Chapter 4
Civil Liberties and Securing the HomelandCivil Liberties and Securing the Homeland
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
Civil Liberties andCivil Liberties and
Securing theSecuring the
HomelandHomeland
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 The Early Republic and Civil WarThe Early Republic and Civil War
 Communism and the Red ScaresCommunism and the Red Scares
 Wartime Internment CampsWartime Internment Camps
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 The Early Republic and Civil WarThe Early Republic and Civil War
 Alien and Sedition ActsAlien and Sedition Acts
 Suspension of the Writ of Habeas CorpusSuspension of the Writ of Habeas Corpus
Martin, Understanding Homeland Security ©
2015 SAGE Publications, Inc.
 Communism and the Red ScaresCommunism and the Red Scares
 The Red Scare of 1919The Red Scare of 1919
 The Red Scare of the 1930sThe Red Scare of the 1930s
 The House Un-American Activities CommitteeThe House Un-American Activities Committee
 The Red Scare of the 1950sThe Red Scare of the 1950s
 Senator Joseph McCarthy and McCarthyismSenator Joseph McCarthy and McCarthyism
Martin, Understanding Homeland Security ©
2015 SAGE Publications, Inc.
 Wartime Internment CampsWartime Internment Camps
 Reasons for RelocationReasons for Relocation
 The War Relocation AuthorityThe War Relocation Authority
 Concentrating the Population of Asians of JapaneseConcentrating the Population of Asians of Japanese
HeritageHeritage
 The Civil Liberties Act of 1988The Civil Liberties Act of 1988
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Practical Considerations: Civil Liberty andPractical Considerations: Civil Liberty and
Government ResponsesGovernment Responses
 Civil Liberty and Countering ExtremismCivil Liberty and Countering Extremism
Through ReformThrough Reform
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Practical Considerations: Civil Liberty andPractical Considerations: Civil Liberty and
Government ResponsesGovernment Responses
 Counterterrorist ObjectivesCounterterrorist Objectives
 Balancing Theory and PracticalityBalancing Theory and Practicality
 Electronic Surveillance and Civil LibertyElectronic Surveillance and Civil Liberty
 Data Mining by the NSAData Mining by the NSA
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Civil Liberty and Countering ExtremismCivil Liberty and Countering Extremism
Through ReformThrough Reform
 Coercive Measures to Counter ExtremismCoercive Measures to Counter Extremism
 Societal and Cultural ResponsesSocietal and Cultural Responses
 Case in Point: Cultural Shifts, Inclusion, and CivilCase in Point: Cultural Shifts, Inclusion, and Civil
Liberty in the United StatesLiberty in the United States
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Terrorist ProfilingTerrorist Profiling
 The Problem of Labeling the enemyThe Problem of Labeling the enemy
 The Ker-Frisbie Rule and ExtraordinaryThe Ker-Frisbie Rule and Extraordinary
RenditionsRenditions
 Case in Point: The Torture DebateCase in Point: The Torture Debate
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Terrorist ProfilingTerrorist Profiling
 Similar to Criminal ProfilingSimilar to Criminal Profiling
 Characteristics Used for Terrorist ProfilingCharacteristics Used for Terrorist Profiling
 Detentions and Material Witness WarrantsDetentions and Material Witness Warrants
 Broad Surveillance NetsBroad Surveillance Nets
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 The Problem of Labeling the EnemyThe Problem of Labeling the Enemy
 Defining TerrorismDefining Terrorism
 Labeling DetaineesLabeling Detainees
 Special Status of SuspectsSpecial Status of Suspects
 Civil Liberties and DetaineesCivil Liberties and Detainees
Martin, Understanding Homeland Security ©
2015 SAGE Publications, Inc.
 The Ker-Frisbie Rule and ExtraordinaryThe Ker-Frisbie Rule and Extraordinary
RenditionsRenditions
 Unconventional Tactics and ExtraordinaryUnconventional Tactics and Extraordinary
RenditionsRenditions
 Use During Drug WarUse During Drug War
 CIA OperationsCIA Operations
Martin, Understanding Homeland Security ©
2015 SAGE Publications, Inc.
 Case in Point: The Torture DebateCase in Point: The Torture Debate
 Abu Ghraib ScandalAbu Ghraib Scandal
 Enhanced InterrogationsEnhanced Interrogations
 Morality and LegitimacyMorality and Legitimacy
 Examples of TechniquesExamples of Techniques
Martin, Understanding Homeland Security ©
2015 SAGE Publications, Inc.

Understanding hs ch 04

  • 1.
    Chapter 4 Civil Libertiesand Securing the HomelandCivil Liberties and Securing the Homeland Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 2.
    Civil Liberties andCivilLiberties and Securing theSecuring the HomelandHomeland Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 3.
     The EarlyRepublic and Civil WarThe Early Republic and Civil War  Communism and the Red ScaresCommunism and the Red Scares  Wartime Internment CampsWartime Internment Camps Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 4.
     The EarlyRepublic and Civil WarThe Early Republic and Civil War  Alien and Sedition ActsAlien and Sedition Acts  Suspension of the Writ of Habeas CorpusSuspension of the Writ of Habeas Corpus Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 5.
     Communism andthe Red ScaresCommunism and the Red Scares  The Red Scare of 1919The Red Scare of 1919  The Red Scare of the 1930sThe Red Scare of the 1930s  The House Un-American Activities CommitteeThe House Un-American Activities Committee  The Red Scare of the 1950sThe Red Scare of the 1950s  Senator Joseph McCarthy and McCarthyismSenator Joseph McCarthy and McCarthyism Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 6.
     Wartime InternmentCampsWartime Internment Camps  Reasons for RelocationReasons for Relocation  The War Relocation AuthorityThe War Relocation Authority  Concentrating the Population of Asians of JapaneseConcentrating the Population of Asians of Japanese HeritageHeritage  The Civil Liberties Act of 1988The Civil Liberties Act of 1988 Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 7.
     Practical Considerations:Civil Liberty andPractical Considerations: Civil Liberty and Government ResponsesGovernment Responses  Civil Liberty and Countering ExtremismCivil Liberty and Countering Extremism Through ReformThrough Reform Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 8.
     Practical Considerations:Civil Liberty andPractical Considerations: Civil Liberty and Government ResponsesGovernment Responses  Counterterrorist ObjectivesCounterterrorist Objectives  Balancing Theory and PracticalityBalancing Theory and Practicality  Electronic Surveillance and Civil LibertyElectronic Surveillance and Civil Liberty  Data Mining by the NSAData Mining by the NSA Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 10.
     Civil Libertyand Countering ExtremismCivil Liberty and Countering Extremism Through ReformThrough Reform  Coercive Measures to Counter ExtremismCoercive Measures to Counter Extremism  Societal and Cultural ResponsesSocietal and Cultural Responses  Case in Point: Cultural Shifts, Inclusion, and CivilCase in Point: Cultural Shifts, Inclusion, and Civil Liberty in the United StatesLiberty in the United States Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 11.
     Terrorist ProfilingTerroristProfiling  The Problem of Labeling the enemyThe Problem of Labeling the enemy  The Ker-Frisbie Rule and ExtraordinaryThe Ker-Frisbie Rule and Extraordinary RenditionsRenditions  Case in Point: The Torture DebateCase in Point: The Torture Debate Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 12.
     Terrorist ProfilingTerroristProfiling  Similar to Criminal ProfilingSimilar to Criminal Profiling  Characteristics Used for Terrorist ProfilingCharacteristics Used for Terrorist Profiling  Detentions and Material Witness WarrantsDetentions and Material Witness Warrants  Broad Surveillance NetsBroad Surveillance Nets Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 13.
     The Problemof Labeling the EnemyThe Problem of Labeling the Enemy  Defining TerrorismDefining Terrorism  Labeling DetaineesLabeling Detainees  Special Status of SuspectsSpecial Status of Suspects  Civil Liberties and DetaineesCivil Liberties and Detainees Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 14.
     The Ker-FrisbieRule and ExtraordinaryThe Ker-Frisbie Rule and Extraordinary RenditionsRenditions  Unconventional Tactics and ExtraordinaryUnconventional Tactics and Extraordinary RenditionsRenditions  Use During Drug WarUse During Drug War  CIA OperationsCIA Operations Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 15.
     Case inPoint: The Torture DebateCase in Point: The Torture Debate  Abu Ghraib ScandalAbu Ghraib Scandal  Enhanced InterrogationsEnhanced Interrogations  Morality and LegitimacyMorality and Legitimacy  Examples of TechniquesExamples of Techniques Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.