Homeland Security and the Rule of Law: Methodology and Myth Remarks by Dick Thornburgh, Former Attorney General of the United States, to The Dickinson School of Law Chapter of the Federalist Society at Pennsylvania State University Dick Thornburgh (202) 778-9080 dick.thornburgh@klgates.com www.klgates.com The rule of law today is under enormous stress worldwide and is indeed a subject of considerable concern within our own borders. Threats to this cardinal principle underlying our democracy deserve our constant attention, lest we fall prey to the threat of disorder and chaos which afflicts so many areas of our world in this 21st century. The rule of law is the linchpin in efforts to promote democracy and human rights around the world and we dare not overlook its significance in the effort to harmonize differences and promote social and economic growth worldwide as well as in our United States. Our world was changed completely by the events of September 11, 2001. On that date, the ramparts of our fortress America were breached, not by an invading army or by an alien enemy air armada, but by fanatic terrorists with no regard for innocent human life, or indeed for their own. Their cowardly attacks that day on New York, Washington and in the fields of Central Pennsylvania took the lives of some 3,000 innocent persons, most of them going about their ordinary pursuits on that fateful day. This dreadful assault on our country has obliged us to rethink many of our basic assumptions about national defense and homeland security. We are now forced to confront threats totally unlike those we have had to face in times past. But this nation and our people have proved equal to the challenges of the past and we have no reason to suspect that we will be tried and found wanting in responding now. In devising a strategy for responding to these threats, one of the first considerations we have had to deal with is the preservation of our own treasured rights and liberties. Today, the United States continue to stand throughout the world as the prime exemplar of the rule of law and of a democratic political system. We are the envy of many other nations and their peoples for characteristics which, frankly, we all too often take for granted. What we enjoy in our nation is looked on with covetous eyes by many of the world’s people -- especially those still living under despotic rulers, fearful of the knock on the door at night, unable to speak out against injustice, mired in poverty and laboring within backward economies which are often corrupted by their leaders. Worst of all, too many of the world’s peoples today are denied any means to peaceably effect necessary changes in their political and governmental systems. K&L Gates comprises approximately 1,700 lawyers in 28 offices located in North America, Europe and Asia, and represents capital markets participants, entrepreneurs, growth and middle market companies, leading FORTUNE 100 and FTSE 100 global corporations and public sector entities. For more information, visit www.klgates.com. True, we must take note of the fact that, in times of stress, our constitutional principles can be severely tested. The effort to balance national security and individual liberty inevitably produces tension. The late Chief Justice Rehnquist once noted: “in wartime, reason and history both suggest that [the balance between freedom and order] shifts to some degree in favor of order -- in favor of the government’s ability to deal with conditions that threaten the national well-being.” And sometimes that shift runs to excess. History reminds us of the late 18th century Alien and Sedition Acts which posed a genuine threat to freedom of speech and association in the early days of our republic. During the Civil War, even our most revered president, Abraham Lincoln, it must be remembered, felt obliged to suspend the ancient writ of habeas corpus, a move many scholars today view as unconstitutional. Following the end of World War I, the infamous Palmer raids scooped up hundreds Homeland Security and the Rule of Law: Methodology and Myth of aliens in dragnets directed at so-called “radicals.” And, during World War II, Japanese- American citizens were taken from their homes and confined for the duration of hostilities for no reason other than their ethnic background, surely one of the most shameful episodes in U.S. history. So we must always be on the lookout for overreaction in times of war or national emergency, when law enforcement or our intelligence agencies may be tempted to push the envelope of constitutionality too far in defense of our nation. Care must be exercised lest they cross the line into violation of our civil rights and civil liberties. I. Today there is, I perceive, a broad consensus in our nation about the need to fully empower those to whom we have assigned the task of fighting terrorism on our shores. Yet, we as a people have a strong tradition of fearing centralized, secret police power. This view is reflected in the National Security Act of 1947 that created the Central Intelligence Agency but expressly forbade the CIA from having law enforcement authority. Memories of the Nazi Gestapo were still very fresh in our minds in 1947. Even seven years after the tragic events of September 11, 2001, we continue to face the need to develop new techniques to deal with the threat of terrorist activities. The American people rightly will not accept a government that fails to “connect the dots.” It is unacceptable that one federal agency with information about, for example, terrorists’ planned use of weapons of mass destruction should be prevented by law from sharing that information with another agency that might be lacking that very piece of the puzzle needed to thwart the terrorists’ plan. Important distinctions must be made between the roles respectively, of law enforcement and intelligence gathering in the effort to protect our citizenry and our institutions from the menace of terrorism. •Law enforcement seeks legally admissible evidence to prove a specific criminal offense in court before a judge and jury; • Intelligence gatherers, on the other hand, seek enough information, whether legally admissible or not, to thwart planned terrorist attacks. • And these are not the same. One is designed to punish those who have committed terrorist attacks after the fact; the other is designed to prevent terrorist attacks before the fact. This is one of the principal reasons why cooperation between the FBI and the CIA or other intelligence agencies has sometimes been less than ideal in the past. Grand jury testimony and information obtained from court-authorized FBI wiretaps often could not legally be passed on by law enforcement for use by the intelligence community. By the same token, intelligence information often could not be transmitted for use by law enforcement for fear of compromising the sources and methods by which it was obtained, i.e., by jeopardizing the lives of under-cover operatives or cooperating witnesses or by disclosing highly sophisticated electronic surveillance techniques in criminal trials held in open court. Particularly in the wake of September 11, however, the American public would be understandably outraged if told that the information in the files of one government agency was not being fully shared with other agencies when the stakes are as high as they inevitably are in both the prevention and prosecution of terrorist activities. So the law was changed. In the fall of 2001, the Congress by overwhelming margins passed the USA Patriot Act, which sought to remove some of the barriers to full cooperation. These changes may still not prevent some very evil people from escaping actual prosecution sometime in the future. Legally admissible evidence may not, in fact be available to convict them. But the changes will certainly heighten the prospects of thwarting terrorist designs and preventing potential widespread harm and destruction. And I am confident that our criminal justice process can reconcile the need for enhanced homeland security and the observance of our basic constitutional rights and liberties. After all, as United States Supreme Court Justice Robert Jackson once observed, “our bill of rights is not a suicide pact.” 2 Homeland Security and the Rule of Law: Methodology and Myth II. The task is a formidable one. Particularly since not all our laws are accessible to the lay person. Take, for example, Section 104 of the USA PATRIOT Act. That section states, in its entirety: Section 2332e of title 18, United States Code, is amended — (1) b y striking ‘‘2332c’’ and inserting ‘‘2332a’’; and (2) by striking ‘‘chemical’’. Without access to the existing statute, a reader cannot tell that the old law permitted the Attorney General to ask the Secretary of Defense for assistance in the event of a chemical attack whereas the new law applies to any weapon of mass destruction attack. The USA PATRIOT does not read like a novel. To understand it, a reader must have the Act in one hand and all the laws it amended in the other. With 158 sections in ten titles as diverse as providing monetary benefits to survivors of terrorist attacks to changing the statute of limitations for terrorism related offenses, the Act and its counterparts are not an easy read and they have given rise to various myths and misunderstandings. Let me deal with just a handful. Myth Number One: Time and again in the media I hear it said that the Foreign Intelligence Surveillance Act (FISA) is unconstitutional because it does not require probable cause and is an attempt to circumvent the Fourth Amendment itself. This simply is not true The FISA statute itself states plainly that before the Court may issue an order authorizing electronic surveillance, it must first find – and I quote -- “on the basis of the facts submitted by the applicant there is probable cause to believe that—“ • the target of the electronic surveillance is a foreign power or an agent of a foreign power…; • and each of the facilities or places at which the electronic surveillance is directed is being used, or is about to be used, by a foreign power or an agent of a foreign power; Indeed, even the most recent additions to FISA enacted just this past summer, which extended the FISA Court’s reach to the targeting for electronic surveillance purposes of United States persons outside of the United States require the court to find that “there is probable cause to believe that the target is – • a person reasonably believed to be located outside the United States; and • a foreign power, an agent of a foreign power, or an officer or employee of a foreign power. The Supreme Court has never reached the issue, but every Court of Appeals to consider the matter to date has found FISA’s procedures authorizing electronic surveillance to be constitutional. The Foreign Intelligence Surveillance Court of Review examined FISA after the statute was amended by the USA PATRIOT Act and concluded in no uncertain terms: “FISA as amended is constitutional because the surveillances it authorizes are reasonable.” That is, after all, what the Fourth Amendment emphatically requires: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” Myth Number Two: The Military Commissions Act of 2006 (MCA), passed by Congress and signed into law by President Bush in 2006 creates a system of “Kangaroo Courts.” Not so. The Commissions may be used to try only alien, unlawful combatants. The MCA requires that an accused be given notice of the charges and specifications against him and be permitted to: • present evidence in his defense; • c ross-examine the witnesses who testify against him; • e xamine and respond to evidence admitted against him on the issue of guilt or innocence and for sentencing; • be present at all sessions of the military commission (other than those for deliberations or voting), except when the accused persists in conduct that endangers the physical safety of individuals or disrupts the proceedings; 3 Homeland Security and the Rule of Law: Methodology and Myth • receive the assistance of counsel, both military and civilian; and • represent himself, if he so chooses. Moreover, the MCA explicitly states, “[n]o person shall be required to testify against himself at a proceeding of a military commission,” and that “[a] statement obtained by use of torture shall not be admissible in a military commission under this chapter, except against a person accused of torture as evidence that the statement was made.” The MCA does not permit the use of secret evidence that the defendant and his attorneys are not permitted to see. All of these provisions are entirely consistent with the rights granted our own citizens in the federal district courts. The variances from our civilian criminal courts found in the MCA are, I submit, reasonable accommodations to the circumstances of warfare. For example, the MCA requires that the traditional rules of evidence apply “so far as … practicable or consistent with military or intelligence activities.” The exception to the traditional rules is that the MCA permits introduction of hearsay evidence if, but only if, adequate notice is given to the opposing party and that party fails to establish “that the evidence is unreliable or lacking in probative value.” In any event, no evidence is admissible the “probative value of which is substantially outweighed … by the danger of unfair prejudice.” Even in our civilian criminal courts, hearsay is generally only excluded if it does not meet any of a long list of exceptions and if it is presented to a civilian jury. Federal Rule of Evidence 1101 makes the rules inapplicable to preliminary questions of fact, grand jury proceedings and miscellaneous proceedings such as sentencings, bail hearings, suppression hearings and similar matters that are normally tried before judges without a jury. In many instances, it simply would be impractical or impossible to make available to testify personally in protracted court proceedings military or intelligence officers who are in combat on the other side of the world. Myth Number Three: The MCA is deficient in that it does not provide for alien unlawful enemy combatants to be tried by a jury of their peers. Although different from the practice in U.S. civilian courts, this is not unusual in the world at large. The various international courts such as the International Court for the Former Yugoslavia or the International Court for Rwanda also use the commission system, rather than attempt to locate a lay jury of the defendant’s peers. Juries are not the norm in those nations which follow the civil law system, which is a large part of even the Western Democracies. Myth Number Four: The military commissions do not have an exclusionary rule to prevent the introduction of otherwise reliable evidence “on the grounds that the evidence was not seized pursuant to a search warrant or other authorization.” True, but the exclusionary rule is designed to deter police misconduct. In the case of military commissions, the evidence is often gathered by soldiers who cannot be expected to be trained in evidence collection. Indeed, U.S. courts are not even authorized to issue search warrants for places outside of the United States. As the Supreme Court has stated: “[T]he purpose of the Fourth Amendment was to protect the people of the United States against arbitrary action by their own Government; it was never suggested that the provision was intended to restrain the actions of the Federal Government against aliens outside of the United States territory.” Rather, the standard for admissibility is this: “Evidence shall be admissible if the military judge determines that the evidence would have probative value to a reasonable person.” This is wholly a truth-seeking standard, without any trade-offs to serve other societal values such as deterring police misconduct. Myth Number Five: The MCA exempts its proceedings from the speedy trial provisions of the Uniform Code of Military Justice. True again, but this, too, makes sense in context. Many of the unlawful enemy combatants held by the military were arrested in order to obtain intelligence, and they are not detained as a result of the pendency of proceedings before the military commissions. As Justice O’Connor noted in the Hamdi case: “The capture and detention of lawful combatants and the capture, detention, and trial of unlawful combatants, by ‘universal agreement and practice,’ are ‘important incident[s] of war,” and the United States may detain 4 Homeland Security and the Rule of Law: Methodology and Myth such people – separate and apart from trials by military commissions – “for the duration of the relevant conflict.” Myth Number Six: The MCA does not always require a unanimous vote for conviction. Again true, but it does require the commission to have at least twelve members and that they be unanimous as to both guilt and sentence before imposing a death penalty. The use of secret military tribunals to try those charged as unlawful combatants is a procedure first approved by our Supreme Court in the 1942 Ex Parte Quirin case involving World War II Nazi saboteurs. Such tribunals must be available as an option where sensitive intelligence information might be disclosed in a trial in open court or where it is deemed wise to avoid providing a public platform for terrorists to spew their messages of hatred and extremism. Such a tribunal might well be appropriate, for example, for the trial of Osama bin Laden himself if and when he is finally brought to justice. Myth Number Seven: Is not a myth at all, but a shocking reminder of a lingering deficiency in our system of justice. There is, in fact, no crime of terrorism triable in our federal criminal courts. In 1996, Congress passed the Anti-terrorism and Effective Death Penalty Act – commonly known as the AEDPA – which added Section 2332b to Title 18, the Federal criminal code. Subsection (g)(5) states that “the term ‘Federal crime of terrorism’ means an offense that … is calculated to influence or affect the conduct of government by intimidation or coercion, or to retaliate against government conduct; and …” is a violation of any one of a list of offenses that includes such things as destroying aircraft, taking hostages, and using a weapon of mass destruction. Presumably, these particular offenses were listed because Congress believed them to be the sort of things that terrorists do. But, what some academics call the “dirty little secret of Section 2332b” is that Congress did not impose any penalty for committing such a defined “federal crime of terrorism.” Nowhere. What the section actually prohibits is conduct that transcends national boundaries and is a violation of one of a wholly separate and substantially shorter list of offenses contained in subsection (a). Nowhere in the entire 106 pages of the AEDPA is the term “federal crime of terrorism” used except in its own definition! Apparently, having trouble agreeing on a definition of terrorism, Committee members drafting the bill adopted the concept of “transcending national boundaries” as a surrogate for a definition of terrorism. They altered the “prohibited acts” portion of the statute so that it referred to “conduct transcending national boundaries” instead of to a “federal crime of terrorism,” but no one thought to remove the now orphaned definition from the statute. The only actually crime of “terrorism” as such is set forth in the Military Commissions Act. Section 950v(b)(24) of the MCA creates an offense named simply “Terrorism,” which prohibits an unlawful combatant from intentionally killing or inflicting great bodily harm upon protected persons if they do so in a manner calculated to influence or affect the conduct of a government or civilian population by intimidation or coercion or to retaliate against government conduct. There are at least 14 other definitions of “terrorism” in the United States Code. Sometimes the law defines it by the purpose for which an act is committed, such as to coerce a government. Sometimes Congress defines it by simply providing a list of offenses that are deemed to be terrorism-related. And, sometimes the definition combines both the purpose and a list of offenses. Still other offenses are generally deemed to be terrorism because of the conduct involved – such as using a biological weapon – without any specific mention of the word “terrorism.” A fifth definitional approach employs a surrogate concept, such as the above-noted “transcending national boundaries.” One statute, Title 18, Section 2332, although in a chapter entitled “Terrorism” does not use that word at all, but attempts to limit its otherwise very broad scope by providing that “No prosecution for any offense described in this section shall be undertaken by the United States except on written certification of the Attorney General or the highest ranking subordinate of the Attorney General with responsibility for criminal prosecutions that, in the judgment of the certifying official, such offense was intended to coerce, intimidate, or retaliate against a government or a civilian population.” Apparently, 5 Homeland Security and the Rule of Law: Methodology and Myth Congress decided it was better to assign the determination of whether an act constitutes terrorism to the Attorney General rather than to a judge and jury. To be sure, Congress is not alone in finding it difficult to define “terrorism.” There is no agreed definition under international law or in academia, either. Much academic literature defines terrorism as the unlawful targeting of non-combatants, a concept generally absent from legal definitions. And, of course, the parameters of a definition may vary by the use to which the term is put. Still, the many, varied, and inconsistent definitions in the United States Code reflect the lack of a unified legal theory for identifying just what conduct should be prohibited. The AEDPA is itself an example of this reactive approach. The statute was largely a result of recommendations from the Department of Justice based upon its experiences in trying those who bombed the World Trade Center in 1993 and in related cases involving al Qaeda members in New York. The Department found the best available statute in the early 1990s to be the 19th Century prohibition on seditious conspiracy. That was the charge used because at the time the Code lacked suitable offenses for intervening in a terrorist scheme before the terrorists actually struck. The AEDPA added the offenses of providing material support for terrorism in order that the criminal law might be brought to bear to deprive terrorists the resources needed to carry out attacks. We should remember that the notion of prevention, rather than prosecution, is properly given priority in the field of terrorism. As noted, public expectations may be disappointed in some cases where terrorist acts are thwarted by effective intelligence gathering that did not produce legally admissible evidence that would support a criminal prosecution or when prosecution is deemed to be unwise because of the potential exposure of informants or sophisticated intelligence gathering techniques. The public and the media must understand that not all bad guys will be prosecuted, and many of those who are will be charged with offenses less dramatic than actual bombings or killings. III. The AEDPA is hardly the only example of Congress taking a somewhat addled approach to defining criminal offenses. Our federal criminal law has developed largely as a series of sporadic responses to widely publicized criminal conduct that either touched upon a federal interest or provoked an expression of congressional outrage. It has been cast in a multitude of fashions that reflects the idiosyncratic imprint of a two century-long parade of draftsmen possessing quite different views of crime, justice, and the English language, but that is a story for another day. Suffice to say that while Congress may not have identified what constitutes the offense of “terrorism,” it has found time to create over 4,450 separate crimes, including such supposedly nefarious federal offenses as: • using a motor vehicle to capture a wild burro on public land; • reproducing the image of “Smokey Bear” without authorization; • wearing the uniform of a postman in a theatrical production that tends to discredit the postal service; • taking artificial teeth into a state without approval of a local dentist; • using a personal check to pay a debt of less than one dollar; and • broadcasting information concerning prizes in a fishing contest conducted for profit. It has long been clear that we need a body of law that is reasonably accessible, permitting both lawyers and laymen, if so disposed, to locate its core provisions with the expenditure of only a modest amount of effort. But that effort has languished without progress over nearly two centuries. 6 Homeland Security and the Rule of Law: Methodology and Myth *** We must recognize that some of the actions taken since 9/11 are controversial. That controversy will continue. We must work to make sure that the debate and the dissenters are correctly informed about just what the various legal reforms do and do not do. The law will continue to evolve as law enforcement focuses on a prevention paradigm and as, one continues to hope, the federal criminal law is someday truly codified in a rational manner. When all is said and done, I am confident that ways will be found to reconcile our liberties with our national security. The key will be in our longestablished reliance on the principles of democracy and the rule of law. An observer once noted that the beauty of our system is not that it is always right, but that it is usually responsive. And so it is and, I expect, will continue to be. I am banking on this principle to help guarantee that we not only survive the present challenges, but continue to stand as an exemplar for all those countries which seek the blessings of liberty and justice and security for their people. K&L Gates comprises multiple affiliated partnerships: a limited liability partnership with the full name K&L Gates LLP qualified in Delaware and maintaining offices throughout the U.S., in Berlin, in Beijing (K&L Gates LLP Beijing Representative Office), and in Shanghai (K&L Gates LLP Shanghai Representative Office); a limited liability partnership (also named K&L Gates LLP) incorporated in England and maintaining our London and Paris offices; a Taiwan general partnership (K&L Gates) which practices from our Taipei office; and a Hong Kong general partnership (K&L Gates, Solicitors) which practices from our Hong Kong office. K&L Gates maintains appropriate registrations in the jurisdictions in which its offices are located. A list of the partners in each entity is available for inspection at any K&L Gates office. This publication/newsletter is for informational purposes and does not contain or convey legal advice. The information herein should not be used or relied upon in regard to any particular facts or circumstances without first consulting a lawyer. Data Protection Act 1998—We may contact you from time to time with information on K&L Gates LLP seminars and with our regular newsletters, which may be of interest to you. We will not provide your details to any third parties. Please e-mail london@klgates.com if you would prefer not to receive this information. ©1996-2008 K&L Gates LLP. All Rights Reserved. 7