Content: <br>Chapter 1 Introduction (pages 1โ9): <br>Chapter 2 The Strategic Environment (pages 11โ22): <br>Chapter 3 Homeland Security Council (pages 23โ32): <br>Chapter 4 Intelligence Gathering (pages 33โ82): <br>Chapter 5 The Department of Homeland Security (pages 83โ92): <br>Chapter 6 The Federa
Homeland Security Law: A Primer
โ Scribed by Tyll van Geel
- Publisher
- Routledge
- Year
- 2019
- Tongue
- English
- Leaves
- 250
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Cover
Half Title
Title
Copyright
Dedication
CONTENTS
Acknowledgements
Acronyms and abbreviations
1 The counterterrorism enterprise
I. The steering mechanism
II. The core
A. Overview
B. Core: information and intelligence collection and related activities
C. Core: law enforcement and the prosecution of terrorists
D. Core: the other operational functions
III. Overseeing and constraining the counterterrorism enterprise
A. The mechanisms
B. Effectiveness
2 President Bush and mass surveillance
I. Mass surveillance
II. The Presidentโs Surveillance Program (PSP)
III. The Presidentโs Article II authority
IV. The authorization to use military force (AUMF)
V. The PSP and the Fourth Amendment: a brief note
VI. The PSP and the Foreign Intelligence Surveillance Actย (FISA)
Conclusion
3 Mass surveillance today
I. How bulk databases were/are made
II. The debate: mass surveillance in the balance
III. The law: FISA, E.O.12333, and the Electronic Communications Privacy Act (ECPA)
IV. FISA overview
V. FISA and the collection of metadata
A. Telephony and Internet metadata: FISA ยง1842 โ pen register/trap and trace (P/T)
B. Telephony metadata: ยง215
VI. FISA and collecting the content of communications
A. FISA ยง1805
B. ยง702 and mass content collection
1. About ยง702
2. PRISM
3. Upstream โ U.S. and upstream-external collection
VII. Mass surveillance and the Fourth Amendment
A. Collection
1. Is collection a search/seizure?
2. Should a warrant have been obtained prior to collecting?
3. Is bulk collection โreasonableโ?
B. Retention
C. Querying
D. Contact chaining, social networking analysis, and FBI assessments
4 Securing the borders
I. Security between ports of entry
II. Passports
III. Visas, immigrants and refugees
IV. Pre-departure databased screening
V. Arrival screening at ports of entry
A. Who enjoys the protections of the Fourth Amendment at the border?
B. Terminology and principles
C. Routine searches
D. Nonroutine searches and reasonable suspicion
E. Computers and cell phones and non-forensic searches
F. Computers and cell phones and forensic searches
G. Other border issues
VI. Exclusion following arrival
VII. Removal of aliens
5 Airline security and the no fly list
I. Preflight air safety searches by the Transportation Security Administration (TSA)
II. Behavior and profiling
III. The No Fly and Selectee Lists
A. An overview
B. Consequences
C. Substantive standard for listing a name
D. Redress
IV. The Constitution and the watchlist
6 Investigating individual suspects
I. An initial alert
II. The stages of a terrorist investigation
III. Public information and the third party doctrine
IV. Human intelligence
V. Obtaining stored information
VI. Stored information held by other governmental agencies
VII. Physical searches
A. FISA physical searches
B. Other (non-FISA) search authority
VIII. Real time surveillance
A. Pen register/trap and trace (P/T)
B. โWiretappingโ
1. Roving surveillance
2. Computer hacking
IX. Real time tracking and cell phones
7 The trial
I. Terrorism and federal crimes: a general overview
II. Material support
III. Cyberterrorism
IV. The trial โ challenges rooted in the Constitution
V. The trial โ challenges rooted in statutes
VI. The trial โ challenges rooted in federal rules
VII. Pulling a few threads together
8 Military detention and interrogation
I. Presidential domestic exercise of the Constitutionโs Article II military-detention authority
II. The detention of U.S. citizens seized on U.S. soil
III. Limits on the substantive grounds for detention
IV. The President and the Department of Defense
V. Congressional authorization of detention
VI. Taking stock: statutes and DOD policy
VII. The judicial determination of the authority to detain
VIII. Procedural due process and proving detainability
IX. Indefinite detention, forced feeding and torture
9 Military commissions: trials
I. Article III courts and courts-martial
II. Military commissions
III. The authority of a President to establish and use military commissions
IV. Are there limits on the authority of Congress and the President to establish military commissions?
V. Military commission procedures
10 Protection against being โdisappearedโ
I. The writ of habeas corpus: background
II. Attempts to deny the availability of the writ
III. Habeas corpus procedures
Select bibliography
Index
๐ SIMILAR VOLUMES
<p>Have you ever wondered why you take off your shoes and scan your bags every time you get on an airplane? Airport security uses high-tech equipment to make sure no one is carrying weapons or explosives. These procedures were created by the Department of Homeland Security. Learn how the DHS helps d