Tag Archives: Barack Obama

Obama promotes deal as the best alternative to war

President Barack Obama defended the Iran Deal at American University in Washington, D.C. Wednesday. “Now, we have before us a solution that prevents Iran from obtaining a nuclear weapon without resorting to war,” he said.

Obama to wounded warriors: ‘We’ve got your back’

  • President Barack Obama speaks with spectators after the cyclists have set off on the Soldier Ride. (Nick Kariuki/MEDILL)
    President Barack Obama speaks with spectators after the cyclists have set off on the Soldier Ride. (Nick Kariuki/MEDILL)

WASHINGTON — Under clear skies, President Obama blasted an air horn Thursday to start the Wounded Warrior Project’s Soldier Ride from the White House’s South Lawn.

Speaking before the bikes rolled out, Obama said the event was “a chance to say to all the returning heroes that you’re not alone. That we’ve got your back. We’re going to be with you every step of the way.”

The nationwide, annual ride offers wounded service members and veterans the chance to salve the physical, mental and emotional wounds they may have suffered through cycling and the common bond of military service.

Over 50 riders from all branches of the armed forces signed up for the three-day, 60 mile challenge, many riding on adaptive bicycles.

Obama was joined by Vice President Joe Biden and Veterans Affairs Secretary Bob McDonald. This year marked the sixth time that the event was welcomed to the White House.

The first Soldier Ride was in 2004 when Chris Carney, a Long Island, New York, bartender, biked across the country to raise money for the Wounded Warrior Project, an organization that supports injured troops.

The WWP claims over 68,000 alumni and more than 10,500 family members involved, as of April 1.


Published in conjunction with Military Times Logo

FAA backed away from proposing privacy regulations for drones – but that might be a good thing, experts say

WASHINGTON—When the Federal Aviation Administration released its proposed “framework of regulations” for governing the commercial use of small unmanned aircraft systems last month, people were surprised. After years of failing to act on a 2012 congressional order to develop regulations, the FAA’s proposal seemingly fell from the sky – unexpected, and as it turns out, an unexpected gift to the drone community.

But noticeably missing from the proposed regulations? Privacy.

And the FAA owned up to it. In a privacy impact assessment issued along with the proposed framework, the agency stated that it “acknowledges that privacy concerns have been raised about unmanned aircraft operations. … These issues are beyond the scope of this rulemaking.”

That makes sense, according to Matt Waite. Privacy is not in its wheelhouse.

“The FAA has said all along that it is not a privacy organization – It is an aviation safety organization. They don’t have the experience or the skill[set] to be in the privacy business,” Waite added.

A professor of journalism and founder of the Drone Journalism Lab at the University of Nebraska-Lincoln, Waite said that the FAA more or less intentionally walked away from building privacy regulations into its proposal. “They had been talking about it and had been claiming that that was the reason it was all being delayed [as] they were considering privacy regulations … But ultimately, nothing.”

Waite said that the implications of that choice suggest that states are going to have to make up the difference.

“The FAA has wisely backed off all privacy issues [because] there’s no need for a new federal privacy bureaucracy [when] states already have protections in place,” said Charles Tobin, a privacy rights lawyer and partner at Holland & Knight.

“The laws that are on the books are all technology agnostic. They apply to computers, they apply to still cameras, they apply to wireless microphones, they apply to video cameras … and there’s no reason that they can’t be applied – as already written – to UAVs,” Tobin added.

He said he understands why people are concerned, but suggests we look to history for any insight we might need. “Since the turn of the century, people have expressed concerns about every single new phase of technology [that has been] developed to allow people to gather information in public places and private places, and so over the decades, states have developed a strong series of statutes and precedents in the courts that deal with electronic surveillance, eavesdropping, trespassing and just about any other concern for invasion of privacy.”

To add additional statutes would be more than redundant, Tobin said. It would be confusing for everyone involved. It also leaves the possibility that one law could potentially violate the other.

While recognizing that the FAA made the appropriate call when it chose to step aside, Tobin said the baton has simply been passed on down the line. A presidential memorandum issued the same day as the FAA’s proposed regulations relays the responsibility to “develop a framework regarding privacy, accountability, and transparency for commercial and private UAS use” to the Department of Commerce. The memo states that the department must initiate a “multi-stakeholder engagement process” within 90 days of the memo’s release – so it must begin work by mid-May. According to Tobin, “the development of private industry best practices” by the Department of Commerce is a positive step – but it should avoid stepping further.

Government trying to involve itself in the regulation of a specific piece of technology is just a terrible idea, Waite said. “As we are already seeing, the government lags way behind technology when it comes to laws that would deal with that technology. It’s taken the FAA a long time to come up with rules for these drones and they’re flying around right now. They’re being used for commercial purposes even though the FAA says, ‘No, you can’t do that.’” Law will forever lag behind technology, he said.

“So if that’s the case, then legislatures and policymakers need to acknowledge and accept that and begin to craft rules that are technology agnostic,” Waite added. Because therein lies the solution to any concerns that privacy might be invaded.

Waite said that the key is deciding what we don’t want people to do – what we need to prevent from happening. “We need to start thinking about what we consider a reasonable expectation of privacy in our modern times. And if that’s not allowing [me to] photograph [someone] streaking in their backyard, then that’s great. We can say I can’t do that. But it shouldn’t matter how I do that, [just that] you don’t want me to do it.”

It’s about understanding what we’re offended by. And then realizing that if privacy was violated, then how it was done is unimportant, he added.

The drone-related privacy concerns of the average American are actually pretty obvious, Waite said. They’re afraid of a drone operator peering into their windows like a 21st Century peeping tom, or using them to stalk and harass people. And they’re also afraid that someone might gather information about them and their behaviors.

Amie Stepanovich, senior policy counsel for privacy advocacy group Access Now, said these concerns are genuine because drone technology is in a league of its own. “Drones have [the] capacity to bring a bunch of different surveillance technologies onto a singular platform and to reach into areas that other vehicles have not been able to get to. For example, up into very high buildings or into inside spaces.”

But many of the acts people are fearful of are actually crimes, Waite said. They’re already illegal. “It is illegal for you to fly up and peer in[to] someone’s window, those peeping tom laws already handle that.” He admitted that some states aren’t as advanced as others because they require that an offender physically be on the property to be prosecuted as a peeping tom. “[But] that doesn’t take a great leap of mind to fix that real quick,” he added.

Gathering information through surveillance is a different issue, however, one steeped with potential for abuse. Stepanovich said that limitations should be put in place to restrict the ways in which government agencies can use drone technology. “It’s highly advanced and gives them a great deal [of] increased capability and can be used to collect a great deal of information,” she said.

“We need things that will, for example, protect users’ location information from being collected and tracked. … It comes back to tracking people over time without a warrant and being able to pinpoint their exact location. And this is true with drones but … there are several other different kinds of technologies that are coming out. And we need to make sure that that information is adequately protected.”

The presidential memo issued in conjunction with the FAA’s proposal states that agencies must “comply with the Privacy Act of 1974, which, among other things, restricts the collection and dissemination of individuals’ information that is maintained in systems of records, including personally identifiable information.”

The White House’s assurance that government agencies will be held accountable to legacy privacy standards is a good thing, Stepanovich said, but she recommends further attribution and transparency.

“The FAA has a publicly accessible database of who is able to fly airplanes in any specific geographic area in the United States. But they haven’t made a similar commitment to do that for drone operators,” Stepanovich said. She calls that a double standard.

People won’t know which agency, company or person is behind the remote of the drone flying over their homes. They’re already fearful, so that’s not the best way to go about this, Stepanovich added.

“And so the FAA definitely has a role to play in protecting privacy,” and she recommends the agency operate a full registry. “We’re talking about transparency, requiring that drone users register what technology they are deploying on their drones, and what capacity these drones will have. This just gets at making sure people are aware of what’s going on in their own area,” she added.

“But it should be up to Congress and other agencies to ensure that users don’t violate one another’s privacy rights.” That requires a separate law, but Stepanovich said it would be a mistake to make a new law for a singular piece of technology.

Like Waite and Tobin, she advises technology agnosticism when it comes to lawmaking. Because technology changes frequently. And for that same reason, Stepanovich said the drone privacy debate is an important one: “It will definitely be worth paying attention to because it’s really deciding the future of this technology in the U.S.”

All three agree that the next 24 months will be very exciting. “We’re sort of in the early years of the Wild West stage here, where the rules and the court cases [haven’t happened] yet,” Waite said. “But things are going to happen and they’re going to be tested in court and they’re going to be squared to our constitutional values and when they are, we’ll actually have a fairly stable system.”

“But until then you’re going to have some crazy stuff going on,” Waite added. “You’re going to see people doing things that were never envisioned and you’re going to see [drones] being used in ways that we hadn’t thought of yet. And some of that’s going to be cool and neat and some of it’s going to be kind of ugly.”

One thing is guaranteed: The waiting game has just begun.

White House pushes for student data regulations

WASHINGTON — When the educational company ConnectEDU filed for bankruptcy about a year ago, it tried to do what any business would — sell off its most valuable asset: student data.

Millions of students submitted personal information such as email addresses, birth dates and test scores to the college and career planning company.

The Federal Trade Commission eventually stopped any transactions involving the data after noting that they violated ConnectEDU’s privacy policy.

Some student educational records are protected through the Family Educational and Privacy Rights Act, or FERPA. Originally signed into law in 1974, FERPA essentially protects the records schools collect on students and gives parents certain oversight and disclosure rights.

The growing influence of technology in classrooms and in administrative data collection, though, is making FERPA out-of-date.

Teachers, students and parents now routinely submit information to educational services companies, such as ConnectEDU. FERPA does not regulate how these companies use that data. And there is no other federal law that does. The companies’ own privacy policies are the only limit to what the companies can do with the information users provide.

The concern is that ConnectEDU may not be the only education technology company that is trying to sell its data to third parties.

ConnectEDU’s databases, for example, were filled with students’ personally identifiable information including names, birthdates, email addresses and telephone numbers. The sale of that information to other companies is not regulated.

In order to make FERPA up-to-date, President Barack Obama, in conjunction with partners in the private sector, called for a legislation to establish a national standard to protect students’ data in January.

“It’s pretty straightforward,” Obama said in a speech at the Federal Trade Commission. “We’re saying the data collected on students in the classroom can be used for educational purposes — to teach our children, not to market to our children. We want to prevent companies from selling student data to third parties for purposes other than education. We want to prevent any kind of profiling about certain students.”

Dubbed the Student Digital Privacy Act, the White House’s plan is loosely based on a 2014 California law that prohibits third-party education companies from selling student information. While other states have laws regulating and increasing the transparency, regulation and collection of student data, the California law seems to be the most far-reaching.

Because FERPA doesn’t cover third-party use, some private sector leaders have taken a vow to establish clear industry standards for protecting student data through the Student Privacy Pledge.

Created by the Future of Privacy Forum and the Software and Information Industry Association in the fall of 2014, Obama mentioned the pledge as an encouraging sign for the protection of student information.

“I want to encourage every company that provides these technologies to our schools to join this effort,” Obama said. “It’s the right thing to do. And if you don’t join this effort, then we intend to make sure that those schools and those parents know you haven’t joined this effort.”

So far, 123 companies have signed the pledge, including tech and education giants such as Apple, Microsoft, Google and Houghton Mifflin Harcourt.

“There was a lack of awareness, information and understanding about what school service providers did and didn’t do with data and what the laws required and allowed,” Mark Schneiderman, senior director of education policy at SIIA, said. “Rather than waiting for public policy and public debate to play itself out, we figured, let’s just step in and make clear that the industry is supporting schools, is using data only for school purposes, not selling the data, not doing other things that there was a perception out there that maybe [companies were doing].”

The National Parent-Teacher Association and other groups support the pledge, according to Schneiderman.

“It is imperative that students’ personal informational formation is protected at all times,” the National PTA wrote in a statement.

The companies that signed the pledge are not subject to any policing body, but by signing the pledge they show consumers their commitment to student privacy, Schneiderman said.

But many notable educational technology companies, like Pearson Education, have not signed the pledge. Pearson was recently the subject of a POLITICO investigative report that revealed that the company’s use of student data was unmonitored.

According to the report, Pearson claims it does not sell the students’ data it collects.

The College Board, ACT and Common Application are often viewed as integral to the college admissions process, but are also not included in the pledge.

Instead, these education companies point consumers to their privacy policies, which can often be difficult to understand because of the legal jargon and ambiguous terms.

Some groups such as the Parent Coalition for Student Privacy think the pledge and the privacy policies aren’t enough.

“We also need strong enforcement and security mechanisms to prevent against breaches,” Leonie Haimson, one of the group’s co-chairs, said in a statement responding to Obama’s speech. “This has been a year of continuous scandalous breaches; we owe it to our children to require security provisions at least as strict as in the case of personal health information.”

Out of the 12 commitments listed in the pledge, only one deals with preventing leaks or breaches.

The signees must “maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of student personal information against risks,” the pledge states.

Haimson said the policies are a decent start, but do not go nearly far enough in protecting educational data.

Regardless, a bill for a comprehensive national standard has yet to be introduced despite the White House’s push.

In early February, though, the White House said that it had been working closely with Republican Rep. Luke Messer of Indiana and Colorado Democrat Rep. Jared Polis to introduce a bipartisan bill to Congress.

The bill’s release is expected by the end of the month, according to Messer’s office.MINTZERPRIVACY (9) 2

Private sector remains wary of government efforts to increase cybersecurity collaboration

WASHINGTON– President Barack Obama and lawmakers have announced plans to increase information sharing between the government and the private sector following data breaches at major companies. But companies are hesitant to join these initiatives because of liability and privacy concerns – and sharing information could put them at a competitive disadvantage.

Experts agree information sharing is essential in preventing and responding to cyber attacks, but the government and private sector bring different perspectives and strategies to mitigating the threats.

Companies need to take the approach that there is “strength in numbers,” said Greg Garcia, executive director of the Financial Services Sector Coordinating Council.

“To the extent that we can have what amounts to a neighborhood watch at a national scale, then were going to be better aware of the adversaries and what they’re up to and what they’re trying to do,” Garcia said.

One area where progress has been made is in the sharing of cybersecurity threat indicators, which identify the source of cyber attacks, said Mary Ellen Callahan, former chief privacy officer at the Department of Homeland Security. These indicators can include bad IP addresses, malware that’s embedded in emails or specific coding in software, she said.

DHS and the Mitre Corporation have developed programming languages to improve communication about cyber threat information between the government and the private sector. Structured Threat Information Expression and Trusted Automated Exchange of Indicator Information, known as STIX and TAXII respectively, are used in tandem to quickly share the information.

“It’s one thing to have these executive orders and things, but it’s another to have the technical enablers to make it easy for these companies to do it,” said John Wunder, lead cybersecurity engineer at Mitre. “You want to make it easy to share threat information in a way that you share exactly what you want.”

Yet, these programs haven’t fully developed and more participation is needed to make them effective, said Judith Germano, a senior fellow at New York University School of Law’s Center on Law and Security.

“I hear from companies that they are often less concerned about where the threat is coming from, but what is the threat and what can they do to stop it,” she said. “That’s the valuable information. Some of that is being shared and is very helpful, but it needs to be expanded.”

Last month, Obama announced an executive order promoting cybersecurity information sharing. The order encouraged the development of information sharing and analysis organizations to spearhead collaboration between the private sector and government. He tasked DHS with creating create a nonprofit organization to develop a set of standards for ISAOs.

Despite these efforts, robust information sharing is still lacking.

“Everyone wants information. Nobody wants to give information,” said Mark Seward, vice president of marketing at Exabeam, a big data security analytics company.

Companies fear sharing information with the government could reveal corporate secrets or consumers’ private information, said Martin Libicki, a senior management scientist at the RAND Corporation. He added sharing information with the government could also pose legal risks if the information shows companies did not follow federal regulations.

Germano, who also runs a law firm focused on cybersecurity issues, says cybersecurity collaboration comes down to a matter of trust. The private sector, she said, is weary of the government.

“On one hand [the government is] reaching out as a friend and collaborator to work with companies,” she said. “On the other hand, the same government has an enforcement arm outstretched with the FTC, the SEC that if you do not comply, there can be repercussions, possible lawsuits and other regulatory action taken against you.”

Therefore, only information that is directly related to a threat should be shared and stored, said Callahan, now a partner at Jenner & Block. Further, she said when companies share a large amount of information at once it slows down the process of assessing the threat and they often share more information than is necessary.

The U.S. also lacks “an intelligent and forceful deterrence strategy” for cyber attacks, said Matthew Eggers, senior director of the U.S. Chamber of Commerce’s national security and emergency preparedness department, at a Congressional hearing earlier this month. He also said the government needs to provide more assistance to companies who have suffered from hacks.

“U.S. policymakers need to focus on pushing back against illicit actors and not on blaming the victims of cybersecurity incidents,” Eggers said. 

To address some of these concerns, Sen. Tom Carper, D-Del., introduced in February the Cyber Threat Sharing Act of 2015, which looks to provide liability protections for companies when they share cyber information with the government.

The bill would prohibit the government from using shared cyber threat data as evidence in a regulatory action against the company that shared the information. It also strengthens privacy protections and limits how shared data could be used. The bill has been referred to the Committee on Homeland Security and Governmental Affairs.

In February, Obama also called on the Director of National Intelligence to create the Cyber Threat Intelligence Integration Center, a national intelligence center aimed at “connecting the dots” on cyber threats. The center will “collect intelligence, manage incident response efforts, direct investigations” among other responsibilities.

However, experts remain skeptical about the center.

“What concerns me about that is if you read the president’s memoranda on [the Cyber Threat Intelligence Integration Center], it says that it’s consistent with privacy and civil liberties protections as relevant to that agency,” said Callahan, the Jenner & Block lawyer. “Well, the intelligence community, as you know, has reduced private protections.”

The center’s framework will be similar to that of the National Counterterrorism Center, which is a concern for Libicki, of the RAND Corporation.

“The last cyber attack had elements of terrorism in it. Does that mean we should look at this entire problem purely through the lens of counterterrorism?” Libicki said. “Why are you duplicating a methodological framework that culminates in a set of actions, like predator drones, which are totally inappropriate for cyber?”

Kathleen Butler, a spokesperson for the Office of the Director of National Intelligence, did not have any additional comment beyond the president’s announcement of the center as she said initial planning is still underway.

While experts say it will take time for the private sector to fully engage in the information sharing initiatives, the government’s efforts have been mostly positive.

“This is about enabling people to share what they know and get access to what others know such that protection can be more pervasive,” said Bobbie Stempfley, Mitre’s director of cybersecurity implementation. “That’s really a powerful concept.”

Political analyst Al From talks Democratic Party readiness for 2016

WASHINGTON — Democratic Leadership Council founder and Medill M.S.J. alum Al From turned a critical eye onto his own party during a March 12 visit to the Medill Washington newsroom.

During the talk with Medill undergraduates, From discussed the history of the contemporary Democratic party, political strategy and his analysis of the Democratic party’s prognosis in the battle for the White House in 2016. From’s book “The New Democrats and the Return to Power” serves as a historical guide to how the modern Democratic party came together, but he dedicated much of his current analysis to the party’s future and he pulled no punches.

From started off his evaluation of the Democrats’ current obstacles by calling out Democrats for prioritizing fancy campaign delivery mechanisms over a relatable platform.

“The truth is, despite all the talk about different ways to communicate, you know, no amount of money or technology or social media or campaign strategy or tactics can make up for a message that doesn’t connect with voters,” From said.

He went on to accuse Democrats of being too comfortable with their historic “demographic advantage” in presidential elections and not taking into account factors such as the potential flippability of the Hispanic vote and the recent Republican capture of the Asian vote. From emphasized the idea that “votes are not necessarily forever” and noted that President Barack Obama’s absence from the 2016 ballot could significantly impact the minority and youth votes for the worse.

From also underscored the importance of working to improve the economy vs. solely focusing on minimum wage. He cited an old friend’s success as a case study for this point, attributing the decrease in American equality observed under Bill Clinton’s presidential administration to national economic growth.

“The problem with the Democrats is you spend so much time worrying about the, uh, about passing out the golden eggs, you forget to worry about the health of the goose,” From explained.

Additionally, From said that members of his party must keep healthcare reinvention and modernization at the forefront of their considerations, since there is a correlation between the efficiency of federal services and the public’s faith in government.

“I learned at a very young age that government reform is not an advocation of liberal goals; it’s essential to achieving them,” he said. “Government is our vehicle for doing good things.”

Private sector advises Obama’s cybersecurity proposal

WASHINGTON —President Barack Obama’s cybersecurity information sharing proposal – with its focus on sharing only targeted threat information between private firms and the government is a better approach than “ill-advised” widespread sharing, a former top privacy official for homeland security said Wednesday.

The Committee on Homeland Security’s Cybersecurity, Infrastructure Protection and Security Technologies subcommittee heard from industry, privacy and academic experts regarding what they think cyber threat information sharing should look like. The previous week, Department of Homeland Security representatives went before the entire committee to explain how this legislation could protect Americans from increasing cybersecurity threats.

Obama’s three-part proposal includes increased sharing among private sector companies and between them and the government. It also encourages the formation of Information Sharing and Analysis Organizations and creates certain guidelines for both the private and federal sectors regarding personal information retention and sharing.

Under the legislation, businesses would share information with the Department of Homeland Security’s National Cybersecurity and Communications Integration Center, which would pass it onto relevant federal agencies and ISAOs. Participating businesses would receive targeted liability protection in return.

Mary Ellen Callahan, former Department of Homeland Security chief privacy officer, agreed with this targeted sharing approach, calling immediate widespread sharing of threats “ill-advised.” According to Callahan, private sector threats–usually IP addresses and URLs–are reported to the DHS, and then distilled to remove any personal information.

In the end, government security professionals only have information on the threat, its source and target, and how to combat it.

Subcommittee Chairman John Ratcliffe, R-Texas, referred to recent breaches at companies such as Anthem, Sony Pictures, Target and J.P. Morgan as examples of why the legislation is needed. “We need to pass legislation that facilitates the sharing of cyber threat indicators and contains robust privacy protections to improve collaboration between federal civilian agencies, like DHS, and the private sector,” he said.

Many companies choose not to share cyber threat indicators or breaches with one another or the government for fear of legal liability, or having their names in the media as companies with poor cybersecurity. Without this sharing of information, hackers can use the same tactics repeatedly with multiple companies.

Private companies want to see a bill that would allow them to voluntarily share cyber threats with other organizations, but have flexibility in what they share with the government, according to Matthew Eggers, senior director of National Security and Emergency Preparedness for the U.S. Chamber of Commerce.

“This is a bill trying to convince them to participate in a voluntary program that makes their lives more difficult. For folks like me saying ‘I’m not fond of government being in my cell or ERP (Enterprise Resource Planning–software for data management),’ that’s going to be a neat trick,” Eggers said.

The key will be convincing companies that Obama’s proposal would better protect everyone in the long run.

“We need a federated sharing community, not a competitive one,” Greg Garcia,
executive director of the Financial Services Sector Coordinating Council, said. “Withholding info to get ahead… Balkanizing or siloing information–that defeats the purpose.”

This is not the first time Obama has proposed legislation to safeguard America from cyber attacks. In 2011, he rolled out his Cybersecurity Legislative Proposal in an effort to give the private sector and government the tools they need to combat cyber threats. In 2013, he issued the Executive Order on Improving Critical Infrastructure Cybersecurity, which established cybersecurity framework standards that were developed in tandem with the private industry.

Targeted killing of U.S. citizens lawful, says Holder, but critics pounce


Attorney General Eric Holder announced last week that U.S. citizens are not exempt from being targeted by the government. (Office of the Attorney General)

WASHINGTON – The U.S. government has the right to kill terrorists overseas if they pose an imminent threat and can’t be captured – even if they are American citizens, Attorney General Eric Holder said last week in a major address in Chicago.

Leading civil liberties groups say the administration should involve courts in setting standards for when it is legal to kill terrorists before decisions are made to use lethal force, but other legal scholars assert that providing due process, especially to U.S. citizens, does not necessarily mean providing a judicial process.

Holder’s assertion was the Obama administration’s most weighty justification for armed drone strikes against a terrorist target, specifically a “senior operational leader of al-Qaida or associated forces.” Though Holder didn’t mention anyone by name, the statement comes just months after the government targeted Anwar al-Awlaki, a senior al-Qaida operative in Yemen and an American citizen. Al-Awlaki, who was born in New Mexico, was killed in an unmanned drone strike in September.

“It’s clear that United States citizenship alone does not make such individuals immune from being targeted,” Holder said in a speech at the Northwestern University School of Law. “But it does mean that the government must take into account all relevant constitutional considerations with respect to United States citizens – even those who are leading efforts to kill innocent Americans.”

Holder’s speech is a welcome step toward transparency, said Nathan Wessler, the national security fellow with the American Civil Liberties Union’s National Security Project. But, he added, it’s nowhere near sufficient in opening up the targeted killing program to public scrutiny.

“When we’re talking about killing U.S. citizens, there’s no chance to make it better after they’re dead,” Wessler said. “So it’s very important that courts are involved to help set the standards under which the government can use lethal force, and to evaluate whether they’ve observed the constitution after they carry out a strike.”

Targeted killings are constitutional, Holder said, because they afford targets the due process mandated in the Fifth Amendment, which says that the government may not deprive a citizen of his or her life without due process of law.

Holder argued that the “thorough and careful review” that the government engages in to determine whether a U.S. citizen is a lawful target amounts to due process. He made a distinction between due process and “judicial process,” maintaining that “where national security operations are at stake, due process takes into account the realities of combat.”

Examples of due process without judicial involvement can be found throughout U.S. law, said Charles Stimson, a senior legal fellow at the conservative Heritage Foundation. If the military wants to discharge a soldier, for instance, judge advocate generals, the military justice system’s judiciary, have to review the facts in the case. Though the soldier isn’t tried through the court system, Stimson said the offender has been afforded due process that is “fully consistent with” the constitution.

The Geneva Conventions stipulate that targeted killings are only legal in the context of “armed conflict.” Because the U.S. is engaged in armed conflict with terrorists, Holder said, the government’s targeted killing program complies with international law.

Holder acknowledged that the war the U.S. is waging on terrorists isn’t a conventional one with a set battlefield. Al-Qaida operates out of Afghanistan, he said, but the U.S. can’t afford to limit its self-defense to that battlefield. Holder alluded to al-Alwaki’s Yemeni group, noting that “al-Qaida and its associates have directed several attacks – fortunately, unsuccessful – against us from countries other than Afghanistan.”

“We are at war with a stateless enemy, prone to shifting operations from country to country,” he said. “Our government has both a responsibility and a right to protect this nation and its people from such threats.”

As a lawyer in the Israel Defense Forces, Amos Guiora sat at the table during counterterrorism discussions, helping make decisions in targeted killing cases. Now a law professor at the University of Utah, Guiora said Holder should have done a better job of defining exactly what constitutes a legitimate target. Without a “criteria-based approach” to targeted killing, he said, the government could apply the policy far too broadly.

“We need to have narrow, as in precise, articulations of these definitions in order to ensure that we’re not engaging in, for lack of a better term, overkill,” Guiora said. “And if you have loosey-goosey standards devoid of strictness, then what you ultimately have is a policy of obtuseness which lends itself to abuse.”

Wessler also worries that, devoid of public debate and judicial scrutiny, targeting American citizens will give the government too much power.

“The administration is asking the public just to trust it when it comes to protecting the rights of U.S. citizens who are targeted with lethal force,” Wessler said. “But that can’t be enough.”

Because terrorists who can be lawfully targeted pose an “imminent threat” to national security, Holder said capture can be a “time-sensitive” issue.

“It is preferable to capture suspected terrorists where feasible — among other reasons, so that we can gather valuable intelligence from them — but we must also recognize that there are instances where our government has the clear authority — and, I would argue, the responsibility — to defend the United States through the appropriate and lawful use of lethal force,” Holder said.

The legal authority to capture and detain is the same legal authority to target and kill, Stimson said. Once the government determines a terrorist is a lawful target, it’s up to the president to make a policy decision: capture or kill.

“This administration, because detention has proven, at least in their minds, to be difficult, has chosen to kill rather than capture,” Stimson said. “They prefer justice from 30,000 feet instead of capturing them, lawfully detaining them, lawfully taking them to Guantanamo, giving them an attorney and giving them access to our federal courts through habeas. And that’s a policy decision.”

It’s a decision, Stimson said, that the next administration can easily reverse – or enhance. With an ever-evolving terrorist threat, Holder is adamant that the power to target U.S. citizens is indispensable.

“This is an indicator of our times – not a departure from our laws and our values,” Holder said. “For this administration – and for this nation – our values are clear.”

 

Critics call Obama’s Libya response weak

President Barack Obama came under heavy fire this week for remarks on Libya, which critics on all sides said amounted to little more than wishful thinking.

Indeed, the Lawyer replaced the Orator Wednesday afternoon. Obama said, “This violence must stop,” but offered limited ideas about how his administration will go about coordinating its end.

“The American people extend our deepest condolences to the families and loved ones of all who’ve been killed or injured. The suffering and bloodshed is outrageous and it is unacceptable. So are threats and orders to shoot peaceful protesters and further punish the people of Libya. These actions violate international norms and every standard of common decency.”

The New Republic called the president out Friday for empty words.

“This ‘must’ denotes an order, or a permission, or an obligation, or a wish, or a will. It does not denote a plan. It includes no implication, no expectation, of action. It is the rhetoric of futility: this infection must stop, this blizzard must stop, this madness must stop…. Must the murder of his own people by this madman stop, Mr. President? Then stop it.”

So far, the U.S. has focused on pursuing sanctions and resolutions geared at pressuring longtime Libyan dictator Muammar Qadhafi into ceasing the attacks he has launched against the opposition, his own citizens.

The United Nations Security Council issued a statement Tuesday denouncing Libya’s abusive crackdown, and asking the dictator to act with restraint and respect for human rights.

Politico reported Thursday that the Obama administration also plans to support a Security Council sanctions resolution, expected to be introduced by the United Kingdom Friday.

Meanwhile, as the politicians and diplomats have gone about officially decrying the bloodshed, the situation has continued to escalate. Clashes between pro-government forces and the opposition moved into Tripoli Friday, with more reports of security forces firing indiscriminately into crowds of protesters.

Reports from inside the country indicate the resulting casualties could now number in the thousands, said Navi Pillay, UN high commissioner for human rights.

Speaking at an emergency session of the UN Human Rights Council Friday in Geneva, she said: “We owe [the Libyan people] our solidarity and protection from violence.

Obama said in his speech Wednesday that human rights are not negotiable, but has not presented specific consequences if the Libyan leader, who has vowed to fight to his “last drop of blood,” doesn’t stop.

Such repercussions need to be made clear and soon, a New York Times editorial said Thursday. Otherwise, the newspaper said, Qadhafi will kill hundreds or even thousands more of his own citizens in his struggle to keep power.

“There is not a lot of time. Colonel Qaddafi and his henchmen have to be told in credible and very specific terms the price they will pay for any more killing,” the Times editorialized. “They need to start paying right now.”

The recent evolution of the 'enemy combatant'

Since 2001, the term “enemy combatant” has been primarily applied to terror suspects associated with al-Qaida and the Taliban.

Largely on the basis of its own executive orders, the Bush administration applied the term “enemy combatant” to former Chicago gang member Jose Padilla and Yaser Esam Hamdi, who was a U.S. citizen when he was captured in Afghanistan, reportedly fighting American forces with the Taliban.

In its 2003 World Report, advocacy group Human Rights Watch said, “The use of the ‘enemy combatant’ designation appeared to be intended to circumvent the U.S. criminal justice system and its safeguard of basic rights.”

Civil rights groups often cite the cases of Padilla, who was detained for more than three years without a trial for suspected connections with al-Qaida, and Hamdi. After Hamdi was detained without being charged, he became the subject of the 2004 Supreme Court case Hamdi v. Rumsfeld. The court ruled that while the government could detain unlawful combatants, detainees with U.S. citizenship have a right to challenge their detention.

In 2005, Rep. Adam Schiff, a Democrat from California, introduced the Detention of Enemy Combatants Act, which would permit the president to detain U.S. citizens with connections to al-Qaida but would also “guarantee [detainees] timely access to judicial review.” The bill never left committee, but it made the following statement about enemy combatants:

“The term ‘enemy combatant’ has historically referred to all of the citizens of a state with which the Nation is at war, and who are members of the armed force of that enemy state. Enemy combatants in the present conflict, however, come from many nations, wear no uniforms, and use unconventional weapons. Enemy combatants in the war on terrorism are not defined by simple, readily apparent criteria, such as citizenship or military uniform. And the power to name a citizen as an ‘enemy combatant’ is therefore extraordinarily broad.”

In 2006, President George W. Bush signed the Military Commissions Act, which distinguished between lawful and unlawful enemy combatants. According to the law, lawful enemy combatants are those associated with an opposing government or other organized force who identify themselves in appearance and behavior. In short, unlawful enemy combatants are those who aren’t lawful enemy combatants.

Matthew Lippmann, a professor of criminology, law and justice at the University of Illinois in Chicago, said Bush broadly defined enemy combatants as “people who fall outside the Geneva Conventions who are at war with the United States.”

The Military Commissions Act of 2006 also specified that unlawful enemy combatants could be tried in military courts and thus were not subject to rights including habeas corpus.

In 2008, the U.S. Supreme Court ruled that prisoners have a right to habeas corpus, making that provision of the Military Commissions Act of 2006 unconstitutional.

The Obama administration officially abandoned the term “enemy combatant” last year, though it has continued holding some individuals without trial at Guantanamo Bay. It attributed continued detentions to Congressional and international law, including the Geneva Conventions.

“President Obama said no, I’m not really going to buy into the notion that this is a war,” Lippmann said. “We’re going to prosecute [detainees] in a civilian court and treat them as criminals.”

For a timeline of the history of the term “enemy combatant” in the United States, click here.