| Acknowledgements |
|
xi | |
| Acronyms and abbreviations |
|
xii | |
| Introduction |
|
xv | |
|
1 The counterterrorism enterprise |
|
|
1 | (20) |
|
|
|
2 | (3) |
|
|
|
5 | (9) |
|
|
|
5 | (2) |
|
B Core: information and intelligence collection and related activities |
|
|
7 | (5) |
|
C Core: law enforcement and the prosecution of terrorists |
|
|
12 | (1) |
|
D Core: the other operational functions |
|
|
13 | (1) |
|
III Overseeing and constraining the counterterrorism enterprise |
|
|
14 | (7) |
|
|
|
14 | (6) |
|
|
|
20 | (1) |
|
2 President Bush and mass surveillance |
|
|
21 | (18) |
|
|
|
21 | (2) |
|
II The President's Surveillance Program (PSP) |
|
|
23 | (4) |
|
III The President's Article II authority |
|
|
27 | (3) |
|
IV The authorization to use military force (AUMF) |
|
|
30 | (1) |
|
V The PSP and the Fourth Amendment: a brief note |
|
|
31 | (2) |
|
VI The PSP and the Foreign Intelligence Surveillance Act (FISA) |
|
|
33 | (5) |
|
|
|
38 | (1) |
|
3 Mass surveillance today |
|
|
39 | (30) |
|
I How bulk databases were/are made |
|
|
39 | (3) |
|
II The debate: mass surveillance in the balance |
|
|
42 | (2) |
|
III The law: FISA, E.O.12333, and the Electronic Communications Privacy Act (ECPA) |
|
|
44 | (1) |
|
|
|
44 | (1) |
|
V FISA and the collection of metadata |
|
|
45 | (4) |
|
A Telephony and Internet metadata: FISA §1842 - pen register/trap and trace (P/T) |
|
|
45 | (2) |
|
B Telephony metadata: § 215 |
|
|
47 | (2) |
|
VI FISA and collecting the content of communications |
|
|
49 | (7) |
|
|
|
49 | (1) |
|
B § 702 and mass content collection |
|
|
50 | (1) |
|
|
|
51 | (2) |
|
|
|
53 | (1) |
|
3 Upstream -- U.S. and upstream-external collection |
|
|
53 | (3) |
|
VII Mass surveillance and the Fourth Amendment |
|
|
56 | (13) |
|
|
|
57 | (1) |
|
1 Is collection a search/seizure? |
|
|
57 | (3) |
|
2 Should a warrant have been obtained prior to collecting? |
|
|
60 | (2) |
|
3 Is bulk collection "reasonable"? |
|
|
62 | (4) |
|
|
|
66 | (1) |
|
|
|
67 | (1) |
|
D Contact chaining, social networking analysis, and FBI assessments |
|
|
67 | (2) |
|
|
|
69 | (20) |
|
I Security between ports of entry |
|
|
70 | (4) |
|
|
|
74 | (1) |
|
III Visas, immigrants and refugees |
|
|
75 | (1) |
|
IV Pre-departure databased screening |
|
|
76 | (2) |
|
V Arrival screening at ports of entry |
|
|
78 | (6) |
|
A Who enjoys the protections of the Fourth Amendment at the border? |
|
|
78 | (1) |
|
B Terminology and principles |
|
|
79 | (1) |
|
|
|
79 | (1) |
|
D Nonroutine searches and reasonable suspicion |
|
|
80 | (1) |
|
E Computers and cell phones and non-forensic searches |
|
|
80 | (1) |
|
F Computers and cell phones and forensic searches |
|
|
81 | (2) |
|
|
|
83 | (1) |
|
VI Exclusion following arrival |
|
|
84 | (1) |
|
|
|
85 | (4) |
|
5 Airline security and the no fly list |
|
|
89 | (14) |
|
I Preflight air safety searches by the Transportation Security Administration (TSA) |
|
|
89 | (3) |
|
II Behavior and profiling |
|
|
92 | (1) |
|
III The No Fly and Selectee Lists |
|
|
93 | (6) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
C Substantive standard for listing a name |
|
|
95 | (4) |
|
|
|
99 | (1) |
|
IV The Constitution and the watchlist |
|
|
99 | (4) |
|
6 Investigating individual suspects |
|
|
103 | (33) |
|
|
|
104 | (1) |
|
II The stages of a terrorist investigation |
|
|
105 | (5) |
|
III Public information and the third party doctrine |
|
|
110 | (1) |
|
|
|
111 | (4) |
|
V Obtaining stored information |
|
|
115 | (4) |
|
VI Stored information held by other governmental agencies |
|
|
119 | (3) |
|
|
|
122 | (4) |
|
|
|
123 | (1) |
|
B Other (non-FISA) search authority |
|
|
124 | (2) |
|
VIII Real time surveillance |
|
|
126 | (6) |
|
A Pen register/trap and trace (P/T) |
|
|
126 | (2) |
|
|
|
128 | (3) |
|
|
|
131 | (1) |
|
|
|
131 | (1) |
|
IX Real time tracking and cell phones |
|
|
132 | (4) |
|
|
|
136 | (34) |
|
I Terrorism and federal crimes: a general overview |
|
|
137 | (2) |
|
|
|
139 | (5) |
|
|
|
144 | (4) |
|
IV The trial - challenges rooted in the Constitution |
|
|
148 | (11) |
|
V The trial - challenges rooted in statutes |
|
|
159 | (4) |
|
VI The trial - challenges rooted in federal rules |
|
|
163 | (1) |
|
VII Pulling a few threads together |
|
|
164 | (6) |
|
8 Military detention and interrogation |
|
|
170 | (20) |
|
I Presidential domestic exercise of the Constitution's Article II military-detention authority |
|
|
171 | (4) |
|
II The detention of U.S. citizens seized on U.S. soil |
|
|
175 | (1) |
|
III Limits on the substantive grounds for detention |
|
|
176 | (1) |
|
IV The President and the Department of Defense |
|
|
177 | (1) |
|
V Congressional authorization of detention |
|
|
178 | (2) |
|
VI Taking stock: statutes and DOD policy |
|
|
180 | (1) |
|
VII The judicial determination of the authority to detain |
|
|
180 | (4) |
|
VIII Procedural due process and proving detainability |
|
|
184 | (1) |
|
IX Indefinite detention, forced feeding and torture |
|
|
185 | (5) |
|
9 Military commissions: trials |
|
|
190 | (16) |
|
I Article III courts and courts-martial |
|
|
191 | (1) |
|
|
|
192 | (2) |
|
III The authority of a President to establish and use military commissions |
|
|
194 | (2) |
|
IV Are there limits on the authority of Congress and the President to establish military commissions? |
|
|
196 | (6) |
|
V Military commission procedures |
|
|
202 | (4) |
|
10 Protection against being "disappeared" |
|
|
206 | (12) |
|
I The writ of habeas corpus: background |
|
|
207 | (1) |
|
II Attempts to deny the availability of the writ |
|
|
208 | (4) |
|
III Habeas corpus procedures |
|
|
212 | (6) |
| Select bibliography |
|
218 | (1) |
| Index |
|
219 | |