Muutke küpsiste eelistusi

E-raamat: Homeland Security Law: A Primer [Taylor & Francis e-raamat]

(University of Rochester, USA)
  • Formaat: 228 pages
  • Ilmumisaeg: 04-Dec-2018
  • Kirjastus: Routledge
  • ISBN-13: 9781315298252
  • Taylor & Francis e-raamat
  • Hind: 161,57 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 230,81 €
  • Säästad 30%
  • Formaat: 228 pages
  • Ilmumisaeg: 04-Dec-2018
  • Kirjastus: Routledge
  • ISBN-13: 9781315298252
Since 2001 the U.S. government has been engaged in the delicate balancing act of seeking to protect the country against terrorism, both foreign-connected and wholly domestic, while taking into account a number of constitutional protections that can all too easily be trammelled in the effort to assure domestic security. At the same time the development of these policies has created significant constitutional tension among the three branches of the federal government, especially when the President vigorously asserts claims of sweeping power as commander-in-chief in such a way as to raise warnings about the emergence of an imperial presidency. Simultaneously, the rule of law has been placed under stress as the technological prowess of the government has grown.

This book addresses these topics in an accessible manner, covering the key developments of domestic security law related to terrorism. Tyll van Geel covers the essential elements of homeland security law including: branches of government and institutions involved in counterterrorism law; border control and immigration; surveillance; the searching of computers and cell phones; the prosecution of terrorists for any number of crimes, including cyberterrorism; military detention; the prosecution of unprivileged enemy belligerents in military commissions; and habeas corpus. The book is designed to offer a clear guide to current issues in domestic security in response to terrorism and will be a valuable guide for concerned citizens as well as undergraduate students studying domestic politics or national security.
Acknowledgements xi
Acronyms and abbreviations xii
Introduction xv
1 The counterterrorism enterprise
1(20)
I The steering mechanism
2(3)
II The core
5(9)
A Overview
5(2)
B Core: information and intelligence collection and related activities
7(5)
C Core: law enforcement and the prosecution of terrorists
12(1)
D Core: the other operational functions
13(1)
III Overseeing and constraining the counterterrorism enterprise
14(7)
A The mechanisms
14(6)
B Effectiveness
20(1)
2 President Bush and mass surveillance
21(18)
I Mass surveillance
21(2)
II The President's Surveillance Program (PSP)
23(4)
III The President's Article II authority
27(3)
IV The authorization to use military force (AUMF)
30(1)
V The PSP and the Fourth Amendment: a brief note
31(2)
VI The PSP and the Foreign Intelligence Surveillance Act (FISA)
33(5)
Conclusion
38(1)
3 Mass surveillance today
39(30)
I How bulk databases were/are made
39(3)
II The debate: mass surveillance in the balance
42(2)
III The law: FISA, E.O.12333, and the Electronic Communications Privacy Act (ECPA)
44(1)
IV FISA overview
44(1)
V FISA and the collection of metadata
45(4)
A Telephony and Internet metadata: FISA §1842 - pen register/trap and trace (P/T)
45(2)
B Telephony metadata: § 215
47(2)
VI FISA and collecting the content of communications
49(7)
A FISA § 1805
49(1)
B § 702 and mass content collection
50(1)
1 About § 702
51(2)
2 PRISM
53(1)
3 Upstream -- U.S. and upstream-external collection
53(3)
VII Mass surveillance and the Fourth Amendment
56(13)
A Collection
57(1)
1 Is collection a search/seizure?
57(3)
2 Should a warrant have been obtained prior to collecting?
60(2)
3 Is bulk collection "reasonable"?
62(4)
B Retention
66(1)
C Querying
67(1)
D Contact chaining, social networking analysis, and FBI assessments
67(2)
4 Securing the borders
69(20)
I Security between ports of entry
70(4)
II Passports
74(1)
III Visas, immigrants and refugees
75(1)
IV Pre-departure databased screening
76(2)
V Arrival screening at ports of entry
78(6)
A Who enjoys the protections of the Fourth Amendment at the border?
78(1)
B Terminology and principles
79(1)
C Routine searches
79(1)
D Nonroutine searches and reasonable suspicion
80(1)
E Computers and cell phones and non-forensic searches
80(1)
F Computers and cell phones and forensic searches
81(2)
G Other border issues
83(1)
VI Exclusion following arrival
84(1)
VII Removal of aliens
85(4)
5 Airline security and the no fly list
89(14)
I Preflight air safety searches by the Transportation Security Administration (TSA)
89(3)
II Behavior and profiling
92(1)
III The No Fly and Selectee Lists
93(6)
A An overview
93(1)
B Consequences
94(1)
C Substantive standard for listing a name
95(4)
D Redress
99(1)
IV The Constitution and the watchlist
99(4)
6 Investigating individual suspects
103(33)
I An initial alert
104(1)
II The stages of a terrorist investigation
105(5)
III Public information and the third party doctrine
110(1)
IV Human intelligence
111(4)
V Obtaining stored information
115(4)
VI Stored information held by other governmental agencies
119(3)
VII Physical searches
122(4)
A FISA physical searches
123(1)
B Other (non-FISA) search authority
124(2)
VIII Real time surveillance
126(6)
A Pen register/trap and trace (P/T)
126(2)
B "Wiretapping"
128(3)
1 Roving surveillance
131(1)
2 Computer hacking
131(1)
IX Real time tracking and cell phones
132(4)
7 The trial
136(34)
I Terrorism and federal crimes: a general overview
137(2)
II Material support
139(5)
III Cyberterrorism
144(4)
IV The trial - challenges rooted in the Constitution
148(11)
V The trial - challenges rooted in statutes
159(4)
VI The trial - challenges rooted in federal rules
163(1)
VII Pulling a few threads together
164(6)
8 Military detention and interrogation
170(20)
I Presidential domestic exercise of the Constitution's Article II military-detention authority
171(4)
II The detention of U.S. citizens seized on U.S. soil
175(1)
III Limits on the substantive grounds for detention
176(1)
IV The President and the Department of Defense
177(1)
V Congressional authorization of detention
178(2)
VI Taking stock: statutes and DOD policy
180(1)
VII The judicial determination of the authority to detain
180(4)
VIII Procedural due process and proving detainability
184(1)
IX Indefinite detention, forced feeding and torture
185(5)
9 Military commissions: trials
190(16)
I Article III courts and courts-martial
191(1)
II Military commissions
192(2)
III The authority of a President to establish and use military commissions
194(2)
IV Are there limits on the authority of Congress and the President to establish military commissions?
196(6)
V Military commission procedures
202(4)
10 Protection against being "disappeared"
206(12)
I The writ of habeas corpus: background
207(1)
II Attempts to deny the availability of the writ
208(4)
III Habeas corpus procedures
212(6)
Select bibliography 218(1)
Index 219
Tyll van Geel is Earl B. Taylor Professor Emeritus, University of Rochester.