank Secrecy Act of 1970, which was amended by the USA PATRIOT Act of 2001, established an arbitrary threshold of $10, 000 for daily cash transactions, above which U. S. banks must file a report known as a "Currency Transaction Report".
    • N. Y. Times
  • 155
    • 79951927543 scopus 로고    scopus 로고
    • §§ 5313, 5316 a, Note, however, that U. S. banks must also file a "Suspicious Activity Report" where the bank "knows, suspects or has reason to suspect" that questionable cash transactions are being effected
    • U. S. C. §§ 5313, 5316 (a) (2000). Note, however, that U. S. banks must also file a "Suspicious Activity Report" where the bank "knows, suspects or has reason to suspect" that questionable cash transactions are being effected.
    • (2000) U. S. C. , vol.31
  • 156
    • 79951934969 scopus 로고    scopus 로고
    • Id. § 5318 g
    • Id. § 5318 (g).
  • 157
    • 79951869075 scopus 로고    scopus 로고
    • supra note 4, at, Executive Summary
    • 9/11 COMMISSION REPORT, supra note 4, at 14 (Executive Summary).
    • Commission Report , vol.9-11 , pp. 14
  • 158
    • 79951902815 scopus 로고    scopus 로고
    • See id. at 382 noting that the world financial community has provided strong cooperation in supplying relevant information for investigations
    • See id. at 382 (noting that the world financial community has provided strong cooperation in supplying relevant information for investigations).
  • 159
    • 79951885747 scopus 로고    scopus 로고
    • According to Treasury Department Undersecretary Levey: While terrorist supporters may use code names on the phone, when they send or receive money through the banking system, they often provide information that yields the kind of concrete leads that can advance an investigation. For these reasons, counter-terrorism officials place a heavy premium on financial intelligence.... Despite attempts at secrecy, terrorist facilitators have continued to use the international banking system to send money to one another, even after September 11th
    • According to Treasury Department Undersecretary Levey: [W]hile terrorist supporters may use code names on the phone, when they send or receive money through the banking system, they often provide information that yields the kind of concrete leads that can advance an investigation. For these reasons, counter-terrorism officials place a heavy premium on financial intelligence.... Despite attempts at secrecy, terrorist facilitators have continued to use the international banking system to send money to one another, even after September 11th.
  • 161
    • 33751244161 scopus 로고    scopus 로고
    • First Data, which operates globally, processes massive volumes of credit charge charges and, as such, has access to who purchases what and where they live. See, According to its web site, a sender may send money through Western Union to 245, 000 agent locations in over 200 countries. WesternUnion, last visited Oct. 4, 2007
    • First Data, which operates globally, processes massive volumes of credit charge charges and, as such, has access to who purchases what and where they live. See Ron Suskind, THE ONE PERCENT DOCTRINE 38 (2006). According to its web site, a sender may send money through Western Union to 245, 000 agent locations in over 200 countries. WesternUnion, http://www.westernunion. com/info/selectCountry.asp?origina tion=global (last visited Oct. 4, 2007).
    • (2006) The One Percent Doctrine , pp. 38
    • Suskind, R.1
  • 162
    • 79951877301 scopus 로고    scopus 로고
    • The first public admission of the existence of the program was made on 22 June 2006
    • The first public admission of the existence of the program was made on 22 June 2006.
  • 163
    • 79951871139 scopus 로고    scopus 로고
    • U. S. Is moving on several fronts to police financial transactions
    • See, June 24, at
    • See Glen R. Simpson, U. S. Is Moving on Several Fronts to Police Financial Transactions, WALL ST. J., June 24, 2006, at A4;
    • (2006) Wall St. J.
    • Simpson, G.R.1
  • 164
    • 35648965624 scopus 로고    scopus 로고
    • Bank data sifted in secret by U. S. to block terror
    • see also, June 23, at
    • see also Eric Lichtblau & James Risen, Bank Data Sifted in Secret by U. S. to Block Terror, N. Y. TIMES, June 23, 2006, at A-1;
    • (2006) N. Y. Times
    • Lichtblau, E.1    Risen, J.2
  • 165
    • 79956131769 scopus 로고    scopus 로고
    • Bank records secretly tapped
    • June 23, at
    • Barton Gellman, et al., Bank Records Secretly Tapped, WASH. POST, June 23, 2006, at A-1;
    • (2006) Wash. Post
    • Gellman, B.1
  • 166
    • 53149102325 scopus 로고    scopus 로고
    • U. S. Secretly tracks global bank data
    • June 23, at
    • Josh Meyer & Greg Miller, U. S. Secretly Tracks Global Bank Data, L. A. TIMES, June 23, 2006, at A-1.
    • (2006) L. A. Times
    • Meyer, J.1    Miller, G.2
  • 167
    • 79951870289 scopus 로고    scopus 로고
    • According to its web site, SWIFT was founded in 1973 with the mission of "creating a shared worldwide data processing and communications link and a common language for international financial transactions". SWIFT, About SWIFT, last visited Oct. 4, 2007
    • According to its web site, SWIFT was founded in 1973 with the mission of "creating a shared worldwide data processing and communications link and a common language for international financial transactions". SWIFT, About SWIFT, http://www.swift.com/index.cfm?item-id=1243 (last visited Oct. 4, 2007).
  • 168
    • 79951865558 scopus 로고    scopus 로고
    • SWIFT's web site indicates exactly how expansive its reach is, reporting that it currently provides messaging services and interface software to nearly 8, 100 financial institutions in 206 countries. SWIFT, About SWIFT, last visited Oct. 4, Once the TFTP was publicly acknowledged by a U. S. Government official, SWIFT issued the following statement to help allay fear in the financial markets of abuse: In the aftermath of the September 11th attacks, SWIFT responded to compulsory subpoenas for limited sets of data from the Office of Foreign Assets Control of the United States Department of the Treasury. Our fundamental principle has been to preserve the confidentiality of our users' data while complying with the lawful obligations in countries where we operate
    • SWIFT's web site indicates exactly how expansive its reach is, reporting that it currently provides messaging services and interface software to nearly 8, 100 financial institutions in 206 countries. SWIFT, About SWIFT, http://www.swift.com/index.cfm?item-id=62272 (last visited Oct. 4, 2007). Once the TFTP was publicly acknowledged by a U. S. Government official, SWIFT issued the following statement to help allay fear in the financial markets of abuse: In the aftermath of the September 11th attacks, SWIFT responded to compulsory subpoenas for limited sets of data from the Office of Foreign Assets Control of the United States Department of the Treasury. Our fundamental principle has been to preserve the confidentiality of our users' data while complying with the lawful obligations in countries where we operate.
    • (2007)
  • 169
    • 79951935728 scopus 로고    scopus 로고
    • Press Release, Statement on Compliance by SWIFT, June 23, 2006, available at
    • Press Release, Statement on Compliance by SWIFT, June 23, 2006, available at http://www.swift.com/index.cfm?item-id=59904.
  • 170
    • 79951901515 scopus 로고    scopus 로고
    • Treasury tracks financial data in secret program
    • June 23, at
    • Glen R. Simpson, Treasury Tracks Financial Data in Secret Program, WALL ST. J., June 23, 2006, at A1.
    • (2006) Wall St. J.
    • Simpson, G.R.1
  • 172
    • 79951891341 scopus 로고    scopus 로고
    • See Levey HFSSOI Testimony, supra note 72 noting that the program "played an important role in the investigation that eventually culminated in the capture of Hambali, Jemaah Islamiyya's Operations Chief, who masterminded the 2002 Bali bombings" and uncovered "a key piece of evidence that confirmed the identity of a major Iraqi terrorist facilitator and financier"
    • See Levey HFSSOI Testimony, supra note 72 (noting that the program "played an important role in the investigation that eventually culminated in the capture of Hambali, Jemaah Islamiyya's Operations Chief, who masterminded the 2002 Bali bombings" and uncovered "a key piece of evidence that confirmed the identity of a major Iraqi terrorist facilitator and financier").
  • 173
    • 79951861047 scopus 로고    scopus 로고
    • relevant part, Secretary Snow's letter stated: The decision by The New York Times to disclose the Terrorist Finance Tracking Program, a robust and classified effort to map terrorist networks through the use of financial data, was irresponsible and harmful to the security of Americans and freedom-loving people worldwide. In choosing to expose this program, The Times undermined a highly successful counter-terrorism program and alerted terrorists to the methods and sources used to track their money trails. Secretary Snow Letter, supra note 69. Following the disclosure of the program, Treasury Undersecretary Levey testified: "The Terrorist Finance Tracking Program was... an invisible tool. Its exposure represents a grave loss to our overall efforts to combat al Qaida and other terrorist groups".
    • In relevant part, Secretary Snow's letter stated: The decision by The New York Times to disclose the Terrorist Finance Tracking Program, a robust and classified effort to map terrorist networks through the use of financial data, was irresponsible and harmful to the security of Americans and freedom-loving people worldwide. In choosing to [expose this program], The Times undermined a highly successful counter-terrorism program and alerted terrorists to the methods and sources used to track their money trails. Secretary Snow Letter, supra note 69. Following the disclosure of the program, Treasury Undersecretary Levey testified: "The Terrorist Finance Tracking Program was... an invisible tool. Its exposure represents a grave loss to our overall efforts to combat al Qaida and other terrorist groups".
  • 174
    • 79951875593 scopus 로고    scopus 로고
    • Levey HFSSOI Testimony, supra note 72
    • Levey HFSSOI Testimony, supra note 72.
  • 175
    • 79951918699 scopus 로고    scopus 로고
    • See, § 949d f 2 B LEXIS
    • See 10 U. S. C. S. § 949d (f) (2) (B) (LEXIS 2007).
    • (2007) U. S. C. S , vol.10
  • 176
    • 79951939042 scopus 로고    scopus 로고
    • See, e.g., United States v. Walker-Lindh, 742 E. D. Va
    • See, e.g., United States v. Walker-Lindh, 198 F. Supp. 2d 739, 742 (E. D. Va. 2002);
    • (2002) F. Supp. 2d , vol.198 , pp. 739
  • 177
    • 79951899009 scopus 로고    scopus 로고
    • United States v. Bin Laden, 121, S. D. N. Y, As one court stated in an attempt to disclose surveillance information under the Foreign Intelligence Surveillance Act, "in the area of foreign intelligence gathering, the need for extreme caution and sometimes even secrecy may not be overemphasized".
    • United States v. Bin Laden, 58 F. Supp. 2d 113, 121 (S. D. N. Y. 1999). As one court stated in an attempt to disclose surveillance information under the Foreign Intelligence Surveillance Act, "[i]n the area of foreign intelligence gathering, the need for extreme caution and sometimes even secrecy may not be overemphasized".
    • (1999) F. Supp. 2d , vol.58 , pp. 113
  • 178
    • 79951892634 scopus 로고
    • United States v. Ott, 65 E. D. Ca
    • United States v. Ott, 637 F. Supp. 62, 65 (E. D. Ca. 1986)
    • (1986) F. Supp. , vol.637 , pp. 62
  • 179
    • 84892758831 scopus 로고
    • aff'd, 475 9th Cir
    • aff'd, 827 F.2d 473, 475 (9th Cir. 1987).
    • (1987) F.2d , vol.827 , pp. 473
  • 180
    • 79951904170 scopus 로고    scopus 로고
    • See, at, In considering whether to require security clearances for defense counsel, the court stated that concern over the disclosure of classified information is "heightened in this case because the Government's investigation is ongoing, which increases the possibility that unauthorized disclosures might place additional lives in danger".
    • See Bin Laden, 58 F. Supp. 2d at 121 (In considering whether to require security clearances for defense counsel, the court stated that concern over the disclosure of classified information is "heightened in this case because the Government's investigation is ongoing, which increases the possibility that unauthorized disclosures might place additional lives in danger.").
    • F. Supp. 2d , vol.58 , pp. 121
    • Laden, B.1
  • 181
    • 79951883451 scopus 로고    scopus 로고
    • For instance, in the prosecution of John Walker-Lindh in 2002, a federal district court acknowledged that "given the nature of al Qaeda and its activities, and the ongoing federal law enforcement investigation into al Qaeda, the identities of the interviewed detainees, as well as the questions asked and the techniques employed by law enforcement agents in the interviews are highly sensitive and confidential".
    • For instance, in the prosecution of John Walker-Lindh in 2002, a federal district court acknowledged that "given the nature of al Qaeda and its activities, and the ongoing federal law enforcement investigation into al Qaeda, the identities of the [interviewed] detainees, as well as the questions asked and the techniques employed by law enforcement agents in the interviews are highly sensitive and confidential".
  • 183
    • 33746899988 scopus 로고    scopus 로고
    • Hamdan v. Rumsfeld, 2798, Sources of intelligence information have been protected across the federal legal landscape, and not just in connection with terrorism trials. For example, in
    • Hamdan v. Rumsfeld, 126 S. Ct. 2749, 2798 (2006). Sources of intelligence information have been protected across the federal legal landscape, and not just in connection with terrorism trials. For example, in
    • (2006) S. Ct. , vol.126 , pp. 2749
  • 184
    • 84877858183 scopus 로고
    • CIA v. Sims, 175, the Supreme Court recognized the broad authority of the director of Central Intelligence to withhold intelligence sources from Freedom of Information Act disclosure requests
    • CIA v. Sims, 471 U. S. 159, 175 (1985), the Supreme Court recognized the broad authority of the director of Central Intelligence to withhold intelligence sources from Freedom of Information Act disclosure requests
    • (1985) U. S. , vol.471 , pp. 159
  • 185
    • 84875166073 scopus 로고
    • reiterating its position in Snepp v. United States, 509 n. 3, per curiam, that "the government has a compelling interest in protecting both the secrecy of information important to our national security and the appearance of confidentiality so essential to the effective operation of our foreign intelligence service".
    • reiterating its position in Snepp v. United States, 444 U. S. 507, 509 n. 3 (1980) (per curiam), that "the [g]overnment has a compelling interest in protecting both the secrecy of information important to our national security and the appearance of confidentiality so essential to the effective operation of our foreign intelligence service".
    • (1980) U. S. , vol.444 , pp. 507
  • 186
    • 84865157833 scopus 로고
    • Haig v. Agee, 307
    • Haig v. Agee, 453 U. S. 280, 307 (1981)
    • (1981) U. S. , vol.453 , pp. 280
  • 187
    • 84875166185 scopus 로고
    • quoting Aptheker v. Sec'y of State, 509, a case where the public disclosure of the CIA station chief in Athens, Greece, was quickly followed by his assassination
    • (quoting Aptheker v. Sec'y of State, 378 U. S. 500, 509 (1964), a case where the public disclosure of the CIA station chief in Athens, Greece, was quickly followed by his assassination).
    • (1964) U. S. , vol.378 , pp. 500
  • 188
    • 84892755792 scopus 로고
    • As the original statute addressing the procedures for disclosure of classified information in legal proceedings, CIPA has more developed case law than MRE 505. Hence, this analysis focuses solely on CIPA. CIPA itself has withstood the test of time and its provisions have repeatedly been found constitutional. See, e.g., United States v. Pringle, 427-28 1st Cir
    • As the original statute addressing the procedures for disclosure of classified information in legal proceedings, CIPA has more developed case law than MRE 505. Hence, this analysis focuses solely on CIPA. CIPA itself has withstood the test of time and its provisions have repeatedly been found constitutional. See, e.g., United States v. Pringle, 751 F.2d 419, 427-28 (1st Cir. 1984);
    • (1984) F.2d , vol.751 , pp. 419
  • 189
    • 79951890442 scopus 로고
    • United States v. Wilson, 2d Cir
    • United States v. Wilson, 750 F.2d 7 (2d Cir. 1984);
    • (1984) F.2d , vol.750 , pp. 7
  • 190
    • 79951872942 scopus 로고
    • Note, CIPA under siege: The use and abuse of classified information in criminal trials
    • see also
    • see also Timothy J. Shea, Note, CIPA Under Siege: The use and Abuse of Classified Information in Criminal Trials, 27 Am. Crim. L. Rev. 657 (1990).
    • (1990) Am. Crim. L. Rev. , vol.27 , pp. 657
    • Shea, T.J.1
  • 191
    • 79951867194 scopus 로고    scopus 로고
    • Note further that § 5 of CIPA and § 949d f 1 of the MCA would prevent the accused from disclosing such information unless and until vetted by the court
    • Note further that § 5 of CIPA and § 949d (f) (1) of the MCA would prevent the accused from disclosing such information unless and until vetted by the court.
  • 192
    • 79951858920 scopus 로고    scopus 로고
    • See S. Rep. No. 96-823, at 8 1980
    • See S. Rep. No. 96-823, at 8 (1980);
  • 193
    • 79951907642 scopus 로고    scopus 로고
    • H. R. No. 96-1436, at 12 1980 Conf. Rep.
    • H. R. No. 96-1436, at 12 (1980) (Conf. Rep.);
  • 194
    • 79951930143 scopus 로고    scopus 로고
    • United States v. Johnson, 1365 11th Cir, "CIPA has no substantive impact on the admissibility or relevance of probative evidence". citations omitted
    • United States v. Johnson, 139 F.3d 1359, 1365 (11th Cir. 1998) ("CIPA has no substantive impact on the admissibility or relevance of probative evidence.") (citations omitted).
    • (1998) F.3d , vol.139 , pp. 1359
  • 195
    • 84892683224 scopus 로고    scopus 로고
    • United States v. Dumeisi, 578 7th Cir, citations and quotations omitted
    • United States v. Dumeisi, 424 F.3d 566, 578 (7th Cir. 2005) (citations and quotations omitted);
    • (2005) F.3d , vol.424 , pp. 566
  • 196
    • 84892707350 scopus 로고
    • see also United States v. Smith, 1106 4th Cir, en banc stating that "the circuits that have considered the matter agree with the legislative history... that ordinary rules of evidence determine admissibility under CIPA" citations omitted
    • see also United States v. Smith, 780 F.2d 1102, 1106 (4th Cir. 1985) (en banc) (stating that "[t]he circuits that have considered the matter agree with the legislative history... that ordinary rules of evidence determine admissibility under CIPA") (citations omitted).
    • (1985) F.2d , vol.780 , pp. 1102
  • 197
    • 79951868067 scopus 로고    scopus 로고
    • app. III, § 4
    • 18 U. S. C. app. III, § 4;
    • U. S. C. , vol.18
  • 198
    • 79951913833 scopus 로고    scopus 로고
    • see also Pringle, at
    • see also Pringle, 751 F.2d at 427;
    • F.2d , vol.751 , pp. 427
  • 199
    • 79951926557 scopus 로고    scopus 로고
    • United States v. Libby, 47 D. D. C
    • United States v. Libby, 429 F. Supp. 2d 46, 47 (D. D. C. 2006).
    • (2006) F. Supp. 2d , vol.429 , pp. 46
  • 200
    • 84880281820 scopus 로고
    • Irrespective of the CIPA discovery procedures, the Government's obligation to disclose any evidence in its possession that is exculpatory to a defendant in accordance with Brady v. Maryland, 87, remains. Although the Supreme Court has stated that "there is no general constitutional right to discovery in a criminal case and Brady did not create one, "
    • Irrespective of the CIPA discovery procedures, the Government's obligation to disclose any evidence in its possession that is exculpatory to a defendant in accordance with Brady v. Maryland, 373 U. S. 83, 87 (1963), remains. Although the Supreme Court has stated that "[t]here is no general constitutional right to discovery in a criminal case and Brady did not create one, "
    • (1963) U. S. , vol.373 , pp. 83
  • 201
    • 84868070739 scopus 로고
    • Weatherford v. Bursey, 559, the Government would withhold such evidence at its own risk
    • Weatherford v. Bursey, 429 U. S. 545, 559 (1977), the Government would withhold such evidence at its own risk.
    • (1977) U. S. , vol.429 , pp. 545
  • 202
    • 79951862880 scopus 로고    scopus 로고
    • See United States v. Ramirez, 33 D. D. C, To properly comply with its Brady obligations, the Government would need to assess whether the evidence in its possession was arguably exculpatory and, if so, should submit the evidence to the court for an in camera and ex parte review to secure judicial approval for withholding it from the defense
    • See United States v. Ramirez, 54 F. Supp. 2d 25, 33 (D. D. C. 1999). To properly comply with its Brady obligations, the Government would need to assess whether the evidence in its possession was arguably exculpatory and, if so, should submit the evidence to the court for an in camera and ex parte review to secure judicial approval for withholding it from the defense.
    • (1999) F. Supp. 2d , vol.54 , pp. 25
  • 203
    • 79951901516 scopus 로고
    • See United States v. Felt, 184, D. D. C
    • See United States v. Felt, 491 F. Supp. 179, 184 (D. D. C. 1979).
    • (1979) F. Supp. , vol.491 , pp. 179
  • 205
    • 79951862881 scopus 로고    scopus 로고
    • see also H. R. Rep. No. 96-831, at 27 n. 22 1980
    • see also H. R. Rep. No. 96-831, at 27 n. 22 (1980)
  • 206
    • 79951894467 scopus 로고    scopus 로고
    • reprinted in 1980 U. S. C. C. A. N. 4307 stating that an adversarial proceeding at this stage "would defeat the very purpose" of the Government's request to withhold discovery of the classified materials at issue
    • reprinted in 1980 U. S. C. C. A. N. 4307 (stating that an adversarial proceeding at this stage "would defeat the very purpose" of the Government's request to withhold discovery of the classified materials at issue);
  • 207
    • 79951874231 scopus 로고
    • United States v. Clegg, 17, 6th Cir, noting that the district court allowed the Government to submit classified and unclassified documents for in camera ex parte review to establish their materiality to the defense
    • United States v. Clegg, 740 F.2d 16, 17 (6th Cir. 1984) (noting that the district court allowed the Government to submit classified and unclassified documents for in camera ex parte review to establish their materiality to the defense);
    • (1984) F.2d , vol.740 , pp. 16
  • 208
    • 79951913400 scopus 로고    scopus 로고
    • at, stating that the court can envision making determinations regarding the materiality of classified information in the preparation of the defense ex parte "if the Government is of the view that simply disclosing the nature or mere existence of certain classified information would alone pose significant harm to national security"
    • Libby, 429 F. Supp. 2d at 48 (stating that the court can envision making determinations regarding the materiality of classified information in the preparation of the defense ex parte "if the Government is of the view that simply disclosing the nature or mere existence of certain classified information would alone pose significant harm to national security").
    • F. Supp. 2d , vol.429 , pp. 48
    • Libby1
  • 209
    • 79951886187 scopus 로고    scopus 로고
    • Note that this standard is explicitly set forth for determinations regarding substitutions for classified information at trial, and not for responses to discovery requests. 18 U. S. C. app. III, § 6 c. Nevertheless, courts have applied this same standard for substitution determinations at the discovery stage, as doing so is in line with the underlying purpose of the Act
    • Note that this standard is explicitly set forth for determinations regarding substitutions for classified information at trial, and not for responses to discovery requests. 18 U. S. C. app. III, § 6 (c). Nevertheless, courts have applied this same standard for substitution determinations at the discovery stage, as doing so is in line with the underlying purpose of the Act.
  • 210
    • 84892757005 scopus 로고
    • See United States v. Yunis, 623 D. C. Cir, stating that classified information must be at least helpful to the defense, and not just theoretically relevant
    • See United States v. Yunis, 867 F.2d 617, 623 (D. C. Cir. 1989) (stating that classified information must be at least helpful to the defense, and not just theoretically relevant);
    • (1989) F.2d , vol.867 , pp. 617
  • 211
    • 79951863308 scopus 로고    scopus 로고
    • at, stating that courts should order the disclosure of classified information only if it is "at least essential to the defense, necessary to the defense, and neither merely cumulative nor corroborative" internal citation and quotation marks omitted
    • Smith, 780 F.2d at 1110 (stating that courts should order the disclosure of classified information only if it is "at least essential to [the] defense, necessary to the defense, and neither merely cumulative nor corroborative") (internal citation and quotation marks omitted);
    • F.2d , vol.780 , pp. 1110
    • Smith1
  • 212
    • 84873659964 scopus 로고    scopus 로고
    • see also United States v. Rezaq, 1142 D. C. Cir
    • see also United States v. Rezaq, 134 F.3d 1121, 1142 (D. C. Cir. 1998);
    • (1998) F.3d , vol.134 , pp. 1121
  • 214
    • 79951868213 scopus 로고    scopus 로고
    • See, at
    • See Yunis, 867 F.2d at 623.
    • F.2d , vol.867 , pp. 623
    • Yunis1
  • 215
    • 79951906726 scopus 로고    scopus 로고
    • Id
    • Id.
  • 216
    • 79951864559 scopus 로고    scopus 로고
    • Id. In connection with its determinations, some circuit courts have adopted balancing tests to weigh the defendant's right to prepare his defense against the public's interest in preventing disclosure of classified information
    • Id. In connection with its determinations, some circuit courts have adopted balancing tests to weigh the defendant's right to prepare his defense against the public's interest in preventing disclosure of classified information.
  • 217
    • 79951921446 scopus 로고
    • See, e.g., United States v. Sarkissian, 965 9th Cir
    • See, e.g., United States v. Sarkissian, 841 F.2d 959, 965 (9th Cir. 1988);
    • (1988) F.2d , vol.841 , pp. 959
  • 218
    • 79951863308 scopus 로고    scopus 로고
    • at
    • Smith, 780 F.2d at 1110.
    • F.2d , vol.780 , pp. 1110
    • Smith1
  • 219
    • 84892755792 scopus 로고
    • United States v. Pringle, 425 1st Cir, In relevant part, Rule 16 d 1 provides as follows: 1 Protective and Modifying Orders. Upon a sufficient showing the court may at any time order that the discovery or inspection be denied, restricted or deferred, or make such other order as is appropriate. Upon motion by a party, the court may permit the party to make such showing, in whole or in part, in the form of a written statement to be inspected by the judge alone
    • United States v. Pringle, 751 F.2d 419, 425 (1st Cir. 1984). In relevant part, Rule 16 (d) (1) provides as follows: (1) Protective and Modifying Orders. Upon a sufficient showing the court may at any time order that the discovery or inspection be denied, restricted or deferred, or make such other order as is appropriate. Upon motion by a party, the court may permit the party to make such showing, in whole or in part, in the form of a written statement to be inspected by the judge alone.
    • (1984) F.2d , vol.751 , pp. 419
  • 221
    • 79951939043 scopus 로고    scopus 로고
    • at
    • Pringle, 751 F.2d at 425.
    • F.2d , vol.751 , pp. 425
    • Pringle1
  • 222
    • 79951940713 scopus 로고    scopus 로고
    • Id. as the court pointed out, the legislative history makes clear that §§ 3 and 4 of CIPA "were intended to make explicitly the... limitation of discovery of classified information pursuant to Rule 16".
    • Id. as the court pointed out, the legislative history makes clear that §§ 3 and 4 of CIPA "were intended to make explicitly the... limitation of discovery of classified information pursuant to [Rule 16]".
  • 223
    • 79951926104 scopus 로고    scopus 로고
    • Id. at 427
    • Id. at 427.
  • 224
    • 79951899373 scopus 로고    scopus 로고
    • Id. at 427-28 stating "we have reviewed the classified information and agree with the district court that 'it was not relevant to the determination of the guilt or innocence of the defendants, was not helpful to the defense and was not essential to a fair determination of the cause.'"
    • Id. at 427-28 (stating "[w]e have reviewed the classified information and agree with the district court that 'it was not relevant to the determination of the guilt or innocence of the defendants, was not helpful to the defense and was not essential to a fair determination of the cause.'")
  • 225
    • 84880281820 scopus 로고
    • quoting Brady v. Maryland
    • (quoting Brady v. Maryland, 373 U. S. 83 (1963)).
    • (1963) U. S. , vol.373 , pp. 83
  • 226
    • 79951892195 scopus 로고    scopus 로고
    • For instance, in the course of examining the evidence identifying the financial monitoring program under CIPA's procedures, the court itself could determine that the reliability and/or accuracy of the program warrants adversarial probing. And yet, a court likely would proceed down this road with great caution. In short, where "the Government is seeking to withhold classified information from the defendant, an adversary hearing with defense knowledge would defeat the very purpose of the discovery rules".
    • For instance, in the course of examining the evidence identifying the financial monitoring program under CIPA's procedures, the court itself could determine that the reliability and/or accuracy of the program warrants adversarial probing. And yet, a court likely would proceed down this road with great caution. In short, where "the Government is seeking to withhold classified information from the defendant, an adversary hearing with defense knowledge would defeat the very purpose of the discovery rules".
  • 227
    • 79951890441 scopus 로고    scopus 로고
    • at, quotation and citation omitted
    • Sarkissian, 841 F.2d at 965 (quotation and citation omitted).
    • F.2d , vol.841 , pp. 965
    • Sarkissian1
  • 228
    • 79951939819 scopus 로고    scopus 로고
    • The same cannot be said for human sources of intelligence, whether Government agents, informants or interrogated persons. This is especially true where information is obtained through the interrogation of either the defendant himself or another detainee and the military judge must determine whether the resulting evidence is reliable. For example, evidence may be obtained through an informant with malicious motives or through the testimony of another detainee during an interrogation involving questionable tactics
    • The same cannot be said for human sources of intelligence, whether Government agents, informants or interrogated persons. This is especially true where information is obtained through the interrogation of either the defendant himself or another detainee and the military judge must determine whether the resulting evidence is reliable. For example, evidence may be obtained through an informant with malicious motives or through the testimony of another detainee during an interrogation involving questionable tactics.
  • 229
    • 79951921861 scopus 로고    scopus 로고
    • See supra note 48. The MCA specifically deals with coerced testimony
    • See supra note 48. The MCA specifically deals with coerced testimony.
  • 230
    • 79951916494 scopus 로고    scopus 로고
    • See, § 948r
    • See 10 U. S. C. S. § 948r (2007).
    • (2007) U. S. C. S , vol.10
  • 231
    • 79951913832 scopus 로고    scopus 로고
    • See supra note 44 and accompanying text
    • See supra note 44 and accompanying text.
  • 232
    • 79951882200 scopus 로고    scopus 로고
    • See supra note 40, 105, § 949d f 1
    • See supra note 40. 105 10 U. S. C. S. § 949d (f) (1).
    • U. S. C. S , vol.10
  • 233
    • 79951898555 scopus 로고    scopus 로고
    • Exec. Order No. 13, 292, 198, emphasis added
    • Exec. Order No. 13, 292, 3 C. F. R. 196, 198 (2004) (emphasis added).
    • (2004) C. F. R , vol.3 , pp. 196
  • 234
    • 79951860679 scopus 로고    scopus 로고
    • See supra note 27 and accompanying text
    • See supra note 27 and accompanying text.
  • 235
    • 79951923578 scopus 로고    scopus 로고
    • See, § 949d f 2 B
    • See 10 U. S. C. S. § 949d (f) (2) (B).
    • U. S. C. S , vol.10
  • 236
    • 79951880915 scopus 로고    scopus 로고
    • See id
    • See id.
  • 237
    • 79951888385 scopus 로고    scopus 로고
    • See supra notes 44-45 and accompanying text
    • See supra notes 44-45 and accompanying text.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.