Page 232 - Privacy in a Cyber Age Policy and Practice
P. 232

220  NOTES

              such as these are also best dealt with in a preventative measure, and while they
              make up a tiny percentage of American criminals, they are a large part of the
              terrorist population, large enough to justify a different level of legal protection.
           54. Matthew Waxman writes “criminal justice also has a preventive component . . .
              criminal law is generally retrospective in focus, in that it addresses past acts”
              in “Administrative Detention of Terrorists: Why Detain, and Detain Whom?”
              Journal of National Security Law and Policy 3 (2009): 12–13.
           55.  Coleen Rowley, “Memo to FBI Director Robert Mueller,” May 21, 2002, http://
              globalresearch.ca/articles/ROW205A.html.
           56.  The FBI “provides guidance for law enforcement officers confronted with
              an emergency that may require interrogating a suspect held in custody
              about an imminent threat to public safety without providing Miranda warn-
              ings.” Carl A. Benoit, “The ‘Public Safety’ Exception to Miranda,”  FBI Law
              Enforcement Bulletin  (2011), http://www.fbi.gov/stats-services/publications/
              law-enforcement-bulletin/february2011/legal_digest.
           57.  John Yoo, “The Legality of the National Security Agency’s Bulk Data Surveil-
              lance Programs,” 9 I/S: A Journal of Law and Policy for the Information Society
              (2014): 301.
           58.  El-Motassadeq was later re-tried and convicted but the case demonstrates that
              “even in the most obvious and dramatic instances of terrorist involvement,
              substantial conviction cannot always be achieved.” Brian Whitaker, “Mem-
              ber of 9/11 Terror Cell Jailed,” The Guardian, August 19, 2005, http://www.
              guardian.co.uk/world/2005/aug/20/september11.usa.
           59.  Lucian E. Dervan, “The Surprising Lessons from Plea Bargaining in the
              Shadow of Terror,” Georgia State University Law Review 27, 2 (2011): 239–98.
           60.  The New York Times, “Ali Saleh Kahlah al-Marri,” May 1, 2009, http:// topics.
              nytimes.com/top/reference/timestopics/people/m/ali_saleh_kahlah_al_
              marri/index.html.
           61.  See, for example: Mark A. Rothstein, “Privacy and Technology in the Twenty-
              First Century,” University of Louisville Law Review 52 (2014): 333, 339.
           62.  See, for example: Jameel Jaffer, “Needles are Harder to Find in Bigger Hay-
              stacks,”  The New York Times, June 10, 2013, http://www.nytimes.com/
              roomfordebate/2013/06/09/is-the-nsa-surveillance-threat-real-or- imagined; Ron
              Wyden and Mark Udall, “Wyden, Udall Issue Statement on Effectiveness of
              Declassified NSA Programs,” June 19, 2013, http://www.wyden.senate.gov/news/
              press-releases/wyden-udall-issue-statement-on-effectiveness-of-declassified-
              nsa-programs; Kevin Drum, “The NSA’s Massive Call Record Surveillance Pro-
              gram Barely Accomplishes Anything,” Mother Jones, July 31, 2013, http://www
              .motherjones.com/kevin-drum/2013/07/nsa-surveillance-call-record-program;
              and Robert Zubrin, “PRISM Costs Lives,” National Review Online, June 21, 2013,
              http://www.nationalreview.com/article/351622/prism-costs-lives-robert-zubrin.
           63.  Keith Alexander, as quoted in “House Select Intelligence Committee Holds
              Hearing on Disclosure of National Security Agency Surveillance Programs,”
              Federation of American Scientists, June 18, 2013, pp. 5, 11–13, https://www.
              fas.org/irp/congress/2013_hr/disclosure.pdf.
   227   228   229   230   231   232   233   234   235   236   237